WorldWideScience

Sample records for deploying ip telephony

  1. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  2. Standardization efforts in IP telephony

    Science.gov (United States)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  3. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Design and implementation of a system to interconnect VoIP services and CERN’s telephony networks

    CERN Document Server

    Pohančeník, Martin; Segeč, Pavel

    The purpose of this diploma thesis was to design and implement a system that would provide an interface of CERN’s telephony network for Voice over IP services (SIP-based services specifically). This system thus serves as an entry point for calls originating from outside of CERN’s telephony network and enables users of these services to call CERN’s fixed and mobile phone numbers. The theoretical part of the thesis talks in detail about the project specification and describes the goals that were trying to be achieved. It also describes the topic of VoIP telephony and current trends, alongside with analysis of the current telephone network of CERN. The practical part is targeted to explain the design of the solution and deployment of the system at CERN. The final part of the thesis shows testing scenarios and results and states several extension capabilities.

  6. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  7. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  8. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  9. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  10. The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia

    OpenAIRE

    Md Khaled Shukran

    2011-01-01

    IP telephony is a transmission of voice and data over Packet Switched IP Networks and it has become a key issue in the telecommunication industry worldwide because of its higher efficiency and cheapest call rate. Hence, most of the countries in the world set up their telecommunication platform on IP based network as a fast revenue generating sources. Though Malaysia is on the way forward on IP based platform but the growth is not reached at satisfactory level due to the absence of effective r...

  11. Telephony Over IP: A QoS Measurement-Based End to End Control Algorithm

    Directory of Open Access Journals (Sweden)

    Luigi Alcuri

    2004-12-01

    Full Text Available This paper presents a method for admitting voice calls in Telephony over IP (ToIP scenarios. This method, called QoS-Weighted CAC, aims to guarantee Quality of Service to telephony applications. We use a measurement-based call admission control algorithm, which detects network congested links through a feedback on overall link utilization. This feedback is based on the measures of packet delivery latencies related to voice over IP connections at the edges of the transport network. In this way we introduce a close loop control method, which is able to auto-adapt the quality margin on the basis of network load and specific service level requirements. Moreover we evaluate the difference in performance achieved by different Queue management configurations to guarantee Quality of Service to telephony applications, in which our goal was to evaluate the weight of edge router queue configuration in complex and real-like telephony over IP scenario. We want to compare many well-know queue scheduling algorithms, such as SFQ, WRR, RR, WIRR, and Priority. This comparison aims to locate queue schedulers in a more general control scheme context where different elements such as DiffServ marking and Admission control algorithms contribute to the overall Quality of Service required by real-time voice conversations. By means of software simulations we want to compare this solution with other call admission methods already described in scientific literature in order to locate this proposed method in a more general control scheme context. On the basis of the results we try to evidence the possible advantages of this QoS-Weighted solution in comparison with other similar CAC solutions ( in particular Measured Sum, Bandwidth Equivalent with Hoeffding Bounds, and Simple Measure CAC, on the planes of complexity, stability, management, tune-ability to service level requirements, and compatibility with actual network implementation.

  12. Comparison of H.323 and SIP for IP telephony signaling

    Science.gov (United States)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  13. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  14. The extended TRIP supporting VoIP routing reservation with distributed QoS

    Science.gov (United States)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  15. Open-Source Telephony Infrastructure

    CERN Document Server

    CERN. Geneva

    2018-01-01

    TONE (Telephony Open-source Network Evolution) is CERN’s future-proof telephony network. Over the past few years, TONE has evolved from its initial design to a solid reality that accommodates some of CERN’s most critical communication services.   TONE’s architecture was designed to: -          Use VoIP (Voice over IP) standard protocols. -          Avoid vendor lock-in by using open-source components. -          Reduce operational costs. -          Be built on top on the IT department’s Agile Infrastructure, combining Virtual Machines and redundant physical servers.   In this presentation we will review the project’s past and future milestones, main use cases and detailed network architecture.

  16. Telephony user survey

    CERN Multimedia

    IT Department

    2016-01-01

    Let us know your needs to better plan the transition to a new CERN telephony system.   CERN is planning to upgrade its telephony network and replace the system with a new and modern VoIP infrastructure. We strive to make this transition as beneficial and smooth as possible for you. Please let us know more about your current working environment, expectations and suggestions by responding to this survey: https://cern.ch/tel-survey. The more answers we get, the better the new system will serve everyone in the future. The survey will take you about five minutes to complete; we are counting on your feedback!

  17. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  18. Fixed telephony evolution at CERN

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    The heart of CERN’s telephony infrastructure consists of the Alcatel IP-PBX that links CERN’s fixed line phones, Lync softphones and CERN’s GSM subscribers to low-cost local and international telephony services. The PABX infrastructure also supports the emergency “red telephones” in the LHC tunnel and provides vital services for the Fire and Rescue Service and the CERN Control Centre. Although still reliable, the Alcatel hardware is increasingly costly to maintain and looking increasingly outmoded in a market where open source solutions are increasingly dominant. After presenting an overview of the Alcatel PABX and the services it provides, including innovative solutions such as the Closed User Group for our mobile telephony services, we present a possible architecture for a software based system designed to meet tomorrow’s communication needs and describe how the introduction of open-source call routers based on the SIP protocol and Session Border Controllers (SBC) could foster the introduction...

  19. Analysis of Techniques for Protection Against Spam over Internet Telephony

    NARCIS (Netherlands)

    Quinten, Vincent M.; van de Meent, R.; Pras, A.; Pras, Aiko; van Sinderen, M.J.; van Sinderen, Marten J.

    2007-01-01

    Spam in Internet telephony (SPIT) networks is likely to become a large problem in the future, as more and more people and companies switch from traditional telephone networks to Voice over IP (VoIP) networks, and as it is easy to spam VoIP users. The goal of this survey paper is to identify

  20. Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2010-06-01

    Full Text Available 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

  1. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  2. Design & Implementation of IP-PBX for Small Business Organization

    OpenAIRE

    Mr. Sandeep R. Sonaskar; Dr. M. M. Khanapurkar

    2012-01-01

    Most of the small business organization uses old Electronics Private Branch Exchange (EPBX) System for the telephony communication. This EPBX is now could be replaced by Internet protocol telephony PBX called IP-PBX which uses Intranet as a backbone as each organization has pre installed local area network. The network architecture for the IPPBX system is easy to design

  3. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  4. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy. Volume 1

    Science.gov (United States)

    2007-10-01

    endpoint server, H.323<->SIP Proxy, SIP session border controller, SIP router, SIP registration server, Jingle server, ISDN passive and active...34 Support for SIP, AIX2, H.323 and Jingle protocols " Support for traditional digital telephony circuits, including hardware support for personal

  5. Enhanced service zone architecture for multiservices over IP

    Science.gov (United States)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  6. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  7. IP Telephony Applicability in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Francisco Palacios

    2018-02-01

    Full Text Available This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX; and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users.

  8. Applied Multiprotocol Routing in IP Telephony

    Directory of Open Access Journals (Sweden)

    Miroslav Voznak

    2010-01-01

    Full Text Available The aim of the project was to create a multi-protocol system using SIP, H.323 and MGCP standards, which would ensure routing to various types of VoIP networks. The priority was to provide multi-protocol support to SIP and H.323 signalling and the support of the routing using the ENUM standard which has recently passed from the trial phase into full operation in the Czech Republic. The document describes the system's architecture and the components used. It also briefly describes ENUM.

  9. Voice and Video Telephony Services in Smartphone

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Multimedia telephony is a delay-sensitive application. Packet losses, relatively less critical than delay, are allowed up to a certain threshold. They represent the QoS constraints that have to be respected to guarantee the operation of the telephony service and user satisfaction. In this work we introduce a new smartphone architecture characterized by two process levels called application processor (AP and mobile termination (MT, respectively. Here, they communicate through a serial channel. Moreover, we focus our attention on two very important UMTS services: voice and video telephony. Through a simulation study the impact of voice and video telephony is evaluated on the structure considered using the protocols known at this moment to realize voice and video telephony

  10. Change of Mobile Telephony Operator

    CERN Multimedia

    2015-01-01

    Following a call for tenders issued in 2014, CERN has agreed a contract with Swisscom for the provision of mobile telephony services from 1 July 2015.     The Sunrise equipment on CERN sites will therefore be switched off from this date and people with a CERN mobile subscription will need to exchange their Sunrise SIM card for a new one from Swisscom, with a new mobile number (the last 4 digits will remain the same). We cannot give further details at present as we are still finalising arrangements for the deployment of the new network with Swisscom, but detailed information on the steps to be followed will be given well in advance of the changeover. Communication Systems Group Information Technology Department 

  11. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current......This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  12. Digital telephony and network integration

    CERN Document Server

    Keiser, Bernhard E

    1995-01-01

    What is "digital telephony"? To the authors, the term digital telephony denotes the technology used to provide a completely digital telecommunication system from end-to-end. This implies the use of digital technology from one end instru­ ment through transmission facilities and switching centers to another end instru­ ment. Digital telephony has become possible only because of the recent and on­ going surge of semiconductor developments, allowing microminiaturization and high reliability along with reduced costs. This book deals with both the future and the present. Thus, the first chapter is entitled, "A Network in Transition." As baselines, Chapters 2 and 11 provide the reader with the present status of teler-hone technology in terms of voice digiti­ zation as well as switching principles. The book is an outgrowth of the authors' consulting and teaching experience in the field since the early 1980s. The book has been written to provide both the engineering student and the practicing engineer a working k...

  13. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  14. A Stepwise Approach to Developing Languages for SIP Telephony Service Creation

    DEFF Research Database (Denmark)

    Palix, Nicolas; Consel, Charles; Reveillere, Laurent

    2007-01-01

    Developing a SIP-based telephony service requires a programmer to have expertise in telephony rules and constraints, the SIP protocol, distributed systems, and a SIP API, which is often large and complex. These requirements make the development of telephony software an overwhelming challenge...... a scripting language dedicated to the development of telephony services. This approach enables critical properties of services to be guaranteed and captures expertise on the operational behavior of a service. We have applied this approach to developing the Session Processing Language (SPL) dedicated to SIP...

  15. Troublesome telephony: how users and non-users shaped the development of early British exchange telephony

    Directory of Open Access Journals (Sweden)

    Dr Michael Kay

    2015-05-01

    Full Text Available When exchange telephony was first marketed to the British public by the early telephone companies in the late nineteenth century it was as an intuitive technology requiring no specialist knowledge or training. This has gone unquestioned in subsequent telephone historiography but, as this article demonstrates, telephone instruments and systems were not always unproblematic or easy to use. Whilst other scholars have discussed important factors in the development and uptake of telephony, such as business economics and intellectual property, this article focuses on usage, and argues that difficulties in using telephone instruments and systems also influenced key changes in the operations of early British exchange systems. To understand these responses and developments it is necessary to look at the opinions and complaints of both users and non-users of telephone exchange systems. In investigating non-users as well as users, this article is influenced by the work of Sally Wyatt in Oudshoorn and Pinch's (2003 edited volume regarding users and non-users of technologies. Recovering the reactions of such people is possible through extensive use of letters received by the telephone companies or published in the periodical press, and opinions voiced at select committee meetings investigating the state of the country's telephone system. In recovering the difficulties early users and non-users faced when confronted with exchange telephone systems this article emphasises the importance of problematising the historical uptake of new technologies, and highlights how, in the case of early British telephony in particular, these problems can reveal specific facts both about historical telephone use-experience and about how exchange telephony spread around the country.

  16. Phonion: Practical Protection of Metadata in Telephony Networks

    Directory of Open Access Journals (Sweden)

    Heuser Stephan

    2017-01-01

    Full Text Available The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs, which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor, which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.

  17. MOBILTEL - Mobile Multimodal Telecommunications dialogue system based on VoIP telephony

    Directory of Open Access Journals (Sweden)

    Anton Čižmár

    2009-10-01

    Full Text Available In this paper the project MobilTel ispresented. The communication itself is becoming amultimodal interactive process. The MobilTel projectprovides research and development activities inmultimodal interfaces area. The result is a functionalarchitecture for mobile multimodal telecommunicationsystem running on handheld device. The MobilTelcommunicator is a multimodal Slovak speech andgraphical interface with integrated VoIP client. Theother possible modalities are pen – touch screeninteraction, keyboard, and display on which theinformation is more user friendly presented (icons,emoticons, etc., and provides hyperlink and scrollingmenu availability.We describe the method of interaction between mobileterminal (PDA and MobilTel multimodal PCcommunicator over a VoIP WLAN connection basedon SIP protocol. We also present the graphicalexamples of services that enable users to obtaininformation about weather or information about trainconnection between two train stations.

  18. Privacy through pseudonymity in mobile telephony systems

    OpenAIRE

    Arapinis, Myrto; Mancini, Loretta Ilaria; Ritter, Eike; Ryan, Mark

    2014-01-01

    To protect mobile phone from tracking by third parties, mobile telephony systems rely on periodically changing pseudonyms. We experimentally and formally analyse the mechanism adopted to update these pseudonyms and point out design and implementation weaknesses that defeat its purpose by allowing the identification and/or tracking of mobile telephony users. In particular, the experiments show that the pseudonym changing mechanism as implemented by real networks does not achieve the intended p...

  19. Benefícios do Uso do VoIP: um estudo de caso na GMBenefits from the VOIP Use: a case study at GMBeneficios del Uso del VoIP: un estudio de caso en la GM

    Directory of Open Access Journals (Sweden)

    FEITERA, Carlos Henrique

    2006-05-01

    Full Text Available RESUMOEste artigo traz uma visão do que é o VoIP, assim como suas principais aplicações, os fatores que as empresas buscam para minimizar custos em telefonia, as vantagens e desvantagens, a agregação de novas tecnologias, como WI-FI e o VOIP, e o futuro da telefonia no Brasil.Serão analisadas as diferenças entre Telefonia IP e VOIP paralelamente, e será tratada como base e estudo de caso a empresa General Motors do Brasil. O objetivo é mostrar o conteúdo que envolve essa inovadora tecnologia. Podemos dizer que a vontade de abordar esse tema foi despertada não somente por ser uma tecnologia inovadora que vem substituindo a telefonia convencional reduzindo os custos das empresas e trocando serviços e equipamentos obsoletos por uma série de novos serviços e oferecendo muitos recursos e benefícios, mas nos chamou a atenção também pelo fato de ser uma tecnologia que está revolucionando o mercado de telecomunicações, já que as empresas de telefonia prestadoras de serviços consomem uma boa parte da renda das empresas e pessoas, e também por exigir, nesse período de transição, muita habilidade em adequar as necessidades do cliente ao uso dessas ferramentas.ABSTRACTThis article brings a vision about Voip, as well as itself main applications, the factors with that the companies search to decrease costs in telephony, the advantages and disadvantages, aggregation of new technologies as wi-fi to the VOIP and the future of the telephony in Brazil. The differences between Telephony IP and VOIP will be analyzed parallel, and will be showed with as base study case of the General Motors. Our objective for this subject is to show the content that involves this fantastic technology. We can say that will to approach this subject it was influenced not only by being an innovative technology that comes substituting the conventional telephony, reducing the costs of the companies, and changing to services and obsolete equipments for a series

  20. Income, Inequality, Market Potential, and Diffusion of Mobile Telephony

    Science.gov (United States)

    Kim, Sungjoong

    2009-01-01

    The diffusion of many previous innovations eventually slowed down and reached an equilibrium level. Despite continued rapid growth, it is possible that the diffusion of mobile telephony will also begin to decelerate and reach a saturation level. Whether universal service can be achieved with the help of mobile telephony will therefore depend…

  1. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  2. Voice over IP in the WiFi Network business models: Will voice be a killer application for WiFi Public Networks?

    OpenAIRE

    Infante, Jorge; Bellalta, Boris

    2013-01-01

    The stunning growth of WiFi networks, together with the spreading of mobile telephony and the increasing use of Voice over IP (VoIP) on top of Internet, pose relevant questions on the application of WiFi networks to support VoIP services that could be used as a complement and/or competition to the 2G/3G cellular networks. The paper explores the state of the art on the capability of WiFi networks to support voice services in a user itinerant context, identifying actual and future strengths, we...

  3. Speech perception benefits of internet versus conventional telephony for hearing-impaired individuals.

    Science.gov (United States)

    Mantokoudis, Georgios; Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco; Senn, Pascal

    2012-07-16

    Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3-3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1-8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%-53%), 10.6% (4%-46%), and 8.8% (7%-33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and were 36% (P = .001) for cochlear implant users, 18

  4. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  5. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  6. Framework for Development of Advanced Telecommunication Services in Current and Future Converged Networks

    DEFF Research Database (Denmark)

    Soler-Lucas, José

    2006-01-01

    switched based systems towards packet based ones. Service deployment in a specific hybrid PSTN/IN/VoIP architecture is presented as well as a description of the enabling technologies. Discussion on service implementation examples is provided. The convenience of network neutral service invocation......This thesis presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context for these experiences is the transition of telecommunication (telephony) networks from circuit...... is introduced and how this has been achieved, by means of Web Services-based mechanisms. A single-request / single response protocol for invocation of a specific set of services is presented and a decoupling mechanism between signalling network protocols and service logic invocation demonstrated. Services, have...

  7. Speech Perception Benefits of Internet Versus Conventional Telephony for Hearing-Impaired Individuals

    Science.gov (United States)

    Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco

    2012-01-01

    Background Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3–3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1–8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. Objective To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. Methods We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Results Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%–53%), 10.6% (4%–46%), and 8.8% (7%–33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and

  8. On a Malware Targeting Private Telephony Networks during Cyber Conflict

    Directory of Open Access Journals (Sweden)

    I. I. Androulidakis

    2013-06-01

    Full Text Available Telecommunication networks have long ago entered the Critical Infrastructure domain. Apart from the public telephony network, there is a parallel private telephony network, consisting of Private Branch Exchanges (PBXs that serve the communication needs of private or public entities. Their penetration in the market is substantial. As a result, thousands of PBX installations are present in every country serving many times more users in vital infrastructures (including health, safety, security, economy, energy. Therefore, attacking PBXs can have critical effects that disrupt society and can clearly be used in warlike situations. PBXs are an integral part of the critical infrastructure, along with the public telephony network. The contribution of this work focuses on the theoretical and practical capabilities of a malware able to target PBXs. Such an occurrence would have devastating effects on the communication confidentiality, integrity and availability.

  9. CONSTRAINTS TO USE OF MOBILE TELEPHONY FOR ...

    African Journals Online (AJOL)

    Key words: Constraints, mobile telephony, frequency, farmers and telecommunications service ... efficient sharing of agricultural information ... calls on the mobile phone without the need .... adequate training on the use of mobile .... Job Market.

  10. Mobile telephony and copresence in Marakwet, Kenya

    African Journals Online (AJOL)

    Levi Manda

    Key words: mobile telephony, co-presence, assemblage, time and space, private versus public ... dislike', friend and unfriend', follow and unfollow on social media ..... 'We usually call each other either via texting or by word of mouth. Then.

  11. Impact of VoIP and QoS on Open and Distance Learning

    Directory of Open Access Journals (Sweden)

    Sanjay JASOLA

    2006-07-01

    Full Text Available Voice over Internet Protocol (VoIP is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support any kind of sophisticated quality of service (QoS mechanism. Although the type of service (TOS field in the Internet protocol (IP header has been existing and has been allowing the differentiated treatment of packets, it was never really used on a large scale. The voice is sensitive to delay and jitter so bandwidth must be guaranteed while transporting it. With the extensive use of Internet for carrying voice, there is a need to add QoS functionality in it. QoS with reference to VoIP has been discussed in the paper. Limited bandwidth and network latency are the issues which need to be considered while using wireless LAN for packetized voice data. Efforts of standards like 802.11e which will take care of these issues, have also been explored. The impact of these technologies on distance education has also been explored in the paper.

  12. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  13. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  14. Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

    Directory of Open Access Journals (Sweden)

    david irwin

    2011-03-01

    Full Text Available The popularity of Voice over the Internet Protocol (VoIP is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is not applicable to VoIP calls. Therefore, other methods of recovering electronic evidence and information from VoIP are required.  This research looks at what protocol evidence remains after a VoIP call has taken place examining both a virtual hard disk and the Random Access Memory (RAM. This paper proposes a set of identifiable credentials based on packet header information contained within the VoIP protocol stack. A series of controlled tests were undertaken whereby these credentials were forensically searched for on a virtual machine which was used to make the VoIP call. This experiment was then repeated by a search for the same protocol credentials within the RAM.

  15. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  16. Energy use of set-top boxes and telephony products in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Rosen, Karen B.; Meier, Alan K.; Zandelin, Stefan

    2001-06-01

    The goal of this investigation was to estimate the 1999 energy consumption of set-top boxes and telephony products in the U.S. residential sector. Results of this study will be used to identify new energy conservation opportunities and to align programs with those opportunities. We conducted a bottom-up analysis for set-top boxes and telephony products using our own power measurements and stock and usage estimates from secondary sources. The most common set-top boxes in U.S. homes in 1999 were analog cable boxes, digital cable boxes, wireless receivers, and game consoles. According to these measurements, analog cable boxes and wireless receivers draw between 10 and 15 watts, while digital cable boxes draw between 20 and 25 watts in both the Active and Standby modes. Video games used less than 2 watts in Standby mode, and about 8 watts when Active. We estimate that set-top boxes accounted for 0.7% of residential electricity use in 1999. Our investigation of telephony products included answering machines, cordless phones, cordless phone answering machine combination units, and mobile phone chargers. Answering machines, cordless phones, and combination units use between 2 and 3 watts in both the Active and Standby modes. Mobile phone chargers use about 1 watt in standby. We estimate that these telephony products account for 0.5% of U.S. residential electricity consumption. Together, set-tops and telephony constituted 1.2% of U.S. residential electricity consumption in 1999. Standby power use accounted for about 60% of this energy use. The combined total energy use of the products investigated for this study and those researched previously for this series of reports account for about 6.6% of residential electricity use in the U.S.

  17. Evaluating the potential of automated telephony systems in rural communities: Field assessment for project Lwazi of HLT Meraka

    CSIR Research Space (South Africa)

    Gumede, T

    2008-11-01

    Full Text Available the potential role automated telephony services in the improving access to important government information and services. Our interviews, focus groups and surveys revealed that an automated telephony service could be greatly support current government efforts...

  18. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations

    Directory of Open Access Journals (Sweden)

    Raimondas Buckus

    2017-03-01

    Full Text Available During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF electromagnetic radiation (EMR in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF intensity parameters in the environment are discussed in this article. The research methodology is applied according to the requirements of safety norms and Lithuanian Standards in English (LST EN. The article presents and analyses RF EMFs generated by mobile telephony base station antennas in areas accessible to the general public. Measurements of the RF electric field strength and RF EMF power density were conducted in the near- and far-fields of the mobile telephony base station antenna. Broadband and frequency-selective measurements were performed outside (on the roof and on the ground and in a residential area. The tests performed on the roof in front of the mobile telephony base station antennas in the near-field revealed the presence of a dynamic energy interaction within the antenna electric field, which changes rapidly with distance. The RF EMF power density values on the ground at distances of 50, 100, 200, 300, 400, and 500 m from the base station are very low and are scattered within intervals of 0.002 to 0.05 μW/cm2. The results were compared with international exposure guidelines (ICNIRP.

  19. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations.

    Science.gov (United States)

    Buckus, Raimondas; Strukčinskienė, Birute; Raistenskis, Juozas; Stukas, Rimantas; Šidlauskienė, Aurelija; Čerkauskienė, Rimantė; Isopescu, Dorina Nicolina; Stabryla, Jan; Cretescu, Igor

    2017-03-01

    During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF) electromagnetic radiation (EMR) in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation) from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF) intensity parameters in the environment are discussed in this article. The research methodology is applied according to the requirements of safety norms and Lithuanian Standards in English (LST EN). The article presents and analyses RF EMFs generated by mobile telephony base station antennas in areas accessible to the general public. Measurements of the RF electric field strength and RF EMF power density were conducted in the near- and far-fields of the mobile telephony base station antenna. Broadband and frequency-selective measurements were performed outside (on the roof and on the ground) and in a residential area. The tests performed on the roof in front of the mobile telephony base station antennas in the near-field revealed the presence of a dynamic energy interaction within the antenna electric field, which changes rapidly with distance. The RF EMF power density values on the ground at distances of 50, 100, 200, 300, 400, and 500 m from the base station are very low and are scattered within intervals of 0.002 to 0.05 μW/cm². The results were compared with international exposure guidelines (ICNIRP).

  20. Energy use of set-top boxes and telephony products in the U.S.; FINAL

    International Nuclear Information System (INIS)

    Rosen, Karen B.; Meier, Alan K.; Zandelin, Stefan

    2001-01-01

    The goal of this investigation was to estimate the 1999 energy consumption of set-top boxes and telephony products in the U.S. residential sector. Results of this study will be used to identify new energy conservation opportunities and to align programs with those opportunities. We conducted a bottom-up analysis for set-top boxes and telephony products using our own power measurements and stock and usage estimates from secondary sources. The most common set-top boxes in U.S. homes in 1999 were analog cable boxes, digital cable boxes, wireless receivers, and game consoles. According to these measurements, analog cable boxes and wireless receivers draw between 10 and 15 watts, while digital cable boxes draw between 20 and 25 watts in both the Active and Standby modes. Video games used less than 2 watts in Standby mode, and about 8 watts when Active. We estimate that set-top boxes accounted for 0.7% of residential electricity use in 1999. Our investigation of telephony products included answering machines, cordless phones, cordless phone answering machine combination units, and mobile phone chargers. Answering machines, cordless phones, and combination units use between 2 and 3 watts in both the Active and Standby modes. Mobile phone chargers use about 1 watt in standby. We estimate that these telephony products account for 0.5% of U.S. residential electricity consumption. Together, set-tops and telephony constituted 1.2% of U.S. residential electricity consumption in 1999. Standby power use accounted for about 60% of this energy use. The combined total energy use of the products investigated for this study and those researched previously for this series of reports account for about 6.6% of residential electricity use in the U.S

  1. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  2. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations

    OpenAIRE

    Buckus, Raimondas; Struk?inskien?, Birute; Raistenskis, Juozas; Stukas, Rimantas; ?idlauskien?, Aurelija; ?erkauskien?, Rimant?; Isopescu, Dorina Nicolina; Stabryla, Jan; Cretescu, Igor

    2017-01-01

    During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF) electromagnetic radiation (EMR) in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation) from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF) intensity p...

  3. Current level of knowledge in estimating the risks of mobile telephony

    International Nuclear Information System (INIS)

    Berg, G.

    2005-01-01

    Since the introduction of mobile telephony the exposure of the population to radiofrequency electromagnetic fields (in the frequency range 30 kHz to 300 GHz) has risen considerably. Due not least to inconclusive results from a wide range of research activities this new technology has triggered an extremely controversial discussion on the health risks associated with radiofrequency electromagnetic fields. In late 1999 already some 25% of the population, and in the year 2000 around 50% of all households used a mobile phone. In 2002 more than 71% of the German population in the age range from 14 to 64 years owned a mobile phone. The need for further research on the health effects of such exposure is substantiated by the public concern over this issue, its widespread presence since the introduction of mobile telephony and the inconsistency of results obtained so far

  4. Risks of carcinogenesis from electromagnetic radiation of mobile telephony devices.

    Science.gov (United States)

    Yakymenko, I; Sidorik, E

    2010-07-01

    Intensive implementation of mobile telephony technology in everyday human life during last two decades has given a possibility for epidemiological estimation of long-term effects of chronic exposure of human organism to low-intensive microwave (MW) radiation. Latest epidemiological data reveal a significant increase in risk of development of some types of tumors in chronic (over 10 years) users of mobile phone. It was detected a significant increase in incidence of brain tumors (glioma, acoustic neuroma, meningioma), parotid gland tumor, seminoma in long-term users of mobile phone, especially in cases of ipsilateral use (case-control odds ratios from 1.3 up to 6.1). Two epidemiological studies have indicated a significant increase of cancer incidence in people living close to the mobile telephony base station as compared with the population from distant area. These data raise a question of adequacy of modern safety limits of electromagnetic radiation (EMR) exposure for humans. For today the limits were based solely on the conception of thermal mechanism of biological effects of RF/MW radiation. Meantime the latest experimental data indicate the significant metabolic changes in living cell under the low-intensive (non-thermal) EMR exposure. Among reproducible biological effects of low-intensive MWs are reactive oxygen species overproduction, heat shock proteins expression, DNA damages, apoptosis. The lack of generally accepted mechanism of biological effects of low-intensive non-ionizing radiation doesn't permit to disregard the obvious epidemiological and experimental data of its biological activity. Practical steps must be done for reasonable limitation of excessive EMR exposure, along with the implementation of new safety limits of mobile telephony devices radiation, and new technological decisions, which would take out the source of radiation from human brain.

  5. DEPLOYMENT OF VOIP ON WIRELINE NETWORK USING OPNET

    African Journals Online (AJOL)

    EKPAH

    study of VoIP traffic and other major devices. These results will ... pre-deployment analysis, planning and lack of ... given network under VoIP and data load traffic. OPNET contains a vast amount of models of .... There are a number of tools.

  6. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  7. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  8. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  9. Simulation Study on Deployment of VoIP on Wireline Network ...

    African Journals Online (AJOL)

    Voice over Internet Protocol is a revolutionary technology which has become a key topic in both the growing Internet industry and established telecommunications industry. VoIP has become a potential alternative to the Public switching telecommunication network due to its reduced cost. However, despite its reduced cost it ...

  10. Fifty years of progress in speech coding standards

    Science.gov (United States)

    Cox, Richard

    2004-10-01

    Over the past 50 years, speech coding has taken root worldwide. Early applications were for the military and transmission for telephone networks. The military gave equal priority to intelligibility and low bit rate. The telephone network gave priority to high quality and low delay. These illustrate three of the four areas in which requirements must be set for any speech coder application: bit rate, quality, delay, and complexity. While the military could afford relatively expensive terminal equipment for secure communications, the telephone network needed low cost for massive deployment in switches and transmission equipment worldwide. Today speech coders are at the heart of the wireless phones and telephone answering systems we use every day. In addition to the technology and technical invention that has occurred, standards make it possible for all these different systems to interoperate. The primary areas of standardization are the public switched telephone network, wireless telephony, and secure telephony for government and military applications. With the advent of IP telephony there are additional standardization efforts and challenges. In this talk the progress in all areas is reviewed as well as a reflection on Jim Flanagan's impact on this field during the past half century.

  11. Summary of world wide studies related to cellular telephony and cancer

    International Nuclear Information System (INIS)

    Swicord, M. L.; Morrissey, J. J.; Joyner, K. H.

    2002-01-01

    Over 170 studies have been initiated using human, animal, and cell culture experimental models to investigate whether exposure to radiofrequency (RF) emissions from mobile telephony can cause or promote cancer. Animal studies will play an important role when epidemiological studies are weak or not definitive. In vitro studies will generally have a supporting or clarifying role

  12. Mobile telephony and children

    International Nuclear Information System (INIS)

    Karipidis, K.K.

    2004-01-01

    There is an ongoing debate about the possibility of adverse health effects related to radiofrequency (RF) radiation exposure from mobile phones and their associated base stations. Of particular public concern in this context are children. In its report the Independent Expert Group on Mobile Phones (IEGMP) recommended that the widespread use of mobile phones by children should be discouraged citing that children may be more vulnerable because of their developing nervous system, their greater absorption of energy in the tissue of the head and a longer lifetime of exposure. However, more recently the Health Council of the Netherlands disagreed with the IEGMP and concluded that there is no convincing scientific data to restrict children from using mobile phones. The World Health Organization states that none of there centre views have found that exposure to the RF fields form mobile phones or their base stations causes any adverse health consequence. However there has been limited scientific research specifically focussed on children. Future research will be required to address the issue of mobile telephony and children. Copyright (2004) Australasian Radiation Protection Society Inc

  13. Enhancing the Classification Accuracy of IP Geolocation

    Science.gov (United States)

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  14. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  15. Change of mobile telephony operator and mobile telephone numbers - 24 June 2015

    CERN Multimedia

    2015-01-01

    Following a call for tenders issued in 2014, Swisscom will replace Sunrise as CERN’s mobile telephony operator from 24 June 2015. As of this date, CERN mobile telephone numbers will change from the +41 (0)76 487 xxxx format to the +41 (0)75 411 xxxx format and people with a CERN mobile telephony subscription will need to change their SIM card.   SIM card replacement New SIM cards will be available for collection between 1 June and 30 June from distribution points located around CERN. Please check the list of distribution points to find where you will need to collect your SIM card based on your department and group. After 1st July, you will be able to collect your SIM card from the Telecom lab. Please open a SNOW request via this link if: you will not be at CERN in June, you are using a SIM card in a modem or other special device for machine-to-machine communications.   New mobile phone numbers CERN mobile numbers will change from the +41 (0)76 487 xxxx format to the +41...

  16. Health and Safety in Mobile Telephony

    International Nuclear Information System (INIS)

    Lipnjak, G.

