WorldWideScience

Sample records for id ip getcuid

  1. IPs

    African Journals Online (AJOL)

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  2. IP Centrex

    OpenAIRE

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  3. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  4. Ifabiyi, IP

    African Journals Online (AJOL)

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  5. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  6. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  7. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  8. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  9. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  10. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  11. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  12. Ensuring Software IP Cleanliness

    OpenAIRE

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  13. Lessons Learned from resolving massive IPS database change for SPADES+

    International Nuclear Information System (INIS)

    Kim, Jin-Soo

    2016-01-01

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT_ID is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT_IDs, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT_IDs are in IPS database. Changing POINT_IDs could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database

  14. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  15. Interoperability for electronic ID

    OpenAIRE

    Zygadlo, Zuzanna

    2009-01-01

    Electronic Business, including eBanking, eCommerce and eGovernmental services, is today based on a large variety of security solutions, comprising electronic IDs provided by a broad community of Public Key Infrastructure (PKI) vendors. Significant differences in implementations of those solutions introduce a problem of lack of interoperability in electronic business, which have not yet been resolved by standardization and interoperability initiatives based on existing PKI trust models. It i...

  16. FlowIDS

    OpenAIRE

    Sabolčák, Peter

    2006-01-01

    FlowIDS is system which can detect some of the undesirable traffi c in computer networks (undesirable traffic could be also ie. virus activity or overloading of network) and mostly doing counteraction which are set by administrator. Information about data ows are provided by hardware of network infrastructure, eliminitaion of undesirable activity is done through changes in network hardware settings. Regarding the quantity of solution which are provided on market, I decided to focus on Cisco n...

  17. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  18. IP Infrastructure Geolocation

    Science.gov (United States)

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  19. Cyclin D1, Id1 and EMT in breast cancer

    International Nuclear Information System (INIS)

    Tobin, Nicholas P; Sims, Andrew H; Lundgren, Katja L; Lehn, Sophie; Landberg, Göran

    2011-01-01

    Cyclin D1 is a well-characterised cell cycle regulator with established oncogenic capabilities. Despite these properties, studies report contrasting links to tumour aggressiveness. It has previously been shown that silencing cyclin D1 increases the migratory capacity of MDA-MB-231 breast cancer cells with concomitant increase in 'inhibitor of differentiation 1' (ID1) gene expression. Id1 is known to be associated with more invasive features of cancer and with the epithelial-mesenchymal transition (EMT). Here, we sought to determine if the increase in cell motility following cyclin D1 silencing was mediated by Id1 and enhanced EMT-features. To further substantiate these findings we aimed to delineate the link between CCND1, ID1 and EMT, as well as clinical properties in primary breast cancer. Protein and gene expression of ID1, CCND1 and EMT markers were determined in MDA-MB-231 and ZR75 cells by western blot and qPCR. Cell migration and promoter occupancy were monitored by transwell and ChIP assays, respectively. Gene expression was analysed from publicly available datasets. The increase in cell migration following cyclin D1 silencing in MDA-MB-231 cells was abolished by Id1 siRNA treatment and we observed cyclin D1 occupancy of the Id1 promoter region. Moreover, ID1 and SNAI2 gene expression was increased following cyclin D1 knock-down, an effect reversed with Id1 siRNA treatment. Similar migratory and SNAI2 increases were noted for the ER-positive ZR75-1 cell line, but in an Id1-independent manner. In a meta-analysis of 1107 breast cancer samples, CCND1 low /ID1 high tumours displayed increased expression of EMT markers and were associated with reduced recurrence free survival. Finally, a greater percentage of CCND1 low /ID1 high tumours were found in the EMT-like 'claudin-low' subtype of breast cancer than in other subtypes. These results indicate that increased migration of MDA-MB-231 cells following cyclin D1 silencing can be mediated by Id

  20. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  1. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  2. Ade-Ojo, IP

    African Journals Online (AJOL)

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  3. Lessons Learned from resolving massive IPS database change for SPADES+

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin-Soo [KEPCO Engineering and Construction Co., Deajeon (Korea, Republic of)

    2016-10-15

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT{sub I}D is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT{sub I}Ds, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT{sub I}Ds are in IPS database. Changing POINT{sub I}Ds could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database.

  4. Facts about Infectious Diseases (ID)

    Science.gov (United States)

    ... an ID Specialist? Facts about ID Pocketcard Infectious diseases are caused by microscopic organisms that penetrate the body’s natural ... from diseases such as AIDS or treatment of diseases such as cancer, may allow ... of contaminated food or water, bites from vectors such as ticks or mosquitoes ...

  5. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    OpenAIRE

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  6. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  7. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  8. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  9. Determination of local chromatin composition by CasID.

    Science.gov (United States)

    Schmidtmann, Elisabeth; Anton, Tobias; Rombaut, Pascaline; Herzog, Franz; Leonhardt, Heinrich

    2016-09-02

    Chromatin structure and function are determined by a plethora of proteins whose genome-wide distribution is typically assessed by immunoprecipitation (ChIP). Here, we developed a novel tool to investigate the local chromatin environment at specific DNA sequences. We combined the programmable DNA binding of dCas9 with the promiscuous biotin ligase BirA* (CasID) to biotinylate proteins in the direct vicinity of specific loci. Subsequent streptavidin-mediated precipitation and mass spectrometry identified both known and previously unknown chromatin factors associated with repetitive telomeric, major satellite and minor satellite DNA. With super-resolution microscopy, we confirmed the localization of the putative transcription factor ZNF512 at chromocenters. The versatility of CasID facilitates the systematic elucidation of functional protein complexes and locus-specific chromatin composition.

  10. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  11. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  12. Landscape-scale Ips typographus attack dynamics: from monitoring plots to GIS-based disturbance models

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Zajíčková, L.; Cudlín, Pavel; Blaženec, M.; Turčani, M.; Ježík, M.; Střelcová, K.; Lieutier, F.; Schlyter, F.

    2011-01-01

    Roč. 4, - (2011), s. 256-261 ISSN 1971-7458 R&D Projects: GA MŠk OC10022 Institutional research plan: CEZ:AV0Z60870520 Keywords : Spruce * Ips typographus * Attack * Drought * Host Subject RIV: GK - Forestry Impact factor: 0.507, year: 2011 http://www.sisef.it/iforest/pdf/?id=ifor0589-004

  13. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  14. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  15. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  16. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  17. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  18. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  19. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  20. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  1. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  2. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  3. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  4. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  5. Standardization efforts in IP telephony

    Science.gov (United States)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  6. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  7. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  8. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  9. Electron ID in ATLAS Run 2

    CERN Document Server

    Thais, Savannah Jennifer; The ATLAS collaboration

    2018-01-01

    Efficient and accurate electron identification is of critical importance to measuring many physics processes with leptons in the final state, including H->4l, dark vector boson searches, and various SUSY searches. This poster will describe the current status of the Likelihood driven Electron ID, highlighting the recent move from a MC driven ID to a data-driven ID. It will include the most recent identification efficiency and scale-factor measurements. Additionally, it will describe continued improvements for Run 2 electron ID, highlighting improvements in the low pt region and potential Machine Learning improvements.

  10. Tinjauan Desain Website Kemlu.Go.Id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-04-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.  

  11. Tinjauan Desain Website Kemlu.Go.Id

    OpenAIRE

    Danu Widhyatmoko

    2013-01-01

    Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007). At the end of the article, several recommendations in developing kemlu.go.id website are...

  12. Presence in the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  13. Id1 and Id3 expression is associated with increasing grade of prostate cancer: Id3 preferentially regulates CDKN1B

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Patel, Divya; Chaudhary, Jaideep

    2012-01-01

    As transcriptional regulators of basic helix–oop–helix (bHLH) transcription and non-bHLH factors, the inhibitor of differentiation (Id1, Id2, Id3, and Id4) proteins play a critical role in coordinated regulation of cell growth, differentiation, tumorigenesis, and angiogenesis. Id1 regulates prostate cancer (PCa) cell proliferation, apoptosis, and androgen independence, but its clinical significance in PCa remains controversial. Moreover, there is lack of evidence on the expression of Id2 and Id3 in PCa progression. In this study we investigated the expression of Id2 and Id3 and reevaluated the expression of Id1 in PCa. We show that increased Id1 and Id3 protein expression is strongly associated with increasing grade of PCa. At the molecular level, we report that silencing either Id1 or Id3 attenuates cell cycle. Although structurally and mechanistically similar, our results show that both these proteins are noncompensatory at least in PCa progression. Moreover, through gene silencing approaches we show that Id1 and Id3 primarily attenuates CDKN1A (p21) and CDKN1B (p27), respectively. We also demonstrate that silencing Id3 alone significantly attenuates proliferation of PCa cells as compared with Id1. We propose that increased Id1 and Id3 expression attenuates all three cyclin-dependent kinase inhibitors (CDKN2B, -1A, and -1B) resulting in a more aggressive PCa phenotype

  14. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  15. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  16. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  17. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  18. A proposed HTTP service based IDS

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2014-03-01

    Full Text Available The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. Security administrators use Intrusion-Detection System (IDS to monitor network traffic and host activities to detect attacks against hosts and network resources. In this paper IDS based on Naïve Bayes classifier is analyzed. The main objective is to enhance IDS performance through preparing the training data set allowing to detect malicious connections that exploit the http service. Results of application are demonstrated and discussed. In the training phase of the proposed IDS, at first a feature selection technique based on Naïve Bayes classifier is used, this technique identifies the most important HTTP traffic features that can be used to detect HTTP attacks. In the testing and running phases proposed IDS classifies the network traffic based on the requested service, then based on the selected features Naïve Bayes classifier is used to analyze the HTTP service based traffic and identifies the HTTP normal connections and attacks. The performance of the IDS is measured through experiments using NSL-KDD data set. The results show that the detection rate of the IDS is about 99%, the false-positive rate is about 1%, and the false-negative rate is about 0.25%; therefore, proposed IDS holds the highest detection rate and the lowest false alarm compared with other leading IDS. In addition, the proposed IDS based on Naïve Bayes is used to classify network connections as a normal or attack. And it holds a high detection rate and a low false alarm.

  19. A non-parametric peak calling algorithm for DamID-Seq.

    Directory of Open Access Journals (Sweden)

    Renhua Li

    Full Text Available Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS of double sex (DSX-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq. One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only. After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1 reads resampling; 2 reads scaling (normalization and computing signal-to-noise fold changes; 3 filtering; 4 Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC. We also used irreproducible discovery rate (IDR analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  20. A non-parametric peak calling algorithm for DamID-Seq.

    Science.gov (United States)

    Li, Renhua; Hempel, Leonie U; Jiang, Tingbo

    2015-01-01

    Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS) of double sex (DSX)-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID) technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq). One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only). After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1) reads resampling; 2) reads scaling (normalization) and computing signal-to-noise fold changes; 3) filtering; 4) Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC). We also used irreproducible discovery rate (IDR) analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  1. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  2. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  3. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  4. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  5. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  6. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  7. IP Security für Linux

    OpenAIRE

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  8. Universal Space IP Transparent Proxy, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  9. Pengalaman Komunikasi Pelanggan Zalora.co.id (Studi Fenomenologi Pelanggan Zalora.co.id)

    OpenAIRE

    Aji, Widya Andhika; Pradekso, Tandiyo; Ulfa, Nurist Surayya

    2013-01-01

    1PENGALAMAN KOMUNIKASI PELANGGAN ZALORA.CO.ID(Studi Fenomenologi Pelanggan Zalora.co.id)Oleh:Widya Andhika AjiFakultas Ilmu Sosial dan Ilmu PolitikUniversitas Diponegoro SemarangABSTRAKPenelitian ini bertujuan untuk menganalisis pengalaman komunikasi danpemahaman penerimaan konsumen terkait pesan komunikasi pemasaran dalamberbelanja di Zalora.co.id. Dengan menggunakan sampel pada lima informandan metode wawancara, dapat ditarik kesimpulan: Pelanggan Zalora.co.idmemiliki pengalaman komunikasi ...

  10. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  11. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  12. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  13. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  14. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  15. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  16. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  17. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  18. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  19. Vibrational measurements in 3-ID-B

    International Nuclear Information System (INIS)

    Sutter, J.; Alp, E.; Barraza, J.; Shu, D.

    1998-04-01

    The authors have undertaken a series of vibrational measurements in hutch 3-ID-B. Their motivation was to compare two different methods of mounting an interferometer for effectiveness in vibrational isolation and stability. In addition they were able to compare the stability of the optical table with and without its eight large bolts inserted

  20. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  1. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  2. China's Indigenous IP Policies -- Here to Stay?

    OpenAIRE

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  3. HPC Access Using KVM over IP

    Science.gov (United States)

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  4. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  5. Beam transport radiation shielding for branch lines 2-ID-B and 2-ID-C

    International Nuclear Information System (INIS)

    Feng, Y.P.; Lai, B.; McNulty, I.; Dejus, R.J.; Randall, K.J.; Yun, W.

    1995-01-01

    The x-ray radiation shielding requirements beyond the first optics enclosure have been considered for the beam transport of the 2-ID-B and 2-ID-C branch lines of Sector 2 (SRI-CAT) of the APS. The first three optical components (mirrors) of the 2-ID-B branch are contained within the shielded first optics enclosure. Calculations indicate that scattering of the primary synchrotron beam by beamline components outside the enclosure, such as apertures and monochromators, or by gas particles in case of vacuum failure is within safe limits for this branch. A standard 2.5-inch-diameter stainless steel pipe with 1/16-inch-thick walls provides adequate shielding to reduce the radiation dose equivalent rate to human tissue to below the maximum permissible limit of 0.25 mrem/hr. The 2-ID-C branch requires, between the first optics enclosure where only two mirrors are used and the housing for the third mirror, additional lead shielding (0.75 mm) and a minimum approach distance of 2.6 cm. A direct beam stop consisting of at least 4.5 mm of lead is also required immediately downstream of the third mirror for 2-ID-C. Finally, to stop the direct beam from escaping the experimental station, a beam stop consisting of at least 4-mm or 2.5-mm steel is required for the 2-ID-B or 2-ID-C branches, respectively. This final requirement can be met by the vacuum chambers used to house the experiments for both branch lines

  6. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  7. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  8. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  9. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  10. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    OpenAIRE

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  11. Idékatalog Appetit på maden

    DEFF Research Database (Denmark)

    Jensen, Tenna; Jespersen, Astrid Pernille; Grønnow, Liv Cæcilie

    2015-01-01

    Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune.......Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune....

  12. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  13. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  14. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  15. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  16. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  17. Experimental evaluation of the IP multimedia subsystem

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  18. EQuIP-ped for Success

    Science.gov (United States)

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  19. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  20. Spojení s dynamickou IP adresou

    Czech Academy of Sciences Publication Activity Database

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  1. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  2. Operational Space Weather Products at IPS

    Science.gov (United States)

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  3. Searching CLEF-IP by Strategy

    NARCIS (Netherlands)

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  4. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  5. Enhancing the Classification Accuracy of IP Geolocation

    Science.gov (United States)

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  6. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  7. Automatic spent fuel ID number reader (I)

    International Nuclear Information System (INIS)

    Tanabe, S.; Kawamoto, H.; Fujimaki, K.; Kobe, A.

    1991-01-01

    An effective and efficient technique has been developed for facilitating identification works of LWR spent fuel stored in large scale spent fuel storage pools of such as processing plants. Experience shows that there are often difficulties in the implementation of operator's nuclear material accountancy and control works as well as safeguards inspections conducted on spent fuel assemblies stored in deep water pool. This paper reports that the technique is realized as an automatic spent fuel ID number reader system installed on fuel handling machine. The ID number reader system consists of an optical sub-system and an image processing sub-system. Thousands of spent fuel assemblies stored in under water open racks in each storage pool could be identified within relatively short time (e.g. within several hours) by using this combination. Various performance tests were carried out on image processing sub-system in 1990 using TV images obtained from different types of spent fuel assemblies stored in various storage pools of PWR and BWR power stations

  8. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  9. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  10. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Science.gov (United States)

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  11. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  12. Adjusting the IP $\\beta$ Functions in RHIC

    CERN Document Server

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  13. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  14. IP Telephony Applicability in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Francisco Palacios

    2018-02-01

    Full Text Available This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX; and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users.

  15. Reliability of IP Tunnels in Military Networks

    Directory of Open Access Journals (Sweden)

    Pólkowski Marcin

    2016-10-01

    Full Text Available The military networks, contrary to commercial ones, require standards which provide the highest level of security and reliability. The process to assuring redundancy of the main connections through applying various protocols and transmission media causes problem with time needed to re-establish virtual tunnels between different locations in case of damaged link. This article compares reliability of different IP (Internet Protocol tunnels, which were implemented on military network devices.

  16. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  17. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  18. A fast neutron detector with IP by track measurement

    International Nuclear Information System (INIS)

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  19. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  20. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  1. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  2. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  3. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  4. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  5. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    Directory of Open Access Journals (Sweden)

    Jungsuk Song

    2017-02-01

    Full Text Available The darknet (i.e., a set of unused IP addresses is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’ do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc. to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them.

  6. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  7. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  8. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    International Nuclear Information System (INIS)

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  9. Applied Multiprotocol Routing in IP Telephony

    Directory of Open Access Journals (Sweden)

    Miroslav Voznak

    2010-01-01

    Full Text Available The aim of the project was to create a multi-protocol system using SIP, H.323 and MGCP standards, which would ensure routing to various types of VoIP networks. The priority was to provide multi-protocol support to SIP and H.323 signalling and the support of the routing using the ENUM standard which has recently passed from the trial phase into full operation in the Czech Republic. The document describes the system's architecture and the components used. It also briefly describes ENUM.

  10. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  11. Best practices for the implementation of the REAL ID Act.

    Science.gov (United States)

    2015-10-01

    The REAL ID Act specifies the minimum standards that must be used to produce and issue drivers license and : identification cards that are REAL ID compliant. Beginning in 2020, if a person does not possess a form of : identification that meets REA...

  12. IMI's CANCER-ID: Status of liquid biopsy standardization

    NARCIS (Netherlands)

    Pantel, Klaus; Terstappen, Leon W. M. M.; Baggiani, Barbara; Krahn, Thomas; Schlange, Thomas

    The CANCER-ID (www.cancer-id.eu) consortium was established in early 2015 with more than 30 partners as part of the Innovative Medicines Initiative (IMI), Europe's largest public-private partnership funded in equal parts by the European Union and the European Federation of Pharmaceutical Industries

  13. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  14. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  15. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  16. 78 FR 65555 - Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-11-01

    ...-0531; Airspace Docket No. 13-ANM-20] Establishment of Class E Airspace; Salmon, ID AGENCY: Federal... at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules (IFR) aircraft under control of Salt Lake...

  17. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Science.gov (United States)

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  18. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  19. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  20. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in

  1. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  2. IPS Empress: a standard of excellence.

    Science.gov (United States)

    Hornbrook, D S; Roberts, M

    1998-01-01

    For 10 years, clinicians have been able to provide patients with a proven aesthetic and functional restoration that exhibits wear-compatibility, durability, and marginal integrity. This leucite-reinforced, pressed ceramic (IPS Empress, Ivoclar Williams, Amherst, NY) presents to patients and dentists the option of a metal-free alternative which retains the functional advantages of a porcelain-fused-to-metal restoration. This article illustrates the importance of sound laboratory communication in the utilization of this restorative material, focusing upon three aspects: midline and incisal edge inclination, elimination of open gingival embrasures, and incisal edge translucency. Techniques are also presented in order to efficiently communicate details of each case presented to the laboratory.

  3. Telemetry and Communication IP Video Player

    Science.gov (United States)

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  4. Machinability of IPS Empress 2 framework ceramic.

    Science.gov (United States)

    Schmidt, C; Weigl, P

    2000-01-01

    Using ceramic materials for an automatic production of ceramic dentures by CAD/CAM is a challenge, because many technological, medical, and optical demands must be considered. The IPS Empress 2 framework ceramic meets most of them. This study shows the possibilities for machining this ceramic with economical parameters. The long life-time requirement for ceramic dentures requires a ductile machined surface to avoid the well-known subsurface damages of brittle materials caused by machining. Slow and rapid damage propagation begins at break outs and cracks, and limits life-time significantly. Therefore, ductile machined surfaces are an important demand for machine dental ceramics. The machining tests were performed with various parameters such as tool grain size and feed speed. Denture ceramics were machined by jig grinding on a 5-axis CNC milling machine (Maho HGF 500) with a high-speed spindle up to 120,000 rpm. The results of the wear test indicate low tool wear. With one tool, you can machine eight occlusal surfaces including roughing and finishing. One occlusal surface takes about 60 min machining time. Recommended parameters for roughing are middle diamond grain size (D107), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 1000 mm/min, depth of cut a(e) = 0.06 mm, width of contact a(p) = 0.8 mm, and for finishing ultra fine diamond grain size (D46), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 100 mm/min, depth of cut a(e) = 0.02 mm, width of contact a(p) = 0.8 mm. The results of the machining tests give a reference for using IPS Empress(R) 2 framework ceramic in CAD/CAM systems. Copyright 2000 John Wiley & Sons, Inc.

  5. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  6. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  7. Voice over IP in the Local Exchange: A Case Study

    OpenAIRE

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  8. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  9. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  10. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  11. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  12. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  13. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  14. The Antibody Response of Pregnant Cameroonian Women to VAR2CSA ID1-ID2a, a Small Recombinant Protein Containing the CSA-Binding Site

    Science.gov (United States)

    Babakhanyan, Anna; Leke, Rose G. F.; Salanti, Ali; Bobbili, Naveen; Gwanmesia, Philomina; Leke, Robert J. I.; Quakyi, Isabella A.; Chen, John J.; Taylor, Diane Wallace

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8–9% of males had antibodies to full-length VAR2CSA, but 90–96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a. PMID:24505415

  15. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site.

    Directory of Open Access Journals (Sweden)

    Anna Babakhanyan

    Full Text Available In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8-9% of males had antibodies to full-length VAR2CSA, but 90-96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a.

  16. La certificazione professionale I&D in Europa

    OpenAIRE

    Franco, Augusta

    2003-01-01

    The statement points out the activity of I&D European associations in the field of competences' certification, in ECIA federation's area as well as in the national one. In the statement there are references on history and outcomes of DECIDoc project; objectives and operative stages of CERTIDoc project, promoted by ECIA; and enterprises of I&D associations in France, Spain, Germany and Italy. Secondly, it is illustrated the activity of Italian librarians and archivists associatio...

  17. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    OpenAIRE

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  18. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  19. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Directory of Open Access Journals (Sweden)

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  20. In Silico Pooling of ChIP-seq Control Experiments

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  1. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  2. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  3. VoIP under the EU regulatory framework : preventing foreclosure?

    NARCIS (Netherlands)

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  4. Collaboration in Science and Innovation: IP Considerations

    International Nuclear Information System (INIS)

    Belenkaya, N.

    2016-01-01

    Full text: In today’s highly competitive market, organizations gain competitive advantage by collaborating on innovations. However, in general, before a successful partnership can start, organizations will have to negotiate ownership and access to the intellectual property produced as a result of the joint effort. While some collaborative projects are not created to pursue commercial gains, outputs of collaboration may have commercial application. Experience shows that the framework for the collaboration should be determined through an agreement that describes the project and the future ownership, management and exploitation of the intellectual property. The attractiveness of a collaborative project is increased if such framework can be negotiated timely. It is important that the partners agree on the allocation of ownership, transfer, and access to intellectual property before the project starts. This is done to reduce uncertainties and to protect the rights of the partners. Partners should agree not only on the owners of the future intellectual property but also on the ways for subsequent commercial exploitation of the results of the collaboration. A timely negotiated and successfully finalized framework for IP ownership and management plays a key role in protecting partner investments and ensuring the successful exploitation of the results of the collaboration. (author

  5. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  6. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  7. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    International Nuclear Information System (INIS)

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  8. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  9. Aliénation et idéologie

    OpenAIRE

    Kanabus, Benoît; Popa, Délia

    2017-01-01

    Dès lors, on entend mieux la question sur laquelle se referment les mille pages du Marx : « La pensée de Marx nous place devant la question abyssale : qu’est-ce que la vie » ? Cette question peut être reposée à nouveaux frais à l’âge du capitalisme avancé, où, comme le notait Adorno, la vie est devenue « l’idéologie de sa propre absence ». La recherche d’un autre rapport à l’idéologie vient alors prendre le relais de la lutte anti-idéologique de la théorie critique. Cette recherche part du po...

  10. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  11. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  12. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  13. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  14. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  15. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Science.gov (United States)

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  16. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  17. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  18. Engineering of radioimmunoassay (RIA) IP10.1

    International Nuclear Information System (INIS)

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  19. IP and resistivity survey at the INEL cold test pit

    International Nuclear Information System (INIS)

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  20. The psisub(IPS)-LAS relation for extragalactic radio sources

    International Nuclear Information System (INIS)

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  1. Quantitative analysis of macro-ARG using IP system

    International Nuclear Information System (INIS)

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  2. Identification of Staphylococcus species and subspecies with the MicroScan Pos ID and Rapid Pos ID panel systems.

