WorldWideScience

Sample records for ipv6 deployment activities

  1. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  2. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  3. The production deployment of IPv6 on WLCG

    Science.gov (United States)

    Bernier, J.; Campana, S.; Chadwick, K.; Chudoba, J.; Dewhurst, A.; Eliáš, M.; Fayer, S.; Finnern, T.; Grigoras, C.; Hartmann, T.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Macmahon, E.; Martelli, E.; Millar, A. P.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Voicu, R.; Walker, C. J.; Wildish, T.

    2015-12-01

    The world is rapidly running out of IPv4 addresses; the number of IPv6 end systems connected to the internet is increasing; WLCG and the LHC experiments may soon have access to worker nodes and/or virtual machines (VMs) possessing only an IPv6 routable address. The HEPiX IPv6 Working Group has been investigating, testing and planning for dual-stack services on WLCG for several years. Following feedback from our working group, many of the storage technologies in use on WLCG have recently been made IPv6-capable. This paper presents the IPv6 requirements, tests and plans of the LHC experiments together with the tests performed on the group's IPv6 test-bed. This is primarily aimed at IPv6-only worker nodes or VMs accessing several different implementations of a global dual-stack federated storage service. Finally the plans for deployment of production dual-stack WLCG services are presented.

  4. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  5. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  6. Deployment of IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.

    2017-10-01

    The fraction of Internet traffic carried over IPv6 continues to grow rapidly. IPv6 support from network hardware vendors and carriers is pervasive and becoming mature. A network infrastructure upgrade often offers sites an excellent window of opportunity to configure and enable IPv6. There is a significant overhead when setting up and maintaining dual-stack machines, so where possible sites would like to upgrade their services directly to IPv6 only. In doing so, they are also expediting the transition process towards its desired completion. While the LHC experiments accept there is a need to move to IPv6, it is currently not directly affecting their work. Sites are unwilling to upgrade if they will be unable to run LHC experiment workflows. This has resulted in a very slow uptake of IPv6 from WLCG sites. For several years the HEPiX IPv6 Working Group has been testing a range of WLCG services to ensure they are IPv6 compliant. Several sites are now running many of their services as dual-stack. The working group, driven by the requirements of the LHC VOs to be able to use IPv6-only opportunistic resources, continues to encourage wider deployment of dual-stack services to make the use of such IPv6-only clients viable. This paper presents the working group’s plan and progress so far to allow sites to deploy IPv6-only CPU resources. This includes making experiment central services dual-stack as well as a number of storage services. The monitoring, accounting and information services that are used by jobs also need to be upgraded. Finally the VO testing that has taken place on hosts connected via IPv6-only is reported.

  7. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    user1

    gaming, and many other new applications cost even higher to be deployed on IPv4 ... mitigate the effects of the imminent depletion of the IPv4 address space and .... The government of Korea plans to achieve complete IPv6 transition in the.

  8. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  9. Deployment of 464XLAT (RFC6877) alongside IPv6-only CPU resources at WLCG sites

    Science.gov (United States)

    Froy, T. S.; Traynor, D. P.; Walker, C. J.

    2017-10-01

    IPv4 is now officially deprecated by the IETF. A significant amount of effort has already been expended by the HEPiX IPv6 Working Group on testing dual-stacked hosts and IPv6-only CPU resources. Dual-stack adds complexity and administrative overhead to sites that may already be starved of resource. This has resulted in a very slow uptake of IPv6 from WLCG sites. 464XLAT (RFC6877) is intended for IPv6 single-stack environments that require the ability to communicate with IPv4-only endpoints. This paper will present a deployment strategy for 464XLAT, operational experiences of using 464XLAT in production at a WLCG site and important information to consider prior to deploying 464XLAT.

  10. Evaluating IPv6 Adoption in the Internet

    Science.gov (United States)

    Colitti, Lorenzo; Gunderson, Steinar H.; Kline, Erik; Refice, Tiziana

    As IPv4 address space approaches exhaustion, large networks are deploying IPv6 or preparing for deployment. However, there is little data available about the quantity and quality of IPv6 connectivity. We describe a methodology to measure IPv6 adoption from the perspective of a Web site operator and to evaluate the impact that adding IPv6 to a Web site will have on its users. We apply our methodology to the Google Web site and present results collected over the last year. Our data show that IPv6 adoption, while growing significantly, is still low, varies considerably by country, and is heavily influenced by a small number of large deployments. We find that native IPv6 latency is comparable to IPv4 and provide statistics on IPv6 transition mechanisms used.