    2001-01-01

    Full text: The paper deals with a description of mobile telephone network and the emitted radiation. The main focus is related to the potential health risks of mobile telephone radio waves. The international press has published articles warning of the risk of brain damage, hypersensitivity, eye damage, etc., if people use mobile telephones. The most important guidelines in the field of bioelectromagnetic and related to mobile telephony (ICNIRP, CENELEC and IEEE) are commented. Also, the problem of EMI of mobile telephone with other used electronic equipment by an impaired part of the human population has been elaborated. A lot of telecommunication companies provide expertise in a number of national and international standardisation groups, whose task is to monitor what is going on in the area of Health and Safety and to develop standardised measurement methods and equipment for radio-frequency electromagnetic exposure and interference. (author)

  17. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  18. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  19. The development of speech coding and the first standard coder for public mobile telephony

    NARCIS (Netherlands)

    Sluijter, R.J.

    2005-01-01

    This thesis describes in its core chapter (Chapter 4) the original algorithmic and design features of the ??rst coder for public mobile telephony, the GSM full-rate speech coder, as standardized in 1988. It has never been described in so much detail as presented here. The coder is put in a

  20. Investigation on possible risks to human health by exposure to the radiation of electromagnetic waves produced by the radio communications; Investigacion sobre posibles riesgos a la salud humana por exposicion a la radiacion de ondas electromagneticas producidas por las radiocomunicaciones

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Carlos Felipe; Ibarguengoytia Gonzalez, Pablo Hector; Flores Garcia, Andres; Franco Campos, Laura Elena [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2011-06-13

    This verification procedure is based on a research work on the possible risks to human health by exposure to the radiation of electromagnetic waves produced by the radio communications, cases of study: cellular telephony, radio digital troncalized and wireless telephony IP of Voice on IP (wireless local area network). The revision of all the international standards and the applicable national standardization was included, as well as the verification of fulfillment. [Spanish] Este procedimiento de verificacion esta basado en un trabajo de investigacion sobre posibles riesgos a la salud humana por exposicion a la radiacion de ondas electromagneticas producidas por la radiocomunicaciones, casos de estudio: telefonia celular, radio troncalizado digital y telefonia IP inalambrica de Voz sobre IP (red de area local inalambrica). Se incluyo la revision de todos los estandares internacionales y de la normatividad nacional aplicable, asi como la verificacion de cumplimiento.

  1. IP Centrex

    OpenAIRE

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  2. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection

    Directory of Open Access Journals (Sweden)

    Xuan Dau Hoang

    2016-10-01

    Full Text Available On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. Fast finding of Hot-IPs in the IP packet stream can be effectively used in early detection of DDoS (Distributed Denial of Service attack targets and spreading sources of network worms. Research results show that the Count-Min method gives the best overall performance for Hot-IP detection thanks to its low computational complexity, low space requirement and fast processing speed. We also propose an early detection model of DDoS attack targets based on Hot-IP finding, which can be deployed on the target network routers.

  3. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  4. Minimization of green house gases emission by using hybrid energy system for telephony base station site application

    International Nuclear Information System (INIS)

    Nema, Pragya; Rangnekar, Saroj; Nema, R.K.

    2010-01-01

    Cellular mobile service is a rapidly expanding and a very competitive business worldwide, including developing countries. This paper proposes that the suitable alternative solution of grid power is the stand-alone PV/wind hybrid energy system with diesel generator as a backup for cellular mobile telephony base station site in isolated areas. It is expected that the newly developed and installed system would provide very good opportunities for mobile telephony base station in near future. In addition, protecting the environment and combating climate change are two of the most pressing challenges facing humankind. As energy prices soar, network operators are increasingly scrutinizing their environmental and social responsibilities. This system will be more cost effective and environmental friendly over the conventional diesel generator. Approximately 70-80% fuel cost over conventional diesel generator and the emission of CO 2 and other harmful gasses in environments were reduced. (author)

  5. Building Model for the University of Mosul Computer Network Using OPNET Simulator

    Directory of Open Access Journals (Sweden)

    Modhar Modhar A. Hammoudi

    2013-04-01

    Full Text Available This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600, core switch (Cisco6509, two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX. Three applications were added to test the network model. These applications were FTP (File Transfer Protocol, HTTP (Hyper Text Transfer Protocol and VoIP (Voice over Internet Protocol. The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised upto 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme.

  6. Performances des applications IP dans les systèmes de communications par satellite : cas du DVB-RCS et du DVB-S2

    OpenAIRE

    Jegham , Nizar

    2008-01-01

    Despite of a number of IP satellite networks developed and deployed, only a limited number of studies and feedbacks about the performance is available. IP over satellite systems raises several constraints. One of the main reasons is the lack of adaptation of IP protocol, initially designed for terrestrial wired networks, to the large bandwidth delay product of the satellite media. Another reason is a lack of coordination between the IP protocol stack upper layer and the satellite MAC and phys...

  7. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  8. Deployment summary: Fiscal years 1995-2000 [USDOE Office of International Programs

    International Nuclear Information System (INIS)

    2000-01-01

    This publication summarizes the progress made by the Office of International Programs (IP) in deploying innovative technologies for the environmental remediation of the DOE complex and for sites of its international collaborators for fiscal years 1995 through 2000

  9. Deployment summary: Fiscal years 1995-2000 [USDOE Office of International Programs

    Energy Technology Data Exchange (ETDEWEB)

    None

    2000-07-01

    This publication summarizes the progress made by the Office of International Programs (IP) in deploying innovative technologies for the environmental remediation of the DOE complex and for sites of its international collaborators for fiscal years 1995 through 2000.

  10. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  11. Asterisk

    CERN Document Server

    Meggelen, Jim Van; Madsen, Leif

    2008-01-01

    This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control of your telephone system.If you've worked with telephony in the past, you're familiar with the problem: expensive and inflexible systems that are tuned to the vendor's needs, not yours. Asterisk isn't just a candle in the darkness, it's a whole firew

  12. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  13. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  14. Adaptation of Powerline Communications-Based Smart Metering Deployments to the Requirements of Smart Grids

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2015-11-01

    Full Text Available Powerline communications (PLC-based smart meter deployments are now a reality in many regions of the world. Although PLC elements are generally incorporated in smart meters and data concentrators, the underlying PLC network allows the integration of other smart grid services directly over it. The remote control capabilities that automation programs need and are today deployed over their medium voltage (MV grid, can be extended to the low voltage (LV grid through these existing PLC networks. This paper demonstrates the capabilities of narrowband high data rate (NB HDR PLC technologies deployed over LV grids for smart metering purposes to support internet protocol internet protocol (IP communications in the LV grid. The paper demonstrates these possibilities with the presentation of the simulation and laboratory results of IP communications over international telecommunication union: ITU-T G.9904 PLC technology, and the definition of a PLC Network Management System based on a simple network management protocol (SNMP management information base (MIB definition and applicable use cases.

  15. MiniSIP as a Plug-in

    OpenAIRE

    Arumugam Mathivanan, Arun

    2012-01-01

    Internet telephony has rapidly becoming an integral part of life. Due to its low incremental cost and the wide availability of voice over IP (VoIP) based services these services being used by nearly everyone. Today there are many VoIP applications available in the market, but most of them lack basic security features. Because people use VoIP services via public hotspots and shared local area networks these VoIP applications are vulnerable to attacks, such as eavesdropping. Today, there is a g...

  16. ENERGY STAR Certified Telephones

    Data.gov (United States)

    U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 3.0 ENERGY STAR Program Requirements for Telephony (cordless telephones and VoIP...

  17. Optimal design of an IP/MPLS over DWDM network

    Directory of Open Access Journals (Sweden)

    Eduardo Canale

    2014-04-01

    Full Text Available Different approaches for deploying resilient optical networks of low cost constitute a traditional group of NP-Hard problems that have been widely studied. Most of them are based on the construction of low cost networks that fulfill connectivity constraints. However, recent trends to virtualize optical networks over the legacy fiber infrastructure, modified the nature of network design problems and turned inappropriate many of these models and algorithms. In this paper we study a design problem arising from the deployment of an IP/MPLS network over an existing DWDM infrastructure. Besides cost and resiliency, this problem integrates traffic and capacity constraints. We present: an integer programming formulation for the problem, theoretical results, and describe how several metaheuristics were applied in order to find good quality solutions, for a real application case of a telecommunications company.

  18. 1-800-CALL-H.E.P. -- Experiences on a voice-over-IP test bed

    International Nuclear Information System (INIS)

    Matthews, W.

    2000-01-01

    Highly interactive Internet applications such as Voice-over-IP are extremely sensitive to network performance. Even on high performance research networks, many cases will require the use of differentiated services to achieve high (toll) quality conversations. In this talk the authors will describe a test bed over the Energy Sciences network (ESnet) between Lawrence Berkeley National Laboratory (LBNL), Stanford Linear Accelerator Center (SLAC), Argonne National Laboratory (ANL) and Sandia National Laboratory (Sandia). In particular the characteristics of Voice-over-IP calls between LBNL and SLAC will be reviewed and the effect of low, moderate and high congestion on the link will be quantified. The use of Per Hop Behavior (PHB) in IP headers with Weighted Fair Queuing (WFQ) in routers and the benefit they provide will be explained. A model of flows and performance will be presented and new techniques to predict the quality of calls are under development and will be reviewed. Comparisons with telephone reliability will be discussed and the feasibility of wide spread deployment of VoIP in HEP will be considered

  19. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  20. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  1. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  2. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  3. Interface for connectioin of a spectrometer with remoted computer by means of the internal telephony net

    International Nuclear Information System (INIS)

    Minin, V.V.; Gejst, A.G.; Larin, G.M.

    1989-01-01

    A device permitting to record spectrometers analog signals for computer memory using internal telephony net for connection of a spectrometer with remoted computer, is described. Two-way communication in half-duplex mode is established by a spectrometer operator. Analog-to-digital conversion of a signal is realized by means of a voltage-pulse frequency is 3-30 kHz. The computer may be remoted at up to 1 km. The line signal level is ≤3V, that does not induce transfersal noise

  4. Change to mobile telephony coverage and billing in France

    CERN Multimedia

    IT Department

    2016-01-01

    Following recent discussions with the French and Swiss authorities, it has become clear that it is not permitted for a mobile telephony provider from one host state to transmit signals from the territory of the other. As a result, the Swisscom transmitters in France will be turned off on 29 August. From that date, coverage in France will be provided by Orange France. Users with a private subscription will be pleased to note that they will again have the ability to identify calls as private as from 18 July.   In order to ensure that you can still be contacted by your colleagues, please make sure that you have enabled roaming for voice calls. Instructions for common phone models are available at https://cern.ch/gsm-france/content/instructions. If you make use of data services, you will also need to enable data roaming to, for example, access your email whilst in France, but note that use of data services will be charged. Special arrangements have been put in place by Swisscom to ensure that k...

  5. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  6. Management of speech and video telephony quality in heterogeneous wireless networks

    CERN Document Server

    Lewcio, Błażej

    2014-01-01

    This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless networks. Nomadic use of services requires intelligent management of ongoing transmission, and to make the best of available resources many fundamental trade-offs must be considered. Network coverage versus throughput and reliability of a connection is one key aspect, efficiency versus robustness of signal compression is another. However, to successfully manage services, user-perceived Quality of Experience (QoE) in heterogeneous networks must be known, and the perception of quality changes must be understood.  These issues are addressed in this book, in particular focusing on the perception of quality changes due to switching between diverse networks, speech and video codecs, and encoding bit rates during active calls.

  7. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  8. Effective distance adaptation traffic dispatching in software defined IP over optical network

    Science.gov (United States)

    Duan, Zhiwei; Li, Hui; Liu, Yuze; Ji, Yuefeng; Li, Hongfa; Lin, Yi

    2017-10-01

    The rapid growth of IP traffic has contributed to the wide deployment of optical devices (ROADM/OXC, etc.). Meanwhile, with the emergence and application of high-performance network services such as ultra-high video transmission, people are increasingly becoming more and more particular about the quality of service (QoS) of network. However, the pass-band shape of WSSs which is utilized in the ROADM/OXC is not ideal, causing narrowing of spectrum. Spectral narrowing can lead to signal impairment. Therefore, guard-bands need to be inserted between adjacent paths. In order to minimize the bandwidth waste due to guard bands, we propose an effective distance-adaptation traffic dispatching algorithm in IP over optical network based on SDON architecture. We use virtualization technology to set up virtual resources direct links by extracting part of the resources on paths which meet certain specific constraints. We also assign different bandwidth to each IP request based on path length. There is no need for guard-bands between the adjacent paths on the virtual link, which can effectively reduce the number of guard-bands and save the spectrum.

  9. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  10. The Telephony in the City of Santiago of Cuba (1893 - 1959

    Directory of Open Access Journals (Sweden)

    Maithe Sánchez-Garrido

    2016-02-01

    Full Text Available In spite of the substantial advantages which it specifically contributed the restoration of the telephone in Cuba and in the oriental locality, like an element of modernity that contributed to improve the form of life of the population, as well as the quality of mass media, the subject from its arrival to Santiago of Cuba is very little disclosed and/or not known, to grief that with the triumph of the Cuban Revolution considerably spread the use of the same one and some writings were published on the matter. The present research shows an analysis of the historical evolution of the telephony in the Island, but having like attention center the city of Santiago of Cuba. For it the antecedents of this phenomenon consider, the political, economic-social and cultural circumstances that influenced in their evolution and development, as well as their within the framework local incidence.

  11. Intelligent Services in Converged Networks - Evolution steps in the signalling arena

    DEFF Research Database (Denmark)

    Soler-Lucas, José; Fosgerau, Anders; Grabner, Boris

    2003-01-01

    The paper aims to present the authors' view of the future of telephony. While voice transport over IP is no longer a dream but a reality, the capacity to offer IN-like services, as value added services within VoIP environments, has still been rarely treated and implemented. We present an overview...... on the subject and the work currently in development, within the IST project GEMINI, towards the implementation of IN IP-based services and its interoperability with traditional PSTN-SS7-IN networks....

  12. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  13. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  14. Strategies of business interna-cionalization in digital products. A Brazilian cellular telephony case

    Directory of Open Access Journals (Sweden)

    Paulo Sidney Ferreira

    2007-12-01

    Full Text Available The cellular telephony market crossed expressive changes of late years. The explosion of consumption, the globalization and the technological advances transformed the cellular market into the one of the most competitive in the world.  This scenery promotes the interest of promising nations, like Brazil, today, the sixth biggest cellular market. The more used alternative, of late years, by international companies that intend to go into these countries, has been the strategist alliances. In this article, it is intended to analyze the inter-national  alliance  between  Nokia  and  Gradient and  also  the  obtained  results.  The case shows the appropriation of the use of cooperation strategies for going into an international market.

  15. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    OpenAIRE

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  16. Implementing VoIP over Fatima Jinnah Women University

    OpenAIRE

    Ammara Asif; Ammara Asif; Tahira Mahboob

    2011-01-01

    Working people employee the use of technology in such very effective natural ways that permit them to do what they want: they can communicate with anyone as per need, in the time and space that suits them the best. Easily accessible and user-friendly, collaboration tools allow them to explore, share, engage, and connect with people and content in meaningful ways that help them learn. Traditional telephony carriers use circuit switching for carrying voice traffic. Circuit switching was designe...

  17. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  18. Green IGP Link Weights for Energy-efficiency and Load-balancing in IP Backbone Networks

    OpenAIRE

    Francois, Frederic; Wang, Ning; Moessner, Klaus; Georgoulas, Stylianos; Xu, Ke

    2013-01-01

    The energy consumption of backbone networks has become a primary concern for network operators and regulators due to the pervasive deployment of wired backbone networks to meet the requirements of bandwidth-hungry applications. While traditional optimization of IGP link weights has been used in IP based load-balancing operations, in this paper we introduce a novel link weight setting algorithm, the Green Load-balancing Algorithm (GLA), which is able to jointly optimize both energy efficiency ...

  19. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  20. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  1. Combined Arms in the Electro-Magnetic Spectrum: Integrating Non-kinetic Operations

    Science.gov (United States)

    2013-05-23

    Greene , Robert. The 33 Strategies of War. New York: Penguin, 2007. Halpern, Jason. IP Telephony Security in Depth. Cisco Systems, 2003...Theory of John Boyd. New York, NY: Routledge, 2007. Paiget, J., & Inhelder, B. Memory and Intelligence. London: Routledge and Kegan Paul, 1973. Qiao

  2. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  3. Ensuring Software IP Cleanliness

    OpenAIRE

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  4. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  5. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  6. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  7. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  8. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  9. Towards a 21st century telephone exchange at CERN

    CERN Document Server

    AUTHOR|(SzGeCERN)745509; Hesnaux, Anthony Gerard; Sierra, Rodrigo; Chapron, Frederic; CERN. Geneva. IT Department

    2015-01-01

    The advent of mobile telephony and Voice over IP (VoIP) has significantly impacted the traditional telephone exchange industry—to such an extent that private branch exchanges are likely to disappear completely in the near future. For large organisations, such as CERN, it is important to be able to smooth this transition by implementing new multimedia platforms that can protect past investments and the flexibility needed to securely interconnect emerging VoIP solutions and forthcoming developments such as Voice over LTE (VoLTE). We present the results of ongoing studies and tests at CERN of the latest technologies in this area.

  10. Overview of hybrid fiber-coaxial network deployment in the deregulated UK environment

    Science.gov (United States)

    Cox, Alan L.

    1995-11-01

    Cable operators in the U.K. enjoy unprecedented license to construct networks and operate cable TV and telecommunications services within their franchise areas. In general, operators have built hybrid-fiber-coax (HFC) networks for cable TV in parallel with fiber-copper-pair networks for telephony. The commonly used network architectures are reviewed, together with their present and future capacities. Despite this dual-technology approach, there is considerable interest in the integration of telephony services onto the HFC network and the development of new interactive services for which HFC may be more suitable than copper pairs. Certain technological and commercial developments may have considerable significance for HFC networks and their operators. These include the digitalization of TV distribution and the rising demand for high-rate digital access lines. Possible scenarios are discussed.

  11. IPs

    African Journals Online (AJOL)

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  12. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  13. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  14. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  15. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  16. IP telephony based danger alert communication system and its implementation

    Science.gov (United States)

    Rezac, Filip; Safarik, Jakub; Voznak, Miroslav; Tomala, Karel; Partila, Pavol

    2013-05-01

    This article discusses a danger alert system created as a part of the research project at Department of Telecommunications of Technical University of Ostrava. The aim of the system is to distribute pre-recorded voice messages in order to alert the called party in danger. This article describes individual technologies, which the application uses for its operation as well as issues relating to hardware requirements and transfer line bandwidth load. The article also describes new algorithms, which had to be developed in order to ensure the reliability of the system. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transformation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations). The benefit of such communication compared to others, is the fact, that it uses a phone call and, therefore, it is possible to get feedback who accepted the message and to improve efficiency of alert system. Finally, the list of unanswered calls is exported and these users can be informed via SMS.

  17. IP Telephony Based Danger Alert Communication System and Its Implementation

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2012-01-01

    Full Text Available The paper deals with development of a web application allowing to deliver pre-recorded voice messages by using SIP generator. The developed application is a part of complex system, which has been evolved in Dpt. of Telecommunications, Technical University of Ostrava for last three years. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transormation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations. The advantage of this aproach lies in controlled delivery and finally the list of unanswered calls is exported and these users are informed via SMS. In the paper, the core of the danger alert system is described including algorithms of the voice message delivery.

  18. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    OpenAIRE

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  19. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  20. IP Infrastructure Geolocation

    Science.gov (United States)

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  1. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  2. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Science.gov (United States)

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  3. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Science.gov (United States)

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  4. LOCATION-BASED SERVICES USING SIP

    OpenAIRE

    Abdullah Azfar,; Md. Sakhawat Hossen,; María José Peroza Marval; Razib Hayat Khan

    2010-01-01

    Due to the popularity of Location-Based Services and IP telephony, we decided to review a number of different proposals to implement Location-Based Services over a SIP-based mobile network. The result is an interesting overview about the potential functionalities of Location-Based Services and the capabilities of SIP for implementingthese services.

  5. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  6. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  7. Location and Unlocation: Examining Gender and Telephony through Autoethnographic Textual and Visual Methods

    Directory of Open Access Journals (Sweden)

    Lia Bryant BSW, PhD in Sociology

    2013-02-01

    Full Text Available Studies on gender and telephony tend to be quantitative and depict the purposes for which women and men use mobile telephones and landlines. Qualitative studies on the topic predominantly rely on face-to-face interviews to examine how telephone use genders space. We suggest these traditional methods of data collection leave unexamined the emotional and social relationships that emerge and are enabled by telephone use, which at times reconfigure and gender social spaces. In this article we present a collaborative autoethnographic inquiry based on our own telephone lives. We introduce a reflexive visual and textual methodological design, specifically diary notes, memory work, and photography, developed from our lives as researcher and researched. We examine an important theme in our findings, the physical placement of the telephone and the phone holder's awareness of the physicality of the telephone, which illustrates the importance of our methodological choices. We show how the placement of the phone by the users both genders space and creates emotional spaces.

  8. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  9. Presence in the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  10. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  11. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Science.gov (United States)

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  12. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Science.gov (United States)

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  13. ChIP-PIT: Enhancing the Analysis of ChIP-Seq Data Using Convex-Relaxed Pair-Wise Interaction Tensor Decomposition.

    Science.gov (United States)

    Zhu, Lin; Guo, Wei-Li; Deng, Su-Ping; Huang, De-Shuang

    2016-01-01

    In recent years, thanks to the efforts of individual scientists and research consortiums, a huge amount of chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) experimental data have been accumulated. Instead of investigating them independently, several recent studies have convincingly demonstrated that a wealth of scientific insights can be gained by integrative analysis of these ChIP-seq data. However, when used for the purpose of integrative analysis, a serious drawback of current ChIP-seq technique is that it is still expensive and time-consuming to generate ChIP-seq datasets of high standard. Most researchers are therefore unable to obtain complete ChIP-seq data for several TFs in a wide variety of cell lines, which considerably limits the understanding of transcriptional regulation pattern. In this paper, we propose a novel method called ChIP-PIT to overcome the aforementioned limitation. In ChIP-PIT, ChIP-seq data corresponding to a diverse collection of cell types, TFs and genes are fused together using the three-mode pair-wise interaction tensor (PIT) model, and the prediction of unperformed ChIP-seq experimental results is formulated as a tensor completion problem. Computationally, we propose efficient first-order method based on extensions of coordinate descent method to learn the optimal solution of ChIP-PIT, which makes it particularly suitable for the analysis of massive scale ChIP-seq data. Experimental evaluation the ENCODE data illustrate the usefulness of the proposed model.

  14. Mobile telephony and the precautionary principle - a phoney debate?

    International Nuclear Information System (INIS)

    Anderson, V.

    2001-01-01

    This paper explores potential adverse consequences of applying the precautionary principle (PP) to low-level radiofrequency (RF) transmissions from mobile phones and base stations. An oft-cited criticism of the PP is that it is poorly and inconsistently defined. In its best and most inclusive form, as defined in a recent communication from the European Commission, the PP includes elements of proportionality, non-discrimination, consistency, cost/benefit analysis and ongoing scientific review. In its worst form the PP can introduce arbitrary and onerous regulatory measures without regard to new community risks and costs that may be generated, e.g.: 1. Denying or delaying public access to the social, economic and public safety benefits of mobile telephony; 2. Redirection of limited community resources away from more important public safety issues; 3. Protracted legal argument (and costs) over the vague definitions inherent in the PP; 4. Undermining of the integrity of the scientific method in determining the true level of any health risk from direct exposure to low level EME; 5. Inappropriate occupational and public risk behaviors based on an exaggerated concern of EME as implied by the PP. There is little published data to quantify these risks, though a strong prima facie case exists for a cautious approach to the PP. A considered decision on the PP that protects the public interest will require quantitative analysis of the risks generated by the PP described above. Copyright (2001) Australasian Radiation Protection Society Inc

  15. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  16. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  17. Penetration tests in next generation networks

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav

    2012-06-01

    SIP proxy server is without any doubts centerpiece of any SIP IP telephony infrastructure. It also often provides other services than those related to VoIP traffic. These softswitches are, however, very often become victims of attacks and threats coming from public networks. The paper deals with a system that we developed as an analysis and testing tool to verify if the target SIP server is adequately secured and protected against any real threats. The system is designed as an open-source application, thus allowing independent access and is fully extensible to other test modules.

  18. Mobile P2P Web Services Using SIP

    Directory of Open Access Journals (Sweden)

    Guido Gehlen

    2007-01-01

    Full Text Available Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P services which are originally offered by network providers, like telephony and messaging, are provided through VoIP and Instant Messaging (IM by Internet service providers, too. The IP Multimedia Subsystem (IMS is the answer of the telecommunication industry to this trend and aims at providing Internet P2P and multimedia services controlled by the network operators. The IMS provides mobility and session management as well as message routing, security, and billing.

  19. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  20. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  1. IP Security für Linux

    OpenAIRE

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  2. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  3. GMI-IPS: Python Processing Software for Aircraft Campaigns

    Science.gov (United States)

    Damon, M. R.; Strode, S. A.; Steenrod, S. D.; Prather, M. J.

    2018-01-01

    NASA's Atmospheric Tomography Mission (ATom) seeks to understand the impact of anthropogenic air pollution on gases in the Earth's atmosphere. Four flight campaigns are being deployed on a seasonal basis to establish a continuous global-scale data set intended to improve the representation of chemically reactive gases in global atmospheric chemistry models. The Global Modeling Initiative (GMI), is creating chemical transport simulations on a global scale for each of the ATom flight campaigns. To meet the computational demands required to translate the GMI simulation data to grids associated with the flights from the ATom campaigns, the GMI ICARTT Processing Software (GMI-IPS) has been developed and is providing key functionality for data processing and analysis in this ongoing effort. The GMI-IPS is written in Python and provides computational kernels for data interpolation and visualization tasks on GMI simulation data. A key feature of the GMI-IPS, is its ability to read ICARTT files, a text-based file format for airborne instrument data, and extract the required flight information that defines regional and temporal grid parameters associated with an ATom flight. Perhaps most importantly, the GMI-IPS creates ICARTT files containing GMI simulated data, which are used in collaboration with ATom instrument teams and other modeling groups. The initial main task of the GMI-IPS is to interpolate GMI model data to the finer temporal resolution (1-10 seconds) of a given flight. The model data includes basic fields such as temperature and pressure, but the main focus of this effort is to provide species concentrations of chemical gases for ATom flights. The software, which uses parallel computation techniques for data intensive tasks, linearly interpolates each of the model fields to the time resolution of the flight. The temporally interpolated data is then saved to disk, and is used to create additional derived quantities. In order to translate the GMI model data to the

  4. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  5. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    International Nuclear Information System (INIS)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F.

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32 P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen

  6. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    International Nuclear Information System (INIS)

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  7. Asterisk The Definitive Guide

    CERN Document Server

    Madsen, Leif; Bryant, Russell

    2011-01-01

    Design a complete VoIP or analog PBX with Asterisk, even if you have no previous Asterisk experience and only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap to installing, configuring, and integrating this open source software into your existing phone system. Ideal for Linux administrators, developers, and power users, this book shows you how to write a basic dialplan step by step, and quickly brings you up to speed on the latest Asterisk features in version 1.8. Integrate Asterisk with analog, VoIP, and digital telephony systemsBuild a simp

  8. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  9. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  10. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  11. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    Science.gov (United States)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  12. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  13. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  14. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  15. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    Science.gov (United States)

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  16. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    Directory of Open Access Journals (Sweden)

    Jordi Casademont

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  17. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  18. Scientific Cluster Deployment and Recovery - Using puppet to simplify cluster management

    Science.gov (United States)

    Hendrix, Val; Benjamin, Doug; Yao, Yushu

    2012-12-01

    Deployment, maintenance and recovery of a scientific cluster, which has complex, specialized services, can be a time consuming task requiring the assistance of Linux system administrators, network engineers as well as domain experts. Universities and small institutions that have a part-time FTE with limited time for and knowledge of the administration of such clusters can be strained by such maintenance tasks. This current work is the result of an effort to maintain a data analysis cluster (DAC) with minimal effort by a local system administrator. The realized benefit is the scientist, who is the local system administrator, is able to focus on the data analysis instead of the intricacies of managing a cluster. Our work provides a cluster deployment and recovery process (CDRP) based on the puppet configuration engine allowing a part-time FTE to easily deploy and recover entire clusters with minimal effort. Puppet is a configuration management system (CMS) used widely in computing centers for the automatic management of resources. Domain experts use Puppet's declarative language to define reusable modules for service configuration and deployment. Our CDRP has three actors: domain experts, a cluster designer and a cluster manager. The domain experts first write the puppet modules for the cluster services. A cluster designer would then define a cluster. This includes the creation of cluster roles, mapping the services to those roles and determining the relationships between the services. Finally, a cluster manager would acquire the resources (machines, networking), enter the cluster input parameters (hostnames, IP addresses) and automatically generate deployment scripts used by puppet to configure it to act as a designated role. In the event of a machine failure, the originally generated deployment scripts along with puppet can be used to easily reconfigure a new machine. The cluster definition produced in our CDRP is an integral part of automating cluster deployment

  19. Operational Space Weather Products at IPS

    Science.gov (United States)

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  20. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Science.gov (United States)

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  1. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  2. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  3. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  4. Ifabiyi, IP

    African Journals Online (AJOL)

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  5. An ICMP-Based Mobility Management Approach Suitable for Protocol Deployment Limitation

    Directory of Open Access Journals (Sweden)

    Jeng-Yueng Chen

    2009-01-01

    Full Text Available Mobility management is one of the important tasks on wireless networks. Many approaches have been proposed in the past, but none of them have been widely deployed so far. Mobile IP (MIP and Route Optimization (ROMIP, respectively, suffer from triangular routing problem and binding cache supporting upon each node on the entire Internet. One step toward a solution is the Mobile Routing Table (MRT, which enables edge routers to take over address binding. However, this approach demands that all the edge routers on the Internet support MRT, resulting in protocol deployment difficulties. To address this problem and to offset the limitation of the original MRT approach, we propose two different schemes, an ICMP echo scheme and an ICMP destination-unreachable scheme. These two schemes work with the MRT to efficiently find MRT-enabled routers that greatly reduce the number of triangular routes. In this paper, we analyze and compare the standard MIP and the proposed approaches. Simulation results have shown that the proposed approaches reduce transmission delay, with only a few routers supporting MRT.

  6. Split degenerate states and stable p+ip phases from holography

    Energy Technology Data Exchange (ETDEWEB)

    Nie, Zhang-Yu; Zeng, Hui [Kunming University of Science and Technology, Kunming (China); Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing (China); Pan, Qiyuan [Hunan Normal Univ., Key Lab. of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Synergetic Innovation Center for Quantum Effects and Applications, Dept. of Physics, Changsha (China); Zeng, Hua-Bi [Yangzhou University, College of Physics Science and Technology, Yangzhou, Jiangsu (China); National Central University, Department of Physics, Chungli (China)

    2017-02-15

    In this paper, we investigate the p+ip superfluid phases in the complex vector field holographic p-wave model. We find that in the probe limit, the p+ip phase and the p-wave phase are equally stable, hence the p and ip orders can be mixed with an arbitrary ratio to form more general p+λip phases, which are also equally stable with the p-wave and p+ip phases. As a result, the system possesses a degenerate thermal state in the superfluid region. We further study the case on considering the back-reaction on the metric, and we find that the degenerate ground states will be separated into p-wave and p+ip phases, and the p-wave phase is more stable. Finally, due to the different critical temperature of the zeroth order phase transitions from p-wave and p+ip phases to the normal phase, there is a temperature region where the p+ip phase exists but the p-wave phase does not. In this region we find the stable holographic p+ip phase for the first time. (orig.)

  7. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  8. Health coaching by telephony to support self-care in chronic diseases: clinical outcomes from The TERVA randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Patja Kristiina

    2012-06-01

    Full Text Available Abstract Background The aim was to evaluate the effect of a 12-month individualized health coaching intervention by telephony on clinical outcomes. Methods An open-label cluster-randomized parallel groups trial. Pre- and post-intervention anthropometric and blood pressure measurements by trained nurses, laboratory measures from electronic medical records (EMR. A total of 2594 patients filling inclusion criteria (age 45 years or older, with type 2 diabetes, coronary artery disease or congestive heart failure, and unmet treatment goals were identified from EMRs, and 1535 patients (59% gave consent and were randomized into intervention or control arm. Final analysis included 1221 (80% participants with data on primary end-points both at entry and at end. Primary outcomes were systolic and diastolic blood pressure, serum total and LDL cholesterol concentration, waist circumference for all patients, glycated hemoglobin (HbA1c for diabetics and NYHA class in patients with congestive heart failure. The target effect was defined as a 10-percentage point increase in the proportion of patients reaching the treatment goal in the intervention arm. Results The proportion of patients with diastolic blood pressure initially above the target level decreasing to 85 mmHg or lower was 48% in the intervention arm and 37% in the control arm (difference 10.8%, 95% confidence interval 1.5–19.7%. No significant differences emerged between the arms in the other primary end-points. However, the target levels of systolic blood pressure and waist circumference were reached non-significantly more frequently in the intervention arm. Conclusions Individualized health coaching by telephony, as implemented in the trial was unable to achieve majority of the disease management clinical measures. To provide substantial benefits, interventions may need to be more intensive, target specific sub-groups, and/or to be fully integrated into local health care. Trial registration

  9. Fast Deploy Radiation Monitoring Array Emergency Solution Based on GPS and Cellular Network

    International Nuclear Information System (INIS)

    Vax, E.; Broide, A.; Manor, A.; Marcus, E.; Seif, R.; Nir, J.; Kadmon, Y.; Sattinger, D.; Levinson, S.; Tal, N.