    Science.gov (United States)

    Kloos, W E; George, C G

    1991-01-01

    The accuracies of the MicroScan Pos ID and Rapid Pos ID panel systems (Baxter Diagnostic Inc., MicroScan Division, West Sacramento, Calif.) were compared with each other and with the accuracies of conventional methods for the identification of 25 Staphylococcus species and 4 subspecies. Conventional methods included those used in the original descriptions of species and subspecies and DNA-DNA hybridization. The Pos ID panel uses a battery of 18 tests, and the Rapid Pos ID panel uses a battery of 42 tests for the identification of Staphylococcus species. The Pos ID panel has modified conventional and chromogenic tests that can be read after 15 to 48 h of incubation; the Rapid Pos ID panel has tests that use fluorogenic substrates or fluorometric indicators, and test results can be read after 2 h of incubation in the autoSCAN-W/A. Results indicated that both MicroScan systems had a high degree of congruence (greater than or equal to 90%) with conventional methods for the species S. capitis, S. aureus, S. auricularis, S. saprophyticus, S. cohnii, S. arlettae, S. carnosus, S. lentus, and S. sciuri and, in particular, the subspecies S. capitis subsp. capitis and S. cohnii subsp. cohnii. The Rapid Pos ID panel system also had greater than or equal to 90% congruence with conventional methods for S. epidermidis, S. caprae, S. warneri subsp. 2, S. xylosus, S. kloosii, and S. caseolyticus. For both MicroScan systems, congruence with conventional methods was 80 to 90% for S. haemolyticus subsp. 1, S. equorum, S. intermedius, and S. hyicus; and in addition, with the Rapid Pos ID panel system congruence was 80 to 89% for S. capitis subsp. ureolyticus, S. warneri subsp. 1, S. hominis, S. cohnii subsp. urealyticum, and S. simulans. The MicroScan systems identified a lower percentage (50 to 75%) of strains of S. lugdunensis, S. gallinarum, S. schleiferi, and S. chromogenes, although the addition of specific tests to the systems might increase the accuracy of identification

  3. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  4. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... variants (Koyama et al., 2008). This method removed the chances of mistyping and gave 100% accuracy in the confirmation of ID heterozygotes but expenses of chromatography did not prove it to be cost effective. Normally, genomic DNA is used as template DNA for. PCR based studies. It is very difficult to ...

  5. Screening of Lactobacillus plantarum isolated from fermented idli ...

    African Journals Online (AJOL)

    Probiotics are defined as live microorganisms which when administered in adequate amounts confer a health benefit on the host. The objective of this study was to screen eight potential probiotic Lactobacillus plantarum strains from fermented idli batter using in vitro assays such as bile tolerance, acid tolerance, transit ...

  6. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  7. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    ACE ID polymorphism is inevitable for genetic epidemiology of several cardiovascular and non cardiovascular diseases due to its direct influence on ACE activity level. In the present work, conditions were optimized for its analysis using conventional and direct blood PCR (DB PCR). Blood samples from nine normotensive ...

  8. Anmeldung in ILIAS ohne Uni-Login-ID

    OpenAIRE

    Schanz, Nadja

    2016-01-01

    Gewusst wie...! Online-Tutorial der Universitätsbibliothek Tübingen. Erklärt die Anmeldung in Ilias zu Führungen ohne Uni-Login-ID Online Tutorial from university library tuebingen. teaches how to register in Ilias for courses and guided tours without university login

  9. idRHa+ProMod - Rail Hardening Control System

    International Nuclear Information System (INIS)

    Ferro, L

    2016-01-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl (paper)

  10. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    the technological, organizational and legal dimensions of eID in Denmark, and comparing these with a number of other European countries made it possible to explain this paradox. Thus, the three main reasons for the special route development has taken in Denmark seems to be concerns over privacy, lack...

  11. idRHa+ProMod - Rail Hardening Control System

    Science.gov (United States)

    Ferro, L.

    2016-03-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl

  12. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  13. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    International Nuclear Information System (INIS)

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  14. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    OpenAIRE

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  15. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Science.gov (United States)

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  16. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Science.gov (United States)

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  17. Epigenetic inactivation of inhibitor of differentiation 4 (Id4) correlates with prostate cancer

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Chinaranagari, Swathi; Patel, Divya; Carey, Jason; Chaudhary, Jaideep

    2012-01-01

    The inhibitor of DNA-binding (Id) proteins, Id1–4 are negative regulators of basic helix-loop-helix (bHLH) transcription factors. As key regulators of cell cycle and differentiation, expression of Id proteins are increasingly observed in many cancers and associated with aggressiveness of the disease. Of all the four Id proteins, the expression of Id1, Id2, and to a lesser extent, Id3 in prostate cancer and the underlying molecular mechanism is relatively well known. On the contrary, our previous results demonstrated that Id4 acts as a potential tumor suppressor in prostate cancer. In the present study, we extend these observations and demonstrate that Id4 is down-regulated in prostate cancer due to promoter hypermethylation. We used prostate cancer tissue microarrays to investigate Id4 expression. Methylation specific PCR on bisulfite treated DNA was used to determine methylation status of Id4 promoter in laser capture micro-dissected normal, stroma and prostate cancer regions. High Id4 expression was observed in the normal prostate epithelial cells. In prostate cancer, a stage-dependent decrease in Id4 expression was observed with majority of high grade cancers showing no Id4 expression. Furthermore, Id4 expression progressively decreased in prostate cancer cell line LNCaP and with no expression in androgen-insensitive LNCaP-C81 cell line. Conversely, Id4 promoter hypermethylation increased in LNCaP-C81 cells suggesting epigenetic silencing. In prostate cancer samples, loss of Id4 expression was also associated with promoter hypermethylation. Our results demonstrate loss of Id4 expression in prostate cancer due to promoter hypermethylation. The data strongly support the role of Id4 as a tumor suppressor

  18. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  19. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  20. An ethernet/IP security review with intrusion detection applications

    International Nuclear Information System (INIS)

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  1. Zircaloy cladding ID/OD oxidation studies. Final report

    International Nuclear Information System (INIS)

    Westerman, R.E.; Hesson, G.M.

    1977-11-01

    The ID/OD oxide ratio that forms on Zircaloy tubing at temperatures relevant to postulated LOCA conditions was measured as a function of time, temperature, and distance from the rupture. The average ratio at the rupture position was less than unity, and decreased with decreasing test time and increasing distance from the point of rupture. The maximum observed ID/OD oxide ratio was 1.4. Ratios in excess of unity were typically found to be a consequence of the OD oxide being thinner than would have been anticipated from the nominal test conditions. Confirmatory data were also obtained on the isothermal oxidation kinetics of Zircaloy. These data are in good agreement with those obtained by other investigators and confirm the conservative nature of the Baker-Just equation that is required for use in licensing calculations

  2. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  3. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  4. ID based cryptography for secure cloud data storage

    OpenAIRE

    Kaaniche , Nesrine; Boudguiga , Aymen; Laurent , Maryline

    2013-01-01

    International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized us...

  5. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  6. ID'ing innate and innate-like lymphoid cells.

    Science.gov (United States)

    Verykokakis, Mihalis; Zook, Erin C; Kee, Barbara L

    2014-09-01

    The immune system can be divided into innate and adaptive components that differ in their rate and mode of cellular activation, with innate immune cells being the first responders to invading pathogens. Recent advances in the identification and characterization of innate lymphoid cells have revealed reiterative developmental programs that result in cells with effector fates that parallel those of adaptive lymphoid cells and are tailored to effectively eliminate a broad spectrum of pathogenic challenges. However, activation of these cells can also be associated with pathologies such as autoimmune disease. One major distinction between innate and adaptive immune system cells is the constitutive expression of ID proteins in the former and inducible expression in the latter. ID proteins function as antagonists of the E protein transcription factors that play critical roles in lymphoid specification as well as B- and T-lymphocyte development. In this review, we examine the transcriptional mechanisms controlling the development of innate lymphocytes, including natural killer cells and the recently identified innate lymphoid cells (ILC1, ILC2, and ILC3), and innate-like lymphocytes, including natural killer T cells, with an emphasis on the known requirements for the ID proteins. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  8. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  9. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  10. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  11. Internal validation of the RapidHIT® ID system.

    Science.gov (United States)

    Wiley, Rachel; Sage, Kelly; LaRue, Bobby; Budowle, Bruce

    2017-11-01

    Traditionally, forensic DNA analysis has required highly skilled forensic geneticists in a dedicated laboratory to generate short tandem repeat (STR) profiles. STR profiles are routinely used either to associate or exclude potential donors of forensic biological evidence. The typing of forensic reference samples has become more demanding, especially with the requirement in some jurisdictions to DNA profile arrestees. The Rapid DNA (RDNA) platform, the RapidHIT ® ID (IntegenX ® , Pleasanton, CA), is a fully automated system capable of processing reference samples in approximately 90min with minimal human intervention. Thus, the RapidHIT ID instrument can be deployed to non-laboratory environments (e.g., booking stations) and run by trained atypical personnel such as law enforcement. In order to implement the RapidHIT ID platform, validation studies are needed to define the performance and limitations of the system. Internal validation studies were undertaken with four early-production RapidHIT ID units. Reliable and concordant STR profiles were obtained from reference buccal swabs. Throughout the study, no contamination was observed. The overall first-pass success rate with an "expert-like system" was 72%, which is comparable to another current RDNA platform commercially available. The system's second-pass success rate (involving manual interpretation on first-pass inconclusive results) increased to 90%. Inhibitors (i.e., coffee, smoking tobacco, and chewing tobacco) did not appear to affect typing by the instrument system; however, substrate (i.e., swab type) did impact typing success. Additionally, one desirable feature not available with other Rapid systems is that in the event of a system failed run, a swab can be recovered and subsequently re-analyzed in a new sample cartridge. Therefore, rarely should additional sampling or swab consumption be necessary. The RapidHIT ID system is a robust and reliable tool capable of generating complete STR profiles within

  12. Which IP Strategies Do Young Highly Innovative Firms Choose

    DEFF Research Database (Denmark)

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  13. Transition in complex calcium bursting induced by IP3 degradation

    International Nuclear Information System (INIS)

    Zhang Feng; Lu Qishao; Su Jianzhong

    2009-01-01

    Complex intracellular Ca 2+ oscillations are systematically investigated in a mathematical model based on the mechanism of Ca 2+ -induced Ca 2+ release (CICR), taking account of the Ca 2+ -stimulated degradation of inositol 1,4,5-trisphosphate (IP 3 ) by a 3-kinase. Periodic, quasi-periodic and chaotic bursting oscillations exist in a wide range of parameter values and occur alternatively as the parameters change slightly. The transition among them can be observed by the evidence in their interspike interval and the Lyapunov exponent. These results reveal the role of agonist-stimulated of IP 3 degradation as a possible source for complex patterns in Ca 2+ signaling.

  14. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  15. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  16. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    Science.gov (United States)

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  17. Solar Type II Radio Bursts and IP Type II Events

    Science.gov (United States)

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  18. ID3 contributes to cerebrospinal fluid seeding and poor prognosis in medulloblastoma

    International Nuclear Information System (INIS)

    Phi, Ji Hoon; Choi, Seung Ah; Lim, Sang-Hee; Lee, Joongyub; Wang, Kyu-Chang; Park, Sung-Hye; Kim, Seung-Ki

    2013-01-01

    The inhibitor of differentiation (ID) genes have been implicated as promoters of tumor progression and metastasis in many human cancers. The current study investigated the expression and functional roles of ID genes in seeding and prognosis of medulloblastoma. ID gene expression was screened in human medulloblastoma tissues. Knockdown of ID3 gene was performed in medulloblastoma cells in vitro. The expression of metastasis-related genes after ID3 knockdown was assessed. The effect of ID3 knockdown on tumor seeding was observed in an animal model in vivo. The survival of medulloblastoma patients was plotted according to the ID3 expression levels. Significantly higher ID3 expression was observed in medulloblastoma with cerebrospinal fluid seeding than tumors without seeding. Knockdown of ID3 decreased proliferation, increased apoptosis, and suppressed the migration of D283 medulloblastoma cells in vitro. In a seeding model of medulloblastoma, ID3 knockdown in vivo with shRNA inhibited the growth of primary tumors, prevented the development of leptomeningeal seeding, and prolonged animal survival. High ID3 expression was associated with shorter survival of medulloblastoma patients, especially in Group 4 medulloblastomas. High ID3 expression is associated with medullolbastoma seeding and is a poor prognostic factor, especially in patients with Group 4 tumors. ID3 may represent the metastatic/ aggressive phenotype of a subgroup of medulloblastoma

  19. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ...) Global Positioning System (GPS) and the Instrument Landing System (ILS) or Localizer (LOC) standard... the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls Joslin Field-Magic Valley Regional...

  20. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... using the Navigation (RNAV) Global Positioning System (GPS) and the Instrument Landing System (ILS) or... or more above the surface of the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls...

  1. 77 FR 68065 - Amendment of Class D and Class E Airspace; Lewiston, ID

    Science.gov (United States)

    2012-11-15

    ... Measuring Equipment (VOR/ DME), and the Lewiston-Nez Perce Instrument Landing System (ILS) Localizer... feet or more above the surface of the earth. * * * * * ANM ID E5 Lewiston, ID [Modified] Lewiston-Nez...

  2. ID.alistic: identificatie met een touch voor de patiënt

    NARCIS (Netherlands)

    M. Wilschut; M. Zijlmans; Dr. L.S.G.L Wauben

    2017-01-01

    ID.alistic is een conceptuele patiëntidentificatie methode (middels een vingerafdrukscanner), ter vervanging van het polsbandjessysteem van het Albert Schweitzer ziekenhuis (ASz) dialysecentrum. Dit onderzoek bepaalt de implementeerbaarheid van ID.alistic binnen het dialysecentrum door

  3. Ekspert : mobiil-ID kasutamine valimistel turvariske ei tekita / Holger Roonemaa

    Index Scriptorium Estoniae

    Roonemaa, Holger

    2008-01-01

    E-valimiste projektijuhi Taavi Martensi väitel pole põhjust kahelda mobiil-ID turvalisuses. Valimiskomisjoni esimehe Heiki Sibula meelest peaks m-ID kaarte välja andma kodakondsus- ja migratsiooniamet

  4. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... Assistance (TAA) applicable to workers and former workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford...

  5. 2011 ATLAS Detector Performance - ID and Forward detectors

    CERN Document Server

    Davies‎, E; The ATLAS collaboration; Abdel Khalek, S

    2012-01-01

    This poster describes the performance of 2 parts of ATLAS: - The Inner Detector which consists of 3 subdetectors: the Pixel detector, the SemiConductor Tracker (or SCT) and the Transition Radiation Tracker (or TRT). Here, we report on Pixel detector and SCT performance over 2011. - ALFA detector which will determine the absolute luminosity of the CERN LHC at the ATLAS Interaction Point (IP), and the total proton-proton cross section, by tracking elastically scattered protons at very small angles in the limit of the Coulomb Nuclear interference region.

  6. Programmable genetic algorithm IP core for sensing and surveillance applications

    Science.gov (United States)

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  7. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  8. Construction of a nuclear data server using TCP/IP

    Energy Technology Data Exchange (ETDEWEB)

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  9. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  10. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  11. Photometric studies of δ Scuti stars. I. IP Virginis

    Science.gov (United States)

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  12. Sister broods in the spruce bark beetle, Ips typographus (L.)

    Czech Academy of Sciences Publication Activity Database

    Davídková, Markéta; Doležal, Petr

    2017-01-01

    Roč. 405, DEC 01 (2017), s. 13-21 ISSN 0378-1127 Grant - others:Lesy ČR(CZ) 08/2009-2015 Institutional support: RVO:60077344 Keywords : re-emergence * sister broods * Ips typographus Subject RIV: EH - Ecology, Behaviour OBOR OECD: Zoology Impact factor: 3.064, year: 2016 http://www.sciencedirect.com/science/article/pii/S0378112717309507

  13. Design & Implementation of IP-PBX for Small Business Organization

    OpenAIRE

    Mr. Sandeep R. Sonaskar; Dr. M. M. Khanapurkar

    2012-01-01

    Most of the small business organization uses old Electronics Private Branch Exchange (EPBX) System for the telephony communication. This EPBX is now could be replaced by Internet protocol telephony PBX called IP-PBX which uses Intranet as a backbone as each organization has pre installed local area network. The network architecture for the IPPBX system is easy to design

  14. The mites associated with Ips typographus in Sweden

    Science.gov (United States)

    John C. Moser; Hubertus H. Eidmann; Jan R. Regnander

    1989-01-01

    Twenty-four species of mites were found associated with Ips typographus (Linnaeus) collected from pherommone traps in Sweden, bringing to 38 the total recorded for this scolytid. Because three of the species are parasites, it may be possible to use them in biological control of I. typographus. Couplets from an earlier key to these...

  15. Harmonising and Matching IPR Holders at IP Australia

    OpenAIRE

    T’Mir D. Julius; Gaétan de Rassenfosse

    2014-01-01

    This document describes the methodology developed by the Melbourne Institute to: (i) harmonise holders of intellectual property rights (IPRs) at IP Australia (applications for patent, designs, trademarks and plant breeder’s rights); (ii) match Australian IPRs holders to the Australian business register; (iii) identify the ultimate owners within Australia; and (iv) identify which holders are small and medium size enterprises.

  16. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  17. Empirical assessment of VoIP overload detection tests

    NARCIS (Netherlands)

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  18. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  19. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  20. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  1. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by

  2. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... workers and former workers of Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford, Connecticut (The Hartford-IDS...

  3. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  4. Applying risk management strategies to strengthen an IDS's investment policy.

    Science.gov (United States)

    Fine, R P

    1998-11-01

    The increased financial risk that not-for-profit integrated delivery systems have assumed to function under managed care has required them to become increasingly reliant on income and gains from their investment portfolios. This reliance underscores the need for these organizations to take steps to effectively manage their investment risk. Not-for-profit IDSs should establish a systematic approach to investment risk management that is based on maintaining a sound fiduciary infrastructure and having a clear understanding of risk exposures, the most important of which are policy and market risk. Applying reasonable and common-sense risk management strategies to investment policy will enhance an IDS's overall financial and competitive strength.

  5. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  6. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  7. Labelling IDS clusters by means of the silhouette index

    OpenAIRE

    Petrovic, Slovodan; Álvarez, Gonzalo; Orfila, Agustín; Carbó, Javier

    2006-01-01

    Proceeding of: IX Reunión Española sobre Criptología y Seguridad de la Información. Barcelona, 2006 One of the most difficult problems in the design of an anomaly based intrusion detection system (IDS) that uses clustering is that of labelling the ob- tained clusters, i.e. determining which of them correspond to ”good” behaviour on the network/host and which to ”bad” behaviour. In this paper, a new clusters’ labelling strategy, which makes use of the Silhouette clustering quality index is ...

  8. Predicting Students’ Performance using Modified ID3 Algorithm

    OpenAIRE

    Ramanathan L; Saksham Dhanda; Suresh Kumar D

    2013-01-01

    The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain) as well as by giving weights to each attribute at every...

  9. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  10. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... will be posted without alteration at http://www.regulations.gov , including any personal information... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...

  11. (S)-(+)-Ipsdienol: Interspecific Inhibition of Ips latidens (LeConte) by Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1992-01-01

    In south-central British Columbia, the attraction of Ips latidens (LeConte) to its pheromone, ipsenol, was inhibited by (S)-(+)-ipsdienol, a pheromone for I. pini (Say). (R)-(-)-Ipsdienol had no effect on I. latidens. (S)-(+)-lpsdienol probably plays a role in interspecific communication between the two species...

  12. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  13. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  14. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  15. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    2009-11-01

    Full Text Available The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized.An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice.In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  16. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women natura...

  17. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  18. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    International Nuclear Information System (INIS)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep

    2016-01-01

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  20. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  1. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  2. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  3. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...... experiencing the most growth. These trends in applications are less evident when we study which applications are actually granted. For example, the shift in IP activity toward middle-income countries and Asia is less pronounced, and the most developed countries still lead globally. Moreover, there seems...

  4. The development of ISO freight containers as IP-2 packagings

    International Nuclear Information System (INIS)

    Janicki, M.C.; Vaughan, R.A.

    1993-01-01

    Design specifications were developed for ISO freight containers to meet the requirements of the transport regulations in the 1985 Edition of IAEA SS6, and to maximize the technical and commercial benefits offered to consignors by this type of container for the transport and handling of bulk LSA/SCO materials. A range of IP-2 ISO freight containers have been designed and built to these specifications and are in use in the UK. This paper discusses the regulatory considerations which had to be reviewed and interpreted in developing freight containers as Industrial Package Type 2 (IP-2) packagings and the development of performance standards to meet the regulatory requirements. Outline details of the packages developed are indicated together with examples of handling equipment developed to facilitate loading and unloading. (J.P.N.)

  5. Pulse to pulse beam trajectory determination at the IP

    International Nuclear Information System (INIS)

    Koska, W.; Wagner, S.

    1988-01-01

    It has long been known that a precise measurement of the SLC beam trajectory through the IP region is vital both from a machine and a detector point of view. One of the primary techniques used to maximize luminosity is the measurement of the deflection angle of one beam produced by the electromagnetic interaction with the other beam. In order to implement this procedure a pair of precision Beam Position Monitors (BPMs) were installed within the Final Triplet of quadrapoles on each side of the IP. Before the IP BPMs could be used to measure beam-beam deflection, a series of measurements were made of the coefficients which relate the setting of an orbit correction magnet to the position of the beam at a particular BPM (R 12 s). The purpose was to expose any problems such as misconnected cables, etc., by comparing the measured R 12 s with theoretical predictions from the model of the Final Focus region. A technique developed that uses position measurements in the long BPMs to determine a three parameter fit to the beam trajectory at the IP. The three parameters in the fit are the beam position, the incoming angle and the deflection angle. The result was very successful and allows the observation of beam-beam deflection even under marginal conditions. The purpose of this memo is to clear up the technical points and to demonstrate that the simplicity of the fit should allow the implementation of this procedure at the micro level, where it could provide trajectory information in real time which would go a long way toward making it useful as a fast feedback tool and in addition allow easy real time access to beam position data by the Mark II

  6. A Learning-Based Approach for IP Geolocation

    Science.gov (United States)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  7. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  8. Normalization and experimental design for ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Alekseyenko Artyom A

    2007-06-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been widely used to investigate the DNA binding sites for a variety of proteins on a genome-wide scale. However, several issues in the processing and analysis of ChIP-chip data have not been resolved fully, including the effect of background (mock control subtraction and normalization within and across arrays. Results The binding profiles of Drosophila male-specific lethal (MSL complex on a tiling array provide a unique opportunity for investigating these topics, as it is known to bind on the X chromosome but not on the autosomes. These large bound and control regions on the same array allow clear evaluation of analytical methods. We introduce a novel normalization scheme specifically designed for ChIP-chip data from dual-channel arrays and demonstrate that this step is critical for correcting systematic dye-bias that may exist in the data. Subtraction of the mock (non-specific antibody or no antibody control data is generally needed to eliminate the bias, but appropriate normalization obviates the need for mock experiments and increases the correlation among replicates. The idea underlying the normalization can be used subsequently to estimate the background noise level in each array for normalization across arrays. We demonstrate the effectiveness of the methods with the MSL complex binding data and other publicly available data. Conclusion Proper normalization is essential for ChIP-chip experiments. The proposed normalization technique can correct systematic errors and compensate for the lack of mock control data, thus reducing the experimental cost and producing more accurate results.

  9. The Incredibly Long-Lived SN 2005ip

    Science.gov (United States)

    Fox, Ori

    2016-10-01

    Type IIn supernovae (SNe IIn) are defined by their relatively narrow spectral line features associated with a dense circumstellar medium (CSM) formed by the progenitor star. The nature of the progenitor and mass loss remains relatively unknown. Shock interaction with the dense CSM can often result in significant UV emission for several years post-explosion, thereby probing the CSM characteristics, progenitor mass loss history and, ultimately, the progenitor itself. The Type IIn SN 2005ip proves to be one of the most interesting and well-studied targets within this subclass. Compared to all other supernovae, SN 2005ip is the most luminous for its age. Now more than 11 years post-explosion, the SN has released >10^51 erg throughout its lifetime as the forward shock continues to collide with a dense CSM. Here we propose HST/STIS-MAMA UV observations of SN 2005ip to investigate the massive CSM. When accounting for the shock travel time, these observations will probe material lost from the progenitor more than 1000 years prior to the explosion. We already have a single HST/STIS spectrum of SN 2005ip from 2014, which was obtained while the shock was still within a higher mass regime. With just 5 orbits, a second spectrum will allow us to directly trace the evolution of the CSM and produce new constraints on the pre-SN mass-loss history. Coinciding with Cycle 24's UV Initiative, this program offers new insight regarding both the progenitor and explosion characteristics of the SN IIn subclass.