  11. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  12. IPv6 testing and deployment at Prague Tier 2

    Science.gov (United States)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  13. IPv6 testing and deployment at Prague Tier 2

    International Nuclear Information System (INIS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-01-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  14. Comparison Between IPv4 to IPv6 Transition Techniques

    OpenAIRE

    Cordeiro, Edwin; Carnier, Rodrigo; Zucchi, Wagner L

    2016-01-01

    The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This work makes an experimental comparison of techniques that use dual stack with a limited IPv4 address. This limited address might be a RFC 1918 address with a NAT at the Internet Service Provider (ISP) gateway, also known as Carrier Grade NAT (CG...

  15. IPv6 in ESnet

    International Nuclear Information System (INIS)

    Matthews, W.; Fink, B.; Hicks, S.; Grigaliunas, V.

    2001-01-01

    The importance of the Internet to modern High Energy Physics collaborators is clearly immense, and understanding how new developments in network technology impact networks is critical to the future design of experiments. The next generation Internet Protocol (IPv6) is being deployed on testbeds and production networks throughout the world. The protocol has been designed to solve todays internet problems, and many of the features will be core Internet services in the future. In this talk the features of the protocol will be described. Details will be given on the deployment at sites important to High Energy Physics Research and the network services operating at these sites. In particular IPv6 deployment on the U.S. Energy Sciences Network (ESnet) will be reviewed. The connectivity and performance between High Energy Physics Laboratories, Universities and Institutes will be discussed

  16. Implementation of IPv6 at the PřF JU

    OpenAIRE

    JOUDAL, Jakub

    2011-01-01

    Aspects of IPv6 implementation. Is the current network structure capable of deploying IPv6 JU? What would this change mean? What will be the financial costs of transition? The advantages of IPv6 in terms of high schools.

  17. IPV6 Deployment - Mauritius to benefit from Opportunities and World ...

    African Journals Online (AJOL)

    The current standard protocol, IPV4, has reached its limit in terms of addressing possibilities, being limited by the 32-bits addressing scheme. Its successor, IPV6, had been devised since the mid 1990's. In addition to handling the address limitations, IPV6 also includes a number of improved features, making it superior to ...

  18. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    Science.gov (United States)

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  19. WLCG and IPv6 - the HEPiX IPv6 working group

    Science.gov (United States)

    Campana, S.; Chadwick, K.; Chen, G.; Chudoba, J.; Clarke, P.; Eliáš, M.; Elwell, A.; Fayer, S.; Finnern, T.; Goossens, L.; Grigoras, C.; Hoeft, B.; Kelsey, D. P.; Kouba, T.; López Muñoz, F.; Martelli, E.; Mitchell, M.; Nairz, A.; Ohrenberg, K.; Pfeiffer, A.; Prelz, F.; Qi, F.; Rand, D.; Reale, M.; Rozsa, S.; Sciaba, A.; Voicu, R.; Walker, C. J.; Wildish, T.

    2014-06-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  20. WLCG and IPv6 – the HEPiX IPv6 working group

    International Nuclear Information System (INIS)

    Campana, S; Elwell, A; Goossens, L; Grigoras, C; Martelli, E; Nairz, A; Pfeiffer, A; Chadwick, K; Chen, G; Chudoba, J; Eliáš, M; Kouba, T; Clarke, P; Fayer, S; Finnern, T; Ohrenberg, K; Hoeft, B; Kelsey, D P; Muñoz, F López; Mitchell, M

    2014-01-01

    The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG). RIPE NCC, the European Regional Internet Registry (RIR), ran out ofIPv4 addresses in September 2012. The North and South America RIRs are expected to run out soon. In recent months it has become more clear that some WLCG sites, including CERN, are running short of IPv4 address space, now without the possibility of applying for more. This has increased the urgency for the switch-on of dual-stack IPv4/IPv6 on all outward facing WLCG services to allow for the eventual support of IPv6-only clients. The activities of the group include the analysis and testing of the readiness for IPv6 and the performance of many required components, including the applications, middleware, management and monitoring tools essential for HEP computing. Many WLCG Tier 1/2 sites are participants in the group's distributed IPv6 testbed and the major LHC experiment collaborations are engaged in the testing. We are constructing a group web/wiki which will contain useful information on the IPv6 readiness of the various software components and a knowledge base (http://hepix-ipv6.web.cern.ch/knowledge-base). This paper describes the work done by the working group and its future plans.