    2004-01-01

    Radiation monitoring of a possible contaminating source is highly important for safety and risk analysis. Since the monitoring must cover the whole contaminated area, the standard solution is to scatter an array of numerous fixed detectors in advance. The Fast Deploy Radiation Monitoring Array (FDRMA) is a solution that does not require coverage of the entire area. The FDRMA is a compact, world wide applicative, seamless and novel solution, designed for emergency cases. The system consists of GPS and IP cellular network, which make it mobile and therefore suitable for global use. The most significant advantage of the FDRMA system is minimizing the exposure time of the monitoring teams, while maintaining flexibility of the deployment area, as opposed to the Vehicle Monitoring System (VMS) [1] or the standard solution mentioned above. A detailed description of the proposed FDRMA system and its comparison to a fixed detectors' array is presented in this work

  10. Enabling 4GBB via the last copper drop of a hybrid FttH deployment

    NARCIS (Netherlands)

    Brink, R.F.M. van den

    2011-01-01

    Recent developments are paving the way for Telcos to offer hundreds of Mb/s to end users in a cost effective manner. These developments are to bridge the last 20-200 m of Fiber to the Home solutions via existing telephony wiring. This so called Hybrid FttH solution is considered to become an

  11. A fast neutron detector with IP by track measurement

    International Nuclear Information System (INIS)

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  12. Engineering of radioimmunoassay (RIA) IP10.1

    International Nuclear Information System (INIS)

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  13. Scientific Cluster Deployment and Recovery – Using puppet to simplify cluster management

    International Nuclear Information System (INIS)

    Hendrix, Val; Yao Yushu; Benjamin, Doug

    2012-01-01

    Deployment, maintenance and recovery of a scientific cluster, which has complex, specialized services, can be a time consuming task requiring the assistance of Linux system administrators, network engineers as well as domain experts. Universities and small institutions that have a part-time FTE with limited time for and knowledge of the administration of such clusters can be strained by such maintenance tasks. This current work is the result of an effort to maintain a data analysis cluster (DAC) with minimal effort by a local system administrator. The realized benefit is the scientist, who is the local system administrator, is able to focus on the data analysis instead of the intricacies of managing a cluster. Our work provides a cluster deployment and recovery process (CDRP) based on the puppet configuration engine allowing a part-time FTE to easily deploy and recover entire clusters with minimal effort. Puppet is a configuration management system (CMS) used widely in computing centers for the automatic management of resources. Domain experts use Puppet's declarative language to define reusable modules for service configuration and deployment. Our CDRP has three actors: domain experts, a cluster designer and a cluster manager. The domain experts first write the puppet modules for the cluster services. A cluster designer would then define a cluster. This includes the creation of cluster roles, mapping the services to those roles and determining the relationships between the services. Finally, a cluster manager would acquire the resources (machines, networking), enter the cluster input parameters (hostnames, IP addresses) and automatically generate deployment scripts used by puppet to configure it to act as a designated role. In the event of a machine failure, the originally generated deployment scripts along with puppet can be used to easily reconfigure a new machine. The cluster definition produced in our CDRP is an integral part of automating cluster deployment

  14. iTAR: a web server for identifying target genes of transcription factors using ChIP-seq or ChIP-chip data.

    Science.gov (United States)

    Yang, Chia-Chun; Andrews, Erik H; Chen, Min-Hsuan; Wang, Wan-Yu; Chen, Jeremy J W; Gerstein, Mark; Liu, Chun-Chi; Cheng, Chao

    2016-08-12

    Chromatin immunoprecipitation followed by massively parallel DNA sequencing (ChIP-seq) or microarray hybridization (ChIP-chip) has been widely used to determine the genomic occupation of transcription factors (TFs). We have previously developed a probabilistic method, called TIP (Target Identification from Profiles), to identify TF target genes using ChIP-seq/ChIP-chip data. To achieve high specificity, TIP applies a conservative method to estimate significance of target genes, with the trade-off being a relatively low sensitivity of target gene identification compared to other methods. Additionally, TIP's output does not render binding-peak locations or intensity, information highly useful for visualization and general experimental biological use, while the variability of ChIP-seq/ChIP-chip file formats has made input into TIP more difficult than desired. To improve upon these facets, here we present are fined TIP with key extensions. First, it implements a Gaussian mixture model for p-value estimation, increasing target gene identification sensitivity and more accurately capturing the shape of TF binding profile distributions. Second, it enables the incorporation of TF binding-peak data by identifying their locations in significant target gene promoter regions and quantifies their strengths. Finally, for full ease of implementation we have incorporated it into a web server ( http://syslab3.nchu.edu.tw/iTAR/ ) that enables flexibility of input file format, can be used across multiple species and genome assembly versions, and is freely available for public use. The web server additionally performs GO enrichment analysis for the identified target genes to reveal the potential function of the corresponding TF. The iTAR web server provides a user-friendly interface and supports target gene identification in seven species, ranging from yeast to human. To facilitate investigating the quality of ChIP-seq/ChIP-chip data, the web server generates the chart of the

  15. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  16. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    Science.gov (United States)

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  17. Intelligent Advanced Communications IP Telephony Feasibility for the US Navy - Phase 3

    Science.gov (United States)

    2011-03-01

    115 FIGURE 6-4 STATIC IPV4 ADDRESSING .......................................................................... 116 FIGURE 6-5 VOIP ACCOUNT...alternative types of network addresses (e.g., both IPv4 and IPv6) in SDP for a specific media session. 2.6.4.3 SIP Requests Related RFC 2976... History -Info”, to capture the history of requests from a UA that arrive at a particular application server or user. RFC 3420 – introduces a new

  18. In Silico Pooling of ChIP-seq Control Experiments

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  19. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  20. On-line Monitoring of VoIP Quality Using IPFIX

    Directory of Open Access Journals (Sweden)

    Petr Matousek

    2014-01-01

    Full Text Available The main goal of VoIP services is to provide a reliable and high-quality voice transmission over packet networks. In order to prove the quality of VoIP transmission, several approaches were designed. In our approach, we are concerned about on-line monitoring of RTP and RTCP traffic. Based on these data, we are able to compute main VoIP quality metrics including jitter, delay, packet loss, and finally R-factor and MOS values. This technique of VoIP quality measuring can be directly incorporated into IPFIX monitoring framework where an IPFIX probe analyses RTP/RTCP packets, computes VoIP quality metrics, and adds these metrics into extended IPFIX flow records. Then, these extended data are stored in a central IPFIX monitoring system called collector where can be used for monitoring purposes. This paper presents a functional implementation of IPFIX plugin for VoIP quality measurement and compares the results with results obtained by other tools.

  1. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  2. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  3. Quality function deployment

    International Nuclear Information System (INIS)

    1981-10-01

    This book indicates quality function deployment with quality and deployment of quality function, process and prospect of quality function deployment and development, product process and conception of quality table, deployment of quality demand, design of quality table and application of concurrent multi design, progress design and quality development, main safe part and management of important function part, quality development and deployment of method of construction, quality deployment and economics, total system of quality function deployment and task of quality function deployment in the present and future.

  4. Study of transmitting electric power utility communications in IP network. Transmission of existing electric power utility communications in best effort type IP network under delay constraint; Denryokuyo tsushin kaisen no IP mo eno shuyo kento. Chien jikan seiyakuka ni okeru best effort gata IP mo eno kison denryokuyo tsushin kaisen no shuyo

    Energy Technology Data Exchange (ETDEWEB)

    Miyake, H.

    2000-07-01

    Since IP network does best effort behavior fundamentally, it always generates delay time and delay variation. For this reason, IP network has been unsuitable to transmit real time data such as a voice. However, in recent years, the technologies which transmit real time data in IP network, e.g. VoIP, have spread. If it is possible to transmit the existing electric power utility communications in IP network using these technologies, total network cost can be reduced by the reduction of required bandwidth and the simplification of communication network systems. In this report, it is examined quantitatively whether end-end delay time of the existing electric power utility communications, e.g. on-line, telephone, carrier relay, CDT (cyclic digital transmission equipment), video conference, ITV(industrial television), is within their permission delay time when they are transmitted in the best effort type IP network. (author)

  5. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  6. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    OpenAIRE

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  7. HPC Access Using KVM over IP

    Science.gov (United States)

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  8. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    International Nuclear Information System (INIS)

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  9. Automatic analysis of attack data from distributed honeypot network

    Science.gov (United States)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  10. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  11. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  12. Quantitative analysis of macro-ARG using IP system

    International Nuclear Information System (INIS)

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  13. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  14. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    International Nuclear Information System (INIS)

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  15. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  16. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2) Gene of Drosophila and Interacts with IP3R to Affect Wing Development.

    Science.gov (United States)

    Dean, Derek M; Maroja, Luana S; Cottrill, Sarah; Bomkamp, Brent E; Westervelt, Kathleen A; Deitcher, David L

    2015-11-27

    Inositol 1,4,5-trisphosphate (IP3) regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs) bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy), a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2), a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80(ts) indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling. Copyright © 2016 Dean et al.

  17. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2 Gene of Drosophila and Interacts with IP3R to Affect Wing Development

    Directory of Open Access Journals (Sweden)

    Derek M. Dean

    2016-02-01

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy, a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2, a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80ts indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling.

  18. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  19. Fourth Generation Broadband Delivered by Hybrid FttH Solution — A Techno-Economic Study

    NARCIS (Netherlands)

    Phillipson, F.; Smit-Rietveld, C.J.C.; Verhagen, W.P.

    2013-01-01

    The use of fibre will be inevitable for transporting hundreds of Mb/s to and from end-users, but this does not necessary mean that fibre has to be deployed all the way up to a point into the home. An alternative is bringing fibre up to the Home (Hybrid FttH) and reusing existing telephony wiring for

  20. Voice over IP in the Local Exchange: A Case Study

    OpenAIRE

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  1. Ade-Ojo, IP

    African Journals Online (AJOL)

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  2. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  3. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  4. Limitations and possibilities of low cell number ChIP-seq

    Directory of Open Access Journals (Sweden)

    Gilfillan Gregor D

    2012-11-01

    Full Text Available Abstract Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP, we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells, and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance.

  5. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  6. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  7. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  8. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  9. Prognostic value of CtIP/RBBP8 expression in breast cancer

    International Nuclear Information System (INIS)

    Soria-Bretones, Isabel; Sáez, Carmen; Ruíz-Borrego, Manuel; Japón, Miguel A; Huertas, Pablo

    2013-01-01

    CtIP/RBBP8 is a multifunctional protein involved in transcription, DNA replication, DNA repair by homologous recombination and the G1 and G2 checkpoints. Its multiple roles are controlled by its interaction with several specific factors, including the tumor suppressor proteins BRCA1 and retinoblastoma. Both its functions and interactors point to a putative oncogenic potential of CtIP/RBBP8 loss. However, CtIP/RBBP8 relevance in breast tumor appearance, development, and prognosis has yet to be established. We performed a retrospective analysis of CtIP/RBBP8 and RB1 levels by immunohistochemistry using 384 paraffin-embedded breast cancer biopsies obtained during tumor removal surgery. We have observed that low or no expression of CtIP/RBBP8 correlates with high-grade breast cancer and with nodal metastasis. Reduction on CtIP/RBBP8 is most common in hormone receptor (HR)-negative, HER2-positive, and basal-like tumors. We observed lower levels of RB1 on those tumors with reduced CtIP/RBBP8 levels. On luminal tumors, decreased but not absence of CtIP/RBBP8 levels correlate with increased disease-free survival when treated with a combination of hormone, radio, and chemo therapies

  10. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  11. China's Indigenous IP Policies -- Here to Stay?

    OpenAIRE

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  12. Internetiside VoIP sobib ka ettevõtteile / Valdur Laid

    Index Scriptorium Estoniae

    Laid, Valdur, 1969-

    2005-01-01

    Ilmunud ka: Delovõje Vedomosti 8. juuni lk. 19. Kommunikatsiooni liikumisest internetti ehk IP-võrku ning selle võimalustest ettevõtjaile. Vt. samas: Väikefirmade IP-lahendus jõuab aasta lõpus massturule

  13. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  14. All-IP-Ethernet architecture for real-time sensor-fusion processing

    Science.gov (United States)

    Hiraki, Kei; Inaba, Mary; Tezuka, Hiroshi; Tomari, Hisanobu; Koizumi, Kenichi; Kondo, Shuya

    2016-03-01

    Serendipter is a device that distinguishes and selects very rare particles and cells from huge amount of population. We are currently designing and constructing information processing system for a Serendipter. The information processing system for Serendipter is a kind of sensor-fusion system but with much more difficulties: To fulfill these requirements, we adopt All IP based architecture: All IP-Ethernet based data processing system consists of (1) sensor/detector directly output data as IP-Ethernet packet stream, (2) single Ethernet/TCP/IP streams by a L2 100Gbps Ethernet switch, (3) An FPGA board with 100Gbps Ethernet I/F connected to the switch and a Xeon based server. Circuits in the FPGA include 100Gbps Ethernet MAC, buffers and preprocessing, and real-time Deep learning circuits using multi-layer neural networks. Proposed All-IP architecture solves existing problem to construct large-scale sensor-fusion systems.

  15. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  16. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  17. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  18. Validation of the Spanish version of the Irrational Procrastination Scale (IPS.

    Directory of Open Access Journals (Sweden)

    Georgina Guilera

    Full Text Available The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS. The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64. Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  19. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  20. Validation of the Spanish version of the Irrational Procrastination Scale (IPS)

    Science.gov (United States)

    Guilera, Georgina; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18–77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population. PMID:29304119

  1. Validation of the Spanish version of the Irrational Procrastination Scale (IPS).

    Science.gov (United States)

    Guilera, Georgina; Barrios, Maite; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  2. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...... as a biomarker that predicts severity of various diseases and can be used in the immunodiagnostics of Mycobacterium tuberculosis and cytomegalovirus infection. Here, we describe an ELISA-based method to detect IP-10 from dried blood and plasma spot samples....

  3. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  4. An ethernet/IP security review with intrusion detection applications

    International Nuclear Information System (INIS)

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  5. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  6. Numerical study of IP3-induced Ca2+ spiral pattern evolution

    International Nuclear Information System (INIS)

    Tang Jun; Ma Jun; Yi Ming; Jia Ya

    2008-01-01

    The effect of change in concentration of messenger molecule inositol 1,4,5-trisphosphate (IP 3 ) on intracellular Ca 2+ spiral pattern evolution is studied numerically. The results indicate that when the IP 3 concentration decreases from 0.27 μM, a physiologically reasonable value, to different values, the spiral centre drifts to the edge of the medium and disappears for a small enough IP 3 concentration. The instability of spiral pattern can be understood in terms of excitability-change controlled by the IP 3 concentration. On the other hand, when the IP 3 concentration increases from 0.27 μM, a homogeneous area with a high Ca 2+ concentration emerges and competes with the spiral pattern. A high enough IP 3 concentration can lead the homogeneous area to occupy the whole medium. The instability of spiral pattern is ascribed to the change in stability of a stationary state with a high Ca 2+ concentration. (general)

  7. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  8. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Directory of Open Access Journals (Sweden)

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  9. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  10. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  11. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  12. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  13. A Reactive and Cycle-True IP Emulator for MPSoC Exploration

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Federico; Sparsø, Jens

    2008-01-01

    The design of MultiProcessor Systems-on-Chip (MPSoC) emphasizes intellectual-property (IP)-based communication-centric approaches. Therefore, for the optimization of the MPSoC interconnect, the designer must develop traffic models that realistically capture the application behavior as executing...... on the IP core. In this paper, we introduce a Reactive IP Emulator (RIPE) that enables an effective emulation of the IP-core behavior in multiple environments, including bit and cycle-true simulation. The RIPE is built as a multithreaded abstract instruction-set processor, and it can generate reactive...

  14. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  15. Quality of Services in Integrated UMTS/IP Networks

    Directory of Open Access Journals (Sweden)

    Ivan Bošnjak

    2006-01-01

    Full Text Available Fast development and implementation of new telecommunicationservices and Intelligent Transp01t Systems (ITS havecreated new environment for the network telecom operatorsand service providers and logistic and transport enterprises. Thecmcial issue for successful business and other professional applicationsis the provision of the end-to-end quality of service inthe inter-network operation of mobile and fixed networks. Theproblem was less expressed in the traditional networks orientedto telephony, but the issue of different QoS algorithms growswith the spreading of data transmission services and multimediaapplications. The existence of different QoS algorithms andprocedures in the !?-based networks (JP- Internet Protocolalso makes difficult the finding of a single solution for the implementationofQoS in the !?-based networks. In the indicatedcontext this work systemically defines the problem of providinga single end-to-end QoS protocol in the connected UMTS/IPnetworks. The possibilities of its realization are presented on theexample of two protocols. The work gives the basic characteristicsof the two protocols that fulfil the criteria set in the realizationof the new generation of mobile networks.

  16. VoIP under the EU regulatory framework : preventing foreclosure?

    NARCIS (Netherlands)

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  17. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  18. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  19. IP and resistivity survey at the INEL cold test pit

    International Nuclear Information System (INIS)

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  20. Computational Methods for ChIP-seq Data Analysis and Applications

    KAUST Repository

    Ashoor, Haitham

    2017-04-25

    The development of Chromatin immunoprecipitation followed by sequencing (ChIP-seq) technology has enabled the construction of genome-wide maps of protein-DNA interaction. Such maps provide information about transcriptional regulation at the epigenetic level (histone modifications and histone variants) and at the level of transcription factor (TF) activity. This dissertation presents novel computational methods for ChIP-seq data analysis and applications. The work of this dissertation addresses four main challenges. First, I address the problem of detecting histone modifications from ChIP-seq cancer samples. The presence of copy number variations (CNVs) in cancer samples results in statistical biases that lead to inaccurate predictions when standard methods are used. To overcome this issue I developed HMCan, a specially designed algorithm to handle ChIP-seq cancer data by accounting for the presence of CNVs. When using ChIP-seq data from cancer cells, HMCan demonstrates unbiased and accurate predictions compared to the standard state of the art methods. Second, I address the problem of identifying changes in histone modifications between two ChIP-seq samples with different genetic backgrounds (for example cancer vs. normal). In addition to CNVs, different antibody efficiency between samples and presence of samples replicates are challenges for this problem. To overcome these issues, I developed the HMCan-diff algorithm as an extension to HMCan. HMCan-diff implements robust normalization methods to address the challenges listed above. HMCan-diff significantly outperforms another state of the art methods on data containing cancer samples. Third, I investigate and analyze predictions of different methods for enhancer prediction based on ChIP-seq data. The analysis shows that predictions generated by different methods are poorly overlapping. To overcome this issue, I developed DENdb, a database that integrates enhancer predictions from different methods. DENdb also

  1. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  2. Photometric studies of δ Scuti stars. I. IP Virginis

    Science.gov (United States)

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  3. Functional-logic simulation of IP-blocks dose functional failures

    Directory of Open Access Journals (Sweden)

    Vyacheslav M. Barbashov

    2017-11-01

    Full Text Available The technique of functional-logical simulation of System-on-Chip (SoC total dose radiation failures is presented based on fuzzy logic sets theory. An analysis of the capabilities of this approach for IP-blocks radiation behavior is carried out along with the analysis of operating modes under irradiation influence on IP-blocks radiation behavior. The following elements of this technique application for simulation of dose radiation failures of various types of IP-units are studied: logical elements, memory units and cells, processors. Examples of criterial membership functions and operability functions construction are given for these IP-units and for various critical parameters characterizing their failures. It is shown that when modeling total dose failures it is necessary to take into account the influence of the functional mode on the model parameters. The technique proposed allows improving the reliability of the SoC radiation hardness estimation, also for the purpose of solving the problems of information security of electronic devices.

  4. The psisub(IPS)-LAS relation for extragalactic radio sources

    International Nuclear Information System (INIS)

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  5. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  6. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    Science.gov (United States)

    2003-04-01

    IP-HORNET, Metropolitan Optical Networks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION...OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500...Gemelos, and L. G. Kazovsky, “CSMA/CA MAC protocols for IP-HORNET: An IP over WDM metropolitan area ring netowrk ,” in Proceedings of GLOBE- COM’00

  7. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    Science.gov (United States)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated

  8. Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching

    DEFF Research Database (Denmark)

    Jha, Vikas; Kalia, Kartik; Chowdhary, Bhawani Shankar

    2016-01-01

    With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone....... With the humongous popularity of Internet the overall traffic on Internet has the same story. Focusing on transmission of IP traffic in an optical network with signals remaining in their optical nature generated at particular wavelength, proposed is the switching of optically generated IP packets through optical...... cross connects based on translation of wavelength when an IP packet is crossing the optical cross connect. Adding the concepts of layer 3 routing protocols along with the wavelength translation scheme, will help in spanning the overall optical network for a larger area....

  9. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  10. Solar Type II Radio Bursts and IP Type II Events

    Science.gov (United States)

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  11. User-centered Development of Video telephony for Servicing Mainly Older Users: Review and Evaluation of an Approach Applied for 10 Years

    Directory of Open Access Journals (Sweden)

    Seppo Väyrynen

    2006-01-01

    Full Text Available A research and development (R&D approach has been applied to video telephony (VT in northern Finland since 1994 by broad consortia. The focus has been on the considerable involvement of ergonomics within the engineering and implementation of VT. This multidisciplinary participatory ergonomic R&D approach (PERDA is described briefly, in general and through two cases. The user-centeredness should be discernible in this sociotechnical systemic entity. A consortium—comprising mainly manufacturers, individual and organizational users of technological products, and R&D organizations—serves as a natural context for product development. VT has been considered to have much potential for enhancing (multimedia interaction and effective multimodal communication, thereby facilitating many activities of everyday life and work. An assessment of the VT system, called HomeHelper, involved older citizens, as clients or customers, and the staff of social, health, and other services.

  12. The role of calsenilin/DREAM/KChIP3 in contextual fear conditioning.

    Science.gov (United States)

    Alexander, Jon C; McDermott, Carmel M; Tunur, Tumay; Rands, Vicky; Stelly, Claire; Karhson, Debra; Bowlby, Mark R; An, W Frank; Sweatt, J David; Schrader, Laura A

    2009-03-01

    Potassium channel interacting proteins (KChIPs) are members of a family of calcium binding proteins that interact with Kv4 potassium (K(+)) channel primary subunits and also act as transcription factors. The Kv4 subunit is a primary K(+) channel pore-forming subunit, which contributes to the somatic and dendritic A-type currents throughout the nervous system. These A-type currents play a key role in the regulation of neuronal excitability and dendritic processing of incoming synaptic information. KChIP3 is also known as calsenilin and as the transcription factor, downstream regulatory element antagonist modulator (DREAM), which regulates a number of genes including prodynorphin. KChIP3 and Kv4 primary channel subunits are highly expressed in hippocampus, an area of the brain important for learning and memory. Through its various functions, KChIP3 may play a role in the regulation of synaptic plasticity and learning and memory. We evaluated the role of KChIP3 in a hippocampus-dependent memory task, contextual fear conditioning. Male KChIP3 knockout (KO) mice showed significantly enhanced memory 24 hours after training as measured by percent freezing. In addition, we found that membrane association and interaction with Kv4.2 of KChIP3 protein was significantly decreased and nuclear KChIP3 expression was increased six hours after the fear conditioning training paradigm with no significant change in KChIP3 mRNA. In addition, prodynorphin mRNA expression was significantly decreased six hours after fear conditioning training in wild-type (WT) but not in KO animals. These data suggest a role for regulation of gene expression by KChIP3/DREAM/calsenilin in consolidation of contextual fear conditioning memories.

  13. Research on TCP/IP network communication based on Node.js

    Science.gov (United States)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  14. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    OpenAIRE

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  15. Smart Grid Applications for a Practical Implementation of IP over Narrowband Power Line Communications

    Directory of Open Access Journals (Sweden)

    Noelia Uribe-Pérez

    2017-11-01

    Full Text Available Currently, Advanced Metering Infrastructure (AMI systems have equipped the low voltage section with a communication system that is being used mainly for metering purposes, but it can be further employed for additional applications related to the Smart Grid (SG concept. This paper explores the potential applications beyond metering of the available channel in a Power Line Communication-based AMI system. To that end, IP has been implemented over Narrow Band-Power Line Communication (NB-PLC in a real microgrid, which includes an AMI system. A thorough review of potential applications for the SG that might be implemented for this representative case is included in order to provide a realistic analysis of the potentiality of NB-PLC beyond smart metering. The results demonstrate that existing AMI systems based on NB-PLC have the capacity to implement additional applications such as remote commands or status signals, which entails an added value for deployed AMI systems.

  16. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  17. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  18. Review Report on the Design of In-Pile Test Section(IPS)

    International Nuclear Information System (INIS)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-01

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins

  19. Review Report on the Design of In-Pile Test Section(IPS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-15

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins.

  20. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  1. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... will be posted without alteration at http://www.regulations.gov , including any personal information... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...

  2. Searching CLEF-IP by Strategy

    NARCIS (Netherlands)

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  3. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  4. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  5. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  6. Quantitative ChIP-Seq Normalization Reveals Global Modulation of the Epigenome

    Directory of Open Access Journals (Sweden)

    David A. Orlando

    2014-11-01

    Full Text Available Epigenomic profiling by chromatin immunoprecipitation coupled with massively parallel DNA sequencing (ChIP-seq is a prevailing methodology used to investigate chromatin-based regulation in biological systems such as human disease, but the lack of an empirical methodology to enable normalization among experiments has limited the precision and usefulness of this technique. Here, we describe a method called ChIP with reference exogenous genome (ChIP-Rx that allows one to perform genome-wide quantitative comparisons of histone modification status across cell populations using defined quantities of a reference epigenome. ChIP-Rx enables the discovery and quantification of dynamic epigenomic profiles across mammalian cells that would otherwise remain hidden using traditional normalization methods. We demonstrate the utility of this method for measuring epigenomic changes following chemical perturbations and show how reference normalization of ChIP-seq experiments enables the discovery of disease-relevant changes in histone modification occupancy.

  7. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  8. The Incredibly Long-Lived SN 2005ip

    Science.gov (United States)

    Fox, Ori

    2016-10-01

    Type IIn supernovae (SNe IIn) are defined by their relatively narrow spectral line features associated with a dense circumstellar medium (CSM) formed by the progenitor star. The nature of the progenitor and mass loss remains relatively unknown. Shock interaction with the dense CSM can often result in significant UV emission for several years post-explosion, thereby probing the CSM characteristics, progenitor mass loss history and, ultimately, the progenitor itself. The Type IIn SN 2005ip proves to be one of the most interesting and well-studied targets within this subclass. Compared to all other supernovae, SN 2005ip is the most luminous for its age. Now more than 11 years post-explosion, the SN has released >10^51 erg throughout its lifetime as the forward shock continues to collide with a dense CSM. Here we propose HST/STIS-MAMA UV observations of SN 2005ip to investigate the massive CSM. When accounting for the shock travel time, these observations will probe material lost from the progenitor more than 1000 years prior to the explosion. We already have a single HST/STIS spectrum of SN 2005ip from 2014, which was obtained while the shock was still within a higher mass regime. With just 5 orbits, a second spectrum will allow us to directly trace the evolution of the CSM and produce new constraints on the pre-SN mass-loss history. Coinciding with Cycle 24's UV Initiative, this program offers new insight regarding both the progenitor and explosion characteristics of the SN IIn subclass.

  9. Sate-of-the-art IP switching router architecture using SFQ technology

    International Nuclear Information System (INIS)

    Miyaho, N.; Miyahara, K.; Yamazaki, A.

    2006-01-01

    Taking the recent trend of rapid IP traffic increasing and QoS in the Internet into account, we propose an innovative IP router architecture from the viewpoint of minimum switching delay, switching capacity, QoS assurance for the next generation Internet services. We examined the IP router performance using superconductivity device simulator (WinS) assuming the future-generation Nb junction process and confirmed more than 300 GHz clock operation. For the evaluation of a novel IP switch architecture, we effectively apply the SFQ circuits using Josephson junctions to an extremely restricted function block in the switching node and a conventional semiconductor technology is also applied for the rest parts of the other function blocks inside it

  10. Implantación de switching y ToIP sobre una red WAN

    OpenAIRE

    Pique Palacin, Ivan

    2013-01-01

    Este proyecto tiene como objeto el diseño y la implementación de servicios de comunicaciones de LAN (Switching) y Telefonía IP (ToIP), todos ellos integrados sobre una red WAN nacional ya existente y funcionando, gestionada por un ISP. Aquest projecte té com a objecte el disseny i la implementació de serveis de comunicacions de LAN (Switching) i telefonia IP (ToIP), tots ells integrats sobre una xarxa WAN nacional ja existent i funcionant, gestionada per un ISP. Bachelor thesis for the ...

  11. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  12. IPS observation system for the Miyun 50 m radio telescope and its commissioning observation

    International Nuclear Information System (INIS)

    Zhu Xinying; Zhang Xizhen; Zhang Hongbo; Kong Deqing; Qu Huipeng

    2012-01-01

    Ground-based observation of Interplanetary Scintillation (IPS) is an important approach for monitoring solar wind. A ground-based IPS observation system has been newly implemented on a 50 m radio telescope at Miyun station, managed by the National Astronomical Observatories, Chinese Academy of Sciences. This observation system has been constructed for the purpose of observing solar wind speed and the associated scintillation index by using the normalized cross-spectrum of a simultaneous dual-frequency IPS measurement. The system consists of a universal dual-frequency front-end and a dual-channel multi-function back-end specially designed for IPS. After careful calibration and testing, IPS observations on source 3C 273B and 3C 279 have been successfully carried out. The preliminary observation results show that this newly-developed observation system is capable of performing IPS observation. The system's sensitivity for IPS observation can reach over 0.3 Jy in terms of an IPS polarization correlator with 4 MHz bandwidth and 2 s integration time. (research papers)

  13. Controlling applied to information processing: quality management applied to IP projects and IP services; Informationsverarbeitungs-Controlling: Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service

    Energy Technology Data Exchange (ETDEWEB)

    Becker, B. [Vereinigung Deutscher Elektrizitaetswerke e.V. (VDEW), Frankfurt am Main (Germany); Beckers, F. [Isar-Amperwerke AG, Muenchen (Germany); Dewald, N. [Bayernwerk AG, Muenchen (Germany); Hauffe, P. [Pfalzwerke AG, Ludwigshafen am Rhein (Germany); Hein, F. [EVS AG Stuttgart (Germany); Hoederath, M. [Vereinigte Elektrizitaetswerke Westfalen AG (VEW), Dortmund (Germany); Seyen, R. [Staedtische Werke Nuernberg GmbH (Germany)

    1998-01-12

    The working group on information processing (IP) basics (in German: `IV-Grundlagen`) has prepared this contribution dealing with controlling applied to information processing. This new report, on the one hand, takes into consideration the role of the organizational IP unit as one offering its services to all sections of a company. On the other hand, information processing as an operational infrastructure influencing all business processes becomes increasingly important with respect to the competitiveness of the EVU. Therefore, quality management applied to IP projects and IP services must support this development. (orig./RHM) [Deutsch] Der VDEW Arbeitskreis `IV-Grundlagen` hat einen Beitrag zum Controlling fuer die Informationsverarbeitung erstellt. Hier geht zum einen die Rolle der Organisationseinheit IV als Dienstleister fuer alle Unternehmensbereiche ein. Zum anderen gewinnt die Informationsverarbeitung als betriebliche Infrastruktur fuer alle Geschaeftsprozesse zunehmende Bedeutung fuer die Wettbewerbsfaehigkeit der EVU. Das Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service muss dies unterstuetzen. (orig./RHM)

  14. Practical guidelines for the comprehensive analysis of ChIP-seq data.

    Directory of Open Access Journals (Sweden)

    Timothy Bailey

    Full Text Available Mapping the chromosomal locations of transcription factors, nucleosomes, histone modifications, chromatin remodeling enzymes, chaperones, and polymerases is one of the key tasks of modern biology, as evidenced by the Encyclopedia of DNA Elements (ENCODE Project. To this end, chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq is the standard methodology. Mapping such protein-DNA interactions in vivo using ChIP-seq presents multiple challenges not only in sample preparation and sequencing but also for computational analysis. Here, we present step-by-step guidelines for the computational analysis of ChIP-seq data. We address all the major steps in the analysis of ChIP-seq data: sequencing depth selection, quality checking, mapping, data normalization, assessment of reproducibility, peak calling, differential binding analysis, controlling the false discovery rate, peak annotation, visualization, and motif analysis. At each step in our guidelines we discuss some of the software tools most frequently used. We also highlight the challenges and problems associated with each step in ChIP-seq data analysis. We present a concise workflow for the analysis of ChIP-seq data in Figure 1 that complements and expands on the recommendations of the ENCODE and modENCODE projects. Each step in the workflow is described in detail in the following sections.

  15. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  16. Longevity and clinical performance of IPS-Empress ceramic restorations--a literature review.