  10. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  11. Objective assessment of IP video calls with Asterisk

    OpenAIRE

    Kapičák, Lukáš; Nevlud, Pavel; Mikulec, Martin; Zdrálek, Jaroslav

    2012-01-01

    The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video re...

  12. IP-Based TV Technologies, Services and Multidisciplinary Applications

    OpenAIRE

    Bonastre, O.M.; Montpetit, M.J.; Cesar Garcia, Pablo Santiago

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its disruptive role as television is now associated with both a personal and social experience using an ecosystem of devices. The unidirectional flow of content from an operator to a device has thus morphed ...

  13. Automated allocation and configuration of dual stack IP networks

    OpenAIRE

    Daniels, Wilfried; Vanbrabant, Bart; Hughes, Danny; Joosen, Wouter

    2013-01-01

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an automatic configuration tool for dual stack IP networks that addresses these issues by using high level abstractions to model the netwo...

  14. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  15. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  16. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  17. In-Pile Section(IPS) Inner Assembly Manufacturing Report

    International Nuclear Information System (INIS)

    Lee, Jong Min; Shim, Bong Sik; Lee, Chung Yong

    2009-12-01

    The objective of this report is to present the manufacturing, assembling and testing process of IPS Inner Assembly used in Fuel Test Loop(FTL) pre-operation test. The majority of the manufactured components are test fuels, inner assembly structures and subsidiary tools that is needed during the assembly process. In addition, Mock-up test for the welding and brazing is included at this stage. Lower structure, such as test fuels, fuel carrier legs are assembled and following structures, such as fuel carrier stem in the middle structure, top flange in the top structure are assembled together each other. To Verify the Reactor Coolant Pressure Boundary(RCPB) function in IPS Inner Assembly helium leak test and hydraulic test is performed with its acceptance criteria. According to the ASME III code Authorized Nuclear Inspector(ANI) is required during the hydraulic test. As-built measurement and insulation resistance test are performed to the structures and instrumentations after the test process. All requirements are satisfied and the IPS Inner Assembly was loaded in HANARO IR-1 hole in September 25, 2009

  18. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  19. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  20. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun; Li, Yue; Peng, Chengbin; Zhang, Zhaolei

    2014-01-01

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene

  1. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned...- 2235075, or email [email protected] . SUPPLEMENTARY INFORMATION: This document announces that, on...

  2. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  3. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  4. International Decommissioning Symposium 2000 (IDS 2000). Final Report

    International Nuclear Information System (INIS)

    Ebadian, M.A.

    2001-01-01

    The purpose of IDS 2000 was to deliver a world-class conference on applicable global environmental issues. The objective of this conference was to publicize environmental progress of individual countries, to provide a forum for technology developer and problem-holder interaction, to facilitate environmental and technology discussions between the commercial and financial communities, and to accommodate information and education exchange between governments, industries, universities, and scientists. The scope of this project included the planning and execution of an international conference on the decommissioning of nuclear facilities, and the providing of a business forum for vendors and participants sufficient to attract service providers, technology developers, and the business and financial communities. These groups, when working together with attendees from regulatory organizations and government decision-maker groups, provide an opportunity to more effectively and efficiently expedite the decommissioning projects

  5. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  6. Underground Storage Tank Integrated Demonstration (UST-ID)

    International Nuclear Information System (INIS)

    1994-02-01

    The DOE complex currently has 332 underground storage tanks (USTs) that have been used to process and store radioactive and chemical mixed waste generated from weapon materials production. Very little of the over 100 million gallons of high-level and low-level radioactive liquid waste has been treated and disposed of in final form. Two waste storage tank design types are prevalent across the DOE complex: single-shell wall and double-shell wall designs. They are made of stainless steel, concrete, and concrete with carbon steel liners, and their capacities vary from 5000 gallons (19 m 3 ) to 10 6 gallons (3785 m 3 ). The tanks have an overburden layer of soil ranging from a few feet to tens of feet. Responding to the need for remediation of tank waste, driven by Federal Facility Compliance Agreements (FFCAs) at all participating sites, the Underground Storage Tank Integrated Demonstration (UST-ID) Program was created by the US DOE Office of Technology Development in February 1991. Its mission is to focus the development, testing, and evaluation of remediation technologies within a system architecture to characterize, retrieve, treat to concentrate, and dispose of radioactive waste stored in USTs at DOE facilities. The ultimate goal is to provide safe and cost-effective solutions that are acceptable to the public and the regulators. The UST-ID has focused on five DOE locations: the Hanford Site, which is the host site, in Richland, Washington; the Fernald Site in Fernald, Ohio; the Idaho National Engineering Laboratory near Idaho Falls, Idaho; the Oak Ridge Reservation in Oak Ridge, Tennessee, and the Savannah River Site in Savannah River, South Carolina

  7. Automatic ID heat load generation in ANSYS code

    International Nuclear Information System (INIS)

    Wang, Zhibi.

    1992-01-01

    Detailed power density profiles are critical in the execution of a thermal analysis using a finite element (FE) code such as ANSYS. Unfortunately, as yet there is no easy way to directly input the precise power profiles into ANSYS. A straight-forward way to do this is to hand-calculate the power of each node or element and then type the data into the code. Every time a change is made to the FE model, the data must be recalculated and reentered. One way to solve this problem is to generate a set of discrete data, using another code such as PHOTON2, and curve-fit the data. Using curve-fitted formulae has several disadvantages. It is time consuming because of the need to run a second code for generation of the data, curve-fitting, and doing the data check, etc. Additionally, because there is no generality for different beamlines or different parameters, the above work must be repeated for each case. And, errors in the power profiles due to curve-fitting result in errors in the analysis. To solve the problem once and for all and with the capability to apply to any insertion device (ID), a program for ED power profile was written in ANSYS Parametric Design Language (APDL). This program is implemented as an ANSYS command with input parameters of peak magnetic field, deflection parameter, length of ID, and distance from the source. Once the command is issued, all the heat load will be automatically generated by the code

  8. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    International Nuclear Information System (INIS)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F.

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32 P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen

  9. GMI-IPS: Python Processing Software for Aircraft Campaigns

    Science.gov (United States)

    Damon, M. R.; Strode, S. A.; Steenrod, S. D.; Prather, M. J.

    2018-01-01

    NASA's Atmospheric Tomography Mission (ATom) seeks to understand the impact of anthropogenic air pollution on gases in the Earth's atmosphere. Four flight campaigns are being deployed on a seasonal basis to establish a continuous global-scale data set intended to improve the representation of chemically reactive gases in global atmospheric chemistry models. The Global Modeling Initiative (GMI), is creating chemical transport simulations on a global scale for each of the ATom flight campaigns. To meet the computational demands required to translate the GMI simulation data to grids associated with the flights from the ATom campaigns, the GMI ICARTT Processing Software (GMI-IPS) has been developed and is providing key functionality for data processing and analysis in this ongoing effort. The GMI-IPS is written in Python and provides computational kernels for data interpolation and visualization tasks on GMI simulation data. A key feature of the GMI-IPS, is its ability to read ICARTT files, a text-based file format for airborne instrument data, and extract the required flight information that defines regional and temporal grid parameters associated with an ATom flight. Perhaps most importantly, the GMI-IPS creates ICARTT files containing GMI simulated data, which are used in collaboration with ATom instrument teams and other modeling groups. The initial main task of the GMI-IPS is to interpolate GMI model data to the finer temporal resolution (1-10 seconds) of a given flight. The model data includes basic fields such as temperature and pressure, but the main focus of this effort is to provide species concentrations of chemical gases for ATom flights. The software, which uses parallel computation techniques for data intensive tasks, linearly interpolates each of the model fields to the time resolution of the flight. The temporally interpolated data is then saved to disk, and is used to create additional derived quantities. In order to translate the GMI model data to the

  10. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  11. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... including notification in the Federal Register. (2) VRS and IP Relay provider. Any entity desiring to...

  12. Inhibitor of differentiation 4 (Id4) is a potential tumor suppressor in prostate cancer

    International Nuclear Information System (INIS)

    Carey, Jason PW; Asirvatham, Ananthi J; Galm, Oliver; Ghogomu, Tandeih A; Chaudhary, Jaideep

    2009-01-01

    Inhibitor of differentiation 4 (Id4), a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH) transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP) analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS), expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR), p21, p27 and p53 expression in DU145 cells. The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously silenced tumor suppressors

  13. Inhibitor of differentiation 4 (Id4 is a potential tumor suppressor in prostate cancer

    Directory of Open Access Journals (Sweden)

    Carey Jason PW

    2009-06-01

    Full Text Available Abstract Background Inhibitor of differentiation 4 (Id4, a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Methods Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS, expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Results Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR, p21, p27 and p53 expression in DU145 cells. Conclusion The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously

  14. Psychometrics and latent structure of the IDS and QIDS with young adult students.

    Science.gov (United States)

    González, David Andrés; Boals, Adriel; Jenkins, Sharon Rae; Schuler, Eric R; Taylor, Daniel

    2013-07-01

    Students and young adults have high rates of suicide and depression, thus are a population of interest. To date, there is no normative psychometric information on the IDS and QIDS in these populations. Furthermore, there is equivocal evidence on the factor structure and subscales of the IDS. Two samples of young adult students (ns=475 and 1681) were given multiple measures to test the psychometrics and dimensionality of the IDS and QIDS. The IDS, its subscales, and QIDS had acceptable internal consistencies (αs=.79-90) and favorable convergent and divergent validity correlations. A three-factor structure and two Rasch-derived subscales best fit the IDS. The samples were collected from one university, which may influence generalizability. The IDS and QIDS are desirable measures of depressive symptoms when studying young adult students. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Id2 reinforces TH1 differentiation and inhibits E2A to repress TFH differentiation.

    Science.gov (United States)

    Shaw, Laura A; Bélanger, Simon; Omilusik, Kyla D; Cho, Sunglim; Scott-Browne, James P; Nance, J Philip; Goulding, John; Lasorella, Anna; Lu, Li-Fan; Crotty, Shane; Goldrath, Ananda W

    2016-07-01

    The differentiation of helper T cells into effector subsets is critical to host protection. Transcription factors of the E-protein and Id families are important arbiters of T cell development, but their role in the differentiation of the TH1 and TFH subsets of helper T cells is not well understood. Here, TH1 cells showed more robust Id2 expression than that of TFH cells, and depletion of Id2 via RNA-mediated interference increased the frequency of TFH cells. Furthermore, TH1 differentiation was blocked by Id2 deficiency, which led to E-protein-dependent accumulation of effector cells with mixed characteristics during viral infection and severely impaired the generation of TH1 cells following infection with Toxoplasma gondii. The TFH cell-defining transcriptional repressor Bcl6 bound the Id2 locus, which provides a mechanism for the bimodal Id2 expression and reciprocal development of TH1 cells and TFH cells.

  16. The Implementation of C-ID, R2D2 Model on Learning Reading Comprehension

    Science.gov (United States)

    Rayanto, Yudi Hari; Rusmawan, Putu Ngurah

    2016-01-01

    The purposes of this research are to find out, (1) whether C-ID, R2D2 model is effective to be implemented on learning Reading comprehension, (2) college students' activity during the implementation of C-ID, R2D2 model on learning Reading comprehension, and 3) college students' learning achievement during the implementation of C-ID, R2D2 model on…

  17. Regulation of Id2 expression in EL4 T lymphoma cells overexpressing growth hormone.

    Science.gov (United States)

    Weigent, Douglas A

    2009-01-01

    In previous studies, we have shown that overexpression of growth hormone (GH) in cells of the immune system upregulates proteins involved in cell growth and protects from apoptosis. Here, we report that overexpression of GH in EL4 T lymphoma cells (GHo) also significantly increased levels of the inhibitor of differentiation-2 (Id2). The increase in Id2 was suggested in both Id2 promoter luciferase assays and by Western analysis for Id2 protein. To identify the regulatory elements that mediate transcriptional activation by GH in the Id2 promoter, promoter deletion analysis was performed. Deletion analysis revealed that transactivation involved a 301-132bp region upstream to the Id2 transcriptional start site. The pattern in the human GHo Jurkat T lymphoma cell line paralleled that found in the mouse GHo EL4 T lymphoma cell line. Significantly less Id2 was detected in the nucleus of GHo EL4 T lymphoma cells compared to vector alone controls. Although serum increased the levels of Id2 in control vector alone cells, no difference was found in the total levels of Id2 in GHo EL4 T lymphoma cells treated with or without serum. The increase in Id2 expression in GHo EL4 T lymphoma cells measured by Id2 promoter luciferase expression and Western blot analysis was blocked by the overexpression of a dominant-negative mutant of STAT5. The results suggest that in EL4 T lymphoma cells overexpressing GH, there is an upregulation of Id2 protein that appears to involve STAT protein activity.

  18. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  19. IP-10 can be measured in dried plasma spots in patients with chronic hepatitis C infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Andersen, Ellen Sloth; Christensen, Peer Brehm

    2012-01-01

    The chemokine IP-10 (CXCL10) is a candidate marker for hepatitis C virus (HCV) fibrosis monitoring. The aim of this proof-of-concept study is to assess if IP-10 measurements from dried plasma spots (DPS) are accurate in HCV-infected patients with either minimal or significant fibrosis. We measured...... IP-10 levels in plasma and DPS of 21 HCV-infected patients with cirrhosis and 19 patients with no/little fibrosis (determined with FibroScan). Cirrhotic patients had significantly higher levels of IP-10 compared to patients with minimal fibrosis. DPS and plasma measurements of IP-10 are comparable...

  20. ChIP-PIT: Enhancing the Analysis of ChIP-Seq Data Using Convex-Relaxed Pair-Wise Interaction Tensor Decomposition.

    Science.gov (United States)

    Zhu, Lin; Guo, Wei-Li; Deng, Su-Ping; Huang, De-Shuang

    2016-01-01

    In recent years, thanks to the efforts of individual scientists and research consortiums, a huge amount of chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) experimental data have been accumulated. Instead of investigating them independently, several recent studies have convincingly demonstrated that a wealth of scientific insights can be gained by integrative analysis of these ChIP-seq data. However, when used for the purpose of integrative analysis, a serious drawback of current ChIP-seq technique is that it is still expensive and time-consuming to generate ChIP-seq datasets of high standard. Most researchers are therefore unable to obtain complete ChIP-seq data for several TFs in a wide variety of cell lines, which considerably limits the understanding of transcriptional regulation pattern. In this paper, we propose a novel method called ChIP-PIT to overcome the aforementioned limitation. In ChIP-PIT, ChIP-seq data corresponding to a diverse collection of cell types, TFs and genes are fused together using the three-mode pair-wise interaction tensor (PIT) model, and the prediction of unperformed ChIP-seq experimental results is formulated as a tensor completion problem. Computationally, we propose efficient first-order method based on extensions of coordinate descent method to learn the optimal solution of ChIP-PIT, which makes it particularly suitable for the analysis of massive scale ChIP-seq data. Experimental evaluation the ENCODE data illustrate the usefulness of the proposed model.

  1. ID-pilet teeb Tallinnas võidukäiku / Anneli Lepp

    Index Scriptorium Estoniae

    Lepp, Anneli

    2006-01-01

    Vt. ka Postimees : na russkom jazõke 12. jaan. lk 3. Tallinna transpordiameti peaökonomisti Mart Moosuse sõnul moodustas ID-pilet 60,7% ühistranspordi piletituludest, Tartus oli vastav näitaja aga alla 1%. Tartut teenindava bussifirma AS Connex Eesti finantsjuht Tiina Telling peab suure erinevuse põhjuseks asjaolu, et Tallinnas on ID-pilet paberpiletist 40-88% soodsam, Tartus hinnavahe aga puudub või on lausa negatiivne ID-pileti kahjuks. Lisa: ID-pilet

  2. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  3. Achieving Payoffs from an Industry Cloud Ecosystem at BankID

    DEFF Research Database (Denmark)

    Eaton, Ben; Hallingby, Hanne Kristine; Nesse, Per-Jonny

    2014-01-01

    BankID is an industry cloud owned by Norwegian banks. It provides electronic identity, authentication and electronic signing capabilities for banking, merchant and government services. More than 60% of the population uses BankID services. As the broader ecosystem around BankID evolved, challenges......—arising from tensions between different parts of the ecosystem—had to be resolved. The four lessons learned from the BankID case will help others to build an industry cloud and establish a healthy ecosystem to service a broad user base....

  4. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  5. Id-1 is not expressed in the luminal epithelial cells of mammary glands

    International Nuclear Information System (INIS)

    Uehara, Norihisa; Chou, Yu-Chien; Galvez, Jose J; Candia, Paola de; Cardiff, Robert D; Benezra, Robert; Shyamala, Gopalan

    2003-01-01

    The family of inhibitor of differentiation/DNA binding (Id) proteins is known to regulate development in several tissues. One member of this gene family, Id-1, has been implicated in mammary development and carcinogenesis. Mammary glands contain various cell types, among which the luminal epithelial cells are primarily targeted for proliferation, differentiation and carcinogenesis. Therefore, to assess the precise significance of Id-1 in mammary biology and carcinogenesis, we examined its cellular localization in vivo using immunohistochemistry. Extracts of whole mammary glands from wild type and Id-1 null mutant mice, and tissue sections from paraffin-embedded mouse mammary glands from various developmental stages and normal human breast were subjected to immunoblot and immunohistochemical analyses, respectively. In both these procedures, an anti-Id-1 rabbit polyclonal antibody was used for detection of Id-1. In immunoblot analyses, using whole mammary gland extracts, Id-1 was detected. In immunohistochemical analyses, however, Id-1 was not detected in the luminal epithelial cells of mammary glands during any stage of development, but it was detected in vascular endothelial cells. Id-1 is not expressed in the luminal epithelial cells of mammary glands

  6. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  7. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  8. Maqueta VoIP con media gateway controllers

    OpenAIRE

    Goicoechea Bozal, Ignacio Javier

    2010-01-01

    El presente proyecto fin de carrera tiene como objeto estudiar y comprobar el funcionamiento de un protocolo VoIP basado en una arquitectura softswitch. La tecnología softswitch nace con el fin de facilitar la interconexión entre la red telefónica pública conmutada y redes basadas en paquetes. Por esta razón, las grandes compañías telefónicas son las principales usuarias de este tipo de arquitectura. Se han evaluado 3 posibles protocolos para controlar la maqueta que se desea diseñar: SGC...

  9. The MIM web gateway to IP multicast e-meetings

    Science.gov (United States)

    Parviainen, Roland; Parnes, Peter

    2003-12-01

    As video conferencing and e-meeting systems are used more and more on the Internet and in businesses it becomes increasingly important to be able to participate from any computer at any location. Often this is impossible, since these systems requires often special software that are not available everywhere or impossible to install for administrative reasons. Many locations also lack the necessary network infrastructure such as IP multicast. This paper presents a WWW gateway system that enables users to participate using only a standard web browser. The design and architecture of the system are described and performance tests that show the scalability of the system are also presented.

  10. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  11. Generating unique IDs from patient identification data using security models

    Directory of Open Access Journals (Sweden)

    Emad A Mohammed

    2016-01-01

    Full Text Available Background: The use of electronic health records (EHRs has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5 and secure hashing algorithm (SHA as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  12. An IDS Alerts Aggregation Algorithm Based on Rough Set Theory

    Science.gov (United States)

    Zhang, Ru; Guo, Tao; Liu, Jianyi

    2018-03-01

    Within a system in which has been deployed several IDS, a great number of alerts can be triggered by a single security event, making real alerts harder to be found. To deal with redundant alerts, we propose a scheme based on rough set theory. In combination with basic concepts in rough set theory, the importance of attributes in alerts was calculated firstly. With the result of attributes importance, we could compute the similarity of two alerts, which will be compared with a pre-defined threshold to determine whether these two alerts can be aggregated or not. Also, time interval should be taken into consideration. Allowed time interval for different types of alerts is computed individually, since different types of alerts may have different time gap between two alerts. In the end of this paper, we apply proposed scheme on DAPRA98 dataset and the results of experiment show that our scheme can efficiently reduce the redundancy of alerts so that administrators of security system could avoid wasting time on useless alerts.

  13. Generating unique IDs from patient identification data using security models.

    Science.gov (United States)

    Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T

    2016-01-01

    The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  14. Molecular characterization of lactobacilli isolated from fermented idli batter

    Directory of Open Access Journals (Sweden)

    Perumal Jayaprabha Agaliya

    2013-12-01

    Full Text Available Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  15. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  16. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  17. Improvement of the ID model for quantitative network data

    DEFF Research Database (Denmark)

    Sørensen, Peter Borgen; Damgaard, Christian Frølund; Dupont, Yoko Luise

    2015-01-01

    Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks. Such artefa......Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks......)1. This presentation will illustrate the application of the ID method based on a data set which consists of counts of visits by 152 pollinator species to 16 plant species. The method is based on two definitions of the underlying probabilities for each combination of pollinator and plant species: (1), pi...... reproduce the high number of zero valued cells in the data set and mimic the sampling distribution. 1 Sørensen et al, Journal of Pollination Ecology, 6(18), 2011, pp129-139...

  18. Update History of This Database - ChIP-Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available search(/contents-en/) != -1 || url.search(/index-e.html/) != -1 ) { document.getElementById(lang).innerHTML=.../) != -1 ) { url = url.replace(-e.html,.html); document.getElementById(lang).innerHTML=[ Japanese |...en/,/jp/); document.getElementById(lang).innerHTML=[ Japanese | English ]; } else if ( url.search(//contents...//) != -1 ) { url = url.replace(/contents/,/contents-en/); document.getElementById(lang).innerHTML=[ Japanes...e(/contents-en/,/contents/); document.getElementById(lang).innerHTML=[ Japanese | English ]; } else if( url.

  19. Fish the ChIPs: a pipeline for automated genomic annotation of ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Minucci Saverio

    2011-10-01

    Full Text Available Abstract Background High-throughput sequencing is generating massive amounts of data at a pace that largely exceeds the throughput of data analysis routines. Here we introduce Fish the ChIPs (FC, a computational pipeline aimed at a broad public of users and designed to perform complete ChIP-Seq data analysis of an unlimited number of samples, thus increasing throughput, reproducibility and saving time. Results Starting from short read sequences, FC performs the following steps: 1 quality controls, 2 alignment to a reference genome, 3 peak calling, 4 genomic annotation, 5 generation of raw signal tracks for visualization on the UCSC and IGV genome browsers. FC exploits some of the fastest and most effective tools today available. Installation on a Mac platform requires very basic computational skills while configuration and usage are supported by a user-friendly graphic user interface. Alternatively, FC can be compiled from the source code on any Unix machine and then run with the possibility of customizing each single parameter through a simple configuration text file that can be generated using a dedicated user-friendly web-form. Considering the execution time, FC can be run on a desktop machine, even though the use of a computer cluster is recommended for analyses of large batches of data. FC is perfectly suited to work with data coming from Illumina Solexa Genome Analyzers or ABI SOLiD and its usage can potentially be extended to any sequencing platform. Conclusions Compared to existing tools, FC has two main advantages that make it suitable for a broad range of users. First of all, it can be installed and run by wet biologists on a Mac machine. Besides it can handle an unlimited number of samples, being convenient for large analyses. In this context, computational biologists can increase reproducibility of their ChIP-Seq data analyses while saving time for downstream analyses. Reviewers This article was reviewed by Gavin Huttley, George

  20. Enhanced service zone architecture for multiservices over IP

    Science.gov (United States)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  1. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  2. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  3. An Early Fire Detection Algorithm Using IP Cameras

    Directory of Open Access Journals (Sweden)

    Hector Perez-Meana

    2012-05-01

    Full Text Available The presence of smoke is the first symptom of fire; therefore to achieve early fire detection, accurate and quick estimation of the presence of smoke is very important. In this paper we propose an algorithm to detect the presence of smoke using video sequences captured by Internet Protocol (IP cameras, in which important features of smoke, such as color, motion and growth properties are employed. For an efficient smoke detection in the IP camera platform, a detection algorithm must operate directly in the Discrete Cosine Transform (DCT domain to reduce computational cost, avoiding a complete decoding process required for algorithms that operate in spatial domain. In the proposed algorithm the DCT Inter-transformation technique is used to increase the detection accuracy without inverse DCT operation. In the proposed scheme, firstly the candidate smoke regions are estimated using motion and color smoke properties; next using morphological operations the noise is reduced. Finally the growth properties of the candidate smoke regions are furthermore analyzed through time using the connected component labeling technique. Evaluation results show that a feasible smoke detection method with false negative and false positive error rates approximately equal to 4% and 2%, respectively, is obtained.

  4. Software-Defined Congestion Control Algorithm for IP Networks

    Directory of Open Access Journals (Sweden)

    Yao Hu

    2017-01-01

    Full Text Available The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.