  1. IPv6-protokolla

    OpenAIRE

    Hautanen, Jukka-Pekka

    2012-01-01

    Tämän työn tarkoituksena on tutkia IPv6-protokollaa ja IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työn alussa tarkastellaan IPv6-protokollan historiaa ja tämän hetkistä levinneisyyttä. Työssä paneudutaan tarkemmin IPv6-protokollan pääpiirteisiin: IPv6-protokollan osoitetyypit ja niiden esitystavat, aliverkotus, IPv6-protokollan uudistetun otsikon rakenne ja uudet lisäotsikot. Edellä mainittuja pääpiirteitä verrataan tarvittaessa IPv4-protokollaan, jotta nähdään parannukset...

  2. Implementasi Migrasi Ipv4 Ke Ipv6

    OpenAIRE

    Syafrizal, Melwin; Qamar, Syamsul; Aji, Damawan Bayu

    2013-01-01

    IPv4 yang digunakan di jaringan publik (internet) sudah habis, sehingga kebutuhan koneksi internet baru tidak dapat dilayani. Layanan baru, konten baru, domain name baru, server baru, router baru tidak dapat koneksi ke internet, kecuali menggunakan IPv6. Migrasi IPv4 ke IPv6 bukan hal yang mudah, pengetahuan baru tentang IPv6 perlu dipelajari, kondisi-kondisi yang akan dialami akibat Perubahan IP, mekanisme transisi, atau mekanisme routing perlu dipahami. Cara-cara konfigurasi IPv6 pada berba...

  3. IPv4-protokollasta siirtyminen IPv6-protokollaan

    OpenAIRE

    Ylituomaala, Jaakko

    2011-01-01

    Tässä työssä tutkitaan IPv6-osoiteavaruutta, sekä IPv6-protokollan yhteensopivuutta IPv4-protokollan kanssa. Työssä käydään läpi myös yleisimmät IPv4-yhteensopivat IPv6-reititysmenetelmät. Tutkimuksessa tutustutaan pääpiirteittäin IPv4-osoiteluokkiin, itse osoitteisiin ja IPv4-headeriin. IPv4 osoiteryhmiä on viisi, jotka ovat A, B, C, D ja E. Lisäksi luodaan katsaus IPv4-headerin eri osioihin ja tutustutaan niiden käyttötarkoituksiin. Työssä käydään läpi myös osittain NAT-toiminto. Tu...

  4. IPv6 Essentials

    CERN Document Server

    Hagen, Silvia

    2006-01-01

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure

  5. A Brief History of MPLS Usage in IPv6

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2016-01-01

    Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers but also by servers and end-hosts. In parallel, researches have been conducted to discover and assess the usage of MPLS tunnels. Indeed, recent developments in the ICMP protocol make certain categories of MPLS tunnels transparent to traceroute probing. However, these studies focus only on IPv4, where MPLS is st...

  6. Transition from IPv4 to IPv6

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far t...... the adoption of IPv6 has come. It also includes a discussion on what but also who the drivers and barriers are, including an examination of the implications of implementing transfer markets for IPv4 addresses.......The paper examines the transition from IPv4 to IPv6. More specifically, the aim of the paper is to present information on the status of the transition process and on the drivers and barriers concerning this transition. This includes an update on the availability of IPv4 addresses and on how far...

  7. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  8. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  9. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  10. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  11. IPv6 testing and deployment at Prague Tier 2

    Czech Academy of Sciences Publication Activity Database

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek; Fiala, Lukáš

    2012-01-01

    Roč. 396, č. 4 (2012), s. 1-6 ISSN 1742-6588. [International Conference on Computing in High Energy and Nuclear Physics 2012 (CHEP2012). New York, 21.05.2012-25.05.2012] Institutional research plan: CEZ:AV0Z10100502 Keywords : IPv6 grid computing HEP Subject RIV: BF - Elementary Particles and High Energy Physics http://iopscience.iop.org/1742-6596/396/4/042034

  12. IPv4 to IPv6 Transformation Schemes

    Science.gov (United States)

    Miyakawa, Shin

    According to the recent observations of IPv4 (Internet Protocol version 4) address allocation status, it will be running out within few years. Consequently, to ensure the continuous extension of the Internet operation, introducing IPv6 (Internet Protocol version 6) protocol is surely needed. But at the same time, such transformation must be “smooth” for every Internet users and be compatible with today's IPv4 based practices. This paper describes several techniques and usage scenario which are discussed mainly in the IETF — Internet Engineering Task Force — and tried to be implemented as prototype products to transform today's Internet towards the IPv6 based one.