    Science.gov (United States)

    El-Mowafy, Omar; Brochu, Jean-François

    2002-04-01

    A literature review of longevity and clinical performance of IPS-Empress restorations is presented. A MEDLINE search was conducted in fall 2000. Selection criteria were set so as to identify suitable clinical trials that were published in full and that had lasted more than 2 years. A total of 6 clinical trials on the performance of IPS-Empress inlays and onlays and a total of 3 clinical trials on the performance of IPS-Empress crowns were identified. Survival rates for IPS-Empress inlays and onlays ranged from 96% at 4.5 years to 91% at 7 years; most failures were due to bulk fracture. IPS-Empress crowns had a survival rate ranging from 92% to 99% at 3 to 3.5 years; crown failure was also mainly due to fracture. Dentists should inform their patients about these survival rates when offering such treatment. The use of IPS-Empress crowns in the posterior of the mouth is not recommended until the results of more long-term clinical trials are available.

  17. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    Science.gov (United States)

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Real-time resource availability signaling in IP multimedia subsystem networks

    NARCIS (Netherlands)

    Ozcelebi, T.; Radovanovic, I.; Sengupta, D.

    2008-01-01

    IP Multimedia Subsystem (IMS) allows the use of unlicensed, non-dedicated and nondeterministic access networks for delivering IP multimedia services. Providing end-to-end Quality-of-Service (QoS) for resource demanding real-time services (e.g. real-time multimedia) over such networks is a

  20. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  1. Examples of modelling IP in AEM data: synthetic and real data

    DEFF Research Database (Denmark)

    Viezzoli, Andrea; Kaminskiy, Vladislav; Fiandaca, Gianluca

    There have been multiple evidences in the literature in the past several years of what has been referred to as IP effect in the Time Domain Airborne EM data (TDEM). This phenomenon is known to be responsible for incorrect inversion modelling of electrical resistivity, lower interpreted depth...... of investigation and lost information about chargeability of the subsurface as well as about other valuable parameters. Historically there have been many suggestions to account for the IP effect using the Cole-Cole model. In current paper we are showing the possibility to extract IP information from airborne TDEM...... with both high electrical conductivity and in resistive environments. Furthermore, modelling of IP effects allows corrected resistivity models. The Amakinskaya kimberlite pipe results highlight the relevance of chargeability for kimberlite exploration....

  2. Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM

    Directory of Open Access Journals (Sweden)

    La Surimi

    2015-07-01

    Abstract VoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed. The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet.   Keywords— VoIP, SCTP, ECN, AQM,AVQ.

  3. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  4. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  5. Analysis of ChIP-seq Data in R/Bioconductor.

    Science.gov (United States)

    de Santiago, Ines; Carroll, Thomas

    2018-01-01

    The development of novel high-throughput sequencing methods for ChIP (chromatin immunoprecipitation) has provided a very powerful tool to study gene regulation in multiple conditions at unprecedented resolution and scale. Proactive quality-control and appropriate data analysis techniques are of critical importance to extract the most meaningful results from the data. Over the last years, an array of R/Bioconductor tools has been developed allowing researchers to process and analyze ChIP-seq data. This chapter provides an overview of the methods available to analyze ChIP-seq data based primarily on software packages from the open-source Bioconductor project. Protocols described in this chapter cover basic steps including data alignment, peak calling, quality control and data visualization, as well as more complex methods such as the identification of differentially bound regions and functional analyses to annotate regulatory regions. The steps in the data analysis process were demonstrated on publicly available data sets and will serve as a demonstration of the computational procedures routinely used for the analysis of ChIP-seq data in R/Bioconductor, from which readers can construct their own analysis pipelines.

  6. A Learning-Based Approach for IP Geolocation

    Science.gov (United States)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  7. Optimal use of tandem biotin and V5 tags in ChIP assays

    Directory of Open Access Journals (Sweden)

    Krpic Sanja

    2009-02-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP assays coupled to genome arrays (Chip-on-chip or massive parallel sequencing (ChIP-seq lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes.

  8. Optimal use of tandem biotin and V5 tags in ChIP assays

    Science.gov (United States)

    Kolodziej, Katarzyna E; Pourfarzad, Farzin; de Boer, Ernie; Krpic, Sanja; Grosveld, Frank; Strouboulis, John

    2009-01-01

    Background Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes. PMID:19196479

  9. Emancipating Intellectual Property from Proprietarianism: Drahos, Foucault, and a Quasi-Genealogy of IP

    Directory of Open Access Journals (Sweden)

    Wendyl Luna

    2018-01-01

    Full Text Available This paper argues that Peter Drahos undertakes a partial Foucauldian genealogy by emancipating intellectual property (IP from proprietarianism. He demonstrates the dominance of proprietarianism in IP by drawing sample practices from trademark, copyright, and patent laws, and then seeks to displace the proprietarian dominance with instrumentalism, which reconstitutes IP as a “liberty-intruding privilege.” Ironically, despite doing a genealogy, Drahos does not eradicate sovereignty altogether as Michel Foucault insists, but instead determines IP as a “sovereignty mechanism” that has a “sovereignty effect.” After explaining what Foucauldian genealogy is, the paper will explain how Drahos undertakes a genealogy of IP, while highlighting the limitations of Drahos’ analysis from a Foucauldian perspective.

  10. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...

  11. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  12. EQuIP-ped for Success

    Science.gov (United States)

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  13. (S)-(+)-Ipsdienol: Interspecific Inhibition of Ips latidens (LeConte) by Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1992-01-01

    In south-central British Columbia, the attraction of Ips latidens (LeConte) to its pheromone, ipsenol, was inhibited by (S)-(+)-ipsdienol, a pheromone for I. pini (Say). (R)-(-)-Ipsdienol had no effect on I. latidens. (S)-(+)-lpsdienol probably plays a role in interspecific communication between the two species...

  14. Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP

    Directory of Open Access Journals (Sweden)

    Muhamad Arsad Adam

    2016-11-01

    Full Text Available Teknologi  VoIP  (Voice  Over  Internet  Protocol merupakan  teknologi  yang  mampu  melewatkan  panggilan  suara, video  dan  data  dalam  jaringan  IP.  Voice  over  Internet  Protocol (VoIP  dalam  teknologi  komunikasi  cukup  signifikan  sehingga tidak  terlepas  dari  kejahatan  cybercrime,  Teknologi  VoIP  dapat disalahgunakan  untuk  melakukan  tindakan  kejahatan  jarak  jauh sehingga  diperlukan  langkah-langkah  investigasi  jika  terjadi masalah.  Menemukan  artefact  pada  Infrastruktur  VoIP merupakan tantangan tersendiri. WireSharks salah satu tool yang digunakan  dalam  investigasi  ini.  Metode  yang  digunakan  adalah DFIF  yang  terdiri  tahapan  adalah  Collection,  Examination, Analysis, dan Report and Documentation. Investigasi pada layanan VoIP  dapat  berhasil  dilakukan  dengan  menemukan  data  digital evidence  di  layer  5.  Tujuan  Penelitian  ini  yaitu  Mengetahui Karakteristik Data Digital berupa suara pada layanan Voice Over IP  dan  Menganalisis  Data  Digital  berupa  suara  pada  layanan Voice Over IP. Hasil dari penelitian ini barang bukti digital yang berupa  percakapan  yang  dapat  dipertanggungjawabkan  dalam pengadilan..Kata kunci— Data, Evidence, Forensik,Network, VoIP

  15. Impact of time-domain IP pulse length on measured data and inverted models

    DEFF Research Database (Denmark)

    Olsson, P. I.; Fiandaca, G.; Dahlin, T.

    2015-01-01

    The duration of time domain (TD) induced polarization (IP) current injections has significant impact on the acquired IP data as well as on the inversion models, if the standard evaluation procedure is followed. However, it is still possible to retrieve similar inversion models if the waveform...... of the injected current and the IP response waveform are included in the inversion. The on-time also generally affects the signal-tonoise ratio (SNR) where an increased on-time gives higher SNR for the IP data....

  16. A Brazilian version of the "Children's Interview for Psychiatric Syndromes" (ChIPS A versão brasileira do "Children's Interview for Psychiatric Syndromes" (ChIPS

    Directory of Open Access Journals (Sweden)

    Isabella G. S. de Souza

    2009-01-01

    Full Text Available OBJETIVE: The advance of research in child and adolescent psychiatry in Brazil heavily depends on the existence of instruments for the investigation of psychiatric syndromes adapted to Brazilian Portuguese. METHODS: This article describes a careful process of translation of the Children's Interview for Psychiatric Syndromes for the purpose of use in research in Brazil. The Children's Interview for Psychiatric Syndromes has a version for parents (P-ChIPs and a version for children (ChIPS. In this article, the sections of P-ChIPS referring to attention-deficit hyperactivity disorder, oppositional-defiant disorder, conduct disorder, mania/hypomania, anorexia nervosa, bulimia nervosa and psychotic disorders were translated to Brazilian Portuguese. The sections of the ChIPS referring to substance use disorders, social anxiety disorder, specific phobias, obsessive-compulsive disorder, generalized anxiety disoder, separation anxiety disorder, post-traumatic disorders and depression/dysthimia were also adapted. Each section was translated by two independent translators and later discussed in a committee composed of experts in the field of Psychiatry and a professional of the field of linguistics. RESULT: A final version containing an interview for the main psychiatric syndromes was defined. CONCLUSION: The translated P-ChIPS is a helpful instrument in children and adolescent clinical evaluation.OBJETIVO: O avanço em pesquisa em psiquiatria da infância e adolescência no Brasil depende da existência de instrumentos para a investigação de síndromes psiquiátricas adaptadas à Língua Portuguesa. Este artigo descreve um cuidadoso processo de tradução do Children´s Interview for Psychiatric Syndromes para o uso em pesquisa no Brasil. MÉTODOS: O Children´s Interview for Psychiatric Syndromes tem uma versão para pais (P-ChIPs e uma versão para as crianças (ChIPs. Nesse artigo, as seções do P-ChIPs referentes ao transtorno do déficit de aten

  17. Considerations on VoIP Throughput in 802.11 Networks

    Directory of Open Access Journals (Sweden)

    POTORAC, A. D.

    2009-10-01

    Full Text Available Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction. From this point of view, transmitting voice over IP networks is the most sensitive category of applications, especially when wireless medium is involved. The paper discusses the possibilities of transmitting the maximum number of simultaneous voice streams over 802.11 wireless networks considering the main factors which impact with VoIP throughput, in a basic scenario. Starting from a proposed communication model, the number of simultaneous possible VoIP sessions is calculated, taking into consideration the contribution of the protocol overheads, the security overheads, the PHY level timings and the CODEC proprieties. Numerical results are generated and compared.

  18. Multiformat decoder for a DSP-based IP set-top box

    Science.gov (United States)

    Pescador, F.; Garrido, M. J.; Sanz, C.; Juárez, E.; Samper, D.; Antoniello, R.

    2007-05-01

    Internet Protocol Set-Top Boxes (IP STBs) based on single-processor architectures have been recently introduced in the market. In this paper, the implementation of an MPEG-4 SP/ASP video decoder for a multi-format IP STB based on a TMS320DM641 DSP is presented. An initial decoder for PC platform was fully tested and ported to the DSP. Using this code an optimization process was started achieving a 90% speedup. This process allows real-time MPEG-4 SP/ASP decoding. The MPEG-4 decoder has been integrated in an IP STB and tested in a real environment using DVD movies and TV channels with excellent results.

  19. US HTGR Deployment Challenges and Strategies HTR 2014 Conference Proceedings

    International Nuclear Information System (INIS)

    Shahrokhi, Farshid; Lommers, Lewis; Mayer, John III; Southworth, Finis

    2014-01-01

    The NGNP Industry Alliance (NIA), LLC (www.NGNPAliance.org), is a consortium of high temperature gas-cooled reactor (HTGR) designers, utility plant owner/operators, critical plant hardware suppliers, and end-user groups. The NIA is promoting the design and commercialization of a HTGR for industrial process heat applications and electricity generation. In 2012, NIA selected the AREVA Steam Cycle HTGR (SC-HTGR) as its primary reactor design choice for its first implementation in mid -2020s. The SC-HTGR can produce 625 MWth of process steam at 550°C or 275 MWe of electricity in a co-generation configuration. The standard plant is a four-pack of 625MWth modules providing steam and electricity co-generation. The safety characteristics of the HTGR technology allows close colocation of the nuclear plant and the industrial end-user. The plant design also allows the process steam used for the industrial applications to be completely segregated and separate from primary Helium coolant and the secondary nuclear steam supply systems. The process steam at temperatures up to 550°C is provided for a variety of direct or indirect applications. End-user requirements are met for a wide range of steam flow, pressure and temperature conditions. Very high reliability (>99.99%) is maintained by the use of multi-reactor modules and conventional gas-fired back-up. Intermittent steam loads can also be efficiently met through co-generation of electricity for internal use or external distribution and sale. The NIA technology development and deployment challenges are met with strategies that provide investment and partnerships opportunities for plant design and equipment supply, and by cooperative government research, sovereign or private investment, and philanthropic opportunities. Our goal is to create intellectual property (IP) and investor value as the design matures and a license is obtained. The strategy also includes involvement of the initial customer in sharing the value created in

  20. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  1. PENGGUNAAN METODE SIMULASI DALAM PEMBELAJARAN KETERAMPILAN LITERASI INFORMASI IPS BAGI MAHASISWA PGSD

    Directory of Open Access Journals (Sweden)

    Ana Nurhasanah

    2016-06-01

    Full Text Available Abstrak. Mata pelajaran IPS di Sekolah Dasar dikembangkan sebagai mata pelajaran terintegrasi atau integrative social studies, bukan sebagai pendidikan disiplin ilmu. Tantangan yang dihadapi peserta didik saat ini adalah banyak dan beragamnya masalah-masalah sosial yang harus dihadapi dalam kehidupan sehari-hari, oleh sebab itu pembelajaran IPS bertujuan untuk  mengembangkan keterampilan sosial. Namun, mengingat perkembangan siswa SD yang masih dalam tingkat berpikir kongkrit maka disarankan pembelajaran IPS SD menggunakan contoh-contoh masalah sosial yang kongkrit dan yang  mungkin melibatkan pengalaman-pengalaman siswa SD secara langsung. Namun dalam kenyataannya berdasarkan wawancara pada guru-guru SD di kota Serang masih banyak ditemukan kesulitan dalam mengajarkan IPS. Hal ini menunjukan bahwa kemampuan guru-guru di SD belum sesuai dengan tuntutan tujuan pembelajaran IPS. Oleh sebab itu penting kiranya mahasiswa PGSD semester V sebagai calon tenaga pendidik dibekali pengalaman dengan metode simulasi guna mengembangkan literasi informasi pada pembelajaran IPS yang menunjang pada pengembangan karir profesionalnya nanti. Kata kunci: metode simulasi, literasi informasi IPS, dan mahasiswa  Abstract. Social studies in elementary school subjects developed as an integrated or integrative social studies, not as educational disciplines. The challenges facing students today are many and varied social problems that must be faced in everyday life, so learning IPS aims to develop social skills. However, considering the development of elementary school students who are still in the level of concrete thinking it is advisable elementary social studies learning using examples of concrete social problems and that may involve experiences elementary students directly. But in reality based on the interviews of the teachers in the city of Serang there are still many difficulties in teaching social studies. This shows that the ability of teachers in primary

  2. Pressurisation of IP-SOFC technology for second generation hybrid application

    Energy Technology Data Exchange (ETDEWEB)

    Jones, L.

    2005-07-01

    The Integrated Planar Solid Oxide Fuel Cell (IP-SOFC) technology developed by Rolls-Royce plc is a hybrid fuel cell technology considered highly suitable for the distributed power generation market. This report presents the results of a project to examine the technical viability of the IP-SOFC technology and some of the associated hybrid system component technologies under pressurised conditions and to investigate the validity of the predicted pressurisation phenomena. The work included: identification of critical material specifications, construction processes, control parameters, etc; the design and commissioning of two pressurised IP-SOFC test rigs at Rolls Royce in Derby; testing two multi-bundle strips at high temperature and atmospheric pressure; testing an active IP-SOFC bundle at high temperature and pressure; testing an experimental steam reforming unit at high temperature and pressure; testing a novel low pressure drop, off-gas combustor concept under atmospheric and pressurised conditions; design studies to identify key parameters affecting the successful integration and packaging of the fuel cell stack with certain associated hybrid components; and designing a hybrid system experimental verification rig. Significant progress was made in addressing the development challenges associated with the IP-SOFC of leakage, performance, durability, yield and geometry, the reaction rate of steam reforming and emissions from the off-gas combustor. Recommendations for future work are made.

  3. Myricetin stimulates the absorption of the pro-carcinogen PhIP

    NARCIS (Netherlands)

    Schutte, M.E.; Sandt, J.J.M. van de; Alink, G.M.; Groten, J.P.; Rietjens, I.M.C.M.

    2006-01-01

    The effect of the flavonoid myricetin on the transport of the pro-carcinogen 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) through differentiated Caco-2 monolayers, a model for the intestinal epithelium, is described. Myricetin causes an increase of the transport of PhIP from the apical to

  4. Universal Space IP Transparent Proxy, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  5. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... including notification in the Federal Register. (2) VRS and IP Relay provider. Any entity desiring to...

  6. Novel characteristics of CtIP at damage-induced foci following the initiation of DNA end resection

    International Nuclear Information System (INIS)

    Fujisawa, Hiroshi; Fujimori, Akira; Okayasu, Ryuichi; Uesaka, Mitsuru; Yajima, Hirohiko

    2015-01-01

    Highlights: • CtIP becomes hyperphosphorylated and forms foci following cell irradiation. • CtIP accumulates in foci subsequent to the peak of hyperphosphorylation. • CtIP is maintained in a hypophosphorylated state at later times. • CtIP is continuously recruited to DNA double strand breaks downstream of resection. • CtIP presumably have a distinct role following the initiation of resection. - Abstract: Homologous recombination (HR) is a major repair pathway for DNA double strand breaks (DSBs), and end resection, which generates a 3′-single strand DNA tail at the DSB, is an early step in the process. Resection is initiated by the Mre11 nuclease together with CtIP. Here, we describe novel characteristics of CtIP at DSBs. At early times following exposure of human cells to ionizing radiation, CtIP localized to the DSB, became hyperphosphorylated and formed foci in an ATM-dependent manner. At later times, when the initiation of resection had occurred, CtIP foci persist but CtIP is maintained in a hypophosphorylated state, which is dependent on ATM and ATR. Exposure to cycloheximide revealed that CtIP turns over at DSB sites downstream of resection. Our findings provide strong evidence that CtIP is continuously recruited to DSBs downstream of both the initiation and extension step of resection, strongly suggesting that CtIP has functions in addition to promoting the initiation of resection during HR

  7. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  8. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  9. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie R. Watzlaf

    2012-06-01

    Full Text Available Consumer-based, free Voice and video over the Internet Protocol (VoIP software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 

  10. CMT: a constrained multi-level thresholding approach for ChIP-Seq data analysis.

    Directory of Open Access Journals (Sweden)

    Iman Rezaeian

    Full Text Available Genome-wide profiling of DNA-binding proteins using ChIP-Seq has emerged as an alternative to ChIP-chip methods. ChIP-Seq technology offers many advantages over ChIP-chip arrays, including but not limited to less noise, higher resolution, and more coverage. Several algorithms have been developed to take advantage of these abilities and find enriched regions by analyzing ChIP-Seq data. However, the complexity of analyzing various patterns of ChIP-Seq signals still needs the development of new algorithms. Most current algorithms use various heuristics to detect regions accurately. However, despite how many formulations are available, it is still difficult to accurately determine individual peaks corresponding to each binding event. We developed Constrained Multi-level Thresholding (CMT, an algorithm used to detect enriched regions on ChIP-Seq data. CMT employs a constraint-based module that can target regions within a specific range. We show that CMT has higher accuracy in detecting enriched regions (peaks by objectively assessing its performance relative to other previously proposed peak finders. This is shown by testing three algorithms on the well-known FoxA1 Data set, four transcription factors (with a total of six antibodies for Drosophila melanogaster and the H3K4ac antibody dataset.

  11. Automated Integration of Dedicated Hardwired IP Cores in Heterogeneous MPSoCs Designed with ESPAM

    Directory of Open Access Journals (Sweden)

    Ed Deprettere

    2008-06-01

    Full Text Available This paper presents a methodology and techniques for automated integration of dedicated hardwired (HW IP cores into heterogeneous multiprocessor systems. We propose an IP core integration approach based on an HW module generation that consists of a wrapper around a predefined IP core. This approach has been implemented in a tool called ESPAM for automated multiprocessor system design, programming, and implementation. In order to keep high performance of the integrated IP cores, the structure of the IP core wrapper is devised in a way that adequately represents and efficiently implements the main characteristics of the formal model of computation, namely, Kahn process networks, we use as an underlying programming model in ESPAM. We present details about the structure of the HW module, the supported types of IP cores, and the minimum interfaces these IP cores have to provide in order to allow automated integration in heterogeneous multiprocessor systems generated by ESPAM. The ESPAM design flow, the multiprocessor platforms we consider, and the underlying programming (KPN model are introduced as well. Furthermore, we present the efficiency of our approach by applying our methodology and ESPAM tool to automatically generate, implement, and program heterogeneous multiprocessor systems that integrate dedicated IP cores and execute real-life applications.

  12. Spojení s dynamickou IP adresou

    Czech Academy of Sciences Publication Activity Database

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  13. IP-telefon säästab oluliselt sidekulusid / Kristjan Otsmann

    Index Scriptorium Estoniae

    Otsmann, Kristjan, 1971-

    2005-01-01

    Telekomifirma Norby Telecomi poolt pakutavast IP-telefonist ehk helistamisest läbi Interneti, millega saab vähendada sidekulusid mitmeid kordi. Erinevatest internetipõhise kõnesidelahenduse lisateenustest. Vt. samas: Saaremaa Spa Hotellid säästab tuhandeid kroone kuus [intervjuu Saaremaa Spa Hotellide IT-juhiga Andri Võrguga]; Kuus olulist tööd enne IP-lahenduse tellimist

  14. Software for rapid time dependent ChIP-sequencing analysis (TDCA).

    Science.gov (United States)

    Myschyshyn, Mike; Farren-Dai, Marco; Chuang, Tien-Jui; Vocadlo, David

    2017-11-25

    Chromatin immunoprecipitation followed by DNA sequencing (ChIP-seq) and associated methods are widely used to define the genome wide distribution of chromatin associated proteins, post-translational epigenetic marks, and modifications found on DNA bases. An area of emerging interest is to study time dependent changes in the distribution of such proteins and marks by using serial ChIP-seq experiments performed in a time resolved manner. Despite such time resolved studies becoming increasingly common, software to facilitate analysis of such data in a robust automated manner is limited. We have designed software called Time-Dependent ChIP-Sequencing Analyser (TDCA), which is the first program to automate analysis of time-dependent ChIP-seq data by fitting to sigmoidal curves. We provide users with guidance for experimental design of TDCA for modeling of time course (TC) ChIP-seq data using two simulated data sets. Furthermore, we demonstrate that this fitting strategy is widely applicable by showing that automated analysis of three previously published TC data sets accurately recapitulates key findings reported in these studies. Using each of these data sets, we highlight how biologically relevant findings can be readily obtained by exploiting TDCA to yield intuitive parameters that describe behavior at either a single locus or sets of loci. TDCA enables customizable analysis of user input aligned DNA sequencing data, coupled with graphical outputs in the form of publication-ready figures that describe behavior at either individual loci or sets of loci sharing common traits defined by the user. TDCA accepts sequencing data as standard binary alignment map (BAM) files and loci of interest in browser extensible data (BED) file format. TDCA accurately models the number of sequencing reads, or coverage, at loci from TC ChIP-seq studies or conceptually related TC sequencing experiments. TC experiments are reduced to intuitive parametric values that facilitate biologically

  15. In-Pile Section(IPS) Inner Assembly Manufacturing Report

    International Nuclear Information System (INIS)

    Lee, Jong Min; Shim, Bong Sik; Lee, Chung Yong

    2009-12-01

    The objective of this report is to present the manufacturing, assembling and testing process of IPS Inner Assembly used in Fuel Test Loop(FTL) pre-operation test. The majority of the manufactured components are test fuels, inner assembly structures and subsidiary tools that is needed during the assembly process. In addition, Mock-up test for the welding and brazing is included at this stage. Lower structure, such as test fuels, fuel carrier legs are assembled and following structures, such as fuel carrier stem in the middle structure, top flange in the top structure are assembled together each other. To Verify the Reactor Coolant Pressure Boundary(RCPB) function in IPS Inner Assembly helium leak test and hydraulic test is performed with its acceptance criteria. According to the ASME III code Authorized Nuclear Inspector(ANI) is required during the hydraulic test. As-built measurement and insulation resistance test are performed to the structures and instrumentations after the test process. All requirements are satisfied and the IPS Inner Assembly was loaded in HANARO IR-1 hole in September 25, 2009

  16. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  17. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  18. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  19. [Two years clinical observation of a kind of castable ceramic--IPS Empress].

    Science.gov (United States)

    Liu, Y; Li, Y; Nie, Y

    1999-03-01

    We used this material in clinic since 1995. Discussion on the prosthetic effects of the above-mentioned material to spreat it clinically. Through half to two years clinical observations to evaluate the effect of IPS Empress crowns in anterior teeth and inlays in posteriors. and Prosthesis made of this kind of material IPS Empress is one kind of excellent all-ceramic prosthetic material. IPS Empress also could be used in post crowns and the clinical effect was satisfactory.

  20. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  1. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  2. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  3. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  4. Solar sail deployment experiment

    OpenAIRE

    Shimose, Shigeru; 下瀬 滋

    2006-01-01

    Solar Sail move by receiving momentum of photons in sunlight. This paper presents results of some Spin-Stabilized Solar Sail deployment experiment. ISAS has successfully deployed, for the first time in the world, the polyimide Solar Sail taking advantage of centrifugal force in space. Based on this result, the new deployment mechanism is being developed which retracts the 50 m diameter sail.

  5. Determination of alpha particle detection efficiency of an imaging plate (IP) detector

    International Nuclear Information System (INIS)

    Rahman, N.M; Iida, Takao; Yamazawa, Hiromi; Moriizumi, Jun

    2006-01-01

    In order to determine the detection efficiency of the imaging plate (IP) detector, the true radioactivity of the alpha particles, which sampled in the collection media, should be known. The true radioactivity could be accurately predicted with the help of the reference alpha spectrometer measurement. The detection efficiency calculated for the IP was estimated with the theoretical curve and the experimental data. It is assumed that the air sample contained the decay products of both 222 Rn and 220 Rn series, the most significant sources of alpha particles. The present study estimated the detection efficiency of the IP as 39.3% with an uncertainty of 2.9 that is well enough to confirm the future use of the IP as a radiation detector. Experimental materials and methods are described. (S.Y.)

  6. CMS software deployment on OSG

    International Nuclear Information System (INIS)

    Kim, B; Avery, P; Thomas, M; Wuerthwein, F

    2008-01-01

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment

  7. CMS software deployment on OSG

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B; Avery, P [University of Florida, Gainesville, FL 32611 (United States); Thomas, M [California Institute of Technology, Pasadena, CA 91125 (United States); Wuerthwein, F [University of California at San Diego, La Jolla, CA 92093 (United States)], E-mail: bockjoo@phys.ufl.edu, E-mail: thomas@hep.caltech.edu, E-mail: avery@phys.ufl.edu, E-mail: fkw@fnal.gov

    2008-07-15

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment.

  8. ChIP-exo interrogation of Crp, DNA, and RNAP holoenzyme interactions

    DEFF Research Database (Denmark)

    Latif, Haythem; Federowicz, Stephen; Ebrahim, Ali

    2018-01-01

    Numerous in vitro studies have yielded a refined picture of the structural and molecular associations between Cyclic-AMP receptor protein (Crp), the DNA motif, and RNA polymerase (RNAP) holoenzyme. In this study, high-resolution ChIP-exonuclease (ChIP-exo) was applied to study Crp binding in vivo...

  9. Inhibition by salmeterol and cilomilast of fluticasone-enhanced IP-10 release in airway epithelial cells.

    Science.gov (United States)

    Reddy, P J; Aksoy, Mark O; Yang, Yi; Li, Xiu Xia; Ji, Rong; Kelsen, Steven G

    2008-02-01

    The CXC chemokines, IP-10/CXCL10 and IL-8/CXCL8, play a role in obstructive lung disease by attracting Th1/Tc1 lymphocytes and neutrophils, respectively. Inhaled corticosteroids (ICS) and long acting beta 2-agonists (LABA) are widely used. However, their effect(s) on the release of IP-10 and IL-8 by airway epithelial cells are poorly understood. This study examined the effects of fluticasone, salmeterol, and agents which raise intracellular cAMP (cilomilast and db-cAMP) on the expression of IP-10 and IL-8 protein and mRNA. Studies were performed in cultured human airway epithelial cells during cytokine-stimulated IP-10 and IL-8 release. Cytokine treatment (TNF-alpha, IL-1beta and IFN-gamma) increased IP-10 and IL-8 protein and mRNA levels. Fluticasone (0.1 nM to 1 microM) increased IP-10 but reduced IL-8 protein release without changing IP-10 mRNA levels assessed by real time RT-PCR. The combination of salmeterol (1 micro M) and cilomilast (1-10 mu M) reduced IP-10 but had no effect on IL-8 protein. Salmeterol alone (1 micro M) and db-cAMP alone (1 mM) antagonised the effects of fluticasone on IP-10 but not IL-8 protein. In human airway epithelial cells, inhibition by salmeterol of fluticasone-enhanced IP-10 release may be an important therapeutic effect of the LABA/ICS combination not present when the two drugs are used separately.

  10. Inference of hierarchical regulatory network of estrogen-dependent breast cancer through ChIP-based data

    Directory of Open Access Journals (Sweden)

    Parvin Jeffrey

    2010-12-01

    Full Text Available Abstract Background Global profiling of in vivo protein-DNA interactions using ChIP-based technologies has evolved rapidly in recent years. Although many genome-wide studies have identified thousands of ERα binding sites and have revealed the associated transcription factor (TF partners, such as AP1, FOXA1 and CEBP, little is known about ERα associated hierarchical transcriptional regulatory networks. Results In this study, we applied computational approaches to analyze three public available ChIP-based datasets: ChIP-seq, ChIP-PET and ChIP-chip, and to investigate the hierarchical regulatory network for ERα and ERα partner TFs regulation in estrogen-dependent breast cancer MCF7 cells. 16 common TFs and two common new TF partners (RORA and PITX2 were found among ChIP-seq, ChIP-chip and ChIP-PET datasets. The regulatory networks were constructed by scanning the ChIP-peak region with TF specific position weight matrix (PWM. A permutation test was performed to test the reliability of each connection of the network. We then used DREM software to perform gene ontology function analysis on the common genes. We found that FOS, PITX2, RORA and FOXA1 were involved in the up-regulated genes. We also conducted the ERα and Pol-II ChIP-seq experiments in tamoxifen resistance MCF7 cells (denoted as MCF7-T in this study and compared the difference between MCF7 and MCF7-T cells. The result showed very little overlap between these two cells in terms of targeted genes (21.2% of common genes and targeted TFs (25% of common TFs. The significant dissimilarity may indicate totally different transcriptional regulatory mechanisms between these two cancer cells. Conclusions Our study uncovers new estrogen-mediated regulatory networks by mining three ChIP-based data in MCF7 cells and ChIP-seq data in MCF7-T cells. We compared the different ChIP-based technologies as well as different breast cancer cells. Our computational analytical approach may guide biologists to

  11. Multiplexed ChIP-Seq Using Direct Nucleosome Barcoding: A Tool for High-Throughput Chromatin Analysis.

    Science.gov (United States)

    Chabbert, Christophe D; Adjalley, Sophie H; Steinmetz, Lars M; Pelechano, Vicent

    2018-01-01

    Chromatin immunoprecipitation followed by sequencing (ChIP-Seq) or microarray hybridization (ChIP-on-chip) are standard methods for the study of transcription factor binding sites and histone chemical modifications. However, these approaches only allow profiling of a single factor or protein modification at a time.In this chapter, we present Bar-ChIP, a higher throughput version of ChIP-Seq that relies on the direct ligation of molecular barcodes to chromatin fragments. Bar-ChIP enables the concurrent profiling of multiple DNA-protein interactions and is therefore amenable to experimental scale-up, without the need for any robotic instrumentation.