  5. Performance Evaluation of IP Based Multimedia Services in UMTS

    Directory of Open Access Journals (Sweden)

    Riri Fitri SARI

    2008-01-01

    Full Text Available This paper presents our work in the performance evaluation of UMTS network based on simulation. Enhanced UMTS Radio Access Network Extensions for NS-2 (EURANE developed by SEACORN has brought us to the higher phase of UMTS simulation in third generation wireless telecommunication system. Wireless 3G is designed to be able to deliver various kind of multimedia package through an IP network for the purpose of easier interconnection with fixed network with various existing multimedia services. Multimedia services with their bandwidth consumption characteristics are able to be sent through a UMTS network with the existence of High Speed Data Packet Access (HSPDA in Release 5. Quality of Service (QoS is a major concern in multimedia services. This paper shows the performance analysis of a number of multimedia services and their QoS using HSDPA in UMTS. The experiments were based on EURANE extension for NS-2. From the simulation conducted, we found that Unacknowledged Mode (UM in Radio Link Control (RLC will perform better for QoS class number 1 (VoIP and 2 (Video Streaming, while Acknowledged Mode (AM mode are more suitable for QoS class number 3 (web server and 4 (FTP.

  6. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    Science.gov (United States)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated

  7. Security and Privacy Improvements for the Belgian eID Technology

    Science.gov (United States)

    Verhaeghe, Pieter; Lapon, Jorn; de Decker, Bart; Naessens, Vincent; Verslype, Kristof

    The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.

  8. Causes of Mortality in Older People with Intellectual Disability: Results from the HA-ID Study

    Science.gov (United States)

    Oppewal, Alyt; Schoufour, Josje D.; van der Maarl, Hanne J. K.; Evenhuis, Heleen M.; Hilgenkamp, Thessa I. M.; Festen, Dederieke A.

    2018-01-01

    We aim to provide insight into the cause-specific mortality of older adults with intellectual disability (ID), with and without Down syndrome (DS), and compare this to the general population. Immediate and primary cause of death were collected through medical files of 1,050 older adults with ID, 5 years after the start of the Healthy Ageing and…

  9. Extending the Intermediate Data Structure (IDS for longitudinal historical databases to include geographic data

    Directory of Open Access Journals (Sweden)

    Finn Hedefalk

    2014-09-01

    Full Text Available The Intermediate Data Structure (IDS is a standardised database structure for longitudinal historical databases. Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. The geographic data that will be stored in IDS-Geo are primarily buildings and/or property units, and the purpose of these geographic data is mainly to link individuals to places in space. When we want to assign such detailed spatial locations to individuals (in times before there were any detailed house addresses available, we often have to create tailored geographic datasets. In those cases, there are benefits of storing geographic data in the same structure as the demographic data. Moreover, we propose the export of data from IDS-Geo using an eXtensible Markup Language (XML Schema. IDS-Geo is implemented in a case study using historical property units, for the period 1804 to 1913, stored in a geographically extended version of the Scanian Economic Demographic Database (SEDD. To fit into the IDS-Geo data structure, we included an object lifeline representation of all of the property units (based on the snapshot time representation of single historical maps and poll-tax registers. The case study verifies that the IDS-Geo model is capable of handling geographic data that can be linked to demographic data.

  10. Demonstrating idAnimate : a multi-touch system for sketching and rapidly manipulating animations

    NARCIS (Netherlands)

    Quevedo Fernandez, Javier; Martens, J.B.O.S.

    2012-01-01

    This demonstration presents idAnimate, a multi-touch application for sketching animations. Thanks to the affordances provided by multitouch interfaces, idAnimate yields a novel, intuitive and easy to use animation technique named transformation-by-example, that allows users to author animations in

  11. Cloning and shake flask expression of hrIDS- Like in Pichia pastoris ...

    African Journals Online (AJOL)

    The human Iduronate-2-sulfate sulfatase (hIDS-Like) was cloned into the methylotrophic yeast Pichia pastoris under the control of alcohol oxidase promoter (AOX1) and the -mating factor signal peptide (a-factor). Six clones were identified by PCR. Using clone IDS28, the enzyme was secreted into the culture medium, ...

  12. The Mathematica package TopoID and its application to the Higgs boson production cross section

    Energy Technology Data Exchange (ETDEWEB)

    Hoff, Jens

    2016-07-15

    We present the Mathematica package TopoID which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of TopoID are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  13. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  14. Supporting co-creation with software, the idSpace platform

    NARCIS (Netherlands)

    Van Rosmalen, Peter; Boon, Jo; Bitter-Rijpkema, Marlies; Sie, Rory; Sloep, Peter

    2014-01-01

    Innovation, in general, requires teamwork among specialist of different disciplines. The idSpace project developed ideas on how teams of collaborating innovators could best be supported. These ideas were embodied in a platform that the project developed. This idSpace platform allows its users to

  15. 76 FR 46721 - Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project...

    Science.gov (United States)

    2011-08-03

    ...-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project Environmental Impact... improve the health of the ecosystem and reach the desired future condition. DATES: Comments concerning the... Ecosystem Restoration Project EIS, P.O. Box 180, 11 Casey Rd., North Fork, ID 83466. Comments may also be...

  16. 78 FR 45478 - Proposed Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-07-29

    ...-0531; Airspace Docket No. 13-ANM-20] Proposed Establishment of Class E Airspace; Salmon, ID AGENCY... action proposes to establish Class E airspace at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules...

  17. Clarté des idées innées ?

    DEFF Research Database (Denmark)

    Schøsler, Jørn

    2013-01-01

    Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer.......Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer....

  18. Ubiquitin-SUMO Circuitry Controls Activated Fanconi Anemia ID Complex Dosage in Response to DNA Damage

    DEFF Research Database (Denmark)

    Gibbs-Seymour, Ian; Oka, Yasuyoshi; Rajendra, Eeson

    2015-01-01

    We show that central components of the Fanconi anemia (FA) DNA repair pathway, the tumor suppressor proteins FANCI and FANCD2 (the ID complex), are SUMOylated in response to replication fork stalling. The ID complex is SUMOylated in a manner that depends on the ATR kinase, the FA ubiquitin ligase...

  19. Muon Identification performance: hadron mis-Id measurements and RPC Muon selections

    CERN Document Server

    CMS Collaboration

    2014-01-01

    Pion, kaon, proton mis-identification probabilities as muons have been measured for different Muon ID algorithms. Results from two independent analyses are presented. The performance of a new muon ID algorithm based on matching of inner tracks with hits in muon RPC chambers is also presented.

  20. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  1. Overestimation of the 25(OH)D serum concentration with the automated IDS EIA kit.

    Science.gov (United States)

    Cavalier, Etienne; Huberty, Véronique; Cormier, Catherine; Souberbielle, Jean-Claude

    2011-02-01

    We have recently observed an increasing number of patients presenting very high serum levels of 25-hydroxyvitamin D [25(OH)D] (> 150 ng/mL), which, in all cases, had been measured with the IDS EIA kit adapted on different "open" automated platforms. We performed a comparison between the IDS EIA kit adapted on two different "open"automated platforms and the DiaSorin RIA. We found a systematic bias (higher levels with the IDS EIA kit) for concentrations more than 50-60 ng/mL that was less obvious when the IDS EIA was used in its manual procedure. We thus suggest to use the IDS EIA kit in its manual procedure rather than to adapt it on an automated platform, and to interpret cautiously a 25(OH)D greater than 100 ng/mL with this kit. Copyright © 2011 American Society for Bone and Mineral Research.

  2. REFORMASI PEMAHAMAN TEORI MAQᾹṢID SYARIAH Analisis Pendekatan Sistem Jasser Auda

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Fasa

    2016-12-01

    Full Text Available This paper attempts to offer reform ideas Jasser Auda thought related reforms theoretical understanding of maqᾱṣid sharia. The systems approach is done by Auda critize the theory of classical maqᾱṣid more likely to hierarchical and narrow mindset. The classical maqᾱṣid pressure a point more on protection and preservation. Whereas the new maqᾱṣid theory emphasizes development (construction, development and rights (rights. Thus, Auda developed the concept of human development as the main target of maslahah (public interest. Auda offers the systems approach, namely: cognitive nature; interrelated; wholeness; openness; multi dimentionality and purposefulness. At the end of the discussion in this paper, the authors develop the idea of Jasser Auda by offering Sharia Maqᾱṣid concept in the context of Islamic Economics

  3. Pengaruh Pembelajaran IPS Berbasis Proyek Terhadap Persepsi Konsumsi Berkarakter Mahasiswa S1 Pendidikan IPS Universitas Negeri Malang

    Directory of Open Access Journals (Sweden)

    Khofifatu Rohmah Adi

    2017-10-01

    Full Text Available This study aims to determine the effect of the project-based learning social studies consumer perceptions of student character. Consumer perception of the character of this research is focused on the consumption of environmentally sound because it was found that the students are less concerned about the environment, especially the cleanliness class. This type of research including quasi experimental, aimed at assessing the effect of an action learning on students' perceptions before and after treatment. Subjects were students of 2015 batch S1 IPS which follows the introductory economics course. The instrument used to measure the consumption of environmentally sound perception using a questionnaire with Likert scale. Based on the homogeneity test the cognitive abilities of students conclusion has a homogeneous character and definitive experimental group and the control is done randomly. This study analyzed SPSS 22.0 for Windows using independent sample T-test. Results of the analysis showed that there were significant differences between the control and experimental class class. Therefore, it can be concluded that the application of project-based learning IPS effect on consumer perceptions of character. In project-based learning allows students trying to construct their own knowledge and actively involved in seeking information so it is expected that students are able to connect theory gained with the existing reality in the environment. Keywords: Project Based Learning, Perception Character consumption   http://dx.doi.org/10.17977/um022v1i12016p065

  4. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS TERPADU BERBASIS OUTDOOR LEARNING

    Directory of Open Access Journals (Sweden)

    Nugraheni Rachmawati

    2013-03-01

    Full Text Available AbstrakPelaksanaan kegiatan pembelajaran tematik di SD kota Semarang belum optimal. Sebagian besar guru belum menyusun dan menggunakan perangkat pembelaja- ran IPS Terpadu berbasis outdoor learning. Tujuan penelitian ini mengembangkan, mengkaji keefektifan dan kepraktisan perangkat pembelajaran. Penelitian ini meru- pakan penelitian pengembangan yang dimodifikasi dari penelitian Borg and Gall. Subjek penelitian adalah siswa kelas 3 SD N Jatingaleh 01-02 Kota Semarang ta- hun pelajaran 2012/2013. Spesifikasi produk yang dikembangkan adalah perangkat pembelajaran IPS terpadu berbasis outdoor learning berupa silabus, RPP, media CD Interaktif, LKS dan alat evaluasi meliputi test kognitif, lembar observasi aktivi- tas serta angket respons siswa dan guru. Data dianalisis secara deskriptif dan Pretest- Posttest Control Group Design. Hasil penelitian menunjukkan bahwa pengembangan perangkat pembelajaran tergolong valid. Keefektifan perangkat dilihat dari aktivitas dan hasil belajar siswa. Aktivitas siswa tergolong sangat tinggi. Hasil belajar kog- nitif siswa setelah mengikuti pembelajaran IPS Terpadu berbasis Outdoor Learning mengalami peningkatan yang signifikan serta mencapai ketuntasan belajar. Rata- rata hasil belajar kognitif siswa secara signifikan lebih besar daripada kelompok siswa yang mengikuti pembelajaran in door. Saran, hendaknya dapat dikembangkan lagi keefektifanya sehingga dapat lebih menggali kemampuan siswa, tidak hanya dalam segi kognitif dan afektif tetapi juga psikomotor. AbstractImplementation of thematic learning activities in elementary school of Semarang is not opti- mal. Most of the teachers do not prepare and use integrated social science learning tools based on outdoor learning. This research is aimed to develop the tools and to review the effectiveness and practicality of integrated social science learning based on outdoor learning. This is a research and development study modified from the research developed by Borg and

  5. PERSONAL BRANDING PRABOWO SUBIANTO (ANALISIS ISI KUANTITATIF PERSONAL BRANDING PRABOWO SUBIANTO DI SITUS BERITA ONLINE REPUBLIKA.CO.ID DAN TEMPO.CO.ID TANGGAL 9 JUNI - 9 JULI 2014

    Directory of Open Access Journals (Sweden)

    Hendro Agus Prakoso

    2016-09-01

    berita kedua media tersebut. Frekuensi berita berjumlah 107 di Republika.co.id dan 51 berita di Tempo.co.id Ragam berita Republika.co.id didominasi konsep Spesialisasi sebesar 22,4% dari 107 berita, sedangkan pada Tempo.co.id didominasi konsep Nama baik sebesar 23,5% dari 51 berita. Sumber berita pada Republika.co.id mayoritas berasal dari Liputan langsung sebesar 42,9% dari 107 berita sedangkan pada Tempo.co.id mayoritas berasal dari Intelektual sebesar 54,9% dari 51 berita.

  6. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2) Gene of Drosophila and Interacts with IP3R to Affect Wing Development.

    Science.gov (United States)

    Dean, Derek M; Maroja, Luana S; Cottrill, Sarah; Bomkamp, Brent E; Westervelt, Kathleen A; Deitcher, David L

    2015-11-27

    Inositol 1,4,5-trisphosphate (IP3) regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs) bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy), a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2), a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80(ts) indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling. Copyright © 2016 Dean et al.

  7. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2 Gene of Drosophila and Interacts with IP3R to Affect Wing Development

    Directory of Open Access Journals (Sweden)

    Derek M. Dean

    2016-02-01

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy, a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2, a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80ts indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling.

  8. Numerical study of IP3-induced Ca2+ spiral pattern evolution

    International Nuclear Information System (INIS)

    Tang Jun; Ma Jun; Yi Ming; Jia Ya

    2008-01-01

    The effect of change in concentration of messenger molecule inositol 1,4,5-trisphosphate (IP 3 ) on intracellular Ca 2+ spiral pattern evolution is studied numerically. The results indicate that when the IP 3 concentration decreases from 0.27 μM, a physiologically reasonable value, to different values, the spiral centre drifts to the edge of the medium and disappears for a small enough IP 3 concentration. The instability of spiral pattern can be understood in terms of excitability-change controlled by the IP 3 concentration. On the other hand, when the IP 3 concentration increases from 0.27 μM, a homogeneous area with a high Ca 2+ concentration emerges and competes with the spiral pattern. A high enough IP 3 concentration can lead the homogeneous area to occupy the whole medium. The instability of spiral pattern is ascribed to the change in stability of a stationary state with a high Ca 2+ concentration. (general)

  9. Study of transmitting electric power utility communications in IP network. Transmission of existing electric power utility communications in best effort type IP network under delay constraint; Denryokuyo tsushin kaisen no IP mo eno shuyo kento. Chien jikan seiyakuka ni okeru best effort gata IP mo eno kison denryokuyo tsushin kaisen no shuyo

    Energy Technology Data Exchange (ETDEWEB)

    Miyake, H.

    2000-07-01

    Since IP network does best effort behavior fundamentally, it always generates delay time and delay variation. For this reason, IP network has been unsuitable to transmit real time data such as a voice. However, in recent years, the technologies which transmit real time data in IP network, e.g. VoIP, have spread. If it is possible to transmit the existing electric power utility communications in IP network using these technologies, total network cost can be reduced by the reduction of required bandwidth and the simplification of communication network systems. In this report, it is examined quantitatively whether end-end delay time of the existing electric power utility communications, e.g. on-line, telephone, carrier relay, CDT (cyclic digital transmission equipment), video conference, ITV(industrial television), is within their permission delay time when they are transmitted in the best effort type IP network. (author)

  10. Optimal design of an IP/MPLS over DWDM network

    Directory of Open Access Journals (Sweden)

    Eduardo Canale

    2014-04-01

    Full Text Available Different approaches for deploying resilient optical networks of low cost constitute a traditional group of NP-Hard problems that have been widely studied. Most of them are based on the construction of low cost networks that fulfill connectivity constraints. However, recent trends to virtualize optical networks over the legacy fiber infrastructure, modified the nature of network design problems and turned inappropriate many of these models and algorithms. In this paper we study a design problem arising from the deployment of an IP/MPLS network over an existing DWDM infrastructure. Besides cost and resiliency, this problem integrates traffic and capacity constraints. We present: an integer programming formulation for the problem, theoretical results, and describe how several metaheuristics were applied in order to find good quality solutions, for a real application case of a telecommunications company.

  11. Research on an IP disaster recovery storage system

    Science.gov (United States)

    Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng

    2008-12-01

    According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.

  12. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP)

    International Nuclear Information System (INIS)

    1994-04-01

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors

  13. IPS Empress crown system: three-year clinical trial results.

    Science.gov (United States)

    Sorensen, J A; Choi, C; Fanuscu, M I; Mito, W T

    1998-02-01

    The IPS Empress system is a highly esthetic hot pressed glass ceramic material for fabrication of single crowns. Adhesive cementation of the system not only contributes to the esthetics but is necessary for increased strength of the crown. The purpose of this prospective clinical trials was to evaluate the longevity of 75 adhesively cemented Empress full crowns. An additional aim was to assess the adhesive cementation methodology and potential side effects. At the three-year point, one molar crown fractured for a 1.3 percent failure rate. The resin cementation technique that was employed exhibited a low incidence of microleakage with few clinical side effects. There was a 5.6 percent incidence of post-cementation sensitivity, with all symptoms subsiding by eight weeks. None of the crowns in the study required endodontic therapy.

  14. ChIP-seq Identification of Weakly Conserved Heart Enhancers

    Energy Technology Data Exchange (ETDEWEB)

    Blow, Matthew J.; McCulley, David J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Bristow, James; Ren, Bing; Black, Brian L.; Rubin, Edward M.; Visel, Axel; Pennacchio, Len A.

    2010-07-01

    Accurate control of tissue-specific gene expression plays a pivotal role in heart development, but few cardiac transcriptional enhancers have thus far been identified. Extreme non-coding sequence conservation successfully predicts enhancers active in many tissues, but fails to identify substantial numbers of heart enhancers. Here we used ChIP-seq with the enhancer-associated protein p300 from mouse embryonic day 11.5 heart tissue to identify over three thousand candidate heart enhancers genome-wide. Compared to other tissues studied at this time-point, most candidate heart enhancers are less deeply conserved in vertebrate evolution. Nevertheless, the testing of 130 candidate regions in a transgenic mouse assay revealed that most of them reproducibly function as enhancers active in the heart, irrespective of their degree of evolutionary constraint. These results provide evidence for a large population of poorly conserved heart enhancers and suggest that the evolutionary constraint of embryonic enhancers can vary depending on tissue type.

  15. Spectroscopy of the red star in IP Peg

    International Nuclear Information System (INIS)

    Martin, J.S.; Jones, D.H.P.; Friend, M.T.; Smith, R.C.

    1989-01-01

    CCD spectroscopy of the cataclysmic variable IP Pegasi during decline from outburst shows narrow chromospheric emission lines from the irradiated face of the red star. The He I (7065 A) emission line is used to produce a partial radial velocity curve, with K He =293.2±3.3 km s -1 . A reanalysis of previous Na I doublet (8190 A) absorption line data produces a considerably larger semi-amplitude, K abs , than previously published. However, this is larger than the true semi-amplitude, K 2 , because irradiation from the disc ionizes the NaI on the inner face of the red star and decreases the strength of the NaI doublet on that face. A computer simulation of the secondary radial velocity curve, including this ionization effect, is used to estimate the true semi-amplitude of the secondary motion. This gives K 2 =298±8 km s -1 . (author)

  16. Comparison of H.323 and SIP for IP telephony signaling

    Science.gov (United States)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  17. Linking international trademark databases to inform IP research and policy

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, P.

    2016-07-01

    Researchers and policy makers are concerned with many international issues regarding trademarks, such as trademark squatting, cluttering, and dilution. Trademark application data can provide an evidence base to inform government policy regarding these issues, and can also produce quantitative insights into economic trends and brand dynamics. Currently, national trademark databases can provide insight into economic and brand dynamics at the national level, but gaining such insight at an international level is more difficult due to a lack of internationally linked trademark data. We are in the process of building a harmonised international trademark database (the “Patstat of trademarks”), in which equivalent trademarks have been identified across national offices. We have developed a pilot database that incorporates 6.4 million U.S., 1.3 million Australian, and 0.5 million New Zealand trademark applications, spanning over 100 years. The database will be extended to incorporate trademark data from other participating intellectual property (IP) offices as they join the project. Confirmed partners include the United Kingdom, WIPO, and OHIM. We will continue to expand the scope of the project, and intend to include many more IP offices from around the world. In addition to building the pilot database, we have developed a linking algorithm that identifies equivalent trademarks (TMs) across the three jurisdictions. The algorithm can currently be applied to all applications that contain TM text; i.e. around 96% of all applications. In its current state, the algorithm successfully identifies ~ 97% of equivalent TMs that are known to be linked a priori, as they have shared international registration number through the Madrid protocol. When complete, the internationally linked trademark database will be a valuable resource for researchers and policy-makers in fields such as econometrics, intellectual property rights, and brand policy. (Author)

  18. Promoter methylation-associated loss of ID4 expression is a marker of tumour recurrence in human breast cancer

    International Nuclear Information System (INIS)

    Noetzel, Erik; Veeck, Jürgen; Niederacher, Dieter; Galm, Oliver; Horn, Felicitas; Hartmann, Arndt; Knüchel, Ruth; Dahl, Edgar

    2008-01-01

    Inhibitor of DNA binding/Inhibitor of differentiation 4 (ID4) is a critical factor for cell proliferation and differentiation in normal vertebrate development. ID4 has regulative functions for differentiation and growth of the developing brain. The role of ID1, ID2 and ID3 are expected to be oncogenic due to their overexpression in pancreatic cancer and colorectal adenocarcinomas, respectively. Aside from these findings, loss of ID3 expression was demonstrated in ovarian cancer. The aim of the present study was to reveal the factual role of ID4 in carcinogenesis in more detail, since its role for the pathogenesis of human breast cancer has been discussed controversially, assigning both oncogenic and tumour suppressive functions. ID4 promoter methylation, ID4 mRNA expression and ID4 protein expression were analysed in primary human breast cancer specimens using methylation-specific PCR (MSP) (n=170), semiquantitative realtime RT-PCR (n=46) and immunhistochemistry (n=3), respectively. In order to demonstrate a functional association of ID4 promoter methylation with its gene silencing, we performed DNA demethylation analysis with four human breast cell lines using MSP and semiquantitative realtime RT-PCR. In addition, we performed correlations of ID4 promoter methylation with ID4 mRNA and ID4 protein expression in matched samples of breast tumour and corresponding normal tissue. We carried out statistical analyses in order to find correlations between ID4 promoter methylation and clinicopathological parameters. Frequent ID4 promoter methylation was observed in primary breast cancer samples (69%, 117/170). We found a tight correlation (P<0.0001) between ID4 promoter methylation and loss of ID4 expression in primary breast cancer 3 specimens. Demethylating treatment with breast cancer cell lines was associated with clear ID4 mRNA re-expression. Tumours with ID4 promoter methylation showed distinct loss of ID4 expression on both transcription and protein level

  19. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  20. [Two years clinical observation of a kind of castable ceramic--IPS Empress].

    Science.gov (United States)

    Liu, Y; Li, Y; Nie, Y

    1999-03-01

    We used this material in clinic since 1995. Discussion on the prosthetic effects of the above-mentioned material to spreat it clinically. Through half to two years clinical observations to evaluate the effect of IPS Empress crowns in anterior teeth and inlays in posteriors. and Prosthesis made of this kind of material IPS Empress is one kind of excellent all-ceramic prosthetic material. IPS Empress also could be used in post crowns and the clinical effect was satisfactory.

  1. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  2. Impact of time-domain IP pulse length on measured data and inverted models

    DEFF Research Database (Denmark)

    Olsson, P. I.; Fiandaca, G.; Dahlin, T.

    2015-01-01

    The duration of time domain (TD) induced polarization (IP) current injections has significant impact on the acquired IP data as well as on the inversion models, if the standard evaluation procedure is followed. However, it is still possible to retrieve similar inversion models if the waveform...... of the injected current and the IP response waveform are included in the inversion. The on-time also generally affects the signal-tonoise ratio (SNR) where an increased on-time gives higher SNR for the IP data....

  3. A Reactive and Cycle-True IP Emulator for MPSoC Exploration

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Federico; Sparsø, Jens

    2008-01-01

    The design of MultiProcessor Systems-on-Chip (MPSoC) emphasizes intellectual-property (IP)-based communication-centric approaches. Therefore, for the optimization of the MPSoC interconnect, the designer must develop traffic models that realistically capture the application behavior as executing...... on the IP core. In this paper, we introduce a Reactive IP Emulator (RIPE) that enables an effective emulation of the IP-core behavior in multiple environments, including bit and cycle-true simulation. The RIPE is built as a multithreaded abstract instruction-set processor, and it can generate reactive...

  4. Split degenerate states and stable p+ip phases from holography

    Energy Technology Data Exchange (ETDEWEB)

    Nie, Zhang-Yu; Zeng, Hui [Kunming University of Science and Technology, Kunming (China); Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing (China); Pan, Qiyuan [Hunan Normal Univ., Key Lab. of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Synergetic Innovation Center for Quantum Effects and Applications, Dept. of Physics, Changsha (China); Zeng, Hua-Bi [Yangzhou University, College of Physics Science and Technology, Yangzhou, Jiangsu (China); National Central University, Department of Physics, Chungli (China)

    2017-02-15

    In this paper, we investigate the p+ip superfluid phases in the complex vector field holographic p-wave model. We find that in the probe limit, the p+ip phase and the p-wave phase are equally stable, hence the p and ip orders can be mixed with an arbitrary ratio to form more general p+λip phases, which are also equally stable with the p-wave and p+ip phases. As a result, the system possesses a degenerate thermal state in the superfluid region. We further study the case on considering the back-reaction on the metric, and we find that the degenerate ground states will be separated into p-wave and p+ip phases, and the p-wave phase is more stable. Finally, due to the different critical temperature of the zeroth order phase transitions from p-wave and p+ip phases to the normal phase, there is a temperature region where the p+ip phase exists but the p-wave phase does not. In this region we find the stable holographic p+ip phase for the first time. (orig.)

  5. Proposta de metodologia para avaliação de redes de voz sobre IP

    OpenAIRE

    Vandersilvio da Silva

    2006-01-01

    A redução de custo com telefonia através do uso de voz sobre IP tem disparado a busca de soluções que transformem redes IP originalmente dedicadas a transporte de dados em redes para transporte de voz. Esta dissertação tem por objetivo apresentar uma metodologia para sistematizar a avaliação de redes para o tráfego de voz sobre IP de acordo com as possibilidades disponíveis no cenário a ser avaliado. Inicialmente é dada uma visão geral de voz sobre IP, apresentando os protocolos utilizados, o...

  6. Implantación de switching y ToIP sobre una red WAN

    OpenAIRE

    Pique Palacin, Ivan

    2013-01-01

    Este proyecto tiene como objeto el diseño y la implementación de servicios de comunicaciones de LAN (Switching) y Telefonía IP (ToIP), todos ellos integrados sobre una red WAN nacional ya existente y funcionando, gestionada por un ISP. Aquest projecte té com a objecte el disseny i la implementació de serveis de comunicacions de LAN (Switching) i telefonia IP (ToIP), tots ells integrats sobre una xarxa WAN nacional ja existent i funcionant, gestionada per un ISP. Bachelor thesis for the ...

  7. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  8. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...... as a biomarker that predicts severity of various diseases and can be used in the immunodiagnostics of Mycobacterium tuberculosis and cytomegalovirus infection. Here, we describe an ELISA-based method to detect IP-10 from dried blood and plasma spot samples....

  9. The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia

    OpenAIRE

    Md Khaled Shukran

    2011-01-01

    IP telephony is a transmission of voice and data over Packet Switched IP Networks and it has become a key issue in the telecommunication industry worldwide because of its higher efficiency and cheapest call rate. Hence, most of the countries in the world set up their telecommunication platform on IP based network as a fast revenue generating sources. Though Malaysia is on the way forward on IP based platform but the growth is not reached at satisfactory level due to the absence of effective r...

  10. Bio-fortification and shelf-life extension of idli batter using curry leaves (Murraya koenigii).

    Science.gov (United States)

    Chelliah, R; Ramakrishnan, S R; Premkumar, D; Antony, U

    2016-06-01

    Among several traditional foods of India, idli is one of the most popular and commonly consumed steamed products. A new method of adding Murraya koenigii (curry leaves) to idli batter as a vehicle for fortification and extension of shelf-life has been developed. Dried curry leaves powder was incorporated with other ingredients like rice and dehusked black gram in different proportions to optimize the most palatable formulation. Rate of fermentation and microbial changes in the batter; nutritional qualities, texture and sensory properties of the prepared product were assessed. Incorporation of curry leaves powder (5 %) in idli batter increased the shelf-life and also increased the flavour, texture and appearance of the idli. The calcium content of the prepared idli was 10 times more than that of the control idli, while dietary fiber content increased by 18.6 %. Anti-microbial activity of the curry leaves in idli batter extended the shelf-life from 2 to 5 days when stored at 30 °C.

  11. An online ID identification system for liquefied-gas cylinder plant

    Science.gov (United States)

    He, Jin; Ding, Zhenwen; Han, Lei; Zhang, Hao

    2017-11-01

    An automatic ID identification system for gas cylinders' online production was developed based on the production conditions and requirements of the Technical Committee for Standardization of Gas Cylinders. A cylinder ID image acquisition system was designed to improve the image contrast of ID regions on gas cylinders against the background. Then the ID digits region was located by the CNN template matching algorithm. Following that, an adaptive threshold method based on the analysis of local average grey value and standard deviation was proposed to overcome defects of non-uniform background in the segmentation results. To improve the single digit identification accuracy, two BP neural networks were trained respectively for the identification of all digits and the easily confusable digits. If the single digit was classified as one of confusable digits by the former BP neural network, it was further tested by the later one, and the later result was taken as the final identification result of this single digit. At last, the majority voting was adopted to decide the final identification result for the 6-digit cylinder ID. The developed system was installed on a production line of a liquefied-petroleum-gas cylinder plant and worked in parallel with the existing weighing step on the line. Through the field test, the correct identification rate for single ID digit was 94.73%, and none of the tested 2000 cylinder ID was misclassified through the majority voting.

  12. Role of ID Proteins in BMP4 Inhibition of Profibrotic Effects of TGF-β2 in Human TM Cells.

    Science.gov (United States)

    Mody, Avani A; Wordinger, Robert J; Clark, Abbot F

    2017-02-01

    Increased expression of TGF-β2 in primary open-angle glaucoma (POAG) aqueous humor (AH) and trabecular meshwork (TM) causes deposition of extracellular matrix (ECM) in the TM and elevated IOP. Bone morphogenetic proteins (BMPs) regulate TGF-β2-induced ECM production. The underlying mechanism for BMP4 inhibition of TGF-β2-induced fibrosis remains undetermined. Bone morphogenic protein 4 induces inhibitor of DNA binding proteins (ID1, ID3), which suppress transcription factor activities to regulate gene expression. Our study will determine whether ID1and ID3 proteins are downstream targets of BMP4, which attenuates TGF-β2 induction of ECM proteins in TM cells. Primary human TM cells were treated with BMP4, and ID1 and ID3 mRNA, and protein expression was determined by quantitative PCR (Q-PCR) and Western immunoblotting. Intracellular ID1 and ID3 protein localization was studied by immunocytochemistry. Transformed human TM cells (GTM3 cells) were transfected with ID1 or ID3 expression vectors to determine their potential inhibitory effects on TGF-β2-induced fibronectin and plasminogen activator inhibitor-I (PAI-1) protein expression. Basal expression of ID1-3 was detected in primary human TM cells. Bone morphogenic protein 4 significantly induced early expression of ID1 and ID3 mRNA (P protein in primary TM cells, and a BMP receptor inhibitor blocked this induction. Overexpression of ID1 and ID3 significantly inhibited TGF-β2-induced expression of fibronectin and PAI-1 in TM cells (P protein 4 induced ID1 and ID3 expression suppresses TGF-β2 profibrotic activity in human TM cells. In the future, targeting specific regulators may control the TGF-β2 profibrotic effects on the TM, leading to disease modifying IOP lowering therapies.

  13. The Self-Identity Protein IdsD Is Communicated between Cells in Swarming Proteus mirabilis Colonies.

    Science.gov (United States)

    Saak, Christina C; Gibbs, Karine A

    2016-12-15

    Proteus mirabilis is a social bacterium that is capable of self (kin) versus nonself recognition. Swarming colonies of this bacterium expand outward on surfaces to centimeter-scale distances due to the collective motility of individual cells. Colonies of genetically distinct populations remain separate, while those of identical populations merge. Ids proteins are essential for this recognition behavior. Two of these proteins, IdsD and IdsE, encode identity information for each strain. These two proteins bind in vitro in an allele-restrictive manner. IdsD-IdsE binding is correlated with the merging of populations, whereas a lack of binding is correlated with the separation of populations. Key questions remained about the in vivo interactions of IdsD and IdsE, specifically, whether IdsD and IdsE bind within single cells or whether IdsD-IdsE interactions occur across neighboring cells and, if so, which of the two proteins is exchanged. Here we demonstrate that IdsD must originate from another cell to communicate identity and that this nonresident IdsD interacts with IdsE resident in the recipient cell. Furthermore, we show that unbound IdsD in recipient cells does not cause cell death and instead appears to contribute to a restriction in the expansion radius of the swarming colony. We conclude that P. mirabilis communicates IdsD between neighboring cells for nonlethal kin recognition, which suggests that the Ids proteins constitute a type of cell-cell communication. We demonstrate that self (kin) versus nonself recognition in P. mirabilis entails the cell-cell communication of an identity-encoding protein that is exported from one cell and received by another. We further show that this intercellular exchange affects swarm colony expansion in a nonlethal manner, which adds social communication to the list of potential swarm-related regulatory factors. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  14. Overexpression of inhibitor of DNA-binding (ID)-1 protein related to angiogenesis in tumor advancement of ovarian cancers

    International Nuclear Information System (INIS)

    Maw, Min Khine; Fujimoto, Jiro; Tamaya, Teruhiko

    2009-01-01

    The inhibitor of DNA-binding (ID) has been involved in cell cycle regulation, apoptosis and angiogenesis. This prompted us to study ID functions in tumor advancement of ovarian cancers. Sixty patients underwent surgery for ovarian cancers. In ovarian cancers, the levels of ID-1, ID-2 and ID-3 mRNAs were determined by real-time reverse transcription-polymerase chain reaction. The histoscore with the localization of ID-1 was determined by immunohistochemistry. Patient prognosis was analyzed with a 36-month survival rate. Microvessel counts were determined by immunohistochemistry for CD34 and factor VIII-related antigen. ID-1 histoscores and mRNA levels both significantly (p < 0.001) increased in ovarian cancers according to clinical stage, regardless of histopathological type. Furthermore, 30 patients with high ID-1 expression had a lower survival rate (53%) compared to patients with low ID-1 expression (80%). ID-1 histoscores and mRNA levels significantly (p < 0.0001) correlated with microvessel counts in ovarian cancers. ID-1 increased in ovarian cancer cells during tumor progression. Moreover, ID-1 expression levels correlated with microvessel counts. Therefore, ID-1 might work on tumor advancement via angiogenesis and is considered to be a candidate for a prognostic indicator in ovarian cancers

  15. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  16. Increased Inhibitor of Differentiation 4 (Id4 Expression in Glioblastoma: A Tissue Microarray Study

    Directory of Open Access Journals (Sweden)

    Weifin Zeng, Elisabeth J. Rushing, Daniel P. Hartmann, Norio Azumi

    2010-01-01

    Full Text Available Background: The inhibitor of differentiation/DNA binding protein family (Id1-4 is involved in cell cycle control, tumorigenesis and angiogenesis through the negative regulation of helix-loop-helix transcription factors. Of these proteins, Id4 is known to play an important role in neural stem cell differentiation, and deregulation has been implicated in glial neoplasia. However, the expression and significance of Id4 in astrocytomas has not been fully addressed. Herein we report the differential expression of Id4 in astrocytomas of various grades using tissue microarrays (TMA and immunohistochemistry (IHC. Design: The GBM TMA was constructed from 53 archival cases at Georgetown University Hospital and a TMA with normal brain controls and grades II-III astrocytoma was obtained from Cybrdi (Rockville, MD. TMA sections were stained with Id4 antibody and the slides were scored according to the percentage of staining astrocytic nuclei (<9% -, 10-50% +, >51% ++. The Fisher Exact test was used to test for statistical significance. Results: Nuclear staining for Id4 was seen in 73.58% GBMs, 25% grade III, and 12.5% grade II astrocytomas; staining was absent in normal brain tissue. There was a statistically significant difference between GBM and grades II, III astrocytoma (p <0.01. Significant Id4 expression was not detected in normal brain. Conclusions: Our study confirms the frequent upregulation of Id4 expression in GBM, which lends support to its role in tumorigenesis, possibly in the transformation of low to high-grade astrocytoma (i.e. GBM. Further studies are warranted to determine the precise role of Id4 in glial neoplasia and its potential use in targeted therapy for GBM.

  17. The paradox of IDs: an account of an ethnographic experience in the US

    Directory of Open Access Journals (Sweden)

    Mariza Peirano

    2008-01-01

    Full Text Available In the modern world, IDs are indispensable objects, without which we cannot prove that we are who we say we are. We need material substantiation that attests to the authenticity of our self-identification. This paper is an account of an ethnographic experience about IDs and identification processes in the US, based on the examination of two events in which Eliot Spitzer, the New York State governor from January 2007 to March 2008, was a central figure. A comparison with the Brazilian scenario is present throughout the paper, and it ends by focusing on the ID theft phenomenon.

  18. Controlling applied to information processing: quality management applied to IP projects and IP services; Informationsverarbeitungs-Controlling: Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service

    Energy Technology Data Exchange (ETDEWEB)

    Becker, B. [Vereinigung Deutscher Elektrizitaetswerke e.V. (VDEW), Frankfurt am Main (Germany); Beckers, F. [Isar-Amperwerke AG, Muenchen (Germany); Dewald, N. [Bayernwerk AG, Muenchen (Germany); Hauffe, P. [Pfalzwerke AG, Ludwigshafen am Rhein (Germany); Hein, F. [EVS AG Stuttgart (Germany); Hoederath, M. [Vereinigte Elektrizitaetswerke Westfalen AG (VEW), Dortmund (Germany); Seyen, R. [Staedtische Werke Nuernberg GmbH (Germany)

    1998-01-12

    The working group on information processing (IP) basics (in German: `IV-Grundlagen`) has prepared this contribution dealing with controlling applied to information processing. This new report, on the one hand, takes into consideration the role of the organizational IP unit as one offering its services to all sections of a company. On the other hand, information processing as an operational infrastructure influencing all business processes becomes increasingly important with respect to the competitiveness of the EVU. Therefore, quality management applied to IP projects and IP services must support this development. (orig./RHM) [Deutsch] Der VDEW Arbeitskreis `IV-Grundlagen` hat einen Beitrag zum Controlling fuer die Informationsverarbeitung erstellt. Hier geht zum einen die Rolle der Organisationseinheit IV als Dienstleister fuer alle Unternehmensbereiche ein. Zum anderen gewinnt die Informationsverarbeitung als betriebliche Infrastruktur fuer alle Geschaeftsprozesse zunehmende Bedeutung fuer die Wettbewerbsfaehigkeit der EVU. Das Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service muss dies unterstuetzen. (orig./RHM)

  19. KChIP2 genotype dependence of transient outward current (Ito) properties in cardiomyocytes isolated from male and female mice.

    Science.gov (United States)

    Waldschmidt, Lara; Junkereit, Vera; Bähring, Robert

    2017-01-01

    The transient outward current (Ito) in cardiomyocytes is largely mediated by Kv4 channels associated with Kv Channel Interacting Protein 2 (KChIP2). A knockout model has documented the critical role of KChIP2 in Ito expression. The present study was conducted to characterize in both sexes the dependence of Ito properties, including current magnitude, inactivation kinetics, recovery from inactivation and voltage dependence of inactivation, on the number of functional KChIP2 alleles. For this purpose we performed whole-cell patch-clamp experiments on isolated left ventricular cardiomyocytes from male and female mice which had different KChIP2 genotypes; i.e., wild-type (KChIP2+/+), heterozygous knockout (KChIP2+/-) or complete knockout of KChIP2 (KChIP2-/-). We found in both sexes a KChIP2 gene dosage effect (i.e., a proportionality between number of alleles and phenotype) on Ito magnitude, however, concerning other Ito properties, KChIP2+/- resembled KChIP2+/+. Only in the total absence of KChIP2 (KChIP2-/-) we observed a slowing of Ito kinetics, a slowing of recovery from inactivation and a negative shift of a portion of the voltage dependence of inactivation. In a minor fraction of KChIP2-/- myocytes Ito was completely lost. The distinct KChIP2 genotype dependences of Ito magnitude and inactivation kinetics, respectively, seen in cardiomyocytes were reproduced with two-electrode voltage-clamp experiments on Xenopus oocytes expressing Kv4.2 and different amounts of KChIP2. Our results corroborate the critical role of KChIP2 in controlling Ito properties. They demonstrate that the Kv4.2/KChIP2 interaction in cardiomyocytes is highly dynamic, with a clear KChIP2 gene dosage effect on Kv4 channel surface expression but not on inactivation gating.

  20. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  1. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    Science.gov (United States)

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  2. Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-08-19

    A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

  3. The metalloid arsenite induces nuclear export of Id3 possibly via binding to the N-terminal cysteine residues

    International Nuclear Information System (INIS)

    Kurooka, Hisanori; Sugai, Manabu; Mori, Kentaro; Yokota, Yoshifumi

    2013-01-01

    Highlights: •Sodium arsenite induces cytoplasmic accumulation of Id3. •Arsenite binds to closely spaced N-terminal cysteine residues of Id3. •N-terminal cysteines are essential for arsenite-induced nuclear export of Id3. •Nuclear export of Id3 counteracts its transcriptional repression activity. -- Abstract: Ids are versatile transcriptional repressors that regulate cell proliferation and differentiation, and appropriate subcellular localization of the Id proteins is important for their functions. We previously identified distinct functional nuclear export signals (NESs) in Id1 and Id2, but no active NES has been reported in Id3. In this study, we found that treatment with the stress-inducing metalloid arsenite led to the accumulation of GFP-tagged Id3 in the cytoplasm. Cytoplasmic accumulation was impaired by a mutation in the Id3 NES-like sequence resembling the Id1 NES, located at the end of the HLH domain. It was also blocked by co-treatment with the CRM1-specific nuclear export inhibitor leptomycin B (LMB), but not with the inhibitors for mitogen-activated protein kinases (MAPKs). Importantly, we showed that the closely spaced N-terminal cysteine residues of Id3 interacted with the arsenic derivative phenylarsine oxide (PAO) and were essential for the arsenite-induced cytoplasmic accumulation, suggesting that arsenite induces the CRM1-dependent nuclear export of Id3 via binding to the N-terminal cysteines. Finally, we demonstrated that Id3 significantly repressed arsenite-stimulated transcription of the immediate-early gene Egr-1 and that this repression activity was inversely correlated with the arsenite-induced nuclear export. Our results imply that Id3 may be involved in the biological action of arsenite

  4. How to save distressed IDS-physician marriages: a case study.

    Science.gov (United States)

    Collins, H; Johnson, B A

    1998-04-01

    A hospital-driven IDS that encounters serious problems resulting from ownership of a physician practice should address those problems by focusing on three core areas: vision and leadership, effectiveness of operations, and physician compensation arrangements. If changes in these areas do not lead to improvements, the IDS may need to consider organizational restructuring. In one case study, a hospital-driven IDS faced the problem of owning a poorly performing MSO with a captive physician group. The IDS's governing board determined that the organization lacked effective communication with the physicians and that realization of the organization's vision would require greater physician involvement in organizational decision making. The organization is expected to undergo some corporate reorganization in which physicians will acquire an equity interest in the enterprise.

  5. Toward operation of series IDs at BL43LXU of SPring-8

    Energy Technology Data Exchange (ETDEWEB)

    Baron, A. Q. R.; Tanaka, T.; Soutome, K.; Takao, M.; Nakamura, T.; Kobayashi, K.; Fujita, T.; Takahashi, S.; Aoyagi, H.; Shimosaki, Y.; Seike, T.; Uchiyama, H.; Ishikawa, D.; Chuang, T.-H.; Kimura, H.; Tanaka, H.; Kitamura, H.; Ishikawa, T. [SPring-8, 1-1-1 Kouto, Sayo, Hyogo, 679 (Japan)

    2016-07-27

    This paper discusses two issues relating to using 3 small gap insertion devices in series at BL43LXU of SPring-8 to make a uniquely powerful source in the 15-26 keV region of the x-ray spectrum. The issues discussed are (1) damage to the covers of the downstream IDs by radiation from the upstream IDs and (2) proper steering of the electron beam to get the best photon beam properties. After tests in several configurations, including one where an ID was run without an impedance-reducing cover, the damage issue was solved by installing a distributed absorber in the most downstream ID. The steering issues were mostly resolved by the introduction of appropriate corrector magnets and feedback. The paper is written from the viewpoint of an interested beamline scientist impressed with the cooperation of different groups to make a source for new science possible.

  6. Pätid võtsid varastatud ID-kaardiga kiirlaene / Põim Kama

    Index Scriptorium Estoniae

    Kama, Põim, 1985-

    2008-01-01

    ID-kaardi vargusega seotud pettusjuhtumist ning jaanuaris jõustunud rahapesu ja terrorismi rahastamise tõkestamise seaduse sättest, mis kohustab laenufirmasid esimese tehingu sooritamisel kliendiga silmast silma kohtuma. Lisatud: kiirlaenufirmad vilistavad seadusele

  7. idSpace Tooling and Training for collaborative distributed product innovation

    NARCIS (Netherlands)

    Rutjens, Marjo; Bitter-Rijpkema, Marlies; Grube, Pascal; Heider, Thomas

    2009-01-01

    Rutjens, M., Bitter-Rijpkema, M., Grube, P. P., & Heider, T. (2009). idSpace Tooling and Training for collaborative distributed product innovation. Workshop during the e-Learning Baltic conference. June, 17-19, 2009, Rostock, Germany.

  8. Wnt/β-catenin signaling changes C2C12 myoblast proliferation and differentiation by inducing Id3 expression

    International Nuclear Information System (INIS)

    Zhang, Long; Shi, Songting; Zhang, Juan; Zhou, Fangfang; Dijke, Peter ten

    2012-01-01

    Highlights: ► Expression of Id3 but not Id1 is induced by Wnt3a stimulation in C2C12 cells. ► Wnt3a induces Id3 expression via canonical Wnt/β-catenin pathway. ► Wnt3a-induced Id3 expression does not depend on BMP signaling activation. ► Induction of Id3 expression is critical determinant in Wnt3a-induced cell proliferation and differentiation. -- Abstract: Canonical Wnt signaling plays important roles in regulating cell proliferation and differentiation. In this study, we report that inhibitor of differentiation (Id)3 is a Wnt-inducible gene in mouse C2C12 myoblasts. Wnt3a induced Id3 expression in a β-catenin-dependent manner. Bone morphogenetic protein (BMP) also potently induced Id3 expression. However, Wnt-induced Id3 expression occurred independent of the BMP/Smad pathway. Functional studies showed that Id3 depletion in C2C12 cells impaired Wnt3a-induced cell proliferation and alkaline phosphatase activity, an early marker of osteoblast cells. Id3 depletion elevated myogenin induction during myogenic differentiation and partially impaired Wnt3a suppressed myogenin expression in C2C12 cells. These results suggest that Id3 is an important Wnt/β-catenin induced gene in myoblast cell fate determination.

  9. Host-tree monoterpenes and biosynthesis of aggregation pheromones in the bark beetle ips paraconfusus

    Science.gov (United States)

    In the 1970-80s, vapors of the common conifer tree monoterpenes, myrcene and a-pinene, were shown to serve as precursors of ipsenol, ipsdienol and cis-verbenol, aggregation pheromone components of Ips paraconfusus. A paradigm developed that Ips bark beetles utilize pre-formed monoterpene precursors ...

  10. ß-Phellandrene: Kairomone for Pine Engraver, Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1990-01-01

    The responses of Ips pini (Scolytidae) to multiple-funnel traps baited with the pheromone, ipsdienol, and various monoterpenes were determined in stands of lodgepole pine in southern and central British Columbia. Ips pini was attracted to both ipsdienol and ß-phellandrene, demonstrating that ß-phellandrene is a kairomone for this...

  11. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  12. A comparison of interferon-γ and IP-10 for the diagnosis of tuberculosis

    DEFF Research Database (Denmark)

    Holm, Line Lindebo; Rose, Michala Vaaben; Kimaro, Godfather

    2014-01-01

    OBJECTIVE: Interferon-γ and IP-10 release assays are diagnostic tests for tuberculosis infection. We have compared the accuracy of IP-10 and QuantiFERON-TB Gold In-tube [QFT-IT] in Tanzanian children suspected of having active tuberculosis (TB). METHODS: Hospitalized Tanzanian children...

  13. A simple method to quantitate IP-10 in dried blood and plasma spots

    DEFF Research Database (Denmark)

    Aabye, Martine G; Eugen-Olsen, Jesper; Werlinrud, Anne Marie

    2012-01-01

    Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn...

  14. Real-time resource availability signaling in IP multimedia subsystem networks

    NARCIS (Netherlands)

    Ozcelebi, T.; Radovanovic, I.; Sengupta, D.