  12. Post-translational inhibition of IP-10 secretion in IEC by probiotic bacteria: impact on chronic inflammation.

    Directory of Open Access Journals (Sweden)

    Gabriele Hoermannsperger

    Full Text Available BACKGROUND: Clinical and experimental studies suggest that the probiotic mixture VSL#3 has protective activities in the context of inflammatory bowel disease (IBD. The aim of the study was to reveal bacterial strain-specific molecular mechanisms underlying the anti-inflammatory potential of VSL#3 in intestinal epithelial cells (IEC. METHODOLOGY/PRINCIPAL FINDINGS: VSL#3 inhibited TNF-induced secretion of the T-cell chemokine interferon-inducible protein (IP-10 in Mode-K cells. Lactobacillus casei (L. casei cell surface proteins were identified as active anti-inflammatory components of VSL#3. Interestingly, L. casei failed to block TNF-induced IP-10 promoter activity or IP-10 gene transcription at the mRNA expression level but completely inhibited IP-10 protein secretion as well as IP-10-mediated T-cell transmigration. Kinetic studies, pulse-chase experiments and the use of a pharmacological inhibitor for the export machinery (brefeldin A showed that L. casei did not impair initial IP-10 production but decreased intracellular IP-10 protein stability as a result of blocked IP-10 secretion. Although L. casei induced IP-10 ubiquitination, the inhibition of proteasomal or lysosomal degradation did not prevent the loss of intracellular IP-10. Most important for the mechanistic understanding, the inhibition of vesicular trafficking by 3-methyladenine (3-MA inhibited IP-10 but not IL-6 expression, mimicking the inhibitory effects of L. casei. These findings suggest that L. casei impairs vesicular pathways important for the secretion of IP-10, followed by subsequent degradation of the proinflammatory chemokine. Feeding studies in TNF(DeltaARE and IL-10(-/- mice revealed a compartimentalized protection of VSL#3 on the development of cecal but not on ileal or colonic inflammation. Consistent with reduced tissue pathology in IL-10(-/- mice, IP-10 protein expression was reduced in primary epithelial cells. CONCLUSIONS/SIGNIFICANCE: We demonstrate segment

  13. Triazolophostins: a library of novel and potent agonists of IP3 receptors

    OpenAIRE

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin William; Sureshan, Kana M

    2015-01-01

    IP3 receptors are channels that mediate the release of Ca2+ from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of sy...

  14. How to use Skype for Business on Windows at CERN

    CERN Multimedia

    CERN. Geneva; Manzoni, Alex Marc

    2017-01-01

    Skype for Business, formerly known as Lync, is a softphone technology, which is, in turn, a feature/component of IP telephony.This short tutorial explains how to use it on the Windows platform at CERN. Timestamps: 3:08 - How to call a regular phone number 3:59 - How to call a Skype for Business user at CERN  5:16 - How to create a Skype for Business meeting in Outlook    Existing MS material: A Making phone calls tutorial A “Skype for Business” introduction (doesn’t cover the part related to “Call forwarding”)    

  15. Which IP Strategies Do Young Highly Innovative Firms Choose

    DEFF Research Database (Denmark)

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  16. A simple method to quantitate IP-10 in dried blood and plasma spots.

    Directory of Open Access Journals (Sweden)

    Martine G Aabye

    Full Text Available BACKGROUND: Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn screening. AIM: To develop a robust and sensitive ELISA-based assay for IP-10 detection in plasma, dried blood spots (DBS and dried plasma spots (DPS; to validate the ELISA in clinically relevant samples; and to assess the performance of the assay for detection of Cytomegalovirus (CMV and M.tuberculosis specific immune responses. METHOD: We raised mice and rat monoclonal antibodies against human IP-10 and developed an ELISA. The assay was validated and applied to the detection of CMV and M.tuberculosis specific responses in 18 patients with immune reactivity towards M.tuberculosis and 32 healthy controls of which 22 had immune reactivity towards CMV and none towards M.tuberculosis. We compared the performance of this new assay to IFN-γ. RESULTS: The ELISA was reliable for IP-10 detection in both plasma and filter paper samples. The linear range of the ELISA was 2.5-600 pg/ml. IFN-γ was not readily detectable in DPS samples. IP-10 was stabile in filter paper samples for at least 4 weeks at 37 °C. The correlation between IP-10 detected in plasma, DPS and DBS samples was excellent (r(2>0.97. CONCLUSIONS: This newly developed assay is reliable for IP-10 quantification in plasma, DBS and DPS samples from antigen stimulated and non-stimulated whole blood. The filter paper assays enable easy sample acquisition and transport at ambient temperature e.g. via the postal system. The system can potentially simplify diagnostic assays for M.tuberculosis and CMV infection.

  17. Redox routes to substitution of aluminum(III): synthesis and characterization of (IP-)2AlX (IP = α-iminopyridine, X = Cl, Me, SMe, S2CNMe2, C≡CPh, N3, SPh, NHPh).

    Science.gov (United States)

    Myers, Thomas W; Holmes, Alexandra L; Berben, Louise A

    2012-08-20

    Redox active ligands are shown to facilitate a variety of group transfer reactions at redox inert aluminum(III). Disulfides can be used as a two-electron group transfer reagent, and we show that (IP(-))(2)AlSR can be formed by reaction of [(THF)(6)Na][(IP(2-))(2)Al] (1c) with disulfides RSSR (where X = C(S)NMe(2), 4; SMe, 5). In a more general redox route to substitution of aluminum bis(iminopyridine) complexes, we report zinc(II) salts as a group transfer reagent. Reaction of [((R)IP(2-))(2)Al](-) (R = H, 1c; Me, 1d) with ZnX(2) affords ((R)IP(-))(2)AlX (where IP = iminopyridine, R = H, and X = Cl, 2; CCPh, 6; N(3), 7; SPh, 8; or R = Me and X = NHPh, 9). Single crystal X-ray diffraction analysis of the complexes reveal that each of the five coordinate complexes reported here has a trigonal bipyramidal geometry with τ = 0.668 - 0.858. We observed a correlation between the greatest deviations from ideal trigonal bipyramidal symmetry (lowest τ values), the bond lengths consistent with smallest degree of ligand reduction, and the least polarizable X ligand in (IP(-))(2)AlX. Complex 4 is six-coordinate and is best described as distorted octahedral. Variable temperature magnetic susceptibility measurements indicate that each of the complexes 3-9 has a biradical electronic structure similar to previously reported 2. Magnetic exchange coupling constants in the range J = -94 to -212 cm(-1) were fit to the data for 2-9 to describe the energy of antiferromagnetic interaction between ligand radicals assuming a spin Hamiltonian of the form Ĥ = -2JŜ(L(1))·Ŝ(L(2)). The strongest coupling occurs when the angle between the ligand planes is smallest, presumably to afford good overlap with the Al-X σ* orbital. Electrochemical properties of the complexes were probed using cyclic voltammetry and each of 3-9 displayed a reversible two-electron reduction and two quasi-reversible one-electron oxidation processes. The energy of the ligand based redox processes for 2-9 differ by

  18. Model-Based Learning Environment Based on The Concept IPS School-Based Management

    Directory of Open Access Journals (Sweden)

    Hamid Darmadi

    2017-03-01

    Full Text Available The results showed: (1 learning model IPS-oriented environment can grow and not you love the cultural values of the area as a basis for the development of national culture, (2 community participation, and the role of government in implementing learning model of IPS-based environment provides a positive impact for the improvement of management school resources, (3 learning model IPS-based environment effectively creating a way of life together peacefully, increase the intensity of togetherness and mutual respect (4 learning model IPS-based environment can improve student learning outcomes, (5 there are differences in the expression of attitudes and results learning among students who are located in the area of conflict with students who are outside the area of conflict (6 analysis of the scale of attitudes among school students da SMA result rewards high school students to the values of unity and nation, respect for diversity and peaceful coexistence, It is recommended that the Department of Education authority as an institution of Trustees and the development of social and cultural values in the province can apply IPS learning model based environments.

  19. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  20. ß-Phellandrene: Kairomone for Pine Engraver, Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1990-01-01

    The responses of Ips pini (Scolytidae) to multiple-funnel traps baited with the pheromone, ipsdienol, and various monoterpenes were determined in stands of lodgepole pine in southern and central British Columbia. Ips pini was attracted to both ipsdienol and ß-phellandrene, demonstrating that ß-phellandrene is a kairomone for this...

  1. Functional role of EF-hands 3 and 4 in membrane-binding of KChIP1

    Indian Academy of Sciences (India)

    Prakash

    type KChIP1, truncated KChIP1 exhibited lower lipid-binding capability. Compared with wild-type KChIP1, increasing membrane permeability by the use of digitonin caused a marked .... with sonication, the supernatant (soluble protein fractions).

  2. Cyclic ADP-ribose and IP3 mediate abscisic acid-induced isoflavone accumulation in soybean sprouts

    International Nuclear Information System (INIS)

    Jiao, Caifeng; Yang, Runqiang; Gu, Zhenxin

    2016-01-01

    In this study, the roles of ABA-cADPR-Ca 2+ and ABA-IP3-Ca 2+ signaling pathways in UV-B-induced isoflavone accumulation in soybean sprouts were investigated. Results showed that abscisic acid (ABA) up regulated cyclic ADP-ribose (cADPR) and inositol 1,4,5-trisphosphate (IP3) levels in soybean sprouts under UV-B radiation. Furthermore, cADPR and IP3, as second messengers of UV-B-triggered ABA, induced isoflavone accumulation by up-regulating proteins and genes expression and activity of isoflavone biosynthetic-enzymes (chalcone synthase, CHS; isoflavone synthase, IFS). After Ca 2+ was chelated by EGTA, isoflavone content decreased. Overall, ABA-induced cADPR and IP3 up regulated isoflavone accumulation which was mediated by Ca 2+ signaling via enhancing the expression of proteins and genes participating in isoflavone biosynthesis in soybean sprouts under UV-B radiation. - Highlights: • UV-B-induced cADPR and IP3 synthesis was mediated by ABA. • cADPR and IP3 were involved in UV-B-ABA-induced isoflavone accumulation. • cADPR and IP3-induced isoflavone accumulation may be mediated by Ca 2+ . • ABA, cADPR, IP3 and Ca 2+ could activate proteins expression of CHS and IFS.

  3. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    International Nuclear Information System (INIS)

    Guo Junqing; Chen Liu; Ai Hongwu; Jing Jiannian; Zhou Jiyong; Zhang Chuyu; You Shangyou

    2004-01-01

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-γ inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V H region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo

  4. Gender differences in the effects of deployment-related stressors and pre-deployment risk factors on the development of PTSD symptoms in National Guard Soldiers deployed to Iraq and Afghanistan.

    Science.gov (United States)

    Polusny, Melissa A; Kumpula, Mandy J; Meis, Laura A; Erbes, Christopher R; Arbisi, Paul A; Murdoch, Maureen; Thuras, Paul; Kehle-Forbes, Shannon M; Johnson, Alexandria K

    2014-02-01

    Although women in the military are exposed to combat and its aftermath, little is known about whether combat as well as pre-deployment risk/protective factors differentially predict post-deployment PTSD symptoms among women compared to men. The current study assesses the influence of combat-related stressors and pre-deployment risk/protective factors on women's risk of developing PTSD symptoms following deployment relative to men's risk. Participants were 801 US National Guard Soldiers (712 men, 89 women) deployed to Iraq or Afghanistan who completed measures of potential risk/protective factors and PTSD symptoms one month before deployment (Time 1) and measures of deployment-related stressors and PTSD symptoms about 2-3 months after returning from deployment (Time 2). Men reported greater exposure to combat situations than women, while women reported greater sexual stressors during deployment than men. Exposure to the aftermath of combat (e.g., witnessing injured/dying people) did not differ by gender. At Time 2, women reported more severe PTSD symptoms and higher rates of probable PTSD than did men. Gender remained a predictor of higher PTSD symptoms after accounting for pre-deployment symptoms, prior interpersonal victimization, and combat related stressors. Gender moderated the association between several risk factors (combat-related stressors, prior interpersonal victimization, lack of unit support and pre-deployment concerns about life/family disruptions) and post-deployment PTSD symptoms. Elevated PTSD symptoms among female service members were not explained simply by gender differences in pre-deployment or deployment-related risk factors. Combat related stressors, prior interpersonal victimization, and pre-deployment concerns about life and family disruptions during deployment were differentially associated with greater post-deployment PTSD symptoms for women than men. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.

  5. Cell-type specificity of ChIP-predicted transcription factor binding sites

    Directory of Open Access Journals (Sweden)

    Håndstad Tony

    2012-08-01

    Full Text Available Abstract Background Context-dependent transcription factor (TF binding is one reason for differences in gene expression patterns between different cellular states. Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq identifies genome-wide TF binding sites for one particular context—the cells used in the experiment. But can such ChIP-seq data predict TF binding in other cellular contexts and is it possible to distinguish context-dependent from ubiquitous TF binding? Results We compared ChIP-seq data on TF binding for multiple TFs in two different cell types and found that on average only a third of ChIP-seq peak regions are common to both cell types. Expectedly, common peaks occur more frequently in certain genomic contexts, such as CpG-rich promoters, whereas chromatin differences characterize cell-type specific TF binding. We also find, however, that genotype differences between the cell types can explain differences in binding. Moreover, ChIP-seq signal intensity and peak clustering are the strongest predictors of common peaks. Compared with strong peaks located in regions containing peaks for multiple transcription factors, weak and isolated peaks are less common between the cell types and are less associated with data that indicate regulatory activity. Conclusions Together, the results suggest that experimental noise is prevalent among weak peaks, whereas strong and clustered peaks represent high-confidence binding events that often occur in other cellular contexts. Nevertheless, 30-40% of the strongest and most clustered peaks show context-dependent regulation. We show that by combining signal intensity with additional data—ranging from context independent information such as binding site conservation and position weight matrix scores to context dependent chromatin structure—we can predict whether a ChIP-seq peak is likely to be present in other cellular contexts.

  6. Programmable genetic algorithm IP core for sensing and surveillance applications

    Science.gov (United States)

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  7. Fish the ChIPs: a pipeline for automated genomic annotation of ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Minucci Saverio

    2011-10-01

    Full Text Available Abstract Background High-throughput sequencing is generating massive amounts of data at a pace that largely exceeds the throughput of data analysis routines. Here we introduce Fish the ChIPs (FC, a computational pipeline aimed at a broad public of users and designed to perform complete ChIP-Seq data analysis of an unlimited number of samples, thus increasing throughput, reproducibility and saving time. Results Starting from short read sequences, FC performs the following steps: 1 quality controls, 2 alignment to a reference genome, 3 peak calling, 4 genomic annotation, 5 generation of raw signal tracks for visualization on the UCSC and IGV genome browsers. FC exploits some of the fastest and most effective tools today available. Installation on a Mac platform requires very basic computational skills while configuration and usage are supported by a user-friendly graphic user interface. Alternatively, FC can be compiled from the source code on any Unix machine and then run with the possibility of customizing each single parameter through a simple configuration text file that can be generated using a dedicated user-friendly web-form. Considering the execution time, FC can be run on a desktop machine, even though the use of a computer cluster is recommended for analyses of large batches of data. FC is perfectly suited to work with data coming from Illumina Solexa Genome Analyzers or ABI SOLiD and its usage can potentially be extended to any sequencing platform. Conclusions Compared to existing tools, FC has two main advantages that make it suitable for a broad range of users. First of all, it can be installed and run by wet biologists on a Mac machine. Besides it can handle an unlimited number of samples, being convenient for large analyses. In this context, computational biologists can increase reproducibility of their ChIP-Seq data analyses while saving time for downstream analyses. Reviewers This article was reviewed by Gavin Huttley, George

  8. Tether Deployer And Brake

    Science.gov (United States)

    Carroll, Joseph A.; Alexander, Charles M.

    1993-01-01

    Design concept promises speed, control, and reliability. Scheme for deploying tether provides for fast, free, and snagless payout and fast, dependable braking. Developed for small, expendable tethers in outer space, scheme also useful in laying transoceanic cables, deploying guidance wires to torpedoes and missiles, paying out rescue lines from ship to ship via rockets, deploying antenna wires, releasing communication and power cables to sonobuoys and expendable bathythermographs, and in reeling out lines from fishing rods.

  9. IP-10 is a potential biomarker of cystic fibrosis acute pulmonary exacerbations.

    Directory of Open Access Journals (Sweden)

    George M Solomon

    Full Text Available Cystic fibrosis (CF is characterized by acute pulmonary exacerbations (APE. The CF nasal airway exhibits a similar ion transport defect as the lung, and colonization, infection, and inflammation within the nasal passages are common among CF patients. Nasal lavage fluid (NLF is a minimally invasive means to collect upper airway samples.We collected NLF at the onset and resolution of CF APE and compared a 27-plex cytokine profile to stable CF outpatients and normal controls. We also tested IP-10 levels in the bronchoalveolar lavage fluid (BALF of CF patients. Well-differentiated murine sinonasal monolayers were exposed to bacterial stimulus, and IP-10 levels were measured to test epithelial secretion.Subjects hospitalized for APE had elevated IP-10 (2582 pg/mL [95% CL of mean: 818,8165], N=13 which significantly decreased (647 pg/mL [357,1174], P<0.05, N =13 following antimicrobial therapy. Stable CF outpatients exhibited intermediately elevated levels (680 pg/mL [281,1644], N=13 that were less than CF inpatients upon admission (P=0.056 but not significantly different than normal controls (342 pg/mL [110,1061]; P=0.3, N=10. IP-10 was significantly increased in CF BALF (2673 pg/mL [1306,5458], N=10 compared to healthy post-lung transplant patients (8.4 pg/mL [0.03,2172], N=5, P<0.001. IP-10 levels from well-differentiated CF murine nasal epithelial monolayers exposed to Pseudomonas PAO-1 bacteria-free prep or LPS (100 nM apically for 24 hours were significantly elevated (1159 ± 147, P<0.001 for PAO-1; 1373 ± 191, P<0.001 for LPS vs. 305 ± 68 for vehicle controls. Human sino-nasal epithelial cells derived from CF patients had a similar response to LPS (34% increase, P<0.05, N=6.IP-10 is elevated in the nasal lavage of CF patients with APE and responds to antimicrobial therapy. IP-10 is induced by airway epithelia following stimulation with bacterial pathogens in a murine model. Additional research regarding IP-10 as a potential biomarker is

  10. KChIP2 genotype dependence of transient outward current (Ito) properties in cardiomyocytes isolated from male and female mice.

    Science.gov (United States)

    Waldschmidt, Lara; Junkereit, Vera; Bähring, Robert

    2017-01-01

    The transient outward current (Ito) in cardiomyocytes is largely mediated by Kv4 channels associated with Kv Channel Interacting Protein 2 (KChIP2). A knockout model has documented the critical role of KChIP2 in Ito expression. The present study was conducted to characterize in both sexes the dependence of Ito properties, including current magnitude, inactivation kinetics, recovery from inactivation and voltage dependence of inactivation, on the number of functional KChIP2 alleles. For this purpose we performed whole-cell patch-clamp experiments on isolated left ventricular cardiomyocytes from male and female mice which had different KChIP2 genotypes; i.e., wild-type (KChIP2+/+), heterozygous knockout (KChIP2+/-) or complete knockout of KChIP2 (KChIP2-/-). We found in both sexes a KChIP2 gene dosage effect (i.e., a proportionality between number of alleles and phenotype) on Ito magnitude, however, concerning other Ito properties, KChIP2+/- resembled KChIP2+/+. Only in the total absence of KChIP2 (KChIP2-/-) we observed a slowing of Ito kinetics, a slowing of recovery from inactivation and a negative shift of a portion of the voltage dependence of inactivation. In a minor fraction of KChIP2-/- myocytes Ito was completely lost. The distinct KChIP2 genotype dependences of Ito magnitude and inactivation kinetics, respectively, seen in cardiomyocytes were reproduced with two-electrode voltage-clamp experiments on Xenopus oocytes expressing Kv4.2 and different amounts of KChIP2. Our results corroborate the critical role of KChIP2 in controlling Ito properties. They demonstrate that the Kv4.2/KChIP2 interaction in cardiomyocytes is highly dynamic, with a clear KChIP2 gene dosage effect on Kv4 channel surface expression but not on inactivation gating.

  11. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  12. Proposta de metodologia para avaliação de redes de voz sobre IP

    OpenAIRE

    Vandersilvio da Silva

    2006-01-01

    A redução de custo com telefonia através do uso de voz sobre IP tem disparado a busca de soluções que transformem redes IP originalmente dedicadas a transporte de dados em redes para transporte de voz. Esta dissertação tem por objetivo apresentar uma metodologia para sistematizar a avaliação de redes para o tráfego de voz sobre IP de acordo com as possibilidades disponíveis no cenário a ser avaliado. Inicialmente é dada uma visão geral de voz sobre IP, apresentando os protocolos utilizados, o...

  13. FANCD2 Binds CtIP and Regulates DNA-End Resection during DNA Interstrand Crosslink Repair

    Directory of Open Access Journals (Sweden)

    Junya Unno

    2014-05-01

    Full Text Available The Fanconi anemia (FA pathway is critically involved in the maintenance of hematopoietic stem cells and the suppression of carcinogenesis. A key FA protein, FANCD2, is monoubiquitinated and accumulates in chromatin in response to DNA interstrand crosslinks (ICLs, where it coordinates DNA repair through mechanisms that are still poorly understood. Here, we report that CtIP protein directly interacts with FANCD2. A region spanning amino acids 166 to 273 of CtIP and monoubiquitination of FANCD2 are both essential for the FANCD2-CtIP interaction and mitomycin C (MMC-induced CtIP foci. Remarkably, both FANCD2 and CtIP are critical for MMC-induced RPA2 hyperphosphorylation, an event that accompanies end resection of double-strand breaks. Collectively, our results reveal a role of monoubiquitinated FANCD2 in end resection that depends on its binding to CtIP during ICL repair.

  14. Value-Based Billing in a 3G IP Services Environment

    OpenAIRE

    Ryan, Conor; Donnelly, William; de Leastar, Eamonn; Cloney, James

    2002-01-01

    The proliferation of IP-based services has resulted in a paradigm shift away from traditional flat-rat, single service billing to content and usage based billing for composed service sets. The Information Societies Technology (IST) FORM project has prototyped an accounting and billing solution for IP-based telecommunications services. A key element of the solution is the IPDR Network Data Management - Usage specification. This paper presents the FORM development of a federated accounting and ...

  15. TCP/IP Communication System for Controlling a Vehicular Traffic Intersection

    Directory of Open Access Journals (Sweden)

    Pedraza-Martínez Luis Fernando

    2013-10-01

    Full Text Available This paper describes the development of a prototype of a vehicular traffic controller, whose system of communication is based on the TCP/IP protocol, in order to re- motely monitor and control the operation of traffic lights for a vehicular intersection. The results show the times of communication between the central and the traffic controller. The conclusions highlight the importance of using the TCP/IP protocol in traffic light systems.

  16. Fusion Power Deployment

    International Nuclear Information System (INIS)

    Schmidt, J.A.; Ogden, J.M.

    2002-01-01

    Fusion power plants could be part of a future portfolio of non-carbon dioxide producing energy supplies such as wind, solar, biomass, advanced fission power, and fossil energy with carbon dioxide sequestration. In this paper, we discuss key issues that could impact fusion energy deployment during the last half of this century. These include geographic issues such as resource availability, scale issues, energy storage requirements, and waste issues. The resource needs and waste production associated with fusion deployment in the U.S. should not pose serious problems. One important feature of fusion power is the fact that a fusion power plant should be locatable within most local or regional electrical distribution systems. For this reason, fusion power plants should not increase the burden of long distance power transmission to our distribution system. In contrast to fusion power, regional factors could play an important role in the deployment of renewable resources such as wind, solar and biomass or fossil energy with CO2 sequestration. We examine the role of these regional factors and their implications for fusion power deployment

  17. Potassium Channel Interacting Protein 2 (KChIP2) is not a transcriptional regulator of cardiac electrical remodeling

    DEFF Research Database (Denmark)

    Winther, Sine V; Tuomainen, Tomi; Borup, Rehannah

    2016-01-01

    The heart-failure relevant Potassium Channel Interacting Protein 2 (KChIP2) augments CaV1.2 and KV4.3. KChIP3 represses CaV1.2 transcription in cardiomyocytes via interaction with regulatory DNA elements. Hence, we tested nuclear presence of KChIP2 and if KChIP2 translocates into the nucleus...... intracellular Ca(2+) concentration. Neither increasing nor decreasing intracellular Ca(2+) concentrations caused translocation of KChIP2. Microarray analysis did not identify relief of transcriptional repression in murine KChIP2(-/-) heart samples. We conclude that although there is a baseline presence of KCh...

  18. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    Energy Technology Data Exchange (ETDEWEB)

    Junqing, Guo; Liu, Chen; Hongwu, Ai; Jiannian, Jing; Jiyong, Zhou; Chuyu, Zhang; Shangyou, You

    2004-07-23

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-{gamma} inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V{sub H} region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo.

  19. Triazolophostins: a library of novel and potent agonists of IP3 receptors.

    Science.gov (United States)

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin W; Sureshan, Kana M

    2015-06-28

    IP3 receptors are channels that mediate the release of Ca(2+) from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of synthetic conditions for each analog. Such lengthy one-at-a-time syntheses limit access to AdA analogs. We have addressed this problem by synthesizing a library of triazole-based AdA analogs, triazolophostins, by employing click chemistry. An advanced intermediate having all the necessary phosphates and a β-azide at the anomeric position was reacted with various alkynes under Cu(i) catalysis to yield triazoles, which upon deprotection gave triazolophostins. All eleven triazolophostins synthesized are more potent than IP3 and some are equipotent with AdA in functional analyses of IP3 receptors. We show that a triazole ring can replace adenine without compromising the potency of AdA and provide facile routes to novel AdA analogs.

  20. DNA-binding proteins regulating pIP501 transfer and replication

    Directory of Open Access Journals (Sweden)

    Elisabeth Grohmann

    2016-08-01

    Full Text Available pIP501 is a Gram-positive broad-host-range model plasmid intensively used for studying plasmid replication and conjugative transfer. It is a multiple antibiotic resistance plasmid frequently found in clinical Enterococcus faecalis and Enterococcus faecium isolates. Replication of pIP501 proceeds unidirectionally by a theta mechanism. The minimal replicon of pIP501 is composed of the repR gene encoding the essential rate-limiting replication initiator protein RepR and the origin of replication, oriR, located downstream of repR. RepR is similar to RepE of related streptococcal plasmid pAMβ1, which has been shown to possess RNase activity cleaving free RNA molecules in close proximity of the initiation site of DNA synthesis. Replication of pIP501 is controlled by the concerted action of a small protein, CopR, and an antisense RNA, RNAIII. CopR has a dual role: It acts as transcriptional repressor at the repR promoter and prevents convergent transcription of RNAIII and repR mRNA (RNAII, thereby indirectly increasing RNAIII synthesis. CopR binds asymmetrically as a dimer at two consecutive binding sites upstream of and overlapping with the repR promoter. RNAIII induces transcriptional attenuation within the leader region of the repR mRNA (RNAII. Deletion of either control component causes a 10- to 20-fold increase of plasmid copy number, while simultaneous deletions have no additional effect. Conjugative transfer of pIP501 depends on a type IV secretion system (T4SS encoded in a single operon. Its transfer host-range is considerably broad, as it has been transferred to virtually all Gram-positive bacteria including filamentous streptomycetes and even the Gram-negative Escherichia coli. Expression of the 15 genes encoding the T4SS is tightly controlled by binding of the relaxase TraA, the transfer initiator protein, to the operon promoter, which overlaps with the origin of transfer (oriT. The T4SS operon encodes the DNA-binding proteins TraJ (VirD4

  1. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  2. Bio-EdIP: An automatic approach for in vitro cell confluence images quantification.

    Science.gov (United States)

    Cardona, Andrés; Ariza-Jiménez, Leandro; Uribe, Diego; Arroyave, Johanna C; Galeano, July; Cortés-Mancera, Fabian M

    2017-07-01

    Cell imaging is a widely-employed technique to analyze multiple biological processes. Therefore, simple, accurate and quantitative tools are needed to understand cellular events. For this purpose, Bio-EdIP was developed as a user-friendly tool to quantify confluence levels using cell culture images. The proposed algorithm combines a pre-processing step with subsequent stages that involve local processing techniques and a morphological reconstruction-based segmentation algorithm. Segmentation performance was assessed in three constructed image sets, comparing F-measure scores and AUC values (ROC analysis) for Bio-EdIP, its previous version and TScratch. Furthermore, segmentation results were compared with published algorithms using eight public benchmarks. Bio-EdIP automatically segmented cell-free regions from images of in vitro cell culture. Based on mean F-measure scores and ROC analysis, Bio-EdIP conserved a high performance regardless of image characteristics of the constructed dataset, when compared with its previous version and TScratch. Although acquisition quality of the public dataset affected Bio-EdIP segmentation, performance was better in two out of eight public sets. Bio-EdIP is a user-friendly interface, which is useful for the automatic analysis of confluence levels and cell growth processes using in vitro cell culture images. Here, we also presented new manually annotated data for algorithms evaluation. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  4. Dental anomalies in 14 patients with IP: clinical and radiological analysis and review.

    Science.gov (United States)

    Santa-Maria, Fernanda D; Mariath, Luiza Monteavaro; Poziomczyk, Cláudia S; Maahs, Marcia A P; Rosa, Rafael F M; Zen, Paulo R G; Schüller-Faccini, Lavínia; Kiszewski, Ana Elisa

    2017-06-01

    Current knowledge on dental anomalies in patients with incontinentia pigmenti (IP) has been obtained by examining case reports; however, an overall characterization of such alterations remains lacking. The objective of this study was to determine the frequency, type and location of dental alterations in IP using a case series. Fourteen patients (9 children and 5 adults) with a clinical diagnosis of IP who presented dental anomalies were included in this study. All patients were administered a clinical questionnaire, dental examination and radiological investigation. In the present case series, agenesis of primary dentition was present in 60 % of patients and agenesis of permanent tooth was present in 92.8 % of patients. Most cases were missing at least 6 teeth. Second molar agenesis was present in 13 patients (92.8 %). Anomalies in dental crowns occurred in 71.4 % of cases, and the central incisor was most frequently affected. Two adult patients still had primary teeth. Malocclusion was found in 10 patients (71.4 %). High-arched palate was observed in 7 (50 %) patients. Patients with IP present alterations in both primary and permanent dentition. Because the agenesis of permanent teeth is more common, primary teeth are not always replaced. In addition, the durability of primary dentition appears to be greater in IP. This study shows that patients with IP experience significant loss of teeth, especially in permanent dentition, and have an increased risk of high-arched palate compared to the general population. Prophylactic care of primary teeth in IP is relevant for improving functional and aesthetic outcomes until dental prostheses are implanted.

  5. Pre-equilibrium Longitudinal Flow in the IP-Glasma Framework for Pb+Pb Collisions at the LHC

    Science.gov (United States)

    McDonald, Scott; Shen, Chun; Fillion-Gourdeau, François; Jeon, Sangyong; Gale, Charles

    2017-08-01

    In this work, we debut a new implementation of IP-Glasma and quantify the pre-equilibrium longitudinal flow in the IP-Glasma framework. The saturation physics based IP-Glasma model naturally provides a non-zero initial longitudinal flow through its pre-equilibrium Yang-Mills evolution. A hybrid IP-Glasma+MUSIC+UrQMD frame-work is employed to test this new implementation against experimental data and to make further predictions about hadronic flow observables in Pb+Pb collisions at 5.02 TeV. Finally, the non-zero pre-equilibrium longitudinal flow of the IP-Glasma model is quantified, and its origin is briefly discussed.

  6. IP-10 can be measured in dried plasma spots in patients with chronic hepatitis C infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Andersen, Ellen Sloth; Christensen, Peer Brehm

    2012-01-01

    The chemokine IP-10 (CXCL10) is a candidate marker for hepatitis C virus (HCV) fibrosis monitoring. The aim of this proof-of-concept study is to assess if IP-10 measurements from dried plasma spots (DPS) are accurate in HCV-infected patients with either minimal or significant fibrosis. We measured...... IP-10 levels in plasma and DPS of 21 HCV-infected patients with cirrhosis and 19 patients with no/little fibrosis (determined with FibroScan). Cirrhotic patients had significantly higher levels of IP-10 compared to patients with minimal fibrosis. DPS and plasma measurements of IP-10 are comparable...

  7. Legal Protection on IP Cores for System-on-Chip Designs

    Science.gov (United States)

    Kinoshita, Takahiko

    The current semiconductor industry has shifted from vertical integrated model to horizontal specialization model in term of integrated circuit manufacturing. In this circumstance, IP cores as solutions for System-on-Chip (SoC) have become increasingly important for semiconductor business. This paper examines to what extent IP cores of SoC effectively can be protected by current intellectual property system including integrated circuit layout design law, patent law, design law, copyright law and unfair competition prevention act.

  8. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  9. [Clinical application of IPS-empress 2 pressable all-ceramic crowns].

    Science.gov (United States)

    Wang, Ai-jun; He, Xiao-ming; Liu, Li-xia; Zhang, Chao-biao; Zhang, Min; Shen, Bei-yong

    2007-02-01

    To evaluate the clinical prosthetic effect of IPS-Empress 2 pressahie ceramic crowns. 198 teeth of 70 patients were restored with IPS-Empress 2 pressahie ceramic crowns. The patients were asked to return in one week and every half year. The clinical prosthetic effect was evaluated. Through follow-up of 3-38 months, the veneer porcelain crowns of 3 teeth were broken. 2 crowns fall off due to teeth fracture, gingivitis occurred in 2 teeth, pulpitis or periapical periodontitis occurred in 3 teeth. The shades of 3 crowns were darkening. The prosthetic effect of 185 teeth was satisfied. The rate of satisfaction was 93.4%. IPS-Empress 2 pressable all-ceramic crown has the advantages of aesthetic effect, good hiocompatihility and simple fabrication. But its strength is not enough for posterior teeth and it can not cover the deep color of non-vital teeth and metal materials.

  10. Human iPS Cell-Derived Germ Cells: Current Status and Clinical Potential

    Directory of Open Access Journals (Sweden)

    Tetsuya Ishii

    2014-10-01

    Full Text Available Recently, fertile spermatozoa and oocytes were generated from mouse induced pluripotent (iPS cells using a combined in vitro and in vivo induction system. With regard to germ cell induction from human iPS cells, progress has been made particularly in the male germline, demonstrating in vitro generation of haploid, round spermatids. Although iPS-derived germ cells are expected to be developed to yield a form of assisted reproductive technology (ART that can address unmet reproductive needs, genetic and/or epigenetic instabilities abound in iPS cell generation and germ cell induction. In addition, there is still room to improve the induction protocol in the female germline. However, rapid advances in stem cell research are likely to make such obstacles surmountable, potentially translating induced germ cells into the clinical setting in the immediate future. This review examines the current status of the induction of germ cells from human iPS cells and discusses the clinical potential, as well as future directions.

  11. DIVERSITY in binding, regulation, and evolution revealed from high-throughput ChIP.

    Science.gov (United States)

    Mitra, Sneha; Biswas, Anushua; Narlikar, Leelavati

    2018-04-23

    Genome-wide in vivo protein-DNA interactions are routinely mapped using high-throughput chromatin immunoprecipitation (ChIP). ChIP-reported regions are typically investigated for enriched sequence-motifs, which are likely to model the DNA-binding specificity of the profiled protein and/or of co-occurring proteins. However, simple enrichment analyses can miss insights into the binding-activity of the protein. Note that ChIP reports regions making direct contact with the protein as well as those binding through intermediaries. For example, consider a ChIP experiment targeting protein X, which binds DNA at its cognate sites, but simultaneously interacts with four other proteins. Each of these proteins also binds to its own specific cognate sites along distant parts of the genome, a scenario consistent with the current view of transcriptional hubs and chromatin loops. Since ChIP will pull down all X-associated regions, the final reported data will be a union of five distinct sets of regions, each containing binding sites of one of the five proteins, respectively. Characterizing all five different motifs and the corresponding sets is important to interpret the ChIP experiment and ultimately, the role of X in regulation. We present diversity which attempts exactly this: it partitions the data so that each partition can be characterized with its own de novo motif. Diversity uses a Bayesian approach to identify the optimal number of motifs and the associated partitions, which together explain the entire dataset. This is in contrast to standard motif finders, which report motifs individually enriched in the data, but do not necessarily explain all reported regions. We show that the different motifs and associated regions identified by diversity give insights into the various complexes that may be forming along the chromatin, something that has so far not been attempted from ChIP data. Webserver at http://diversity.ncl.res.in/; standalone (Mac OS X/Linux) from https

  12. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun; Li, Yue; Peng, Chengbin; Zhang, Zhaolei

    2014-01-01

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene

  13. Immunocytochemical evidence for co-expression of Type III IP3 receptor with signaling components of bitter taste transduction

    Directory of Open Access Journals (Sweden)

    Kinnamon Sue C

    2001-04-01

    Full Text Available Abstract Background Taste receptor cells are responsible for transducing chemical stimuli into electrical signals that lead to the sense of taste. An important second messenger in taste transduction is IP3, which is involved in both bitter and sweet transduction pathways. Several components of the bitter transduction pathway have been identified, including the T2R/TRB taste receptors, phospholipase C β2, and the G protein subunits α-gustducin, β3, and γ13. However, the identity of the IP3 receptor subtype in this pathway is not known. In the present study we used immunocytochemistry on rodent taste tissue to identify the IP3 receptors expressed in taste cells and to examine taste bud expression patterns for IP3R3. Results Antibodies against Type I, II, and III IP3 receptors were tested on sections of rat and mouse circumvallate papillae. Robust cytoplasmic labeling for the Type III IP3 receptor (IP3R3 was found in a large subset of taste cells in both species. In contrast, little or no immunoreactivity was seen with antibodies against the Type I or Type II IP3 receptors. To investigate the potential role of IP3R3 in bitter taste transduction, we used double-label immunocytochemistry to determine whether IP3R3 is expressed in the same subset of cells expressing other bitter signaling components. IP3R3 immunoreactive taste cells were also immunoreactive for PLCβ2 and γ13. Alpha-gustducin immunoreactivity was present in a subset of IP3R3, PLCβ2, and γ13 positive cells. Conclusions IP3R3 is the dominant form of the IP3 receptor expressed in taste cells and our data suggest it plays an important role in bitter taste transduction.

  14. Synthesis and evaluation of p-iodo-phentermine (IP) as a brain perfusion imaging agent

    International Nuclear Information System (INIS)

    Kizuka, H.; Elmaleh, D.R.; Brownell, G.L.; Strauss, H.W.

    1985-01-01

    rho-( 123 I and 131 I) iodo α,α-dimethylphenethylamine (rho-iodophentermine, IP) as the α-methylated analogue of iodoamphetamine has been prepared. It is hoped that this methyl substitution will increase the lipophilicity of the agent, enhance resistance to metabolism by monoamine oxidase, and will result in increased initial uptake and slower washout from the brain as compared to N-isopropyl-rho-( 123 I) iodoamphetamine. IP was prepared by diazotization of rho-aminophentermine followed by decomposition of the diazonium salt with KI. Radioiodinated IP was prepared either by the solid-phase isotopic exchange reaction or by decomposition of the piperidinotriazene derivative with a radiochemical yield of 40-60%. Biodistribution of 131 I-IP in rats showed brain uptake in the range of 1.7% dose g -1 at 5, 30 and 60 min. Imaging studies with 123 I-IP in dogs showed high brain extraction and slow washout of activity. (author)

  15. Using the MDCT thick slab MinIP method for the follow-up of pulmonary emphysema.

    Science.gov (United States)

    Lan, Hai; Nishitani, Hiromu; Nishihara, Sadamitsu; Ueno, Junji; Takao, Shoichiro; Iwamoto, Seiji; Kawanaka, Takashi; Mahmut, Mawlan; Qingge, Si

    2011-08-01

    The purpose of this study was to evaluate the usefulness of thick slab minimum intensity projection (MinIP) as a follow-up method in patients with pulmonary emphysema. This method was used to determine the presence or absence of changes over time in the lung field based on multi-detector-row CT (MDCT) data. Among patients diagnosed with pulmonary emphysema who underwent 16-MDCT (slice thickness, 1 mm) twice at an interval of 6 months or more, 12 patients without changes in the lung field and 14 with clear changes in the lung field were selected as subjects. An image interpretation experiment was performed by five image interpreters. Pulmonary emphysema was followed up using two types of thick slab MinIP (thick slab MinIP 1 and 2) and multi-planar reformation (MPR), and the results of image interpretation were evaluated by receiver operating characteristic (ROC) analysis. In addition, the time required for image interpretation was compared among the three follow-up methods. The area under the ROC curve (Az) was 0.794 for thick slab MinIP 1, 0.778 for the thick slab MinIP 2, and 0.759 for MPR, showing no significant differences among the three methods. Individual differences in each item were significantly more marked for MPR than for thick slab MinIP. The time required for image interpretation was around 18 seconds for thick slab MinIP 1, 11 seconds for thick slab MinIP 2, and approximately 127 seconds for MPR, showing significant differences among the three methods. There were no significant differences in the results of image interpretation regarding the presence or absence of changes in the lung fields between thick slab MinIP and MPR. However, thick slab MinIP showed a shorter image interpretation time and smaller individual differences in the results among image interpreters than MPR, suggesting the usefulness of this method for determining the presence or absence of changes with time in the lung fields of patients with pulmonary emphysema.

  16. An Installation of IPS Bypass Line at the Fuel Test Loop

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Ho Young; Ahn, G. H.; Lee, M.; Kim, M. S.; Cho, S. H.; Han, J. S.; Hur, S. O. [KAERI, Daejeon (Korea, Republic of)

    2010-12-15

    The Fuel Test Loop(FTL) was installed for the national goal of self-supporting technology in the field of design and construction of nuclear power plant. The FTL with the fuel irradiation equipment is essential in developing, improving and inspecting the fuel of CANDU type or PWR type nuclear power plant. The FTL should be operated at the same conditions of commercial nuclear power plant such as temperature, pressure, flow rate, neutron flux and so on. Starting designing in December 2001, the FTL was installed from March 2007 to August 2008. Especially the In Pile Section(IPS) was installed at IR1 hole in August 2008. Until September 2009 after loading the test fuel, a series of power escalation tests (LSD, CSB1, CSB2, HSB, HOP) were conducted. And it was operated at the condition of CSB2 for the 8 cycles from October 2009 to July 2010. But it could not be normally operated in early 2010, because the high radiation released from irradiated materials due to the worn down bearing of main cooling pump. So, we removed the IPS and installed a newly designed IPS bypass line to prevent increasing high radiation. In this report we will present preliminary works, main works processes, devices of making work environments, a designing and manufacturing of IPS bypass line and a rack of IPS, installing know-hows, problems and solutions broke out during the work etc. We believe that our efforts to complete successful installing and operating of the FTL system will contribute for the efficient utilization of HANARO

  17. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  18. Nationwide SIP Telephony Network Design to Prevent Congestion Caused by Disaster

    Science.gov (United States)

    Satoh, Daisuke; Ashitagawa, Kyoko

    We present a session initiation protocol (SIP) network design for a voice-over-IP network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all of the SIP servers equally. It takes advantage of the fact that equipment for voice data packets is different from equipment for signaling packets in SIP networks. Furthermore, the design achieves simple routing on the basis of telephone numbers. We evaluated the performance of our design in preventing congestion through simulation. We showed that the proposed design has roughly 20 times more capacity, which is 57 times the normal load, than the conventional design if a disaster were to occur in Niigata Prefecture struck by the Chuetsu earthquake in 2004.

  19. Part 8. Deployment considerations

    International Nuclear Information System (INIS)

    Dance, K.D.; Chang, Y.I.; Daly, T.A.

    1980-01-01

    This report addresses considerations of fast breeder reactor development and deployment from a national perspective. Nations vary greatly in their expertise and interest relative to nuclear power, and hence a single set of steps to be taken by a nation in decision-making on breeder development and deployment cannot be presented. The approach taken in this report is to present discussions on key factors influencing the breeder development and deployment decisions, especially in non-breeder nations, by drawing upon historical perspectives of the Light Water Reactor for comparison

  20. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  1. Quantitative analysis of intraneuronal transport in human iPS neurons

    Directory of Open Access Journals (Sweden)

    Haruko Nakamura

    2015-08-01

    Full Text Available Induced pluripotent stem (iPS cells are promising tools to investigate disease mechanism and develop new drugs. Intraneuronal transport, which is fundamental for neuronal survival and function, is vulnerable to various pharmacological and chemical agents and is disrupted in some neurodegenerative disorders. We applied a quantification method for axonal transport by counting CM-DiI–labeled particles traveling along the neurite, which allowed us to monitor and quantitate, for the first time, intraneuronal transport in human neurons differentiated from iPS cells (iCell neurons. We evaluated the acute effects of several anti-neoplastic agents that have been previously shown to affect intraneuronal transport. Vincristine, paclitaxel and oxaliplatin decreased the number of moving particle along neurites. Cisplatin, however, produced no effect on intraneuronal transport, which is in contrast to our previous report indicating that it inhibits transport in chick dorsal root ganglion neurons. Our system may be a useful method for assessing intraneuronal transport and neurotoxicity in human iPS neurons.

  2. A short-term clinical evaluation of IPS Empress 2 crowns.

    Science.gov (United States)

    Toksavul, Suna; Toman, Muhittin

    2007-01-01

    The aim of this study was to evaluate the clinical performance of all-ceramic crowns made with the IPS Empress 2 system after an observation period of 12 to 60 months. Seventy-nine IPS Empress 2 crowns were placed in 21 patients. The all-ceramic crowns were evaluated clinically, radiographically, and using clinical photographs. The evaluations took place at baseline (2 days after cementation) and at 6-month intervals for 12 to 60 months. Survival rate of the crowns was determined using Kaplan-Meier statistical analysis. Based on the US Public Health Service criteria, 95.24% of the crowns were rated satisfactory after a mean follow-up period of 58 months. Fracture was registered in only 1 crown. One endodontically treated tooth failed as a result of fracture at the cervical margin area. In this in vivo study, IPS Empress 2 crowns exhibited a satisfactory clinical performance during an observation period ranging from 12 to 60 months.

  3. [Microstructure and mechanical property of a new IPS-Empress 2 dental glass-ceramic].

    Science.gov (United States)

    Luo, Xiao-ping; Watts, D C; Wilson, N H F; Silsons, N; Cheng, Ya-qin

    2005-03-01

    To investigate the microstructure and mechanical properties of a new IPS-Empress 2 dental glass-ceramic. AFM, SEM and XRD were used to analyze the microstructure and crystal phase of IPS-Empress 2 glass-ceramic. The flexural strength and fracture toughness were tested using 3-point bending method and indentation method respectively. IPS-Empress 2 glass-ceramic mainly consisted of lithium disilicate crystal, lithium phosphate and glass matrix, which formed a continuous interlocking structure. The crystal phases were not changed before and after hot-pressed treatment. AFM showed nucleating agent particles of different sizes distributed on the highly polished ceramic surface. The strength and fracture toughness were 300 MPa and 3.1 MPam(1/2). The high strength and fracture toughness of IPS-Empress 2 glass ceramic are attributed to the fine lithium disilicate crystalline, interlocking microstructure and crack deflection.

  4. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  5. Leukotriene B4 (LTB4) induces formation of inositol-phosphates (IP's) in rat peritoneal polymorphonuclear leukocytes (PMN's)

    International Nuclear Information System (INIS)

    Chi-Rosso, G.; Crooke, S.T.; Mong, S.

    1986-01-01

    LTB 4 induced rapid breakdown of prelabeled inositol-phospholipids (PI) in rat PMN. Formation of [ 3 H]-inositol-trisphosphate ([ 3 H]-IP 3 ) was rapid, with a peak of 250-300% of the control level, after 5-15 sec of stimulation with LTB 4 . Accumulation of [ 3 H]-inositol-bisphosphate ([ 3 H]-IP 2 ) was rapid, peaking after 30 sec of stimulation. [ 3 H]-inositol-monophosphate ([ 3 H]-IP 1 ) accumulated gradually in the presence of LiCl. The kinetics of [ 3 H]-IP 3 , [ 3 H]-IP 2 and [ 3 H]-IP 1 accumulation suggested that LTB 4 may interact with receptors in PMNs, activate phospholipase C which, in turn, induces hydrolysis of PI. The agonist activities of several LTB 4 analogs were employed to investigate the structure activity relationship of LTB 4 receptor mediated activation of PI hydrolysis. Increases in [ 3 H]-IP 3 formation were dependent upon the concentration of LTB 4 and the agonist analogs. The rank order potency of these analogs were equivalent to that of the pharmacological activity of LTB 4 agonists in the chemotaxis assay. Furthermore, the Islet activation protein (IAP) inhibited LTB 4 induced [ 3 H]-IP 3 formation. The tumor promoting phorbomyristate ester also inhibited LTB 4 induced [ 3 H]-IP 3 formation. These results suggest LTB 4 may interact with receptors in rat PMNs, activate G/sub i/ protein regulated phospholipase C and induce [ 3 H]-IP 3 formation

  6. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    OBJECTIVE: Insight on how different missions have impacted rates of mental health service (MHS) utilization is unexplored. We compared postdeployment MHS utilization in a national cohort of first-time deployed to missions in Balkan, Iraq, and Afghanistan respectively. METHODS: A prospective...... national cohort study of 13 246 first-time deployed in the period 1996 through 2012 to missions in Balkan area, Iraq, or Afghanistan respectively. Soldiers 'MHS utilization was also compared with a 5:1 sex-, age-, and calendar year-matched never-deployed background population. Postdeployment utilization...... of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  7. What pre-deployment and early post-deployment factors predict health function after combat deployment?: a prospective longitudinal study of Operation Enduring Freedom (OEF)/Operation Iraqi Freedom (OIF) soldiers.

    Science.gov (United States)

    McAndrew, Lisa M; D'Andrea, Elizabeth; Lu, Shou-En; Abbi, Bhavna; Yan, Grace W; Engel, Charles; Quigley, Karen S

    2013-04-30

    Physical and mental function are strong indicators of disability and mortality. OEF/OIF Veterans returning from deployment have been found to have poorer function than soldiers who have not deployed; however the reasons for this are unknown. A prospective cohort of 790 soldiers was assessed both pre- and immediately after deployment to determine predictors of physical and mental function after war. On average, OEF/OIF Veterans showed significant declines in both physical (t=6.65, pfunction (t=7.11, pdeployment function, poorer physical function after deployment was associated with older age, more physical symptoms, blunted systolic blood pressure reactivity and being injured. After controlling for pre-deployment function, poorer mental function after deployment was associated with younger age, lower social desirability, lower social support, greater physical symptoms and greater PTSD symptoms. Combat deployment was associated with an immediate decline in both mental and physical function. The relationship of combat deployment to function is complex and influenced by demographic, psychosocial, physiological and experiential factors. Social support and physical symptoms emerged as potentially modifiable factors.

  8. Dietary Chemoprevention of PhIP Induced Carcinogenesis in Male Fischer 344 Rats with Tomato and Broccoli

    Science.gov (United States)

    Canene-Adams, Kirstie; Sfanos, Karen S.; Liang, Chung-Tiang; Yegnasubramanian, Srinivasan; Nelson, William G.; Brayton, Cory; De Marzo, Angelo M.

    2013-01-01

    The heterocyclic amine, 2-amino-1-methyl-6-phenylimidazo[4,5-B]pyridine (PhIP), found in meats cooked at high temperatures, has been implicated in epidemiological and rodent studies for causing breast, prostate, and colorectal cancers. A previous animal study using a xenograft model has shown that whole tomato and broccoli, when eaten in combination, exhibit a marked effect on tumor reduction compared to when eaten alone. Our aim was to determine if PhIP-induced carcinogenesis can be prevented by dietary consumption of whole tomato + broccoli powders. Male Fischer 344 rats (n = 45) were randomized into the following treatment groups: control (AIN93G diet), PhIP (200 ppm in AIN93G diet for the first 20 weeks of the study), or tomato + broccoli + PhIP (mixed in AIN93G diet at 10% each and fed with PhIP for 20 weeks, and then without PhIP for 32 weeks). Study animals were monitored for 52 weeks and were euthanized as necessary based on a set of criteria for health status and tumor burden. Although there appeared to be some hepatic and intestinal toxicity due to the combination of PhIP and tomato + broccoli, these rodents had improved survival and reduced incidence and/or severity of PhIP-induced neoplastic lesions compared to the PhIP-alone treated group. Rats eating tomato + broccoli exhibited a marked decrease in the number and size of cribiform prostatic intraepitheilial neoplasia/carcinoma in situ (cribiform PIN/CIS) lesions and in the incidence of invasive intestinal adenocarcinomas and skin carcinomas. Although the apparent toxic effects of combined PhIP and tomato + broccoli need additional study, the results of this study support the hypothesis that a diet rich in tomato and broccoli can reduce or prevent dietary carcinogen-induced cancers. PMID:24312188

  9. Normalization and experimental design for ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Alekseyenko Artyom A

    2007-06-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been widely used to investigate the DNA binding sites for a variety of proteins on a genome-wide scale. However, several issues in the processing and analysis of ChIP-chip data have not been resolved fully, including the effect of background (mock control subtraction and normalization within and across arrays. Results The binding profiles of Drosophila male-specific lethal (MSL complex on a tiling array provide a unique opportunity for investigating these topics, as it is known to bind on the X chromosome but not on the autosomes. These large bound and control regions on the same array allow clear evaluation of analytical methods. We introduce a novel normalization scheme specifically designed for ChIP-chip data from dual-channel arrays and demonstrate that this step is critical for correcting systematic dye-bias that may exist in the data. Subtraction of the mock (non-specific antibody or no antibody control data is generally needed to eliminate the bias, but appropriate normalization obviates the need for mock experiments and increases the correlation among replicates. The idea underlying the normalization can be used subsequently to estimate the background noise level in each array for normalization across arrays. We demonstrate the effectiveness of the methods with the MSL complex binding data and other publicly available data. Conclusion Proper normalization is essential for ChIP-chip experiments. The proposed normalization technique can correct systematic errors and compensate for the lack of mock control data, thus reducing the experimental cost and producing more accurate results.

  10. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  11. Experimental evaluation of the IP multimedia subsystem

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  12. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  13. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  14. Optimal use of tandem biotin and V5 tags in ChIP assays

    NARCIS (Netherlands)

    K.E. Kolodziej (Katarzyna); F. Pourfarzad, F. (Farzin); E. de Boer (Ernie); S. Krpic (Sanja); F.G. Grosveld (Frank); J. Strouboulis (John)

    2009-01-01

    textabstractBackground: Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the

  15. Improvement of CPU time of Linear Discriminant Function based on MNM criterion by IP

    Directory of Open Access Journals (Sweden)

    Shuichi Shinmura

    2014-05-01

    Full Text Available Revised IP-OLDF (optimal linear discriminant function by integer programming is a linear discriminant function to minimize the number of misclassifications (NM of training samples by integer programming (IP. However, IP requires large computation (CPU time. In this paper, it is proposed how to reduce CPU time by using linear programming (LP. In the first phase, Revised LP-OLDF is applied to all cases, and all cases are categorized into two groups: those that are classified correctly or those that are not classified by support vectors (SVs. In the second phase, Revised IP-OLDF is applied to the misclassified cases by SVs. This method is called Revised IPLP-OLDF.In this research, it is evaluated whether NM of Revised IPLP-OLDF is good estimate of the minimum number of misclassifications (MNM by Revised IP-OLDF. Four kinds of the real data—Iris data, Swiss bank note data, student data, and CPD data—are used as training samples. Four kinds of 20,000 re-sampling cases generated from these data are used as the evaluation samples. There are a total of 149 models of all combinations of independent variables by these data. NMs and CPU times of the 149 models are compared with Revised IPLP-OLDF and Revised IP-OLDF. The following results are obtained: 1 Revised IPLP-OLDF significantly improves CPU time. 2 In the case of training samples, all 149 NMs of Revised IPLP-OLDF are equal to the MNM of Revised IP-OLDF. 3 In the case of evaluation samples, most NMs of Revised IPLP-OLDF are equal to NM of Revised IP-OLDF. 4 Generalization abilities of both discriminant functions are concluded to be high, because the difference between the error rates of training and evaluation samples are almost within 2%.   Therefore, Revised IPLP-OLDF is recommended for the analysis of big data instead of Revised IP-OLDF. Next, Revised IPLP-OLDF is compared with LDF and logistic regression by 100-fold cross validation using 100 re-sampling samples. Means of error rates of

  16. Flow Monitoring Experiences at the Ethernet-Layer

    NARCIS (Netherlands)

    Hofstede, Rick; Hofstede, R.J.; Drago, Idilio; Sperotto, Anna; Pras, Aiko; Lehnert, Ralf

    2011-01-01

    Flow monitoring is a scalable technology for providing summaries of network activity. Being deployed at the IP-layer, it uses fixed flow definitions, based on fields of the IP-layer and higher layers. Since several backbone network operators are considering the deployment of (Carrier) Ethernet in

  17. Lessons Learned from resolving massive IPS database change for SPADES+

    International Nuclear Information System (INIS)

    Kim, Jin-Soo

    2016-01-01

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT_ID is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT_IDs, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT_IDs are in IPS database. Changing POINT_IDs could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database

  18. Adjusting the IP $\\beta$ Functions in RHIC

    CERN Document Server

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  19. Host based internet protocol (IP) packet analysis to enhance network security

    International Nuclear Information System (INIS)

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  20. Ataxia-telangiectasia mutated (ATM) deficiency decreases reprogramming efficiency and leads to genomic instability in iPS cells

    Energy Technology Data Exchange (ETDEWEB)

    Kinoshita, Taisuke [Department of Cell Differentiation, The Sakaguchi Laboratory, School of Medicine, Keio University, Tokyo 160-8582 (Japan); Nagamatsu, Go, E-mail: gonag@sc.itc.keio.ac.jp [Department of Cell Differentiation, The Sakaguchi Laboratory, School of Medicine, Keio University, Tokyo 160-8582 (Japan); Precursory Research for Embryonic Science and Technology, Japan Science and Technology Agency, Kawaguchi, Saitama 332-0012 (Japan); Kosaka, Takeo [Department of Urology, School of Medicine, Keio University, Tokyo 160-8582 (Japan); Takubo, Keiyo [Department of Cell Differentiation, The Sakaguchi Laboratory, School of Medicine, Keio University, Tokyo 160-8582 (Japan); Hotta, Akitsu [Precursory Research for Embryonic Science and Technology, Japan Science and Technology Agency, Kawaguchi, Saitama 332-0012 (Japan); Department of Reprogramming Science, Center for iPS Cell Research and Application (CiRA), Kyoto University, Kyoto (Japan); Ellis, James [Ontario Human iPS Cell Facility, Molecular Genetics, University of Toronto, Developmental and Stem Cell Biology, SickKids, Toronto, Canada MG1L7 (Canada); Suda, Toshio, E-mail: sudato@sc.itc.keio.ac.jp [Department of Cell Differentiation, The Sakaguchi Laboratory, School of Medicine, Keio University, Tokyo 160-8582 (Japan)

    2011-04-08

    Highlights: {yields} iPS cells were induced with a fluorescence monitoring system. {yields} ATM-deficient tail-tip fibroblasts exhibited quite a low reprogramming efficiency. {yields} iPS cells obtained from ATM-deficient cells had pluripotent cell characteristics. {yields} ATM-deficient iPS cells had abnormal chromosomes, which were accumulated in culture. -- Abstract: During cell division, one of the major features of somatic cell reprogramming by defined factors, cells are potentially exposed to DNA damage. Inactivation of the tumor suppressor gene p53 raised reprogramming efficiency but resulted in an increased number of abnormal chromosomes in established iPS cells. Ataxia-telangiectasia mutated (ATM), which is critical in the cellular response to DNA double-strand breaks, may also play an important role during reprogramming. To clarify the function of ATM in somatic cell reprogramming, we investigated reprogramming in ATM-deficient (ATM-KO) tail-tip fibroblasts (TTFs). Although reprogramming efficiency was greatly reduced in ATM-KO TTFs, ATM-KO iPS cells were successfully generated and showed the same proliferation activity as WT iPS cells. ATM-KO iPS cells had a gene expression profile similar to ES cells and WT iPS cells, and had the capacity to differentiate into all three germ layers. On the other hand, ATM-KO iPS cells accumulated abnormal genome structures upon continuous passages. Even with the abnormal karyotype, ATM-KO iPS cells retained pluripotent cell characteristics for at least 20 passages. These data indicate that ATM does participate in the reprogramming process, although its role is not essential.

  1. Ataxia-telangiectasia mutated (ATM) deficiency decreases reprogramming efficiency and leads to genomic instability in iPS cells

    International Nuclear Information System (INIS)

    Kinoshita, Taisuke; Nagamatsu, Go; Kosaka, Takeo; Takubo, Keiyo; Hotta, Akitsu; Ellis, James; Suda, Toshio

    2011-01-01

    Highlights: → iPS cells were induced with a fluorescence monitoring system. → ATM-deficient tail-tip fibroblasts exhibited quite a low reprogramming efficiency. → iPS cells obtained from ATM-deficient cells had pluripotent cell characteristics. → ATM-deficient iPS cells had abnormal chromosomes, which were accumulated in culture. -- Abstract: During cell division, one of the major features of somatic cell reprogramming by defined factors, cells are potentially exposed to DNA damage. Inactivation of the tumor suppressor gene p53 raised reprogramming efficiency but resulted in an increased number of abnormal chromosomes in established iPS cells. Ataxia-telangiectasia mutated (ATM), which is critical in the cellular response to DNA double-strand breaks, may also play an important role during reprogramming. To clarify the function of ATM in somatic cell reprogramming, we investigated reprogramming in ATM-deficient (ATM-KO) tail-tip fibroblasts (TTFs). Although reprogramming efficiency was greatly reduced in ATM-KO TTFs, ATM-KO iPS cells were successfully generated and showed the same proliferation activity as WT iPS cells. ATM-KO iPS cells had a gene expression profile similar to ES cells and WT iPS cells, and had the capacity to differentiate into all three germ layers. On the other hand, ATM-KO iPS cells accumulated abnormal genome structures upon continuous passages. Even with the abnormal karyotype, ATM-KO iPS cells retained pluripotent cell characteristics for at least 20 passages. These data indicate that ATM does participate in the reprogramming process, although its role is not essential.

  2. Periodontal response to all-ceramic crowns (IPS Empress) in general practice.

    Science.gov (United States)

    Al-Wahadni, A M; Mansour, Y; Khader, Y

    2006-02-01

    The purpose of this study was to investigate the periodontal response to the presence of all-ceramic crowns (IPS Empress) in general practice patients. The convenience sample included 82 IPS Empress crowns placed in 64 patients. These crowns had been in place for an average of 16.27 (SD 9.26) months and ranged from 6.2 to 48.87 months at the time of clinical examination. Periodontal health status (as determined by dental plaque, gingival health status, periodontal pockets) was assessed around all crowned teeth and around matched contralateral teeth by one calibrated examiner. Periodontal indices utilized included the Plaque Index (PI), Gingival Index (GI) and pocket depth (PD) with calibrated probes graduated in millimetres. Plaque, gingival and PD values for crowned teeth were compared with those for control teeth using Wilcoxon signed-rank test for each clinical parameters. Chi-square was used to test the significance of the difference in their distribution between crowns and control teeth. Statistically, PI (0.35), GI (0.41) and mean PD scores (1.42) of IPS Empress crowned teeth compared less favourably with scores of the control teeth (0.27, 0.23 and 0.86 respectively). Teeth with IPS Empress crowns had poorer periodontal health and more clinically evident plaque than uncrowned teeth.

  3. Combining multiple ChIP-seq peak detection systems using combinatorial fusion.

    Science.gov (United States)

    Schweikert, Christina; Brown, Stuart; Tang, Zuojian; Smith, Phillip R; Hsu, D Frank

    2012-01-01

    Due to the recent rapid development in ChIP-seq technologies, which uses high-throughput next-generation DNA sequencing to identify the targets of Chromatin Immunoprecipitation, there is an increasing amount of sequencing data being generated that provides us with greater opportunity to analyze genome-wide protein-DNA interactions. In particular, we are interested in evaluating and enhancing computational and statistical techniques for locating protein binding sites. Many peak detection systems have been developed; in this study, we utilize the following six: CisGenome, MACS, PeakSeq, QuEST, SISSRs, and TRLocator. We define two methods to merge and rescore the regions of two peak detection systems and analyze the performance based on average precision and coverage of transcription start sites. The results indicate that ChIP-seq peak detection can be improved by fusion using score or rank combination. Our method of combination and fusion analysis would provide a means for generic assessment of available technologies and systems and assist researchers in choosing an appropriate system (or fusion method) for analyzing ChIP-seq data. This analysis offers an alternate approach for increasing true positive rates, while decreasing false positive rates and hence improving the ChIP-seq peak identification process.

  4. The effect of zirconia on flexural strength of IPS Empress 2 ceramic

    Directory of Open Access Journals (Sweden)

    Kermanshah H

    2007-06-01

    Full Text Available Background and Aim: All ceramic, inlay-retained resin bonded fixed partial denture is a conservative method for replacement of missing teeth, because of minimal tooth reduction. The connector between the retainer and the pontic is the weak point of these bridges. Reinforcement of ceramic core will increase the clinical longevity. The aim of this study was to determine the effect of zirconia on flexural strength of IPS Empress 2 core ceramic.Materials and Methods: In this experimental in vitro study, twenty eight bar shape specimens (17´3.1´3.1 mm were made of four different materials: (1 Slip casting in-ceram alumina core (control group (2 Hot-pressed lithium disilicate core ceramic (IPS Empress 2 (3 IPS Empress 2 with cosmopost (zirconia post inserted longitudinally in the center of the bar (4 IPS Empress 2 with cosmopost (zirconia post inserted longitudinally in bottom of the bar. Specimens were subjected to three-point flexure loading with the span of 15mm, at a cross-head speed of 0.5 mm/min. Failure loads were recorded and analyzed using one-way ANOVA and Tomhane Post-hoc tests and p<0.05 was set as the level of significance. Fractured surfaces were then observed by scanning electron microscope (SEM. Four additional samples were made as the third group, and zirconia-IPS interface was observed by SEM before fracture.Results: Mean values and standard deviations of three point flexural strengths of groups 1 to 4, were: 378.4±44.6, 258.6±27.5, 144.3±51.7, 230±22.3 MPa respectively. All the groups were statistically different from each other (P<0.05, except groups 2 and 4. The flexural strengths of groups 2, 3, 4 were significantly lower than group 1. Group 3 had the lowest flexural strength. SEM analysis showed that the initiated cracks propagated in the interface of zirconia post and IPS Empress 2 ceramic.Conclusion: Based on the results of this study, inserting zirconia post (cosmopost in IPS Empress 2 ceramic does not reinforce all

  5. Evolution of the PI - Productivity Index; Evolucao do IP - Indice de Produtividade

    Energy Technology Data Exchange (ETDEWEB)

    Feitosa, Gilvan Soares [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    The productivity index (PI), the most direct and widely used measure of a well productivity, is defined as the ratio of oil-well rate to the associated pressure drawdown - from average reservoir pressure to bottom hole-flowing-well pressure. It is known that the actual value of PI can only be attained at pseudosteady-state condition, which requires a lot of time (days, or even months), what is not practical for most well tests. For this reason, PI is often obtained from short transient flow test, which gives usually an overestimate of the actual PI. How larger than the actual value is the transient PI? This paper investigates the PI evolution, from the earlier transient well's production period up to the pseudosteady-state flow establishment, under single-phase flow, and later on, as pressure drops below saturation pressure and then oil and gas flow through the reservoir to the well. For analysis of PI during the transient period is defined a dimensionless PI (IP{sub D}), as the ratio of the time-dependent transient PI (IP{sub t}), to the constant pseudosteady-state PI (IP{sub pss}). For transient radial flow, IP{sub D} is developed as a function of dimensionless time, t{sub DA}, and depends on the stabilized drainage area, the Dietz shape factor, the skin factor and the well radius. It is shown that transient PI (IP{sub t}) is always greater than the actual PI (IP{sub pss}) and decreases monotonically with time. At the infinite-acting end IPt reaches the smallest value, which is the closest to the actual pseudosteady-state PI, in the range of 1 to 60% higher, for a broad range of shape factors. The more eccentric the well in the drainage area the more IP{sub t} departs from the actual PI. It is presented a couple of reservoir-limit well test field-cases, where the well was produced long enough until a pseudosteady-state flow was established. Its results, among others, illustrate and substantiate the main theoretical developments of this work. (author)

  6. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...... experiencing the most growth. These trends in applications are less evident when we study which applications are actually granted. For example, the shift in IP activity toward middle-income countries and Asia is less pronounced, and the most developed countries still lead globally. Moreover, there seems...