    2008-01-01

    IP Multimedia Subsystem (IMS) allows the use of unlicensed, non-dedicated and nondeterministic access networks for delivering IP multimedia services. Providing end-to-end Quality-of-Service (QoS) for resource demanding real-time services (e.g. real-time multimedia) over such networks is a

  15. High intercontinental migration rates and population admixture in the sapstain fungus Ophiostoma ips

    Science.gov (United States)

    Xudong Zhou; Treena I. Burgess; Z. Wilhelm De Beer; Francois Lieutier; Annie Yart; Kier Klepzig; Angus Carnegie; Julio Mena Portales; Brenda D. Wingfield; Michael J. Wingfield

    2006-01-01

    Ophiostoma ips is a common fungal associate of various conifer-infesting bark beetles in their native ranges and has been introduced into non-native pine plantations in the Southern Hemisphere. In this study, we used 10 microsatellite markers to investigate the population biology of O. ips in native (Cuba, France, Morocco and USA) and non-native (...

  16. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  17. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    Science.gov (United States)

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. Myricetin stimulates the absorption of the pro-carcinogen PhIP

    NARCIS (Netherlands)

    Schutte, M.E.; Sandt, J.J.M. van de; Alink, G.M.; Groten, J.P.; Rietjens, I.M.C.M.

    2006-01-01

    The effect of the flavonoid myricetin on the transport of the pro-carcinogen 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) through differentiated Caco-2 monolayers, a model for the intestinal epithelium, is described. Myricetin causes an increase of the transport of PhIP from the apical to

  19. 77 FR 48549 - Eastman Kodak Company, IPS-Dayton Location, Dayton, OH; Notice of Affirmative Determination...

    Science.gov (United States)

    2012-08-14

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-81,387] Eastman Kodak Company, IPS--Dayton Location, Dayton, OH; Notice of Affirmative Determination Regarding Application for...) applicable to workers and former workers of Eastman Kodak Company, IPS- Dayton Location, Dayton, Ohio...

  20. The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?

    NARCIS (Netherlands)

    Maathuis, Ivo; Smit, Willem A.; Egyedi, T.M.; Krechmer, K.; Jakobs, K.

    2003-01-01

    Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the

  1. ChIP-exo interrogation of Crp, DNA, and RNAP holoenzyme interactions

    DEFF Research Database (Denmark)

    Latif, Haythem; Federowicz, Stephen; Ebrahim, Ali

    2018-01-01

    Numerous in vitro studies have yielded a refined picture of the structural and molecular associations between Cyclic-AMP receptor protein (Crp), the DNA motif, and RNA polymerase (RNAP) holoenzyme. In this study, high-resolution ChIP-exonuclease (ChIP-exo) was applied to study Crp binding in vivo...

  2. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  3. Accounting for immunoprecipitation efficiencies in the statistical analysis of ChIP-seq data

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    2013-01-01

    Background: ImmunoPrecipitation (IP) efficiencies may vary largely between different antibodies and between repeated experiments with the same antibody. These differences have a large impact on the quality of ChIP-seq data: a more efficient experiment will necessarily lead to a higher signal to

  4. Highly expressed loci are vulnerable to misleading ChIP localization of multiple unrelated proteins

    NARCIS (Netherlands)

    Teytelman, L.; Thurtle, D.M.; Rine, J.; van Oudenaarden, A.

    2013-01-01

    Chromatin immunoprecipitation (ChIP) is the gold-standard technique for localizing nuclear proteins in the genome. We used ChIP, in combination with deep sequencing (Seq), to study the genome-wide distribution of the Silent information regulator (Sir) complex in Saccharomyces cerevisiae. We analyzed

  5. Joint modeling of ChIP-seq data via a Markov random field model

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    Chromatin ImmunoPrecipitation-sequencing (ChIP-seq) experiments have now become routine in biology for the detection of protein-binding sites. In this paper, we present a Markov random field model for the joint analysis of multiple ChIP-seq experiments. The proposed model naturally accounts for

  6. Optimal use of tandem biotin and V5 tags in ChIP assays

    NARCIS (Netherlands)

    K.E. Kolodziej (Katarzyna); F. Pourfarzad, F. (Farzin); E. de Boer (Ernie); S. Krpic (Sanja); F.G. Grosveld (Frank); J. Strouboulis (John)

    2009-01-01

    textabstractBackground: Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the

  7. Automated Integration of Dedicated Hardwired IP Cores in Heterogeneous MPSoCs Designed with ESPAM

    Directory of Open Access Journals (Sweden)

    Ed Deprettere

    2008-06-01

    Full Text Available This paper presents a methodology and techniques for automated integration of dedicated hardwired (HW IP cores into heterogeneous multiprocessor systems. We propose an IP core integration approach based on an HW module generation that consists of a wrapper around a predefined IP core. This approach has been implemented in a tool called ESPAM for automated multiprocessor system design, programming, and implementation. In order to keep high performance of the integrated IP cores, the structure of the IP core wrapper is devised in a way that adequately represents and efficiently implements the main characteristics of the formal model of computation, namely, Kahn process networks, we use as an underlying programming model in ESPAM. We present details about the structure of the HW module, the supported types of IP cores, and the minimum interfaces these IP cores have to provide in order to allow automated integration in heterogeneous multiprocessor systems generated by ESPAM. The ESPAM design flow, the multiprocessor platforms we consider, and the underlying programming (KPN model are introduced as well. Furthermore, we present the efficiency of our approach by applying our methodology and ESPAM tool to automatically generate, implement, and program heterogeneous multiprocessor systems that integrate dedicated IP cores and execute real-life applications.

  8. HMCan: A method for detecting chromatin modifications in cancer samples using ChIP-seq data

    KAUST Repository

    Ashoor, Haitham; Hé rault, Auré lie; Kamoun, Auré lie; Radvanyi, Franç ois; Bajic, Vladimir B.; Barillot, Emmanuel; Boeva, Valentina

    2013-01-01

    genes. Though several tools have been created to enable detection of histone marks in ChIP-seq data from normal samples, it is unclear whether these tools can be efficiently applied to ChIP-seq data generated from cancer samples. Indeed, cancer genomes

  9. Internetiside VoIP sobib ka ettevõtteile / Valdur Laid

    Index Scriptorium Estoniae

    Laid, Valdur, 1969-

    2005-01-01

    Ilmunud ka: Delovõje Vedomosti 8. juuni lk. 19. Kommunikatsiooni liikumisest internetti ehk IP-võrku ning selle võimalustest ettevõtjaile. Vt. samas: Väikefirmade IP-lahendus jõuab aasta lõpus massturule

  10. IPS observation system for the Miyun 50 m radio telescope and its commissioning observation

    International Nuclear Information System (INIS)

    Zhu Xinying; Zhang Xizhen; Zhang Hongbo; Kong Deqing; Qu Huipeng

    2012-01-01

    Ground-based observation of Interplanetary Scintillation (IPS) is an important approach for monitoring solar wind. A ground-based IPS observation system has been newly implemented on a 50 m radio telescope at Miyun station, managed by the National Astronomical Observatories, Chinese Academy of Sciences. This observation system has been constructed for the purpose of observing solar wind speed and the associated scintillation index by using the normalized cross-spectrum of a simultaneous dual-frequency IPS measurement. The system consists of a universal dual-frequency front-end and a dual-channel multi-function back-end specially designed for IPS. After careful calibration and testing, IPS observations on source 3C 273B and 3C 279 have been successfully carried out. The preliminary observation results show that this newly-developed observation system is capable of performing IPS observation. The system's sensitivity for IPS observation can reach over 0.3 Jy in terms of an IPS polarization correlator with 4 MHz bandwidth and 2 s integration time. (research papers)

  11. Prognostic value of CtIP/RBBP8 expression in breast cancer

    International Nuclear Information System (INIS)

    Soria-Bretones, Isabel; Sáez, Carmen; Ruíz-Borrego, Manuel; Japón, Miguel A; Huertas, Pablo

    2013-01-01

    CtIP/RBBP8 is a multifunctional protein involved in transcription, DNA replication, DNA repair by homologous recombination and the G1 and G2 checkpoints. Its multiple roles are controlled by its interaction with several specific factors, including the tumor suppressor proteins BRCA1 and retinoblastoma. Both its functions and interactors point to a putative oncogenic potential of CtIP/RBBP8 loss. However, CtIP/RBBP8 relevance in breast tumor appearance, development, and prognosis has yet to be established. We performed a retrospective analysis of CtIP/RBBP8 and RB1 levels by immunohistochemistry using 384 paraffin-embedded breast cancer biopsies obtained during tumor removal surgery. We have observed that low or no expression of CtIP/RBBP8 correlates with high-grade breast cancer and with nodal metastasis. Reduction on CtIP/RBBP8 is most common in hormone receptor (HR)-negative, HER2-positive, and basal-like tumors. We observed lower levels of RB1 on those tumors with reduced CtIP/RBBP8 levels. On luminal tumors, decreased but not absence of CtIP/RBBP8 levels correlate with increased disease-free survival when treated with a combination of hormone, radio, and chemo therapies

  12. Evaluation of the Micro-ID system for the identification of Yersinia pestis.

    OpenAIRE

    Harrison, D N; Williams, J E

    1985-01-01

    One hundred isolates of Yersinia pestis identified by conventional means were tested by the Micro-ID system to assess its reliability for distinguishing Y. pestis from other members of the family Enterobacteriaceae. The Micro-ID system gave Y. pestis as a choice for the identification of 89 of these cultures, although not always as the first choice. Most nitrate-negative strains of Y. pestis keyed out with Yersinia pseudotuberculosis as first choice and Y. pestis as second or fourth choice.

  13. ACE I/D polymorphism in Indian patients with hypertrophic cardiomyopathy and dilated cardiomyopathy

    DEFF Research Database (Denmark)

    Rai, Taranjit Singh; Dhandapany, Perundurai Subramaniam; Ahluwalia, Tarun Veer Singh

    2008-01-01

    The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM).......The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM)....

  14. iTAR: a web server for identifying target genes of transcription factors using ChIP-seq or ChIP-chip data.

    Science.gov (United States)

    Yang, Chia-Chun; Andrews, Erik H; Chen, Min-Hsuan; Wang, Wan-Yu; Chen, Jeremy J W; Gerstein, Mark; Liu, Chun-Chi; Cheng, Chao

    2016-08-12

    Chromatin immunoprecipitation followed by massively parallel DNA sequencing (ChIP-seq) or microarray hybridization (ChIP-chip) has been widely used to determine the genomic occupation of transcription factors (TFs). We have previously developed a probabilistic method, called TIP (Target Identification from Profiles), to identify TF target genes using ChIP-seq/ChIP-chip data. To achieve high specificity, TIP applies a conservative method to estimate significance of target genes, with the trade-off being a relatively low sensitivity of target gene identification compared to other methods. Additionally, TIP's output does not render binding-peak locations or intensity, information highly useful for visualization and general experimental biological use, while the variability of ChIP-seq/ChIP-chip file formats has made input into TIP more difficult than desired. To improve upon these facets, here we present are fined TIP with key extensions. First, it implements a Gaussian mixture model for p-value estimation, increasing target gene identification sensitivity and more accurately capturing the shape of TF binding profile distributions. Second, it enables the incorporation of TF binding-peak data by identifying their locations in significant target gene promoter regions and quantifies their strengths. Finally, for full ease of implementation we have incorporated it into a web server ( http://syslab3.nchu.edu.tw/iTAR/ ) that enables flexibility of input file format, can be used across multiple species and genome assembly versions, and is freely available for public use. The web server additionally performs GO enrichment analysis for the identified target genes to reveal the potential function of the corresponding TF. The iTAR web server provides a user-friendly interface and supports target gene identification in seven species, ranging from yeast to human. To facilitate investigating the quality of ChIP-seq/ChIP-chip data, the web server generates the chart of the

  15. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  16. SpaceWire: IP, Components, Development Support and Test Equipment

    Science.gov (United States)

    Parkes, S.; McClements, C.; Mills, S.; Martin, I.

    SpaceWire is a communications network for use onboard spacecraft. It is designed to connect high data-rate sensors, large solid-state memories, processing units and the downlink telemetry subsystem providing an integrated data-handling network. SpaceWire links are serial, high-speed (2 Mbits/sec to 400 Mbits/sec), bi-directional, full-duplex, pointto- point data links which connect together SpaceWire equipment. Application information is sent along a SpaceWire link in discrete packets. Control and time information can also be sent along SpaceWire links. SpaceWire is defined in the ECSS-E50-12A standard [1]. With the adoption of SpaceWire on many space missions the ready availability of intellectual property (IP) cores, components, software drivers, development support, and test equipment becomes a major issue for those developing satellites and their electronic subsystems. This paper describes the work being done at the University of Dundee and STAR-Dundee Ltd with ESA, BNSC and internal funding to make these essential items available. STAR-Dundee is a spin-out company of the University of Dundee set up specifically to support users of SpaceWire.

  17. MD#1182: Calibration of diamond particle detectors in IP6

    CERN Document Server

    Valette, Matthieu; Lindstrom, Bjorn Hans Filip; Wiesner, Christoph

    2017-01-01

    In case of an asynchronous beam dump with a fully filled LHC machine it is expected that all standard ionisation chamber Beam Loss Monitors (IC BLM) around the LHC dumping region in IP6 will be saturated. Diamond Beam Loss Monitors (dBLM) were therefore installed next to the movable dump protection absorber (TCDQ) downstream of the extraction kickers. These detectors allow resolving losses at a nanosecond timescale and with an dynamic range of several orders of magnitude; thus, allowing to know the number of nominal bunches impacting the TCDQ. After a first series of calibrations using asynchronous beam dump tests, an experiment was conducted during MD#1182 to demonstrate the possibility of resolving a nominal bunch hitting the TCDQ. The impact parameter of the bunches on the TCDQ was first scanned using probe bunches with lower intensity then tests were done with nominal bunches (1.1e11 p/bunch) at injection energy. High energy calibration of the losses was also attempted unsuccessfully. Due to different beh...

  18. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  19. Review Report on the Design of In-Pile Test Section(IPS)

    International Nuclear Information System (INIS)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-01

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins

  20. Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching

    DEFF Research Database (Denmark)

    Jha, Vikas; Kalia, Kartik; Chowdhary, Bhawani Shankar

    2016-01-01

    With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone....... With the humongous popularity of Internet the overall traffic on Internet has the same story. Focusing on transmission of IP traffic in an optical network with signals remaining in their optical nature generated at particular wavelength, proposed is the switching of optically generated IP packets through optical...... cross connects based on translation of wavelength when an IP packet is crossing the optical cross connect. Adding the concepts of layer 3 routing protocols along with the wavelength translation scheme, will help in spanning the overall optical network for a larger area....

  1. The extended TRIP supporting VoIP routing reservation with distributed QoS

    Science.gov (United States)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  2. Review Report on the Design of In-Pile Test Section(IPS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-15

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins.

  3. All-IP-Ethernet architecture for real-time sensor-fusion processing

    Science.gov (United States)

    Hiraki, Kei; Inaba, Mary; Tezuka, Hiroshi; Tomari, Hisanobu; Koizumi, Kenichi; Kondo, Shuya

    2016-03-01

    Serendipter is a device that distinguishes and selects very rare particles and cells from huge amount of population. We are currently designing and constructing information processing system for a Serendipter. The information processing system for Serendipter is a kind of sensor-fusion system but with much more difficulties: To fulfill these requirements, we adopt All IP based architecture: All IP-Ethernet based data processing system consists of (1) sensor/detector directly output data as IP-Ethernet packet stream, (2) single Ethernet/TCP/IP streams by a L2 100Gbps Ethernet switch, (3) An FPGA board with 100Gbps Ethernet I/F connected to the switch and a Xeon based server. Circuits in the FPGA include 100Gbps Ethernet MAC, buffers and preprocessing, and real-time Deep learning circuits using multi-layer neural networks. Proposed All-IP architecture solves existing problem to construct large-scale sensor-fusion systems.

  4. Emancipating Intellectual Property from Proprietarianism: Drahos, Foucault, and a Quasi-Genealogy of IP

    Directory of Open Access Journals (Sweden)

    Wendyl Luna

    2018-01-01

    Full Text Available This paper argues that Peter Drahos undertakes a partial Foucauldian genealogy by emancipating intellectual property (IP from proprietarianism. He demonstrates the dominance of proprietarianism in IP by drawing sample practices from trademark, copyright, and patent laws, and then seeks to displace the proprietarian dominance with instrumentalism, which reconstitutes IP as a “liberty-intruding privilege.” Ironically, despite doing a genealogy, Drahos does not eradicate sovereignty altogether as Michel Foucault insists, but instead determines IP as a “sovereignty mechanism” that has a “sovereignty effect.” After explaining what Foucauldian genealogy is, the paper will explain how Drahos undertakes a genealogy of IP, while highlighting the limitations of Drahos’ analysis from a Foucauldian perspective.

  5. Synthesis and evaluation of p-iodo-phentermine (IP) as a brain perfusion imaging agent

    International Nuclear Information System (INIS)

    Kizuka, H.; Elmaleh, D.R.; Brownell, G.L.; Strauss, H.W.

    1985-01-01

    rho-( 123 I and 131 I) iodo α,α-dimethylphenethylamine (rho-iodophentermine, IP) as the α-methylated analogue of iodoamphetamine has been prepared. It is hoped that this methyl substitution will increase the lipophilicity of the agent, enhance resistance to metabolism by monoamine oxidase, and will result in increased initial uptake and slower washout from the brain as compared to N-isopropyl-rho-( 123 I) iodoamphetamine. IP was prepared by diazotization of rho-aminophentermine followed by decomposition of the diazonium salt with KI. Radioiodinated IP was prepared either by the solid-phase isotopic exchange reaction or by decomposition of the piperidinotriazene derivative with a radiochemical yield of 40-60%. Biodistribution of 131 I-IP in rats showed brain uptake in the range of 1.7% dose g -1 at 5, 30 and 60 min. Imaging studies with 123 I-IP in dogs showed high brain extraction and slow washout of activity. (author)

  6. Conservação de sementes de ipê Conservation of "ipê" seeds

    Directory of Open Access Journals (Sweden)

    Jocely Andreuccetti Maeda

    1984-01-01

    Full Text Available Sementes de algumas espécies de ipê foram submetidas a diferentes temperaturas de armazenamento, determinando-se a sua porcentagem de germinação a cada quarenta dias, por um período de trinta meses. Nas condições fornecidas de 10 ºC, 29 ºC e 30 ºC em embalagem hermeticamente fechada, e em saco de papel, a condições ambienteis foram avaliadas as seguintes espécies: Tabebuia avellanedae var. paulensis Tol., Tabebuia chrysotricha (Mart. ex-DC. Standley, Tabebuia impetiginosa (Mart. Standley, Tabebuia rosea (Bertol. DC. e Tabebuia heptaphylla (Vell. Tol. Dentre as condições de armazenamento, o tratamento a 10ºC em vidro hermético foi o que manteve a viabilidade da semente por maior tempo, sendo 20 °C também em vidro hermético o segundo melhor resultado. A germinação das sementes armazenadas em saco de papel a temperatura ambiente foi melhor do que a das que foram armazenadas em vidro hermético a 30 °C, sendo esta a pior condição de armazenagem. A comparação entre as espécies mostrou que Tabebuia heptaphylla, apresenta, além de sementes de maior longevidade, maior resistência às condições adversas de armazenamento.Seeds of some species of "ipê" were stored at different temperatures and the germination percentage was determined at forty-day intervals during thirty months. Seeds were subjected to the following conditions: storage in sealed flasks at 10ºC, 20ºC and 30ºC, and in paper bags at room temperature. The following species were evaluated: Tabebuia avellanedae var. paulensis Tol., Tabebuia chrysotricha (Mart. ex DC. Standley, Tabebuia impetiginosa (Mart. Standley, Tabebuia rosea (Bertol. DC. e Tabebuia heptaphylla (Vell. Tol. Among the treatments studied, storing seeds in sealed flasks at 10°C maintained seed viability for the longest period of time. The second best result was obtained when seeds were kept in sealed flasks at 20ºC. The germination of seeds stored in paper bags at room temperature was higher

  7. Potassium Channel Interacting Protein 2 (KChIP2) is not a transcriptional regulator of cardiac electrical remodeling

    DEFF Research Database (Denmark)

    Winther, Sine V; Tuomainen, Tomi; Borup, Rehannah

    2016-01-01

    The heart-failure relevant Potassium Channel Interacting Protein 2 (KChIP2) augments CaV1.2 and KV4.3. KChIP3 represses CaV1.2 transcription in cardiomyocytes via interaction with regulatory DNA elements. Hence, we tested nuclear presence of KChIP2 and if KChIP2 translocates into the nucleus...... intracellular Ca(2+) concentration. Neither increasing nor decreasing intracellular Ca(2+) concentrations caused translocation of KChIP2. Microarray analysis did not identify relief of transcriptional repression in murine KChIP2(-/-) heart samples. We conclude that although there is a baseline presence of KCh...

  8. The role of calsenilin/DREAM/KChIP3 in contextual fear conditioning.

    Science.gov (United States)

    Alexander, Jon C; McDermott, Carmel M; Tunur, Tumay; Rands, Vicky; Stelly, Claire; Karhson, Debra; Bowlby, Mark R; An, W Frank; Sweatt, J David; Schrader, Laura A

    2009-03-01

    Potassium channel interacting proteins (KChIPs) are members of a family of calcium binding proteins that interact with Kv4 potassium (K(+)) channel primary subunits and also act as transcription factors. The Kv4 subunit is a primary K(+) channel pore-forming subunit, which contributes to the somatic and dendritic A-type currents throughout the nervous system. These A-type currents play a key role in the regulation of neuronal excitability and dendritic processing of incoming synaptic information. KChIP3 is also known as calsenilin and as the transcription factor, downstream regulatory element antagonist modulator (DREAM), which regulates a number of genes including prodynorphin. KChIP3 and Kv4 primary channel subunits are highly expressed in hippocampus, an area of the brain important for learning and memory. Through its various functions, KChIP3 may play a role in the regulation of synaptic plasticity and learning and memory. We evaluated the role of KChIP3 in a hippocampus-dependent memory task, contextual fear conditioning. Male KChIP3 knockout (KO) mice showed significantly enhanced memory 24 hours after training as measured by percent freezing. In addition, we found that membrane association and interaction with Kv4.2 of KChIP3 protein was significantly decreased and nuclear KChIP3 expression was increased six hours after the fear conditioning training paradigm with no significant change in KChIP3 mRNA. In addition, prodynorphin mRNA expression was significantly decreased six hours after fear conditioning training in wild-type (WT) but not in KO animals. These data suggest a role for regulation of gene expression by KChIP3/DREAM/calsenilin in consolidation of contextual fear conditioning memories.

  9. Inhibition by salmeterol and cilomilast of fluticasone-enhanced IP-10 release in airway epithelial cells.

    Science.gov (United States)

    Reddy, P J; Aksoy, Mark O; Yang, Yi; Li, Xiu Xia; Ji, Rong; Kelsen, Steven G

    2008-02-01

    The CXC chemokines, IP-10/CXCL10 and IL-8/CXCL8, play a role in obstructive lung disease by attracting Th1/Tc1 lymphocytes and neutrophils, respectively. Inhaled corticosteroids (ICS) and long acting beta 2-agonists (LABA) are widely used. However, their effect(s) on the release of IP-10 and IL-8 by airway epithelial cells are poorly understood. This study examined the effects of fluticasone, salmeterol, and agents which raise intracellular cAMP (cilomilast and db-cAMP) on the expression of IP-10 and IL-8 protein and mRNA. Studies were performed in cultured human airway epithelial cells during cytokine-stimulated IP-10 and IL-8 release. Cytokine treatment (TNF-alpha, IL-1beta and IFN-gamma) increased IP-10 and IL-8 protein and mRNA levels. Fluticasone (0.1 nM to 1 microM) increased IP-10 but reduced IL-8 protein release without changing IP-10 mRNA levels assessed by real time RT-PCR. The combination of salmeterol (1 micro M) and cilomilast (1-10 mu M) reduced IP-10 but had no effect on IL-8 protein. Salmeterol alone (1 micro M) and db-cAMP alone (1 mM) antagonised the effects of fluticasone on IP-10 but not IL-8 protein. In human airway epithelial cells, inhibition by salmeterol of fluticasone-enhanced IP-10 release may be an important therapeutic effect of the LABA/ICS combination not present when the two drugs are used separately.