  7. Analyzátor kvality hovorů VoIP

    OpenAIRE

    Basel, Martin

    2014-01-01

    Tato bakalářská práce se zabývá metodami pro hodnocení kvality hovorů VoIP. Je zde vysvětlen rozbor protokolu RTP/RTCP a následné počítání statistik potřebných pro určení kvality hovorů. V této práci je také popsána metoda, která byla implementována do pluginů pro sondu FlowMon. Budete zde seznámeni s výsledky a s porovnáním s ostatními programy. This bachelor's thesis focuses on methods for evaluating quality of VoIP calls. You can read about analysis of RTP/RTCP packets and use this know...

  8. Predictive IP controller for robust position control of linear servo system.

    Science.gov (United States)

    Lu, Shaowu; Zhou, Fengxing; Ma, Yajie; Tang, Xiaoqi

    2016-07-01

    Position control is a typical application of linear servo system. In this paper, to reduce the system overshoot, an integral plus proportional (IP) controller is used in the position control implementation. To further improve the control performance, a gain-tuning IP controller based on a generalized predictive control (GPC) law is proposed. Firstly, to represent the dynamics of the position loop, a second-order linear model is used and its model parameters are estimated on-line by using a recursive least squares method. Secondly, based on the GPC law, an optimal control sequence is obtained by using receding horizon, then directly supplies the IP controller with the corresponding control parameters in the real operations. Finally, simulation and experimental results are presented to show the efficiency of proposed scheme. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.

  9. HPeak: an HMM-based algorithm for defining read-enriched regions in ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Maher Christopher A

    2010-07-01

    Full Text Available Abstract Background Protein-DNA interaction constitutes a basic mechanism for the genetic regulation of target gene expression. Deciphering this mechanism has been a daunting task due to the difficulty in characterizing protein-bound DNA on a large scale. A powerful technique has recently emerged that couples chromatin immunoprecipitation (ChIP with next-generation sequencing, (ChIP-Seq. This technique provides a direct survey of the cistrom of transcription factors and other chromatin-associated proteins. In order to realize the full potential of this technique, increasingly sophisticated statistical algorithms have been developed to analyze the massive amount of data generated by this method. Results Here we introduce HPeak, a Hidden Markov model (HMM-based Peak-finding algorithm for analyzing ChIP-Seq data to identify protein-interacting genomic regions. In contrast to the majority of available ChIP-Seq analysis software packages, HPeak is a model-based approach allowing for rigorous statistical inference. This approach enables HPeak to accurately infer genomic regions enriched with sequence reads by assuming realistic probability distributions, in conjunction with a novel weighting scheme on the sequencing read coverage. Conclusions Using biologically relevant data collections, we found that HPeak showed a higher prevalence of the expected transcription factor binding motifs in ChIP-enriched sequences relative to the control sequences when compared to other currently available ChIP-Seq analysis approaches. Additionally, in comparison to the ChIP-chip assay, ChIP-Seq provides higher resolution along with improved sensitivity and specificity of binding site detection. Additional file and the HPeak program are freely available at http://www.sph.umich.edu/csg/qin/HPeak.

  10. A comparison of interferon-γ and IP-10 for the diagnosis of tuberculosis

    DEFF Research Database (Denmark)

    Holm, Line Lindebo; Rose, Michala Vaaben; Kimaro, Godfather

    2014-01-01

    OBJECTIVE: Interferon-γ and IP-10 release assays are diagnostic tests for tuberculosis infection. We have compared the accuracy of IP-10 and QuantiFERON-TB Gold In-tube [QFT-IT] in Tanzanian children suspected of having active tuberculosis (TB). METHODS: Hospitalized Tanzanian children...

  11. Accounting for immunoprecipitation efficiencies in the statistical analysis of ChIP-seq data

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    2013-01-01

    Background: ImmunoPrecipitation (IP) efficiencies may vary largely between different antibodies and between repeated experiments with the same antibody. These differences have a large impact on the quality of ChIP-seq data: a more efficient experiment will necessarily lead to a higher signal to

  12. Unusual Father-to-Daughter Transmission of Incontinentia Pigmenti Due to Mosaicism in IP Males.

    Science.gov (United States)

    Fusco, Francesca; Conte, Matilde Immacolata; Diociaiuti, Andrea; Bigoni, Stefania; Branda, Maria Francesca; Ferlini, Alessandra; El Hachem, Maya; Ursini, Matilde Valeria

    2017-09-01

    Incontinentia pigmenti (IP; Online Mendelian Inheritance in Man catalog #308300) is an X-linked dominant ectodermal disorder caused by mutations of the inhibitor of κ polypeptide gene enchancer in B cells, kinase γ ( IKBKG )/ nuclear factor κB, essential modulator ( NEMO ) gene. Hemizygous IKBKG/NEMO loss-of-function (LoF) mutations are lethal in males, thus patients are female, and the disease is always transmitted from an IP-affected mother to her daughter. We present 2 families with father-to-daughter transmission of IP and provide for the first time molecular evidence that the combination of somatic and germ-line mosaicism for IKBKG/NEMO loss of function mutations in IP males resulted in the transmission of the disease to a female child. We searched for the IKBKG/NEMO mutant allele in blood, urine, skin, and sperm DNA and found that the 2 fathers were somatic and germ-line mosaics for the p.Gln132×mutation or the exon 4-10 deletion of IKBKG/NEMO , respectively. The highest level of IKBKG/NEMO mutant cells was detected in the sperm, which might explain the recurrence of the disease. We therefore recommend careful clinical evaluation in IP male cases and the genetic investigation in sperm DNA to ensure correct genetic counseling and prevent the risk of paternal transmission of IP. Copyright © 2017 by the American Academy of Pediatrics.

  13. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  14. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  15. High throughput mutagenesis for identification of residues regulating human prostacyclin (hIP) receptor expression and function.

    Science.gov (United States)

    Bill, Anke; Rosethorne, Elizabeth M; Kent, Toby C; Fawcett, Lindsay; Burchell, Lynn; van Diepen, Michiel T; Marelli, Anthony; Batalov, Sergey; Miraglia, Loren; Orth, Anthony P; Renaud, Nicole A; Charlton, Steven J; Gosling, Martin; Gaither, L Alex; Groot-Kormelink, Paul J

    2014-01-01

    The human prostacyclin receptor (hIP receptor) is a seven-transmembrane G protein-coupled receptor (GPCR) that plays a critical role in vascular smooth muscle relaxation and platelet aggregation. hIP receptor dysfunction has been implicated in numerous cardiovascular abnormalities, including myocardial infarction, hypertension, thrombosis and atherosclerosis. Genomic sequencing has discovered several genetic variations in the PTGIR gene coding for hIP receptor, however, its structure-function relationship has not been sufficiently explored. Here we set out to investigate the applicability of high throughput random mutagenesis to study the structure-function relationship of hIP receptor. While chemical mutagenesis was not suitable to generate a mutagenesis library with sufficient coverage, our data demonstrate error-prone PCR (epPCR) mediated mutagenesis as a valuable method for the unbiased screening of residues regulating hIP receptor function and expression. Here we describe the generation and functional characterization of an epPCR derived mutagenesis library compromising >4000 mutants of the hIP receptor. We introduce next generation sequencing as a useful tool to validate the quality of mutagenesis libraries by providing information about the coverage, mutation rate and mutational bias. We identified 18 mutants of the hIP receptor that were expressed at the cell surface, but demonstrated impaired receptor function. A total of 38 non-synonymous mutations were identified within the coding region of the hIP receptor, mapping to 36 distinct residues, including several mutations previously reported to affect the signaling of the hIP receptor. Thus, our data demonstrates epPCR mediated random mutagenesis as a valuable and practical method to study the structure-function relationship of GPCRs.

  16. High throughput mutagenesis for identification of residues regulating human prostacyclin (hIP receptor expression and function.

    Directory of Open Access Journals (Sweden)

    Anke Bill

    Full Text Available The human prostacyclin receptor (hIP receptor is a seven-transmembrane G protein-coupled receptor (GPCR that plays a critical role in vascular smooth muscle relaxation and platelet aggregation. hIP receptor dysfunction has been implicated in numerous cardiovascular abnormalities, including myocardial infarction, hypertension, thrombosis and atherosclerosis. Genomic sequencing has discovered several genetic variations in the PTGIR gene coding for hIP receptor, however, its structure-function relationship has not been sufficiently explored. Here we set out to investigate the applicability of high throughput random mutagenesis to study the structure-function relationship of hIP receptor. While chemical mutagenesis was not suitable to generate a mutagenesis library with sufficient coverage, our data demonstrate error-prone PCR (epPCR mediated mutagenesis as a valuable method for the unbiased screening of residues regulating hIP receptor function and expression. Here we describe the generation and functional characterization of an epPCR derived mutagenesis library compromising >4000 mutants of the hIP receptor. We introduce next generation sequencing as a useful tool to validate the quality of mutagenesis libraries by providing information about the coverage, mutation rate and mutational bias. We identified 18 mutants of the hIP receptor that were expressed at the cell surface, but demonstrated impaired receptor function. A total of 38 non-synonymous mutations were identified within the coding region of the hIP receptor, mapping to 36 distinct residues, including several mutations previously reported to affect the signaling of the hIP receptor. Thus, our data demonstrates epPCR mediated random mutagenesis as a valuable and practical method to study the structure-function relationship of GPCRs.

  17. A simple method to quantitate IP-10 in dried blood and plasma spots

    DEFF Research Database (Denmark)

    Aabye, Martine G; Eugen-Olsen, Jesper; Werlinrud, Anne Marie

    2012-01-01

    Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn...

  18. Joint modeling of ChIP-seq data via a Markov random field model

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    Chromatin ImmunoPrecipitation-sequencing (ChIP-seq) experiments have now become routine in biology for the detection of protein-binding sites. In this paper, we present a Markov random field model for the joint analysis of multiple ChIP-seq experiments. The proposed model naturally accounts for

  19. Pulse to pulse beam trajectory determination at the IP

    International Nuclear Information System (INIS)

    Koska, W.; Wagner, S.

    1988-01-01

    It has long been known that a precise measurement of the SLC beam trajectory through the IP region is vital both from a machine and a detector point of view. One of the primary techniques used to maximize luminosity is the measurement of the deflection angle of one beam produced by the electromagnetic interaction with the other beam. In order to implement this procedure a pair of precision Beam Position Monitors (BPMs) were installed within the Final Triplet of quadrapoles on each side of the IP. Before the IP BPMs could be used to measure beam-beam deflection, a series of measurements were made of the coefficients which relate the setting of an orbit correction magnet to the position of the beam at a particular BPM (R 12 s). The purpose was to expose any problems such as misconnected cables, etc., by comparing the measured R 12 s with theoretical predictions from the model of the Final Focus region. A technique developed that uses position measurements in the long BPMs to determine a three parameter fit to the beam trajectory at the IP. The three parameters in the fit are the beam position, the incoming angle and the deflection angle. The result was very successful and allows the observation of beam-beam deflection even under marginal conditions. The purpose of this memo is to clear up the technical points and to demonstrate that the simplicity of the fit should allow the implementation of this procedure at the micro level, where it could provide trajectory information in real time which would go a long way toward making it useful as a fast feedback tool and in addition allow easy real time access to beam position data by the Mark II

  20. Validation of DAB2IP methylation and its relative significance in predicting outcome in renal cell carcinoma

    Science.gov (United States)

    Zhao, Liang-Yun; Kapur, Payal; Wu, Kai-Jie; Wang, Bin; Yu, Yan-Hong; Liao, Bing; He, Da-Lin; Chen, Wei; Margulis, Vitaly; Hsieh, Jer-Tsong; Luo, Jun-Hang

    2016-01-01

    We have recently reported tumor suppressive role of DAB2IP in RCC development. In this study, We identified one CpG methylation biomarker (DAB2IP CpG1) located UTSS of DAB2IP that was associated with poor overall survival in a cohort of 318 ccRCC patients from the Cancer Genome Atlas (TCGA). We further validated the prognostic accuracy of DAB2IP CpG methylation by pyrosequencing quantitative methylation assay in 224 ccRCC patients from multiple Chinese centers (MCHC set), and 239 patients from University of Texas Southwestern Medical Center at Dallas (UTSW set) by using FFPE samples. DAB2IP CpG1 can predict the overall survival of patients in TCGA, MCHC, and UTSW sets independent of patient age, Fuhrman grade and TNM stage (all p<0.05). DAB2IP CpG1 successfully categorized patients into high-risk and low-risk groups with significant differences of clinical outcome in respective clinical subsets, regardless of age, sex, grade, stage, or race (HR: 1.63-7.83; all p<0.05). The detection of DAB2IP CpG1 methylation was minimally affected by ITH in ccRCC. DAB2IP mRNA expression was regulated by DNA methylation in vitro. DAB2IP CpG1 methylation is a practical and repeatable biomarker for ccRCC, which can provide prognostic value that complements the current staging system. PMID:27129174

  1. Multimedia applications in differential services

    International Nuclear Information System (INIS)

    Mahfooz, S.; Merabti, M.; Pereira, R.

    2003-01-01

    In this paper we present a mechanism to provide Quality of Service (QoS) guarantees to different multimedia applications that share link bandwidth in IP-based differential services domain. In this mechanism weights are associated with each and to individual users according to their priorities. In order to evaluate the performance of our scheme we conducted simulations. The test data used portray different multimedia applications i.e. MPEG-2, IP telephony. The simulation results obtained show the effectiveness of our scheme for multimedia applications by allocating link share to each multimedia application and minimising end-to-end transmission delay 9Y bringing them in line with the recommended standard acceptable transmission delay for multimedia applications. This paper also presents extension to our proposed Relative Bandwidth Sharing (RES) scheme for differential services. We have identified and highlighted the role of border routers and core routers in differential services domain. Exploring features of Internet Protocol IPv6 in our architecture. (author)

  2. Global IP6K1 deletion enhances temperature modulated energy expenditure which reduces carbohydrate and fat induced weight gain

    Directory of Open Access Journals (Sweden)

    Qingzhang Zhu

    2017-01-01

    Full Text Available Objective: IP6 kinases (IP6Ks regulate cell metabolism and survival. Mice with global (IP6K1-KO or adipocyte-specific (AdKO deletion of IP6K1 are protected from diet induced obesity (DIO at ambient (23 °C temperature. AdKO mice are lean primarily due to increased AMPK mediated thermogenic energy expenditure (EE. Thus, at thermoneutral (30 °C temperature, high fat diet (HFD-fed AdKO mice expend energy and gain body weight, similar to control mice. IP6K1 is ubiquitously expressed; thus, it is critical to determine to what extent the lean phenotype of global IP6K1-KO mice depends on environmental temperature. Furthermore, it is not known whether IP6K1 regulates AMPK mediated EE in cells, which do not express UCP1. Methods: Q-NMR, GTT, food intake, EE, QRT-PCR, histology, mitochondrial oxygen consumption rate (OCR, fatty acid metabolism assays, and immunoblot studies were conducted in IP6K1-KO and WT mice or cells. Results: Global IP6K1 deletion mediated enhancement in EE is impaired albeit not abolished at 30 °C. As a result, IP6K1-KO mice are protected from DIO, insulin resistance, and fatty liver even at 30 °C. Like AdKO, IP6K1-KO mice display enhanced adipose tissue browning. However, unlike AdKO mice, thermoneutrality only partly abolishes browning in IP6K1-KO mice. Cold (5 °C exposure enhances carbohydrate expenditure, whereas 23 °C and 30 °C promote fat oxidation in HFD-KO mice. Furthermore, IP6K1 deletion diminishes cellular fat accumulation via activation of the AMPK signaling pathway. Conclusions: Global deletion of IP6K1 ameliorates obesity and insulin resistance irrespective of the environmental temperature conditions, which strengthens its validity as an anti-obesity target. Keywords: IP6K, Obesity, Diabetes, Energy expenditure, β-oxidation

  3. Assessment of an implementation project for a voip system: a case in the food industry

    Directory of Open Access Journals (Sweden)

    Tiago José Menezes Gonçalves

    2011-09-01

    Full Text Available In the twenty-first century, all organizations are affected directly or indirectly by the use of information technology and communication (ICT. The preparation of good projects to implement these technologies is relevant for a company to remain competitive compared to its competitors. In this context, this study analyzes the economic viability for the implementation of a communication system based on VoIP (Voice on Internet Protocol in a food company of the industrial sector. In this way, we compared the existing telephony system in the company with a proposed project for implementation of a VoIP system. Therefore, we performed the modeling of costs incurred through of equations and we used as indicators of project viability the break-even point analysis, the payback period analysis, the net present value and the internal rate of return. As result, it was concluded that the implementation of VoIP-based systems can result in large cost saving, allowing rapidly recovering of the capital invested in the project. This conclusion was confirmed by the analysis of all the indicators cited above, which allowed to recommend the implementation of the project and verify the applicability of cost models developed.

  4. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  5. All-IP wireless sensor networks for real-time patient monitoring.

    Science.gov (United States)

    Wang, Xiaonan; Le, Deguang; Cheng, Hongbin; Xie, Conghua

    2014-12-01

    This paper proposes the all-IP WSNs (wireless sensor networks) for real-time patient monitoring. In this paper, the all-IP WSN architecture based on gateway trees is proposed and the hierarchical address structure is presented. Based on this architecture, the all-IP WSN can perform routing without route discovery. Moreover, a mobile node is always identified by a home address and it does not need to be configured with a care-of address during the mobility process, so the communication disruption caused by the address change is avoided. Through the proposed scheme, a physician can monitor the vital signs of a patient at any time and at any places, and according to the IPv6 address he can also obtain the location information of the patient in order to perform effective and timely treatment. Finally, the proposed scheme is evaluated based on the simulation, and the simulation data indicate that the proposed scheme might effectively reduce the communication delay and control cost, and lower the packet loss rate. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. A multicentre evaluation of the accuracy and performance of IP-10 for the diagnosis of infection with M. tuberculosis.

    Science.gov (United States)

    Ruhwald, Morten; Dominguez, Jose; Latorre, Irene; Losi, Monica; Richeldi, Luca; Pasticci, Maria Bruna; Mazzolla, Rosanna; Goletti, Delia; Butera, Ornella; Bruchfeld, Judith; Gaines, Hans; Gerogianni, Irini; Tuuminen, Tamara; Ferrara, Giovanni; Eugen-Olsen, Jesper; Ravn, Pernille

    2011-05-01

    IP-10 has potential as a diagnostic marker for infection with Mycobacterium tuberculosis, with comparable accuracy to QuantiFERON-TB Gold In-Tube test (QFT-IT). The aims were to assess the sensitivity and specificity of IP-10, and to evaluate the impact of co-morbidity on IP-10 and QFT-IT. 168 cases with active TB, 101 healthy controls and 175 non-TB patients were included. IP-10 and IFN-γ were measured in plasma of QFT-IT stimulated whole blood and analyzed using previously determined algorithms. A subgroup of 48 patients and 70 healthy controls was tested in parallel with T-SPOT.TB IP-10 and QFT-IT had comparable accuracy. Sensitivity was 81% and 84% with a specificity of 97% and 100%, respectively. Combining IP-10 and QFT-IT improved sensitivity to 87% (p IP-10. Among non-TB patients IP-10 had a higher rate of positive responders (35% vs 27%, p IP-10 responses to mitogen stimulation were reduced in patients with TB and non-TB infection. This study confirms and validates previous findings and adds substance to IP-10 as a novel diagnostic marker for infection with M. tuberculosis. IP-10 appeared less influenced by infections other than TB; further studies are needed to test the clinical impact of these findings. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. The impact of antecedent trauma exposure and mental health symptoms on the post-deployment mental health of Afghanistan-deployed Australian troops.

    Science.gov (United States)

    Searle, Amelia K; Van Hooff, Miranda; Lawrence-Wood, Ellie R; Grace, Blair S; Saccone, Elizabeth J; Davy, Carol P; Lorimer, Michelle; McFarlane, Alexander C

    2017-10-01

    Both traumatic deployment experiences and antecedent traumas increase personnel's risk of developing PTSD and depression. However, only cross-sectional studies have assessed whether antecedent trauma moderates stress reactions to deployment experiences. This study prospectively examines whether antecedent trauma moderates the association between deployment trauma and post-deployment PTSD and depressive symptoms after accounting for antecedent mental health problems, in a large Australian Defence Force (ADF) sample. In the ADF Middle East Area of Operations Prospective Study, currently-serving military personnel deployed to Afghanistan across 2010-2012 (n = 1122) completed self-reported measures at pre-deployment and post-deployment. Within multivariable regressions, associations between deployment trauma and PTSD and depressive symptoms at post-deployment were stronger for personnel with greater antecedent trauma. However, once adjusting for antecedent mental health problems, these significant interaction effects disappeared. Instead, deployment-related trauma and antecedent mental health problems showed direct associations with post-deployment mental health problems. Antecedent trauma was also indirectly associated with post-deployment mental health problems through antecedent mental health problems. Similar associations were seen with prior combat exposure as a moderator. Antecedent and deployment trauma were reported retrospectively. Self-reports may also suffer from social desirability bias, especially at pre-deployment. Our main effects results support the pervasive and cumulative negative effect of trauma on military personnel, regardless of its source. While antecedent trauma does not amplify personnel's psychological response to deployment trauma, it is indirectly associated with increased post-deployment mental health problems. Antecedent mental health should be considered within pre-deployment prevention programs, and deployment-trauma within post

  8. Quantifying the impact of inter-site heterogeneity on the distribution of ChIP-seq data

    Directory of Open Access Journals (Sweden)

    Jonathan eCairns

    2014-11-01

    Full Text Available Chromatin Immunoprecipitation followed by sequencing (ChIP-seq is a valuable tool for epigenetic studies. Analysis of the data arising from ChIP-seq experiments often requires implicit or explicit statistical modelling of the read counts. The simple Poisson model is attractive, but does not provide a good fit to observed ChIP-seq data. Researchers therefore often either extend to a more general model (e.g. the Negative Binomial, and/or exclude regions of the genome that do not conform to the model. Since many modelling strategies employed for ChIP-seq data reduce to fitting a mixture of Poisson distributions, we explore the problem of inferring the optimal mixing distribution. We apply the Constrained Newton Method (CNM, which suggests the Negative Binomial - Negative Binomial (NB-NB mixture model as a candidate for modelling ChIP-seq data. We illustrate fitting the NB-NB model with an accelerated EM algorithm on four data sets from three species. Zero-inflated models have been suggested as an approach to improve model fit for ChIP-seq data. We show that the NB-NB mixture model requires no zero-inflation and suggest that in some cases the need for zero inflation is driven by the model's inability to cope with both artefactual large read counts and the frequently observed very low read counts.We see that the CNM-based approach is a useful diagnostic for the assessment of model fit and inference in ChIP-seq data and beyond. Use of the suggested NB-NB mixture model will be of value not only when calling peaks or otherwise modelling ChIP-seq data, but also when simulating data or constructing blacklists de novo.

  9. 5-Beam ADCP Deployment Strategy Considerations

    Science.gov (United States)

    Moore, T.; Savidge, D. K.; Gargett, A.

    2016-02-01

    With the increasing availability of 5 beam ADCPs and expanding opportunities for their deployment within both observatory and dedicated process study settings, refinements in deployment strategies are needed.Measuring vertical velocities directly with a vertically oriented acoustic beam requires that the instrument be stably mounted and leveled within fractions of a degree. Leveled shallow water deployments to date have utilized divers to jet pipes into the sand for stability, manually mount the instruments on the pipes, and level them. Leveling has been guided by the deployed instrument's pitch and roll output, available in real-time because of the observatory settings in which the deployments occurred. To expand the range of feasible deployments to deeper, perhaps non-real-time capable settings, alternatives to diver deployment and leveling must be considered. To determine stability requirements, mooring motion (heading, pitch and roll) has been sampled at 1Hz by gimballed ADCPs at a range of instrument deployment depths, and in shrouded and unshrouded cages. Conditions under which ADCP cages resting on the bottom experience significant shifts in tilt, roll or heading are assessed using co-located wind and wave measurements. The accuracy of estimating vertical velocities using all five beams relative to a well leveled vertical single beam is assessed from archived high frequency five beam data, to explore whether easing the leveling requirement is feasible.

  10. Lessons Learned from resolving massive IPS database change for SPADES+

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin-Soo [KEPCO Engineering and Construction Co., Deajeon (Korea, Republic of)

    2016-10-15

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT{sub I}D is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT{sub I}Ds, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT{sub I}Ds are in IPS database. Changing POINT{sub I}Ds could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database.

  11. Isolation, pointing, and suppression (IPS) system for high-performance spacecraft

    Science.gov (United States)

    Hindle, Tim; Davis, Torey; Fischer, Jim

    2007-04-01

    Passive mechanical isolation is often times the first step taken to remedy vibration issues on-board a spacecraft. In many cases, this is done with a hexapod of axial members or struts to obtain the desired passive isolation in all six degrees-of-freedom (DOF). In some instances, where the disturbance sources are excessive or the payload is particularly sensitive to vibration, additional steps are taken to improve the performance beyond that of passive isolation. Additional performance or functionality can be obtained with the addition of active control, using a hexapod of hybrid (passive/active) elements at the interface between the payload and the bus. This paper describes Honeywell's Isolation, Pointing, and Suppression (IPS) system. It is a hybrid isolation system designed to isolate a sensitive spacecraft payload with very low passive resonant break frequencies while affording agile independent payload pointing, on-board payload disturbance rejection, and active isolation augmentation. This system is an extension of the work done on Honeywell's previous Vibration Isolation, Steering, and Suppression (VISS) flight experiment. Besides being designed for a different size payload than VISS, the IPS strut includes a dual-stage voice coil design for improved dynamic range as well as improved low-noise drive electronics. In addition, the IPS struts include integral load cells, gap sensors, and payloadside accelerometers for control and telemetry purposes. The associated system-level control architecture to accomplish these tasks is also new for this program as compared to VISS. A summary of the IPS system, including analysis and hardware design, build, and single axis bipod testing will be reviewed.

  12. Resource Management in Differentiated Services : A Prototype Implementation

    NARCIS (Netherlands)

    Jacobsson, Martin; Oosthoek, Simon; Karagiannis, Georgios

    The wide deployment of IP technologies has driven the development of IP-based solutions for wireless networks, like the IP-based Radio Access Networks (RAN). Such wireless networks have different characteristics than traditional IP networks, imposing very strict requirements on Quality of Service

  13. Calibration and application of the IP25 biomarker for Arctic sea ice reconstructions

    Science.gov (United States)

    Cabedo Sanz, P.; Navarro Rodriguez, A.; Belt, S. T.; Brown, T. A.; Knies, J.; Husum, K.; Giraudeau, J.; Andrews, J.

    2012-04-01

    The presence of the sea ice diatom biomarker IP25 in Arctic marine sediments has been used in previous studies as a proxy for past spring sea ice occurrence and as an indicator of wider palaeoenvironmental conditions for different regions of the Arctic over various timescales [e.g. 1, 3]. In addition, measurement of IP25 has also been applied as a sea ice origin tracer for studying the transfer of organic carbon through Arctic food-webs [2]. The current study focuses on three main areas: (1) In order to improve on the quantitative analytical aspects of IP25 based research, we present here the results of a large scale extraction, purification and identification procedure for IP25 from marine sediments. This has confirmed the structure of IP25 in sediments and enabled more robust quantitative measurements by gas chromatography - mass spectrometry (GC-MS) to be established. (2) Quantitative measurements of IP25 from a sediment core from Andfjord (continental shelf, Tromsø, Norway) have been determined for the period 6.3 to 14.3 ka BP. The results of this study add significant further information to that reported previously from other biomarker studies for this core (e.g. brassicasterol) [4]. (3) Analytical detection issues (GC-MS) regarding the occurrence of IP25 in other sub-Arctic regions (e.g. East Greenland - North Iceland area) will be presented and discussed with relation to other proxy data (e.g. IRD). Belt, S. T., Vare, L. L., Massé, G., Manners, H. R., Price, J. C., MacLachlan, S. E., Andrews, J. T. & Schmidt, S. (2010) 'Striking similarities in temporal changes to spring sea ice occurrence across the central Canadian Arctic Archipelago over the last 7000 years', Quaternary Science Reviews, 29 (25-26), pp. 3489-3504. Brown, T. A. & Belt, S. T. (2012) 'Identification of the sea ice diatom biomarker IP25 in Arctic benthic macrofauna: direct evidence for a sea ice diatom diet in Arctic heterotrophs', Polar Biology, 35, pp. 131-137. Müller, J., Massé, G

  14. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned...- 2235075, or email [email protected] . SUPPLEMENTARY INFORMATION: This document announces that, on...

  15. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  16. Pipeline for the Analysis of ChIP-seq Data and New Motif Ranking Procedure

    KAUST Repository

    Ashoor, Haitham

    2011-06-01

    This thesis presents a computational methodology for ab-initio identification of transcription factor binding sites based on ChIP-seq data. This method consists of three main steps, namely ChIP-seq data processing, motif discovery and models selection. A novel method for ranking the models of motifs identified in this process is proposed. This method combines multiple factors in order to rank the provided candidate motifs. It combines the model coverage of the ChIP-seq fragments that contain motifs from which that model is built, the suitable background data made up of shuffled ChIP-seq fragments, and the p-value that resulted from evaluating the model on actual and background data. Two ChIP-seq datasets retrieved from ENCODE project are used to evaluate and demonstrate the ability of the method to predict correct TFBSs with high precision. The first dataset relates to neuron-restrictive silencer factor, NRSF, while the second one corresponds to growth-associated binding protein, GABP. The pipeline system shows high precision prediction for both datasets, as in both cases the top ranked motif closely resembles the known motifs for the respective transcription factors.

  17. Optimalisasi Pembelajaran IPS Pada Siswa Kelas VI Melalui Metode Contextual Teaching And Learning (CTL

    Directory of Open Access Journals (Sweden)

    Mahfud Mahfud

    2014-08-01

    Full Text Available Peranan guru dalam pembelajaran IPS mempunyai hubungan erat dengan dengan cara mengaktifkan siswa dalam belajar, terutama dalam proses pengembangan kemampuan dan keterampilan.Untuk mengurangi sifat verbalisme siswa dan membantah pemahaman konsep yang terdapat dalam materi IPS yang terdapat di SD, guru diharapkan memiliki kemampuan untuk mengembangkan model interaktif dalam pembelajaran IPS serta mengidentifikasi sumber-sumber pelajaran. Salah satu model interaktif yang bisa diterapkan guru salah satunya adalah model pembelajaran kontekstual atau Contextual Teaching and Learning (CTL. Pembelajarn kontekstual merupakan suatu proses yang bertujuan untuk membantu siswa memahami materi pelajaran yang sedang mereka pelajari dengan menghubungkan pokok materi pelajaran dengan penerapannya dalam kehidupan sehari-hari.Dari hasil kegiatan penelitian tindakan kelas yang telah dilakukan dalam dua siklus terhadap siswa kelas VIA di SDN Pinggir Papas 1 Kecamatan Kalianget Kabupaten Sumenep, dan berdasarkan seluruh pembahasan dari hasil analisis yang telah dilakukan, dapat disimpulkan bahwaOptimalisasi Pembelajaran IPS pada Siswa Kelas VIAmelalui Metode Contextual Teaching And Learning(CTL dapat meningkatkan kemampuan siswa memahami materi pembelajaran IPS, sehingga berpengaruh terhadap peningkatan prestasi belajar siswa, serta siswa menjadi aktif dan tertarik mengikuti proses pembelajaranyang dilaksanakan oleh guru di kelas.

  18. KChIP2 regulates the cardiac Ca2+ transient and myocyte contractility by targeting ryanodine receptor activity.

    Directory of Open Access Journals (Sweden)

    Drew M Nassal

    Full Text Available Pathologic electrical remodeling and attenuated cardiac contractility are featured characteristics of heart failure. Coinciding with these remodeling events is a loss of the K+ channel interacting protein, KChIP2. While, KChIP2 enhances the expression and stability of the Kv4 family of potassium channels, leading to a more pronounced transient outward K+ current, Ito,f, the guinea pig myocardium is unique in that Kv4 expression is absent, while KChIP2 expression is preserved, suggesting alternative consequences to KChIP2 loss. Therefore, KChIP2 was acutely silenced in isolated guinea pig myocytes, which led to significant reductions in the Ca2+ transient amplitude and prolongation of the transient duration. This change was reinforced by a decline in sarcomeric shortening. Notably, these results were unexpected when considering previous observations showing enhanced ICa,L and prolonged action potential duration following KChIP2 loss, suggesting a disruption of fundamental Ca2+ handling proteins. Evaluation of SERCA2a, phospholamban, RyR, and sodium calcium exchanger identified no change in protein expression. However, assessment of Ca2+ spark activity showed reduced spark frequency and prolonged Ca2+ decay following KChIP2 loss, suggesting an altered state of RyR activity. These changes were associated with a delocalization of the ryanodine receptor activator, presenilin, away from sarcomeric banding to more diffuse distribution, suggesting that RyR open probability are a target of KChIP2 loss mediated by a dissociation of presenilin. Typically, prolonged action potential duration and enhanced Ca2+ entry would augment cardiac contractility, but here we see KChIP2 fundamentally disrupts Ca2+ release events and compromises myocyte contraction. This novel role targeting presenilin localization and RyR activity reveals a significance for KChIP2 loss that reflects adverse remodeling observed in cardiac disease settings.

  19. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    Science.gov (United States)

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  20. Intrusion detection for IP-based multimedia communications over wireless networks

    CERN Document Server

    Tang, Jin

    2013-01-01

    IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief

  1. Managing the PSTN transformation a blueprint for a successful migration to IP-based networks

    CERN Document Server

    Dornheim, Sandra

    2015-01-01

    While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the boo

  2. Local Duck Fanning At Paddy Three Times Planting Areas ("IP Padi 300"

    Directory of Open Access Journals (Sweden)

    Setioko A.R

    2000-03-01

    Full Text Available Most of duck husbandry in Indonesia is still run traditionally, herded in rice field or in the swampy area. This kind of husbandry seemed to be much preferred by farmers as they thought it was a simple and did not need high skill and high capital "IP padi 300" was a term of rice planting system tree times instead of twice in a year. This kind of changing might have significantly affected duck faming. The objective of the study was to observe the interactively effect of "IP padi 300" to duck husbandry at the same area. Two locations were choosen (Subang, West Jawa and Pemalang, Central Java with 5 farmers at each location to be involved in the study. As many as 1200 laying pullet ducks were distributed to 10 farmers at two locations. The farmers were suggested to raise laying ducks with their own systems (fully intensive, semi intensive and fully herded and were observed for 6 months. Biota was observed on both field and in the crop of the laying ducks. There was an interactive effect of "IP padi 300" and the duck farming on the same area. The availability of feed was increased on the "IP padi 300", which gave benefit to duck farming especially fue herded system, not to go far from owner's home base. Whilst the benefit to "IP padi 300" was assumed to the reduction of pest and desease, which was frequently attacked the rice field. The production of egg from herded duck was very fluctuative due to the movement and feed availability in the rice field. Field biota in Subang and Pemalang was very much the same in profile, although "golden snail" was only found in Subang. Ducks' crop content seemed to be very much similar with the profile of field biota, although rice grain was the most in the crop. Thus, it was found that field biota was not reduced by "IP padi 300", in fact it was rather increased.

  3. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  4. Electric conductivity for laboratory and field monitoring of induced partial saturation (IPS) in sands

    Science.gov (United States)

    Kazemiroodsari, Hadi

    Liquefaction is loss of shear strength in fully saturated loose sands caused by build-up of excess pore water pressure, during moderate to large earthquakes, leading to catastrophic failures of structures. Currently used liquefaction mitigation measures are often costly and cannot be applied at sites with existing structures. An innovative, practical, and cost effective liquefaction mitigation technique titled "Induced Partial Saturation" (IPS) was developed by researchers at Northeastern University. The IPS technique is based on injection of sodium percarbonate solution into fully saturated liquefaction susceptible sand. Sodium percarbonate dissolves in water and breaks down into sodium and carbonate ions and hydrogen peroxide which generates oxygen gas bubbles. Oxygen gas bubbles become trapped in sand pores and therefore decrease the degree of saturation of the sand, increase the compressibility of the soil, thus reduce its potential for liquefaction. The implementation of IPS required the development and validation of a monitoring and evaluation technique that would help ensure that the sands are indeed partially saturated. This dissertation focuses on this aspect of the IPS research. The monitoring system developed was based on using electric conductivity fundamentals and probes to detect the transport of chemical solution, calculate degree of saturation of sand, and determine the final zone of partial saturation created by IPS. To understand the fundamentals of electric conductivity, laboratory bench-top tests were conducted using electric conductivity probes and small specimens of Ottawa sand. Bench-top tests were used to study rate of generation of gas bubbles due to reaction of sodium percarbonate solution in sand, and to confirm a theory based on which degree of saturation were calculated. In addition to bench-top tests, electric conductivity probes were used in a relatively large sand specimen prepared in a specially manufactured glass tank. IPS was

  5. Development and modeling of self-deployable structures

    Science.gov (United States)

    Neogi, Depankar

    Deployable space structures are prefabricated structures which can be transformed from a closed, compact configuration to a predetermined expanded form in which they are stable and can bear loads. The present research effort investigates a new family of deployable structures, called the Self-Deployable Structures (SDS). Unlike other deployable structures, which have rigid members, the SDS members are flexible while the connecting joints are rigid. The joints store the predefined geometry of the deployed structure in the collapsed state. The SDS is stress-free in both deployed and collapsed configurations and results in a self-standing structure which acquires its structural properties after a chemical reaction. Reliability of deployment is one of the most important features of the SDS, since it does not rely on mechanisms that can lock during deployment. The unit building block of these structures is the self-deployable structural element (SDSE). Several SDSE members can be linked to generate a complex building block such as a triangular or a tetrahedral structure. Different SDSE and SDS concepts are investigated in the research work, and the performance of SDS's are experimentally and theoretically explored. Triangular and tetrahedral prototype SDS have been developed and presented. Theoretical efforts include modeling the behavior of 2-dimensional SDSs. Using this design tool, engineers can study the effects of different packing configurations and deployment sequence; and perform optimization on the collapsed state of a structure with different external constraints. The model also predicts if any lockup or entanglement occurs during deployment.

  6. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  7. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  8. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  9. Deploying Affordable and Available Telecommunications ...

    African Journals Online (AJOL)

    telecommunications backbone infrastructure to an ALL-IP network will address the ... bandwidth, foster regional integration and enhance economic and Small. Medium .... Recognising ICTs as a catalyst for socioeconomic development and the ...

  10. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  11. CXCL10/IP10 is a novel potential in vitro marker of TB infection

    Directory of Open Access Journals (Sweden)

    Ilaria Sauzullo

    2009-06-01

    Full Text Available Introduction IFN-γ is a pivotal cytokine in the immune response to Myc. tuberculosis, infact this is the key cytokine produced in response to antigens specific following tuberculosis exposure causing either active or latent tuberculosis (TB and this observation forms the basis of interferon gamma release assay (IGRA, but there are alternative or additional cytokines and chemokines that could be used to improve detection of Myc. tuberculosis infection.The aim of this study was to evaluate the diagnostic utility of chemokine CXCL10/IP-10 as biomarker of active TB and to compare the results with classical QuantiFERON-Gold assay . Methods CXCL10/IP-10 and IFN-γ responses to stimulation with ESAT-6 and CFP-10 were evaluated in 21 patients with active tuberculosis and in 6 healthy unexposed subjects with no history of TB or TB contact were used as controls healthy controls. QuantiFERON-TB Gold (QFT-G, Cellestis was used for the measurement of IFN-γ levels; CXCL10/IP-10 was detected by ELISA (R&D Systems . Results Of the 21 TB patients included, 11 had a QFT-G positive and 10 had negative QFT-G results.All QFT-G positive patients had increased levels of CXCL10/IP-10 (median, pg/ml in both ESAT-6 and CFP-10 stimulated samples patients compared to healthy controls (1807 and 1111 vs 251 and 188 of controls, respectively (p<0.001 for both. The patients with active TB and QFT-G negative exhibited higher concentrations of CXCL10/IP-10 following antigen stimulation (837 pg/ml for ESAT-6;1674 pg/ml for CFP-10 (p<0.001. Conclusion Our study showed that in all patients with active TB, the CXCL10/IP-10 is expressed in higher amounts than IFN-γ following Myc. tuberculosis antigen-specific stimulation, and CXCL10/IP-10 appeared to be even more sensitive than QuantiFERON TB-Gold in TB patients with negative IFN-γ response. The measurement of chemokine CXCL10/IP-10, although not specific for tuberculosis, may have potential as an alternative or additional marker

  12. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  13. Optimalisasi Kinerja (Internet Protocol) Ip Clock Pada Jaringan Base Transceiver Station (Bts)

    OpenAIRE

    Budiyanto, Setiyo; Saputra, Apipi

    2016-01-01

    Pada sistem komunikasi GSM (Global System for Mobile), BTS (Base Transceiver Station) merupakan jantung dari sebuah cell site layanan telekomunikasi. BTS merupakan perangkat pemancar dan penerima yang menangani akses radio dan berinteraksi langsung dengan Mobile Station (MS) melalui air interface. Sebuah optimasi kinerja ip clock pada base transceiver station (BTS) metode untuk sinkronisasi jaringan untuk jam global yang berasal dari jam GPS diakuisisi oleh sejumlah BTS. IP clock didistribusi...

  14. IP-10 measured by Dry Plasma Spots as biomarker for therapy responses in Mycobacterium Tuberculosis infection.

    Science.gov (United States)

    Tonby, Kristian; Ruhwald, Morten; Kvale, Dag; Dyrhol-Riise, Anne Ma

    2015-03-18

    Tuberculosis (TB) has huge impact on human morbidity and mortality and biomarkers to support rapid TB diagnosis and ensure treatment initiation and cure are needed, especially in regions with high prevalence of multi-drug resistant TB. Soluble interferon gamma inducible protein 10 (IP-10) analyzed from dry plasma spots (DPS) has potential as an immunodiagnostic marker in TB infection. We analyzed IP-10 levels in plasma directly and extracted from DPS in parallel by ELISA from 34 clinically well characterized patients with TB disease before and throughout 24 weeks of effective anti-TB chemotherapy. We detected a significant decline of IP-10 levels in both plasma and DPS already after two weeks of therapy with good correlation between the tests. This was observed both in pulmonary and extrapulmonary TB. In conclusion, plasma IP-10 may serve as an early biomarker for anti-TB chemotherapy responses and the IP-10 DPS method has potential to be developed into a point-of care test for use in resource-limited settings. Further studies must be performed to validate the use of IP-10 DPS in TB high endemic countries.

  15. Elevated IP-10 and IL-6 from bronchoalveolar lavage cells are biomarkers of non-cavitary tuberculosis.

    Science.gov (United States)

    Nolan, A; Condos, R; Huie, M L; Dawson, R; Dheda, K; Bateman, E; Rom, W N; Weiden, M D

    2013-07-01

    Active TB disease can destroy lung parenchyma leading to cavities. Immune responses that predispose or protect individuals from lung damage during TB are poorly defined. To sample lung immune cells and assay bronchoalveolar lavage (BAL) cell cytokine production. Enrolled subjects (n = 73) had bilateral infiltrates and underwent BAL. All had sputum culture demonstrating Mycobacterium tuberculosis and 22/73 (30%) had cavities on their chest radiograph. Those with cavities at presentation had a higher percentage of polymorphonuclear neutrophils (PMN) in BAL as well as lower inducible protein (IP) 10 (P IP-10 was negatively associated with BAL PMN. IP-10 and IL-6 expression above median reduces the odds of cavities by 79% and 78% in logistic regression models. IP-10 and IL-6 clustered with interferon-gamma and tumour necrosis factor-alpha in a principal component analysis, while IL-4 clustered with PMN. Increasing IP-10 and IL-6 production by BAL cells is associated with non-cavitary TB in patients who present with radiographically advanced TB. IP-10 and IL-6 may reflect an effective T-helper 1 immune control pathway for TB, attenuating tuberculous lung destruction.

  16. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  17. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  18. High intercontinental migration rates and population admixture in the sapstain fungus Ophiostoma ips

    Science.gov (United States)

    Xudong Zhou; Treena I. Burgess; Z. Wilhelm De Beer; Francois Lieutier; Annie Yart; Kier Klepzig; Angus Carnegie; Julio Mena Portales; Brenda D. Wingfield; Michael J. Wingfield

    2006-01-01

    Ophiostoma ips is a common fungal associate of various conifer-infesting bark beetles in their native ranges and has been introduced into non-native pine plantations in the Southern Hemisphere. In this study, we used 10 microsatellite markers to investigate the population biology of O. ips in native (Cuba, France, Morocco and USA) and non-native (...

  19. Highly expressed loci are vulnerable to misleading ChIP localization of multiple unrelated proteins

    NARCIS (Netherlands)

    Teytelman, L.; Thurtle, D.M.; Rine, J.; van Oudenaarden, A.

    2013-01-01

    Chromatin immunoprecipitation (ChIP) is the gold-standard technique for localizing nuclear proteins in the genome. We used ChIP, in combination with deep sequencing (Seq), to study the genome-wide distribution of the Silent information regulator (Sir) complex in Saccharomyces cerevisiae. We analyzed

  20. Rapid recycling of Ca2+ between IP3-sensitive stores and lysosomes.

    Directory of Open Access Journals (Sweden)

    Cristina I López Sanjurjo

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 evokes release of Ca2+ from the endoplasmic reticulum (ER, but the resulting Ca2+ signals are shaped by interactions with additional intracellular organelles. Bafilomycin A1, which prevents lysosomal Ca2+ uptake by inhibiting H+ pumping into lysosomes, increased the amplitude of the initial Ca2+ signals evoked by carbachol in human embryonic kidney (HEK cells. Carbachol alone and carbachol in combination with parathyroid hormone (PTH evoke Ca2+ release from distinct IP3-sensitive Ca2+ stores in HEK cells stably expressing human type 1 PTH receptors. Bafilomycin A1 similarly exaggerated the Ca2+ signals evoked by carbachol or carbachol with PTH, indicating that Ca2+ released from distinct IP3-sensitive Ca2+ stores is sequestered by lysosomes. The Ca2+ signals resulting from store-operated Ca2+ entry, whether evoked by thapsigargin or carbachol, were unaffected by bafilomycin A1. Using Gd3+ (1 mM to inhibit both Ca2+ entry and Ca2+ extrusion, HEK cells were repetitively stimulated with carbachol to assess the effectiveness of Ca2+ recycling to the ER after IP3-evoked Ca2+ release. Blocking lysosomal Ca2+ uptake with bafilomycin A1 increased the amplitude of each carbachol-evoked Ca2+ signal without affecting the rate of Ca2+ recycling to the ER. This suggests that Ca2+ accumulated by lysosomes is rapidly returned to the ER. We conclude that lysosomes rapidly, reversibly and selectively accumulate the Ca2+ released by IP3 receptors residing within distinct Ca2+ stores, but not the Ca2+ entering cells via receptor-regulated, store-operated Ca2+ entry pathways.

  1. Rapid recycling of Ca2+ between IP3-sensitive stores and lysosomes.

    Science.gov (United States)

    López Sanjurjo, Cristina I; Tovey, Stephen C; Taylor, Colin W

    2014-01-01

    Inositol 1,4,5-trisphosphate (IP3) evokes release of Ca2+ from the endoplasmic reticulum (ER), but the resulting Ca2+ signals are shaped by interactions with additional intracellular organelles. Bafilomycin A1, which prevents lysosomal Ca2+ uptake by inhibiting H+ pumping into lysosomes, increased the amplitude of the initial Ca2+ signals evoked by carbachol in human embryonic kidney (HEK) cells. Carbachol alone and carbachol in combination with parathyroid hormone (PTH) evoke Ca2+ release from distinct IP3-sensitive Ca2+ stores in HEK cells stably expressing human type 1 PTH receptors. Bafilomycin A1 similarly exaggerated the Ca2+ signals evoked by carbachol or carbachol with PTH, indicating that Ca2+ released from distinct IP3-sensitive Ca2+ stores is sequestered by lysosomes. The Ca2+ signals resulting from store-operated Ca2+ entry, whether evoked by thapsigargin or carbachol, were unaffected by bafilomycin A1. Using Gd3+ (1 mM) to inhibit both Ca2+ entry and Ca2+ extrusion, HEK cells were repetitively stimulated with carbachol to assess the effectiveness of Ca2+ recycling to the ER after IP3-evoked Ca2+ release. Blocking lysosomal Ca2+ uptake with bafilomycin A1 increased the amplitude of each carbachol-evoked Ca2+ signal without affecting the rate of Ca2+ recycling to the ER. This suggests that Ca2+ accumulated by lysosomes is rapidly returned to the ER. We conclude that lysosomes rapidly, reversibly and selectively accumulate the Ca2+ released by IP3 receptors residing within distinct Ca2+ stores, but not the Ca2+ entering cells via receptor-regulated, store-operated Ca2+ entry pathways.

  2. Msd1/SSX2IP-dependent microtubule anchorage ensures spindle orientation and primary cilia formation

    OpenAIRE

    Hori, Akiko; Ikebe, Chiho; Tada, Masazumi; Toda, Takashi

    2014-01-01

    Anchoring microtubules to the centrosome is critical for cell geometry and polarity, yet the molecular mechanism remains unknown. Here we show that the conserved human Msd1/SSX2IP is required for microtubule anchoring. hMsd1/SSX2IP is delivered to the centrosome in a centriolar satellite-dependent manner and binds the microtubule-nucleator ?-tubulin complex. hMsd1/SSX2IP depletion leads to disorganised interphase microtubules and misoriented mitotic spindles with reduced length and intensity....

  3. THE 2012 RISE OF THE REMARKABLE TYPE IIn SN 2009ip

    International Nuclear Information System (INIS)

    Prieto, José L.; Brimacombe, J.; Drake, A. J.; Howerton, S.

    2013-01-01

    Recent observations by Mauerhan et al. have shown the unprecedented transition of the previously identified luminous blue variable (LBV) and supernova (SN) impostor SN 2009ip to a real Type IIn SN explosion. We present ∼100 optical R- and I-band photometric measurements of SN 2009ip obtained between UT 2012 September 23.6 and October 9.6, using 0.3-0.4 m aperture telescopes from the Coral Towers Observatory in Cairns, Australia. The light curves show well-defined phases, including very rapid brightening early on (0.5 mag in 6 hr observed during the night of September 24), a transition to a much slower rise between September 25 and September 28, and a plateau/peak around October 7. These changes are coincident with the reported spectroscopic changes that most likely mark the start of a strong interaction between the fast SN ejecta and a dense circumstellar medium formed during the LBV eruptions observed in recent years. In the 16-day observing period, SN 2009ip brightened by 3.7 mag from I = 17.4 mag on September 23.6 (M I ≅ –14.2) to I = 13.7 mag (M I ≅ –17.9) on October 9.6, radiating ∼3 × 10 49 erg in the optical wavelength range. As of 2012 October 9.6, SN 2009ip is more luminous than most Type IIP SN and comparable to other Type IIn SN.

  4. Transition in complex calcium bursting induced by IP3 degradation

    International Nuclear Information System (INIS)

    Zhang Feng; Lu Qishao; Su Jianzhong

    2009-01-01

    Complex intracellular Ca 2+ oscillations are systematically investigated in a mathematical model based on the mechanism of Ca 2+ -induced Ca 2+ release (CICR), taking account of the Ca 2+ -stimulated degradation of inositol 1,4,5-trisphosphate (IP 3 ) by a 3-kinase. Periodic, quasi-periodic and chaotic bursting oscillations exist in a wide range of parameter values and occur alternatively as the parameters change slightly. The transition among them can be observed by the evidence in their interspike interval and the Lyapunov exponent. These results reveal the role of agonist-stimulated of IP 3 degradation as a possible source for complex patterns in Ca 2+ signaling.

  5. Amplification of pico-scale DNA mediated by bacterial carrier DNA for small-cell-number transcription factor ChIP-seq

    DEFF Research Database (Denmark)

    Jakobsen, Janus S; Bagger, Frederik O; Hasemann, Marie S

    2015-01-01

    BACKGROUND: Chromatin-Immunoprecipitation coupled with deep sequencing (ChIP-seq) is used to map transcription factor occupancy and generate epigenetic profiles genome-wide. The requirement of nano-scale ChIP DNA for generation of sequencing libraries has impeded ChIP-seq on in vivo tissues of low...... transcription factor (CEBPA) and histone mark (H3K4me3) ChIP. We further demonstrate that genomic profiles are highly resilient to changes in carrier DNA to ChIP DNA ratios. CONCLUSIONS: This represents a significant advance compared to existing technologies, which involve either complex steps of pre...... cell numbers. RESULTS: We describe a robust, simple and scalable methodology for ChIP-seq of low-abundant cell populations, verified down to 10,000 cells. By employing non-mammalian genome mapping bacterial carrier DNA during amplification, we reliably amplify down to 50 pg of ChIP DNA from...

  6. Non-traditional Infrasound Deployment

    Science.gov (United States)

    McKenna, M. H.; McComas, S.; Simpson, C. P.; Diaz-Alvarez, H.; Costley, R. D.; Hayward, C.; Golden, P.; Endress, A.

    2017-12-01

    Historically, infrasound arrays have been deployed in rural environments where anthropological noise sources are limited. As interest in monitoring low energy sources at local distances grows in the infrasound community, it will be vital to understand how to monitor infrasound sources in an urban environment. Arrays deployed in urban centers have to overcome the decreased signal-to-noise ratio and reduced amount of real estate available to deploy an array. To advance the understanding of monitoring infrasound sources in urban environments, local and regional infrasound arrays were deployed on building rooftops on the campus at Southern Methodist University (SMU), and data were collected for one seasonal cycle. The data were evaluated for structural source signals (continuous-wave packets), and when a signal was identified, the back azimuth to the source was determined through frequency-wavenumber analysis. This information was used to identify hypothesized structural sources; these sources were verified through direct measurement and dynamic structural analysis modeling. In addition to the rooftop arrays, a camouflaged infrasound sensor was installed on the SMU campus and evaluated to determine its effectiveness for wind noise reduction. Permission to publish was granted by Director, Geotechnical and Structures Laboratory.

  7. Host-tree monoterpenes and biosynthesis of aggregation pheromones in the bark beetle ips paraconfusus

    Science.gov (United States)

    In the 1970-80s, vapors of the common conifer tree monoterpenes, myrcene and a-pinene, were shown to serve as precursors of ipsenol, ipsdienol and cis-verbenol, aggregation pheromone components of Ips paraconfusus. A paradigm developed that Ips bark beetles utilize pre-formed monoterpene precursors ...

  8. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  9. Deployable Brake for Spacecraft

    Science.gov (United States)

    Rausch, J. R.; Maloney, J. W.

    1987-01-01

    Aerodynamic shield that could be opened and closed proposed. Report presents concepts for deployable aerodynamic brake. Brake used by spacecraft returning from high orbit to low orbit around Earth. Spacecraft makes grazing passes through atmosphere to slow down by drag of brake. Brake flexible shield made of woven metal or ceramic withstanding high temperatures created by air friction. Stored until needed, then deployed by set of struts.

  10. Empirical assessment of VoIP overload detection tests

    NARCIS (Netherlands)

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  11. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  12. Macrocell Builder: IP-Block-Based Design Environment for High-Throughput VLSI Dedicated Digital Signal Processing Systems

    Directory of Open Access Journals (Sweden)

    Urard Pascal

    2006-01-01

    Full Text Available We propose an efficient IP-block-based design environment for high-throughput VLSI systems. The flow generates SystemC register-transfer-level (RTL architecture, starting from a Matlab functional model described as a netlist of functional IP. The refinement model inserts automatically control structures to manage delays induced by the use of RTL IPs. It also inserts a control structure to coordinate the execution of parallel clocked IP. The delays may be managed by registers or by counters included in the control structure. The flow has been used successfully in three real-world DSP systems. The experimentations show that the approach can produce efficient RTL architecture and allows to save huge amount of time.

  13. Comparison of Integer Programming (IP) Solvers for Automated Test Assembly (ATA). Research Report. ETS RR-15-05

    Science.gov (United States)

    Donoghue, John R.

    2015-01-01

    At the heart of van der Linden's approach to automated test assembly (ATA) is a linear programming/integer programming (LP/IP) problem. A variety of IP solvers are available, ranging in cost from free to hundreds of thousands of dollars. In this paper, I compare several approaches to solving the underlying IP problem. These approaches range from…

  14. Manufacturing of In-Pile Test Section(IPS) Mock-up for the 3-Pin Fuel Test Loop

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. M.; Park, K. N.; Chi, D. Y. (and others)

    2005-10-15

    Manufacturing process of IPS Mock-up was initiated in late of 2003 with DAEWOO Precision industries Company. Manufacturing drawings due to detail drawings are composed of Outer assembly and Inner assembly. Welding of IPS Mock-up was performed by the GMAW(Gas Metal Arc Welding) process. After the welding process, non-destructive examination was conducted. Leak test was performed to the Main cooling water part and Neon gas inter-space gap part by the He gas injection with the pressure of 6.0 kg{sub f}/cm{sup 2} and 30 minutes holding time. the result was shown that there was no leak at the Neon gas inter-space gap part but leak was occurred at Main cooling water part according to imperfect screw of purge plug. so, it was re-finished and test was performed to certify the leak tightness. To satisfy the HANARO Limiting Operation Condition, IPS should be tested ahead of installation at the HANARO reactor by the use of test facilities. IPS Mock-up and its test facilities will be designed and used for the test of 'HANARO flow tube pressure drop', 'IPS inner pressure drop' and 'IPS inner vibration'.

  15. Accommodating Thickness in Origami-Based Deployable Arrays

    Science.gov (United States)

    Zirbel, Shannon A.; Magleby, Spencer P.; Howell, Larry L.; Lang, Robert J.; Thomson, Mark W.; Sigel, Deborah A.; Walkemeyer, Phillip E.; Trease, Brian P.

    2013-01-01

    The purpose of this work is to create deployment systems with a large ratio of stowed-to-deployed diameter. Deployment from a compact form to a final flat state can be achieved through origami-inspired folding of panels. There are many models capable of this motion when folded in a material with negligible thickness; however, when the application requires the folding of thick, rigid panels, attention must be paid to the effect of material thickness not only on the final folded state, but also during the folding motion (i.e., the panels must not be required to flex to attain the final folded form). The objective is to develop new methods for deployment from a compact folded form to a large circular array (or other final form). This paper describes a mathematical model for modifying the pattern to accommodate material thickness in the context of the design, modeling, and testing of a deployable system inspired by an origami six-sided flasher model. The model is demonstrated in hardware as a 1/20th scale prototype of a deployable solar array for space applications. The resulting prototype has a ratio of stowed-to-deployed diameter of 9.2 (or 1.25 m deployed outer diameter to 0.136 m stowed outer diameter).

  16. The impact of top-down spatial attention on laterality and hemispheric asymmetry in the human parietal cortex.

    Science.gov (United States)

    Jeong, Su Keun; Xu, Yaoda

    2016-08-01

    The human parietal cortex exhibits a preference to contralaterally presented visual stimuli (i.e., laterality) as well as an asymmetry between the two hemispheres with the left parietal cortex showing greater laterality than the right. Using visual short-term memory and perceptual tasks and varying target location predictability, this study examined whether hemispheric laterality and asymmetry are fixed characteristics of the human parietal cortex or whether they are dynamic and modulated by the deployment of top-down attention to the target present hemifield. Two parietal regions were examined here that have previously been shown to be involved in visual object individuation and identification and are located in the inferior and superior intraparietal sulcus (IPS), respectively. Across three experiments, significant laterality was found in both parietal regions regardless of attentional modulation with laterality being greater in the inferior than superior IPS, consistent with their roles in object individuation and identification, respectively. Although the deployment of top-down attention had no effect on the superior IPS, it significantly increased laterality in the inferior IPS. The deployment of top-down spatial attention can thus amplify the strength of laterality in the inferior IPS. Hemispheric asymmetry, on the other hand, was absent in both brain regions and only emerged in the inferior but not the superior IPS with the deployment of top-down attention. Interestingly, the strength of hemispheric asymmetry significantly correlated with the strength of laterality in the inferior IPS. Hemispheric asymmetry thus seems to only emerge when there is a sufficient amount of laterality present in a brain region.

  17. Protocol for the effect evaluation of Individual Placement and Support (IPS): a randomized controlled multicenter trial of IPS versus treatment as usual for patients with moderate to severe mental illness in Norway.

    Science.gov (United States)

    Sveinsdottir, Vigdis; Løvvik, Camilla; Fyhn, Tonje; Monstad, Karin; Ludvigsen, Kari; Øverland, Simon; Reme, Silje Endresen

    2014-11-18

    Roughly one third of disability pensions in Norway are issued for mental and behavioral disorders, and vocational rehabilitation offered to this group has traditionally been dominated by train-and-place approaches with assisted or sheltered employment. Based on a more innovative place-and-train approach, Individual Placement and Support (IPS) involves supported employment in real-life competitive work settings, and has shown great promise for patients with severe mental illness. The study is a multicenter Randomized Controlled Trial (RCT) of IPS in a Norwegian context, involving an effect evaluation, a process evaluation, and a cost/benefit analysis. IPS will be compared to high quality treatment as usual (TAU), with labor market participation and educational activity at 12 months post inclusion as the primary outcome. The primary outcome will be measured using register data, and the project will also include complete follow-up up to 4 years after inclusion for long-term outcome data. Secondary outcomes include mental health status, disability and quality of life, collected through survey questionnaires at baseline, and after 6 and 12 months. Participants will include patients undergoing treatment for moderate to severe mental illness who are either unemployed or on sickness or social benefits. The estimated total sample size of 400-500 will be randomly assigned to the interventions. To be eligible, participants must have an expressed desire to work, and sufficient Norwegian reading and writing skills to fill out the questionnaires. The Effect Evaluation of Individual Placement and Support (IPS) will be one of the largest randomized controlled trials to date investigating the effectiveness of IPS on competitive employment, and the first study to evaluate the effectiveness of IPS for patients with moderate to severe mental illness within a Norwegian context. Clinicaltrials.gov: NCT01964092 . Registered October 16th, 2013.

  18. ipRGCs: possible causation accounts for the higher prevalence of sleep disorders in glaucoma patients

    Directory of Open Access Journals (Sweden)

    Zhen-Zhen Guo

    2017-07-01

    Full Text Available Sleep accounts for a third of one’s lifetime, partial or complete deprivation of sleep could elicit sever disorders of body function. Previous studies have reported the higher prevalence of sleep disorders in glaucoma patients, but the definite mechanism for this phenomenon is unknown. On the other hand, it is well known by us that the intrinsically photosensitive retinal ganglion cells (ipRGCs serve additional ocular functions, called non-image-forming (NIF functions, in the regulation of circadian rhythm, melatonin secretion, sleep, mood and others. Specifically, ipRGCs can directly or indirectly innervate the central areas such as suprachiasmatic nucleus (SCN, downstream pineal gland (the origin of melatonin, sleep and wake-inducing centers and mood regulation areas, making NIF functions of ipRGCs relate to sleep. The more interesting thing is that previous research showed glaucoma not only affected visual functions such as the degeneration of classical retinal ganglion cells (RGCs, but also affected ipRGCs. Therefore, we hypothesize that higher prevalence of sleep disorders in glaucoma patients maybe result from the underlying glaucomatous injuries of ipRGCs leading to the abnormalities of diverse NIF functions corresponding to sleep.

  19. DNA end resection by CtIP and exonuclease 1 prevents genomic instability

    DEFF Research Database (Denmark)

    Eid, Wassim; Steger, Martin; El-Shemerly, Mahmoud

    2010-01-01

    End resection of DNA-which is essential for the repair of DNA double-strand breaks (DSBs) by homologous recombination-relies first on the partnership between MRE11-RAD50-NBS1 (MRN) and CtIP, followed by a processive step involving helicases and exonucleases such as exonuclease 1 (EXO1). In this s......End resection of DNA-which is essential for the repair of DNA double-strand breaks (DSBs) by homologous recombination-relies first on the partnership between MRE11-RAD50-NBS1 (MRN) and CtIP, followed by a processive step involving helicases and exonucleases such as exonuclease 1 (EXO1...... of DNA-PK-dependent radial chromosome formation. Thus, our study identifies new functions of CtIP and EXO1 in DNA end resection and provides new information on the regulation of DSB repair pathways, which is a key factor in the maintenance of genome integrity....

  20. Supporting Knowledge Transfer in IS Deployment Projects

    Science.gov (United States)

    Schönström, Mikael

    To deploy new information systems is an expensive and complex task, and does seldom result in successful usage where the system adds strategic value to the firm (e.g. Sharma et al. 2003). It has been argued that innovation diffusion is a knowledge integration problem (Newell et al. 2000). Knowledge about business processes, deployment processes, information systems and technology are needed in a large-scale deployment of a corporate IS. These deployments can therefore to a large extent be argued to be a knowledge management (KM) problem. An effective deployment requires that knowledge about the system is effectively transferred to the target organization (Ko et al. 2005).