  10. Id3 induces an Elk-1–caspase-8-dependent apoptotic pathway in squamous carcinoma cells

    International Nuclear Information System (INIS)

    Chen, You-Shin; Aubee, Joseph; DiVito, Kyle A; Zhou, Hengbo; Zhang, Weiyi; Chou, Fen-Pi; Simbulan-Rosenthal, Cynthia M; Rosenthal, Dean S

    2015-01-01

    Inhibitor of differentiation/DNA-binding (Id) proteins are helix–loop–helix (HLH) transcription factors. The Id protein family (Id1–Id4) mediates tissue homeostasis by regulating cellular processes including differentiation, proliferation, and apoptosis. Ids typically function as dominant negative HLH proteins, which bind other HLH proteins and sequester them away from DNA promoter regions. Previously, we have found that Id3 induced apoptosis in immortalized human keratinocytes upon UVB exposure, consistent with its role as a tumor suppressor. To investigate the role of Id3 in malignant squamous cell carcinoma (SCC) cells (A431), a tetracycline-regulated inducible system was used to induce Id3 in cell culture and mouse xenograft models. We found that upon Id3 induction, there was a decrease in cell number under low serum conditions, as well as in soft agar. Microarray, RT-PCR, immunoblot, siRNA, and inhibitor studies revealed that Id3 induced expression of Elk-1, an E-twenty-six (ETS)-domain transcription factor, inducing procaspase-8 expression and activation. Id3 deletion mutants revealed that 80 C-terminal amino acids, including the HLH, are important for Id3-induced apoptosis. In a mouse xenograft model, Id3 induction decreased tumor size by 30%. Using immunofluorescent analysis, we determined that the tumor size decrease was also mediated through apoptosis. Furthermore, we show that Id3 synergizes with 5-FU and cisplatin therapies for nonmelanoma skin cancer cells. Our studies have shown a molecular mechanism by which Id3 induces apoptosis in SCC, and this information can potentially be used to develop new treatments for SCC patients

  11. miR-342 regulates BRCA1 expression through modulation of ID4 in breast cancer.

    Directory of Open Access Journals (Sweden)

    Elisabetta Crippa

    Full Text Available A miRNAs profiling on a group of familial and sporadic breast cancers showed that miRNA-342 was significantly associated with estrogen receptor (ER levels. To investigate at functional level the role of miR-342 in the pathogenesis of breast cancer, we focused our attention on its "in silico" predicted putative target gene ID4, a transcription factor of the helix-loop-helix protein family whose expression is inversely correlated with that of ER. ID4 is expressed in breast cancer and can negatively regulate BRCA1 expression. Our results showed an inverse correlation between ID4 and miR-342 as well as between ID4 and BRCA1 expression. We functionally validated the interaction between ID4 and miR-342 in a reporter Luciferase system. Based on these findings, we hypothesized that regulation of ID4 mediated by miR-342 could be involved in the pathogenesis of breast cancer by downregulating BRCA1 expression. We functionally demonstrated the interactions between miR-342, ID4 and BRCA1 in a model provided by ER-negative MDA-MB-231 breast cancer cell line that presented high levels of ID4. Overexpression of miR-342 in these cells reduced ID4 and increased BRCA1 expression, supporting a possible role of this mechanism in breast cancer. In the ER-positive MCF7 and in the BRCA1-mutant HCC1937 cell lines miR-342 over-expression only reduced ID4. In the cohort of patients we studied, a correlation between miR-342 and BRCA1 expression was found in the ER-negative cases. As ER-negative cases were mainly BRCA1-mutant, we speculate that the mechanism we demonstrated could be involved in the decreased expression of BRCA1 frequently observed in non BRCA1-mutant breast cancers and could be implicated as a causal factor in part of the familial cases grouped in the heterogeneous class of non BRCA1 or BRCA2-mutant cases (BRCAx. To validate this hypothesis, the study should be extended to a larger cohort of ER-negative cases, including those belonging to the BRCAx class.

  12. Novel characteristics of CtIP at damage-induced foci following the initiation of DNA end resection

    International Nuclear Information System (INIS)

    Fujisawa, Hiroshi; Fujimori, Akira; Okayasu, Ryuichi; Uesaka, Mitsuru; Yajima, Hirohiko

    2015-01-01

    Highlights: • CtIP becomes hyperphosphorylated and forms foci following cell irradiation. • CtIP accumulates in foci subsequent to the peak of hyperphosphorylation. • CtIP is maintained in a hypophosphorylated state at later times. • CtIP is continuously recruited to DNA double strand breaks downstream of resection. • CtIP presumably have a distinct role following the initiation of resection. - Abstract: Homologous recombination (HR) is a major repair pathway for DNA double strand breaks (DSBs), and end resection, which generates a 3′-single strand DNA tail at the DSB, is an early step in the process. Resection is initiated by the Mre11 nuclease together with CtIP. Here, we describe novel characteristics of CtIP at DSBs. At early times following exposure of human cells to ionizing radiation, CtIP localized to the DSB, became hyperphosphorylated and formed foci in an ATM-dependent manner. At later times, when the initiation of resection had occurred, CtIP foci persist but CtIP is maintained in a hypophosphorylated state, which is dependent on ATM and ATR. Exposure to cycloheximide revealed that CtIP turns over at DSB sites downstream of resection. Our findings provide strong evidence that CtIP is continuously recruited to DSBs downstream of both the initiation and extension step of resection, strongly suggesting that CtIP has functions in addition to promoting the initiation of resection during HR

  13. IP EUROTRANS: from MYRRHA towards XT-ADS

    International Nuclear Information System (INIS)

    Debruyn, D.

    2006-01-01

    The integrated project (IP) EUROTRANS (EUROpean Research Programme for the TRANSmutation of High-Level Nuclear Waste in an Accelerator Driven System) has been launched in the Euratom Sixth Framework Programme (FP6) and has officially started in April 2005 for a duration of four years. This project is the logical continuation of several activities worked out within the previous Framework Programme (FP5), namely the ADOPT network, the FUETRA, BASTRA and TESTRA clusters and the PDS-XADS project. The project is divided into five main sub-projects or domains (DMs). SCK-CEN coordinates the DM1 DESIGN described hereafter. The aim of DM2 ECATS is to provide validated experimental input from relevant coupling experiments of an accelerator, a spallation target and a sub-critical blanket, while the development and demonstration of the associated technologies is devoted to the remaining DMs, DM3 AFTRA (fuels), DM4 DEMETRA (heavy liquid metal technologies) and DM5 NUDATRA (nuclear data). The objective of the DM1 DESIGN of IP EUROTRANS is to proceed by a significant jump towards the demonstration of the industrial transmutation through the ADS route. The strategy of European Transmutation Demonstration (ETD) is carried out with two interconnected activities: (1) the first activity is to develop an advanced design file leading to a short-term (i.e. realisation within the next 10 years) experimental demonstration of the technical feasibility of Transmutation (at 50 to 100 MWth) in an Accelerator Driven System (XT-ADS). Liquid lead-bismuth eutectic (LBE) is used as primary coolant and material for the spallation target and the core is designed with standard MOX fuel; (2) the second activity is to carry out in parallel a reference conceptual design for a modular EFIT (European Facility for Industrial Transmutation) machine with a power of up to several 100 MWth, as a basis for a cost estimate and safety studies for an ADS-based transmutation system. For the EFIT, liquid lead is used

  14. iPS cells to model CDKL5-related disorders.

    Science.gov (United States)

    Amenduni, Mariangela; De Filippis, Roberta; Cheung, Aaron Y L; Disciglio, Vittoria; Epistolato, Maria Carmela; Ariani, Francesca; Mari, Francesca; Mencarelli, Maria Antonietta; Hayek, Youssef; Renieri, Alessandra; Ellis, James; Meloni, Ilaria

    2011-12-01

    Rett syndrome (RTT) is a progressive neurologic disorder representing one of the most common causes of mental retardation in females. To date mutations in three genes have been associated with this condition. Classic RTT is caused by mutations in the MECP2 gene, whereas variants can be due to mutations in either MECP2 or FOXG1 or CDKL5. Mutations in CDKL5 have been identified both in females with the early onset seizure variant of RTT and in males with X-linked epileptic encephalopathy. CDKL5 is a kinase protein highly expressed in neurons, but its exact function inside the cell is unknown. To address this issue we established a human cellular model for CDKL5-related disease using the recently developed technology of induced pluripotent stem cells (iPSCs). iPSCs can be expanded indefinitely and differentiated in vitro into many different cell types, including neurons. These features make them the ideal tool to study disease mechanisms directly on the primarily affected neuronal cells. We derived iPSCs from fibroblasts of one female with p.Q347X and one male with p.T288I mutation, affected by early onset seizure variant and X-linked epileptic encephalopathy, respectively. We demonstrated that female CDKL5-mutated iPSCs maintain X-chromosome inactivation and clones express either the mutant CDKL5 allele or the wild-type allele that serve as an ideal experimental control. Array CGH indicates normal isogenic molecular karyotypes without detection of de novo CNVs in the CDKL5-mutated iPSCs. Furthermore, the iPS cells can be differentiated into neurons and are thus suitable to model disease pathogenesis in vitro.

  15. New-generation security network with synergistic IP sensors

    Science.gov (United States)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  16. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  17. Efficient coding and detection of ultra-long IDs for visible light positioning systems.

    Science.gov (United States)

    Zhang, Hualong; Yang, Chuanchuan

    2018-05-14

    Visible light positioning (VLP) is a promising technique to complement Global Navigation Satellite System (GNSS) such as Global positioning system (GPS) and BeiDou Navigation Satellite System (BDS) which features the advantage of low-cost and high accuracy. The situation becomes even more crucial for indoor environments, where satellite signals are weak or even unavailable. For large-scale application of VLP, there would be a considerable number of Light emitting diode (LED) IDs, which bring forward the demand of long LED ID detection. In particular, to provision indoor localization globally, a convenient way is to program a unique ID into each LED during manufacture. This poses a big challenge for image sensors, such as the CMOS camera in everybody's hands since the long ID covers the span of multiple frames. In this paper, we investigate the detection of ultra-long ID using rolling shutter cameras. By analyzing the pattern of data loss in each frame, we proposed a novel coding technique to improve the efficiency of LED ID detection. We studied the performance of Reed-Solomon (RS) code in this system and designed a new coding method which considered the trade-off between performance and decoding complexity. Coding technique decreases the number of frames needed in data processing, significantly reduces the detection time, and improves the accuracy of detection. Numerical and experimental results show that the detected LED ID can be much longer with the coding technique. Besides, our proposed coding method is proved to achieve a performance close to that of RS code while the decoding complexity is much lower.

  18. The Inventory of Depressive Symptomatology Self Report (IDS-SR: Psychometric properties of the Indonesian version.

    Directory of Open Access Journals (Sweden)

    Retha Arjadi

    Full Text Available Depression screening and examination in Indonesia are highly challenging due to the disproportionately low number of mental health professionals in comparison to the Indonesian population. Self-report questionnaires on depression are cost-effective and time-efficient. The current study investigates the psychometric properties of the Indonesian Inventory of Depressive Symptomatology Self Report (IDS-SR.The participants were 904 Indonesians (aged 16-61; 50.2% female, recruited via an online survey using Qualtrics. Confirmatory factor analysis of the one-factor, three-factor, and four-factor model were explored. Convergent and divergent validity of the total score of the Indonesian IDS-SR and each factor were examined, as well as the Cronbach's Alpha reliability. In addition, an optimal cut-off score for the Indonesian IDS-SR was established using ROC curve analysis.The three-factor model of "cognitive/mood", "anxiety/arousal", and "sleep disturbance" was the best fit with the Indonesian IDS-SR data. Convergent and divergent validity were good. Cronbach's Alpha reliability was excellent for the total score, good for the factors "cognitive/mood" and "anxiety/arousal", but insufficient for the factor "sleep disturbance". The optimal cut-off score of the Indonesian IDS-SR was 14, with 87% sensitivity and 86% specificity.As a multifactorial instrument to measure depression that has good validity and reliability, the Indonesian IDS-SR can be used to assess depressive symptoms for the purpose of research and clinical practice. The optimal cut-off score of the Indonesian IDS-SR is in accordance with the internationally used cut-off score.

  19. Association between ACE gene I/D polymorphism and clinical presentation and prognosis of sarcoidosis.

    Science.gov (United States)

    Alía, P; Mañá, J; Capdevila, O; Alvarez, A; Navarro, M A

    2005-01-01

    Serum angiotensin converting enzyme (SACE) concentration is considered a marker of sarcoidosis activity. This concentration is influenced by an insertion/deletion (I/D) polymorphism of the ACE gene, such that SACE levels follow the pattern DD>ID>II. The aim of our work was to study the relationship between I/D polymorphism and susceptibility to sarcoidosis, as well as the relation between this polymorphism and the clinical presentation and evolution of the disease in 177 sarcoidosis patients. A group of 104 individuals without sarcoidosis was included as control. Genotyping was done by a polymerase chain reaction (PCR) method, and SACE concentration at diagnosis was determined by a kinetic method. No differences were observed in genotype or allele distributions between patients and controls, nor between patients considering the type of presentation (Löfgren versus non-Löfgren) and evolution of the disease (acute versus chronic). As reported for healthy populations, SACE concentrations followed the pattern DD>ID>II in sarcoidosis patients, but significant differences between genotypes existed only in the Löfgren group (p = 0.003) and in acute patients (p = 0.02). SACE concentrations at diagnosis were lower in acute patients (p = 0.05) and in Löfgren's syndrome (p = 0.04), but this seemed to occur only in ID individuals (p = 0.02 and p = 0.01, respectively). No relation was thus found between I/D polymorphism and susceptibility to sarcoidosis, but ACE I/D genotyping may improve the assessment of disease activity, both at diagnosis and during the follow-up of treated and untreated patients.

  20. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  1. Validation of the Spanish version of the Irrational Procrastination Scale (IPS.

    Directory of Open Access Journals (Sweden)

    Georgina Guilera

    Full Text Available The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS. The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64. Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  2. CMT: a constrained multi-level thresholding approach for ChIP-Seq data analysis.

    Directory of Open Access Journals (Sweden)

    Iman Rezaeian

    Full Text Available Genome-wide profiling of DNA-binding proteins using ChIP-Seq has emerged as an alternative to ChIP-chip methods. ChIP-Seq technology offers many advantages over ChIP-chip arrays, including but not limited to less noise, higher resolution, and more coverage. Several algorithms have been developed to take advantage of these abilities and find enriched regions by analyzing ChIP-Seq data. However, the complexity of analyzing various patterns of ChIP-Seq signals still needs the development of new algorithms. Most current algorithms use various heuristics to detect regions accurately. However, despite how many formulations are available, it is still difficult to accurately determine individual peaks corresponding to each binding event. We developed Constrained Multi-level Thresholding (CMT, an algorithm used to detect enriched regions on ChIP-Seq data. CMT employs a constraint-based module that can target regions within a specific range. We show that CMT has higher accuracy in detecting enriched regions (peaks by objectively assessing its performance relative to other previously proposed peak finders. This is shown by testing three algorithms on the well-known FoxA1 Data set, four transcription factors (with a total of six antibodies for Drosophila melanogaster and the H3K4ac antibody dataset.

  3. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  4. Validation of the Spanish version of the Irrational Procrastination Scale (IPS)

    Science.gov (United States)

    Guilera, Georgina; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18–77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population. PMID:29304119

  5. Validation of the Spanish version of the Irrational Procrastination Scale (IPS).

    Science.gov (United States)

    Guilera, Georgina; Barrios, Maite; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  6. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    Energy Technology Data Exchange (ETDEWEB)

    Junqing, Guo; Liu, Chen; Hongwu, Ai; Jiannian, Jing; Jiyong, Zhou; Chuyu, Zhang; Shangyou, You

    2004-07-23

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-{gamma} inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V{sub H} region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo.

  7. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    International Nuclear Information System (INIS)

    Guo Junqing; Chen Liu; Ai Hongwu; Jing Jiannian; Zhou Jiyong; Zhang Chuyu; You Shangyou

    2004-01-01

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-γ inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V H region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo

  8. Benefit-Cost Analysis of Integrated Paratransit Systems : Volume 4. Issues in Community Acceptance and IP Implementation.

    Science.gov (United States)

    1979-09-01

    The report describes various factors which influence community acceptance of integrated paratransit (IP) systems. In order to fully explore past events in those communities which have already accepted IP, a case study approach has been used. Seven we...

  9. Limitations and possibilities of low cell number ChIP-seq

    Directory of Open Access Journals (Sweden)

    Gilfillan Gregor D

    2012-11-01

    Full Text Available Abstract Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP, we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells, and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance.

  10. Optimal use of tandem biotin and V5 tags in ChIP assays

    Directory of Open Access Journals (Sweden)

    Krpic Sanja

    2009-02-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP assays coupled to genome arrays (Chip-on-chip or massive parallel sequencing (ChIP-seq lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes.

  11. Optimal use of tandem biotin and V5 tags in ChIP assays

    Science.gov (United States)

    Kolodziej, Katarzyna E; Pourfarzad, Farzin; de Boer, Ernie; Krpic, Sanja; Grosveld, Frank; Strouboulis, John

    2009-01-01

    Background Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes. PMID:19196479

  12. Managing the PSTN transformation a blueprint for a successful migration to IP-based networks

    CERN Document Server

    Dornheim, Sandra

    2015-01-01

    While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the boo

  13. Msd1/SSX2IP-dependent microtubule anchorage ensures spindle orientation and primary cilia formation

    OpenAIRE

    Hori, Akiko; Ikebe, Chiho; Tada, Masazumi; Toda, Takashi

    2014-01-01

    Anchoring microtubules to the centrosome is critical for cell geometry and polarity, yet the molecular mechanism remains unknown. Here we show that the conserved human Msd1/SSX2IP is required for microtubule anchoring. hMsd1/SSX2IP is delivered to the centrosome in a centriolar satellite-dependent manner and binds the microtubule-nucleator ?-tubulin complex. hMsd1/SSX2IP depletion leads to disorganised interphase microtubules and misoriented mitotic spindles with reduced length and intensity....

  14. Thermostability of IFN-γ and IP-10 release assays for latent infection with Mycobacterium tuberculosis

    DEFF Research Database (Denmark)

    Blauenfeldt, Thomas; Wagner, Dirk; Aabye, Martine Grosos

    2016-01-01

    accuracy of IP-10 release assay and IGRAs. RESULTS: We included 65 patients with confirmed pulmonary tuberculosis and 160 healthy controls from 6 European centres collaborating in the TBnet. In patients, IP-10 responses increased 1.07 (IQR 0.90-1.36) fold and IFN-γ responses decreased 0.88 (IQR 0......INTRODUCTION: Interferon-γ (IFN-γ) inducible protein 10kD (IP-10) and IFN-γ release assays (IGRAs) are immunodiagnostic tests aiming to identify the presence of specific cellular immune responses, interpreted as markers for latent infection with Mycobacterium tuberculosis. Incubation at higher...

  15. Triazolophostins: a library of novel and potent agonists of IP3 receptors

    OpenAIRE

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin William; Sureshan, Kana M

    2015-01-01

    IP3 receptors are channels that mediate the release of Ca2+ from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of sy...

  16. Identification and genetic analysis of Panama-genotype Venezuelan equine encephalitis virus subtype ID in Peru.

    Science.gov (United States)

    Oberste, M S; Weaver, S C; Watts, D M; Smith, J F

    1998-01-01

    Venezuelan equine encephalitis (VEE) virus was isolated in 1993, 1994, and 1995 from human cases of acute, undifferentiated, febrile illness in the Peruvian Amazon Basin. Two virus isolates were recovered in 1994 from Peruvian soldiers at a jungle outpost near Pantoja in northern Peru, and 10 isolates were obtained from military personnel and civilians in 1993-1995 in Iquitos, an urban center in northeastern Peru. The genetic relationship of these isolates to other VEE virus strains was determined by sequencing 856-867 nucleotide reverse transcription-polymerase chain reaction fragments derived from the PE2 glycoprotein gene. The sequences were compared with those of other VEE virus strains, including representatives of the IAB, IC, ID, IE, II, and IIIC subtypes. The two Pantoja isolates were most closely related to subtype IC and ID viruses previously isolated in Colombia and Venezuela, and to the ID viruses isolated during the 1970s in Iquitos. All of the recent Iquitos isolates were similar to one another, but they were more closely related to Panamanian ID strains than to isolates previously obtained in Iquitos, Peru, or in Colombia and Venezuela. The recent Iquitos VEE viral isolates were the first Panama-genotype VEE ID virus strains identified outside of the Republic of Panama.

  17. Relationship between major depressive disorder and ACE gene I/D polymorphism in a Turkish population

    Directory of Open Access Journals (Sweden)

    Sema Inanir

    2016-04-01

    Full Text Available Abstract Background Major depressive disorder (MDD is a complex disease and a significant health problem that is prevalent across the world. Angiotensin-converting enzyme (ACE has an important role in renin-angiotensin system (RAS and converts inactive angiotensin I to a potent vasopressor and aldosterone-stimulating peptide angiotensin II. Levels of ACE in plasma vary according to the insertion/deletion (I/D polymorphism of ACE gene. Objective The aim of the current study was to examine the influence ACE gene I/D variations on the risk of MDD. Methods In the present case-control study, we analyzed ACE I/D polymorphism in 346 MDD patients and 210 healthy subjects using polymerase chain reaction technique. Results Comparing the two groups, no significant difference was observed with regard to either genotype distributions or allele frequencies of the I/D polymorphism of ACE gene. Discussion Our findings suggest that the ACE I/D polymorphism is not associated with MDD in Turkish case-control study. Further studies are still needed.

  18. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  19. CASK inhibits ECV304 cell growth and interacts with Id1

    International Nuclear Information System (INIS)

    Qi Jie; Su Yongyue; Sun Rongju; Zhang Fang; Luo Xiaofeng; Yang Zongcheng; Luo Xiangdong

    2005-01-01

    Calcium/calmodulin-dependent serine protein kinase (CASK) is generally known as a scaffold protein. Here we show that overexpression of CASK resulted in a reduced rate of cell growth, while inhibition of expression of endogenous CASK via RNA-mediated interference resulted in an increased rate of cell growth in ECV304 cells. To explore the molecular mechanism, we identified a novel CASK-interacting protein, inhibitor of differentiation 1 (Id1) with a yeast two-hybrid screening. Furthermore, endogenous CASK and Id1 proteins were co-precipitated from the lysates of ECV304 cells by immunoprecipitation. Mammalian two-hybrid protein-protein interaction assays indicated that CASK possessed a different binding activity for Id1 and its alternative splicing variant. It is known that Id proteins play important roles in regulation of cell proliferation and differentiation. Thus, we speculate that the regulation of cell growth mediated by CASK may be involved in Id1. Our findings indicate a novel function of CASK, the mechanism that remains to be further investigated

  20. Comparison of Integer Programming (IP) Solvers for Automated Test Assembly (ATA). Research Report. ETS RR-15-05

    Science.gov (United States)

    Donoghue, John R.

    2015-01-01

    At the heart of van der Linden's approach to automated test assembly (ATA) is a linear programming/integer programming (LP/IP) problem. A variety of IP solvers are available, ranging in cost from free to hundreds of thousands of dollars. In this paper, I compare several approaches to solving the underlying IP problem. These approaches range from…

  1. Blockade of IP[subscript 3]-Mediated SK Channel Signaling in the Rat Medial Prefrontal Cortex Improves Spatial Working Memory

    Science.gov (United States)

    Brennan, Avis R.; Dolinsky, Beth; Vu, Mai-Anh T.; Stanley, Marion; Yeckel, Mark F.; Arnsten, Amy F. T.

    2008-01-01

    Planning and directing thought and behavior require the working memory (WM) functions of prefrontal cortex. WM is compromised by stress, which activates phosphatidylinositol (PI)-mediated IP[subscript 3]-PKC intracellular signaling. PKC overactivation impairs WM operations and in vitro studies indicate that IP[subscript 3] receptor (IP[subscript…

  2. Functional role of EF-hands 3 and 4 in membrane-binding of KChIP1

    Indian Academy of Sciences (India)

    Prakash

    type KChIP1, truncated KChIP1 exhibited lower lipid-binding capability. Compared with wild-type KChIP1, increasing membrane permeability by the use of digitonin caused a marked .... with sonication, the supernatant (soluble protein fractions).

  3. Crowdsourcing Disease Biomarker Discovery Research: The IP4IC Study.

    Science.gov (United States)

    Chancellor, Michael B; Bartolone, Sarah N; Veerecke, Andrew; Lamb, Laura E

    2018-05-01

    Biomarker discovery is limited by readily assessable, cost efficient human samples available in large numbers that represent the entire heterogeneity of the disease. We developed a novel, active participation crowdsourcing method to determine BP-RS (Bladder Permeability Defect Risk Score). It is based on noninvasive urinary cytokines to discriminate patients with interstitial cystitis/bladder pain syndrome who had Hunner lesions from controls and patients with interstitial cystitis/bladder pain syndrome but without Hunner lesions. We performed a national crowdsourcing study in cooperation with the Interstitial Cystitis Association. Patients answered demographic, symptom severity and urinary frequency questionnaires on a HIPAA (Health Insurance Portability and Accountability Act) compliant website. Urine samples were collected at home, stabilized with a preservative and sent to Beaumont Hospital for analysis. The expression of 3 urinary cytokines was used in a machine learning algorithm to develop BP-RS. The IP4IC study collected a total of 448 urine samples, representing 153 patients (147 females and 6 males) with interstitial cystitis/bladder pain syndrome, of whom 54 (50 females and 4 males) had Hunner lesions. A total of 159 female and 136 male controls also participated, who were age matched. A defined BP-RS was calculated to predict interstitial cystitis/bladder pain syndrome with Hunner lesions or a bladder permeability defect etiology with 89% validity. In this novel participation crowdsourcing study we obtained a large number of urine samples from 46 states, which were collected at home, shipped and stored at room temperature. Using a machine learning algorithm we developed BP-RS to quantify the risk of interstitial cystitis/bladder pain syndrome with Hunner lesions, which is indicative of a bladder permeability defect etiology. To our knowledge BP-RS is the first validated urine biomarker assay for interstitial cystitis/bladder pain syndrome and one of the

  4. Inhibitor of DNA binding 1 (Id1) induces differentiation and proliferation of mouse embryonic carcinoma P19CL6 cells

    International Nuclear Information System (INIS)

    Meng, Qingzhen; Jia, Zhuqing; Wang, Weiping; Li, Binhong; Ma, Kangtao; Zhou, Chunyan

    2011-01-01

    Highlights: → Id1 was upregulated during the cardiac differentiation process of P19CL6 cells. → Id1 upregulated expression of cardiac specific genes Gata4, α-MHC and ISL1. → Id1 promoted proliferation of P19CL6 cells. → Overexpression of Id1 increased activity of TOP flash. → Wnt3a or LiCl treatment promoted Id1 expression in P19CL6 cells. -- Abstract: The inhibitor of DNA binding (Id) family of genes encodes negative regulators of basic helix-loop-helix transcription factors and has been implicated in such diverse cellular processes as differentiation, proliferation, apoptosis and migration. Id knockout mouse embryos display multiple cardiac defects but the specific role of Id1 in cardiac differentiation is unclear. In the present study, we investigated the function of Id1 in DMSO-induced P19CL6 cells, a widely-accepted cell model of cardiac differentiation. We found that Id1 was upregulated during the cardiac differentiation of P19CL6 cells. The expression of cardiac specific marker genes, Gata4, α-MHC and ISL1, was upregulated in P19CL6 cells stably transfected with Id1 (P19CL6-Id1) during cardiac differentiation. The overexpression of Id1 reduced the number of cells in G1 phase and increased the cell population in G2, M and S phases, while knockdown of Id1 increased the number of cells in G1 phase from 48.6 ± 2.51% to 62.2 ± 1.52% at day 0 of cardiac induction, and from 52.5 ± 3.41% to 63.7 ± 1.02% at day 3 after cardiac induction, indicating that Id1 promoted proliferation of P19CL6 cells. Luciferase assays showed that the activity of TOP flash was higher in P19CL6-Id1 cells than wildtype P19CL6 cells, while Id1 expression was also upregulated in P19CL6 cells treated with Wnt3a or LiCl. This indicates that there may be positive feedback between Id1 and Wnt signaling which plays an important role in cardiac differentiation.

  5. Le traitement de l’idéologie dans la sociologie de Luc Boltanski

    Directory of Open Access Journals (Sweden)

    David Vrydaghs

    2006-10-01

    Full Text Available IntroductionLe concept d’idéologie apparaît dans la sociologie de Luc Boltanski à partir du Nouvel Esprit du capitalisme, publié en 1999. L’auteur y revient dans La Condition fœtale, paru en 2004. On aurait donc pu se contenter de ces ouvrages pour examiner le traitement réservé à l’idéologie dans la sociologie de Luc Boltanski. On préférera pourtant revenir aux travaux antérieurs du sociologue, et ce pour deux raisons.D’abord parce que le concept d’idéologie tel qu’il est employé dans Le Nou...

  6. Implementasi Cell ID dan GPS dalam Pencarian Lokasi Fasilitas Kesehatan Terdekat

    Directory of Open Access Journals (Sweden)

    Fahmi Candra Permana

    2017-07-01

    Full Text Available Cell ID dan GPS merupakan layanan berbasis lokasi dan teknologi yang banyak membantu manusia dalam hal navigasi dan penemuan tempat-tempat yang bermanfaat di sekitarnya. Salah satu komponen utama dari teknologi ini dapat diterapkan pada telepon seluler. Dalam penelitian ini, dirancang sebuah aplikasi dengan memanfaatkan teknologi berdasar implementasi dari Cell ID dan GPS untuk mengetahui posisi user dan lokasi fasilitas kesehatan terdekat di sekitar user dan penggunaan JSON sebagai sarana untuk menyimpan database pada web. Aplikasi ini diimplementasikan pada telepon seluler dengan sistem operasi Android. Hasil dari penelitian ini menunjukkan bahwa Cell ID dan GPS dapat diimplementasikan dengan baik dengan memanfaatkan akses Internet dan Google Maps untuk mencari fasilitas kesehatan terdekat dan menggambarkan daerah sekitar user.

  7. Examples of modelling IP in AEM data: synthetic and real data

    DEFF Research Database (Denmark)

    Viezzoli, Andrea; Kaminskiy, Vladislav; Fiandaca, Gianluca

    There have been multiple evidences in the literature in the past several years of what has been referred to as IP effect in the Time Domain Airborne EM data (TDEM). This phenomenon is known to be responsible for incorrect inversion modelling of electrical resistivity, lower interpreted depth...... of investigation and lost information about chargeability of the subsurface as well as about other valuable parameters. Historically there have been many suggestions to account for the IP effect using the Cole-Cole model. In current paper we are showing the possibility to extract IP information from airborne TDEM...... with both high electrical conductivity and in resistive environments. Furthermore, modelling of IP effects allows corrected resistivity models. The Amakinskaya kimberlite pipe results highlight the relevance of chargeability for kimberlite exploration....

  8. Input and Tracking of Continued Education Units and Qualification Data for the Information Professional (IP) Community

    National Research Council Canada - National Science Library

    Beard, LaShandra

    2004-01-01

    .... This research includes the training needs of all personnel within the IP community, from users to supervisors to executive-level managers extending to include designated sponsors/mentors and external...

  9. Computational Methods for ChIP-seq Data Analysis and Applications

    KAUST Repository

    Ashoor, Haitham

    2017-01-01

    four main challenges. First, I address the problem of detecting histone modifications from ChIP-seq cancer samples. The presence of copy number variations (CNVs) in cancer samples results in statistical biases that lead to inaccurate predictions when

  10. Research on TCP/IP network communication based on Node.js

    Science.gov (United States)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  11. Analysis of Voice Quality Problems of Voice Over Internet Protocol (VoIP)

    National Research Council Canada - National Science Library

    Tasyumruk, Lutfullah

    2003-01-01

    .... Additionally, the emergence of 3rd Generation (3G) cellular technology which offers high bandwidth will result in the convergence of the Internet and the cellular networks which will further stimulate the growth of VoIP...

  12. Feasibility Study of VoIP Integration into the MYSEA Environment

    National Research Council Canada - National Science Library

    Tse, Lily

    2005-01-01

    .... VoIP is widely implemented with H.323 and Session Initiation Protocol (SIP) standards. However, both protocols are poorly designed for networks with common security solutions such as firewalls and Network Address Translation...

  13. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  14. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  15. Sate-of-the-art IP switching router architecture using SFQ technology

    International Nuclear Information System (INIS)

    Miyaho, N.; Miyahara, K.; Yamazaki, A.

    2006-01-01

    Taking the recent trend of rapid IP traffic increasing and QoS in the Internet into account, we propose an innovative IP router architecture from the viewpoint of minimum switching delay, switching capacity, QoS assurance for the next generation Internet services. We examined the IP router performance using superconductivity device simulator (WinS) assuming the future-generation Nb junction process and confirmed more than 300 GHz clock operation. For the evaluation of a novel IP switch architecture, we effectively apply the SFQ circuits using Josephson junctions to an extremely restricted function block in the switching node and a conventional semiconductor technology is also applied for the rest parts of the other function blocks inside it

  16. New approach in subjective and objective speech transmission quality measurement in TCP/IP networks

    International Nuclear Information System (INIS)

    Souček, Pavel; Slavata, Oldřich; Holub, Jan

    2015-01-01

    This paper deals with problems of speech transmission quality measurement in modern telecommunication networks. It focuses on problems caused by specific types of distortions and errors caused present in transmissions using TCP/IP networks

  17. [Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University].

    Science.gov (United States)

    Karpishchenko, S A

    This article is designed to report the results of the analysis ofacademic, scientific, and clinical activities of the Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University.

  18. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie R. Watzlaf

    2012-06-01

    Full Text Available Consumer-based, free Voice and video over the Internet Protocol (VoIP software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 

  19. [Microstructure and mechanical property of a new IPS-Empress 2 dental glass-ceramic].

    Science.gov (United States)

    Luo, Xiao-ping; Watts, D C; Wilson, N H F; Silsons, N; Cheng, Ya-qin

    2005-03-01

    To investigate the microstructure and mechanical properties of a new IPS-Empress 2 dental glass-ceramic. AFM, SEM and XRD were used to analyze the microstructure and crystal phase of IPS-Empress 2 glass-ceramic. The flexural strength and fracture toughness were tested using 3-point bending method and indentation method respectively. IPS-Empress 2 glass-ceramic mainly consisted of lithium disilicate crystal, lithium phosphate and glass matrix, which formed a continuous interlocking structure. The crystal phases were not changed before and after hot-pressed treatment. AFM showed nucleating agent particles of different sizes distributed on the highly polished ceramic surface. The strength and fracture toughness were 300 MPa and 3.1 MPam(1/2). The high strength and fracture toughness of IPS-Empress 2 glass ceramic are attributed to the fine lithium disilicate crystalline, interlocking microstructure and crack deflection.

  20. Applying the systems engineering approach to video over IP projects : workshop.

    Science.gov (United States)

    2011-12-01

    In 2009, the Texas Transportation Institute produced for the Texas Department of Transportation a document : called Video over IP Design Guidebook. This report summarizes an implementation of that project in the : form of a workshop. The workshop was...

  1. Determination of alpha particle detection efficiency of an imaging plate (IP) detector

    International Nuclear Information System (INIS)

    Rahman, N.M; Iida, Takao; Yamazawa, Hiromi; Moriizumi, Jun

    2006-01-01

    In order to determine the detection efficiency of the imaging plate (IP) detector, the true radioactivity of the alpha particles, which sampled in the collection media, should be known. The true radioactivity could be accurately predicted with the help of the reference alpha spectrometer measurement. The detection efficiency calculated for the IP was estimated with the theoretical curve and the experimental data. It is assumed that the air sample contained the decay products of both 222 Rn and 220 Rn series, the most significant sources of alpha particles. The present study estimated the detection efficiency of the IP as 39.3% with an uncertainty of 2.9 that is well enough to confirm the future use of the IP as a radiation detector. Experimental materials and methods are described. (S.Y.)

  2. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  3. VoIP Quality Measurements in a Multilevel Secure (MLS) Environment

    National Research Council Canada - National Science Library

    Adams, Jr, Coy M

    2008-01-01

    Voice over Internet Protocol (VoIP) is growing in popularity in the civilian and military communities due to its low cost and the management advantages it offers over traditional Public Switched Telephone Networks (PSTN) phone systems...

  4. ACE I/D genotype, adiposity, and blood pressure in children

    Directory of Open Access Journals (Sweden)

    Rothschild Max

    2009-03-01

    Full Text Available Abstract Background Angiotensin converting enzyme (ACE is a possible candidate gene that may influence both body fatness and blood pressure. Although several genetic studies have been conducted in adults, relatively few studies have examined the contribution of potential candidate genes, and specifically ACE I/D, on adiposity and BP phenotypes in childhood. Such studies may prove insightful for the development of the obesity-hypertension phenotype early in life. The purpose of this study was to examine differences in body fatness and resting blood pressure (BP by ACE I/D genotype, and determine if the association between adiposity and BP varies by ACE I/D genotype in children. Methods 152 children (75 girls, 77 boys were assessed for body composition (% body fat using dual energy x-ray absorbtiometry and resting BP according to American Heart Association recommendations. Buccal cell samples were genotyped using newly developed PCR-RFLP tests for two SNPs (rs4341 and rs4343 in complete linkage disequilibrium with the ACE I/D polymorphism. Partial correlations were computed to assess the ociations between % body fat and BP in the total sample and by genotype. ANCOVA was used to examine differences in resting BP by ACE I/D genotype and fatness groups. Results Approximately 39% of youth were overfat based on % body fat (>30% fat in girls, 25% fat in boys. Body mass, body mass index, and fat-free mass were significantly higher in the ACE D-carriers compared to the II group (p Conclusion ACE D-carriers are heavier than ACE II children; however, BP did not differ by ACE I/D genotype but was adversely influenced in the overfat D-carriers. Further studies are warranted to investigate the genetics of fatness and BP phenotypes in children.

  5. The ubiquitin ligase ASB4 promotes trophoblast differentiation through the degradation of ID2.

    Directory of Open Access Journals (Sweden)

    W H Davin Townley-Tilson

    Full Text Available Vascularization of the placenta is a critical developmental process that ensures fetal viability. Although the vascular health of the placenta affects both maternal and fetal well being, relatively little is known about the early stages of placental vascular development. The ubiquitin ligase Ankyrin repeat, SOCS box-containing 4 (ASB4 promotes embryonic stem cell differentiation to vascular lineages and is highly expressed early in placental development. The transcriptional regulator Inhibitor of DNA binding 2 (ID2 negatively regulates vascular differentiation during development and is a target of many ubiquitin ligases. Due to their overlapping spatiotemporal expression pattern in the placenta and contrasting effects on vascular differentiation, we investigated whether ASB4 regulates ID2 through its ligase activity in the placenta and whether this activity mediates vascular differentiation. In mouse placentas, ASB4 expression is restricted to a subset of cells that express both stem cell and endothelial markers. Placentas that lack Asb4 display immature vascular patterning and retain expression of placental progenitor markers, including ID2 expression. Using JAR placental cells, we determined that ASB4 ubiquitinates and represses ID2 expression in a proteasome-dependent fashion. Expression of ASB4 in JAR cells and primary isolated trophoblast stem cells promotes the expression of differentiation markers. In functional endothelial co-culture assays, JAR cells ectopically expressing ASB4 increased endothelial cell turnover and stabilized endothelial tube formation, both of which are hallmarks of vascular differentiation within the placenta. Co-transfection of a degradation-resistant Id2 mutant with Asb4 inhibits both differentiation and functional responses. Lastly, deletion of Asb4 in mice induces a pathology that phenocopies human pre-eclampsia, including hypertension and proteinuria in late-stage pregnant females. These results indicate that

  6. Optimalisasi Kinerja (Internet Protocol) Ip Clock Pada Jaringan Base Transceiver Station (Bts)

    OpenAIRE

    Budiyanto, Setiyo; Saputra, Apipi

    2016-01-01

    Pada sistem komunikasi GSM (Global System for Mobile), BTS (Base Transceiver Station) merupakan jantung dari sebuah cell site layanan telekomunikasi. BTS merupakan perangkat pemancar dan penerima yang menangani akses radio dan berinteraksi langsung dengan Mobile Station (MS) melalui air interface. Sebuah optimasi kinerja ip clock pada base transceiver station (BTS) metode untuk sinkronisasi jaringan untuk jam global yang berasal dari jam GPS diakuisisi oleh sejumlah BTS. IP clock didistribusi...

  7. A simple method to quantitate IP-10 in dried blood and plasma spots.

    Directory of Open Access Journals (Sweden)

    Martine G Aabye

    Full Text Available BACKGROUND: Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn screening. AIM: To develop a robust and sensitive ELISA-based assay for IP-10 detection in plasma, dried blood spots (DBS and dried plasma spots (DPS; to validate the ELISA in clinically relevant samples; and to assess the performance of the assay for detection of Cytomegalovirus (CMV and M.tuberculosis specific immune responses. METHOD: We raised mice and rat monoclonal antibodies against human IP-10 and developed an ELISA. The assay was validated and applied to the detection of CMV and M.tuberculosis specific responses in 18 patients with immune reactivity towards M.tuberculosis and 32 healthy controls of which 22 had immune reactivity towards CMV and none towards M.tuberculosis. We compared the performance of this new assay to IFN-γ. RESULTS: The ELISA was reliable for IP-10 detection in both plasma and filter paper samples. The linear range of the ELISA was 2.5-600 pg/ml. IFN-γ was not readily detectable in DPS samples. IP-10 was stabile in filter paper samples for at least 4 weeks at 37 °C. The correlation between IP-10 detected in plasma, DPS and DBS samples was excellent (r(2>0.97. CONCLUSIONS: This newly developed assay is reliable for IP-10 quantification in plasma, DBS and DPS samples from antigen stimulated and non-stimulated whole blood. The filter paper assays enable easy sample acquisition and transport at ambient temperature e.g. via the postal system. The system can potentially simplify diagnostic assays for M.tuberculosis and CMV infection.

  8. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    OpenAIRE

    R. Shalin; D. Kesavaraja

    2012-01-01

    The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmissi...

  9. Integrated care for mental health social inclusion through job placement: Implementing IPS in Spain

    OpenAIRE

    Koatz, Débora; Hilarión, Pilar; Bonet, Pere; Suñol, Rosa

    2016-01-01

    Introduction: Individual Placement and Support (IPS) is an integrated social, labor and mental health intervention with an important component of evidence for its effectiveness in helping people with severe mental disorders. Its objective is to obtain and maintain competitive jobs, increase social inclusion and quality of life, and while consuming fewer resources. In Europe, IPS model (which began 14 year ago) is currently implemented in four countries which share background with Dartmouth Co...

  10. TCP/IP Communication System for Controlling a Vehicular Traffic Intersection

    Directory of Open Access Journals (Sweden)

    Pedraza-Martínez Luis Fernando

    2013-10-01

    Full Text Available This paper describes the development of a prototype of a vehicular traffic controller, whose system of communication is based on the TCP/IP protocol, in order to re- motely monitor and control the operation of traffic lights for a vehicular intersection. The results show the times of communication between the central and the traffic controller. The conclusions highlight the importance of using the TCP/IP protocol in traffic light systems.

  11. Value-Based Billing in a 3G IP Services Environment

    OpenAIRE

    Ryan, Conor; Donnelly, William; de Leastar, Eamonn; Cloney, James

    2002-01-01

    The proliferation of IP-based services has resulted in a paradigm shift away from traditional flat-rat, single service billing to content and usage based billing for composed service sets. The Information Societies Technology (IST) FORM project has prototyped an accounting and billing solution for IP-based telecommunications services. A key element of the solution is the IPDR Network Data Management - Usage specification. This paper presents the FORM development of a federated accounting and ...

  12. Legal Protection on IP Cores for System-on-Chip Designs

    Science.gov (United States)

    Kinoshita, Takahiko

    The current semiconductor industry has shifted from vertical integrated model to horizontal specialization model in term of integrated circuit manufacturing. In this circumstance, IP cores as solutions for System-on-Chip (SoC) have become increasingly important for semiconductor business. This paper examines to what extent IP cores of SoC effectively can be protected by current intellectual property system including integrated circuit layout design law, patent law, design law, copyright law and unfair competition prevention act.

  13. IP-telefon säästab oluliselt sidekulusid / Kristjan Otsmann

    Index Scriptorium Estoniae

    Otsmann, Kristjan, 1971-

    2005-01-01

    Telekomifirma Norby Telecomi poolt pakutavast IP-telefonist ehk helistamisest läbi Interneti, millega saab vähendada sidekulusid mitmeid kordi. Erinevatest internetipõhise kõnesidelahenduse lisateenustest. Vt. samas: Saaremaa Spa Hotellid säästab tuhandeid kroone kuus [intervjuu Saaremaa Spa Hotellide IT-juhiga Andri Võrguga]; Kuus olulist tööd enne IP-lahenduse tellimist

  14. The Worldwide Interplanetary Scintillation (IPS) Stations (WIPSS) Network October 2016 Observing Campaign: Initial WIPSS Data Analyses

    Science.gov (United States)

    Bisi, M. M.; Fallows, R. A.; Jackson, B. V.; Tokumaru, M.; Gonzalez-Esparza, A.; Morgan, J.; Chashei, I. V.; Mejia-Ambriz, J.; Tyul'bashev, S. A.; Manoharan, P. K.; De la Luz, V.; Aguilar-Rodriguez, E.; Yu, H. S.; Barnes, D.; Chang, O.; Odstrcil, D.; Fujiki, K.; Shishov, V.

    2017-12-01

    Interplanetary Scintillation (IPS) allows for the determination of velocity and a proxy for plasma density to be made throughout the corona and inner heliosphere. Where sufficient observations are undertaken, the results can be used as input to the University of California, San Diego (UCSD) three-dimensional (3-D) time-dependent tomography suite to allow for the full 3-D reconstruction of both velocity and density throughout the inner heliosphere. By combining IPS results from multiple observing locations around the planet, we can increase both the temporal and spatial coverage across the whole of the inner heliosphere and hence improve forecast capability. During October 2016, a unique opportunity arose whereby the European-based LOw Frequency ARray (LOFAR) radio telescope was used to make nearly four weeks of continuous observations of IPS as a heliospheric space-weather trial campaign. This was expanded into a global effort to include observations of IPS from the Murchison Widefield Array (MWA) in Western Australia and many more observations from various IPS-dedicated WIPSS Network systems. LOFAR is a next-generation low-frequency radio interferometer capable of observing in the radio frequency range 10-250 MHz, nominally with up to 80 MHz bandwidth at a time. MWA in Western Australia is capable of observing in the 80-300 MHz frequency range nominally using up to 32 MHz of bandwidth. IPS data from LOFAR, ISEE, the MEXican Array Radio Telescope (MEXART), and, where possible, other WIPSS Network systems (such as LPI-BSA and Ooty), will be used in this study and we will present some initial findings for these data sets. We also make a first attempt at the 3-D reconstruction of multiple pertinent WIPSS results in the UCSD tomography. We will also try to highlight some of the potential future tools that make LOFAR a very unique system to be able to test and validate a whole plethora of IPS analysis methods with the same set of IPS data.

  15. ID-1 mass storage system for mainframe by using FDDI network

    International Nuclear Information System (INIS)

    Morita, Y.; Fujii, H.; Inoue, E.; Kodama, H. Manabe, A.; Miyamoto, A.; Nomachi, M.; Watase, Y.; Yasu, Y.

    1994-01-01

    The authors have developed an ID-1 mass storage system as a distributed data server for Fujitsu mainframe computers. The system consists of a SONY ID-1 recorder DIR-1000, a tape robot system DMS-24 and a SCSI-II interface DFC-1500, which are connected to Spar Station 10 with an FDDI interface. The maximum speed of 7.5 Mbytes/sec is achieved for data transfer between Sparc Station 10 memory and DIR-1000 with a buffer size of 1 Mbytes. The system has been used successfully since last October to migrate more than 1 Tbytes data

  16. Suurnimed jäid müümata / Maria-Kristiina Soomre

    Index Scriptorium Estoniae

    Soomre, Maria-Kristiina, 1978-

    2001-01-01

    9. mai Christie' oksjonist, müümata jäänud Picasso, Degas', Cezanne'i tööd. 8. mai Sotheby oksjonist, kus edukalt müüdi töid S. J. Seegeri kogust, 3,85 miljoni dollari eest M. Beckmanni "Perseuse viimane katsumus". Sotheby kaasaegse kunsti oksjonil New Yorgis müüdi 5,6 miljoni dollari eest J. Koonsi skulptuur M. Jacksonist. Müümata jäid A. Warholi "Viis supipurki", A. Calderi 3 skulptuuri

  17. Projectc conception for city logistics with utilization of IDS element applicated to the Nitra city

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2010-02-01

    Full Text Available Nowadays traffic situation in the town-residential area is characterized by growing requirement for quality and quantityof transfer performance and services that result in congestion increasing in the some towns. Currently the similar problem has Nitracity, where it is necessary to solve this situation immediately. One of the possibilities of increasing traffic fluency is to extend roads, butin case of Nitra that possibility is irrelevant because of non-available space. Other possibility is an utilization of IDS elements(Intelligent Transport System. The contribution presents the conception of transportation in the town, founded on creation of trafficcircles with subsequent IDS elements application.

  18. Multiplexed ChIP-Seq Using Direct Nucleosome Barcoding: A Tool for High-Throughput Chromatin Analysis.

    Science.gov (United States)

    Chabbert, Christophe D; Adjalley, Sophie H; Steinmetz, Lars M; Pelechano, Vicent

    2018-01-01

    Chromatin immunoprecipitation followed by sequencing (ChIP-Seq) or microarray hybridization (ChIP-on-chip) are standard methods for the study of transcription factor binding sites and histone chemical modifications. However, these approaches only allow profiling of a single factor or protein modification at a time.In this chapter, we present Bar-ChIP, a higher throughput version of ChIP-Seq that relies on the direct ligation of molecular barcodes to chromatin fragments. Bar-ChIP enables the concurrent profiling of multiple DNA-protein interactions and is therefore amenable to experimental scale-up, without the need for any robotic instrumentation.

  19. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  20. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.