  13. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  14. IPv6:n tietoturvaominaisuudet

    OpenAIRE

    Sorsa, Kari

    2013-01-01

    Opinnäytetyön tavoitteena on esitellä IPv6-protokolla ja selvittää sen tärkeimmät tietoturvaominaisuudet ja -riskit. Työtä tullaan käyttämään teoreettisena apuna Turun Ammattikorkeakoulun Lemminkäisenkadun toimipisteen laboratorioverkon siirtämisessä IPv6:een. Opinnäytetyö on jaettu kolmeen osaan. Ensimmäisessä esitellään lyhyesti IPv6:n historia ja kehitysvaiheet sekä uuden protokollan ominaisuudet. Toinen osa koostuu ominaisuus- ja tietoturvavertailusta IPv4:n ja IPv6:n välillä, jo...

  15. Planning for IPv6

    CERN Document Server

    Hagen, Silvia

    2011-01-01

    It's official: with IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical-and nontechnical-steps involved. Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company. IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she co

  16. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering

    Directory of Open Access Journals (Sweden)

    Fuliang Li

    2017-01-01

    Full Text Available Internet Protocol (IP is used to identify and locate computers on the Internet. Currently, IPv4 still routes most Internet traffic. However, with the exhausting of IPv4 addresses, the transition to IPv6 is imminent, because, as the successor of IPv4, IPv6 can provide a larger available address space. Existing studies have addressed the notion that IPv6-centric next generation networks are widely deployed and applied. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss rate of IPv6 are similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, for example, 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct a first-ever analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3⁎10-6, which is much lower than that of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for operators and researchers of IPv6 networks.

  17. IPv6 Network Security using Snort

    OpenAIRE

    Kaur, Ravreet; Kumar, Sumit

    2013-01-01

    IPv6 is new routing protocol. IPv6 is introduced by IETF mainly due IPv4 address exhaustion but it is also an enhanced version of IPv4. There are many changes in IPv6 header, some fields from IPv6 header has been deprecated from IPv6 and some are newly added. There is also common misconception among people that IPv6 is more secure than IPv4, which is not true. Now a day's intruders are targeting IPv6 networks as it is widely being accepted by many organization for their network. An intruder c...

  18. PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFIC

    Directory of Open Access Journals (Sweden)

    Rupesh Jaiswal

    2015-12-01

    Full Text Available The gigantic growth of the internet communication technology has illustrated its value and benefits to private businesses, government organizations, worldwide professionals, academic institutes and individuals over the past few years. The size and range of computing devices connected to the internet, substantially increased because of IPv6 and offers the potential to establish a much more powerful internet compared to the IPv4. IPV6 developed by the IETF to deal with a shortage of IP addresses under IPv4. New features of IPv6 enhance packet processing speeds over routers, switches and end systems. These improved features will have different traffic characteristics than IPv4. The internet traffic which was earlier assumed as Poisson is now shown to have fractal characteristics as; heavy tailedness, self-similarity and long range dependency. Internet traffic showing above characteristics are found to have burstiness at multiple timescales. This behavior impacts network performance and degrades it substantially. It also increases complexity for network design and create difficulties to maintain desired QoS. IPv4 traffic has been well established as self-similar traffic. Nowadays, IPv6 forming a larger share of the internet traffic and it is pivotal to asses IPv6 with regards to fractal behavior. This will enable network designers to do necessary changes in the existing network to reconcile with IPv6. In this paper we compared IPv4 and IPv6 with respect to fractal behavioral characteristics. It is found that IPv6 shows higher degree of heavy tailedness, higher values of Hurst parameter values, higher fractal dimension values i.e. it is more self-similar, greater autocorrelation achieved even at larger lag and thus showing more burstiness.

  19. Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6

    Directory of Open Access Journals (Sweden)

    PAULINE RAHMIATI

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan dibandingkan 2 buah jaringan berbasis routing protokol OSPF, yaitu OSPF untuk IPv4 dan IPv6. Skenario pertama dilakukan 100 kali dalam 5 kasus untuk mengetahui nilai delay OSPF IPv4 dan OSPF IPv6. Skenario kedua dilakukan pemutusan link dilakukan sebanyak 30 kali, hal yang dilihat dari pengujian ini adalah hasil trace route dari cost yang ada. Skenario ketiga dilakukan dengan mengamati waktu konvergensi dari OSPF IPv4 dan IPv6. Secara keseluruhan nilai delay OSPF IPv6 lebih kecil dibandingkan dengan OSPF IPv4 sebesar 3-6%, Trace route dan nilai cost pada OSPF IPv6 dan OSPF IPv4 sama tetapi nilai delay OSPF IPv6 lebih kecil sebesar 3-6% dan waktu konvergensi OSPF IPv4 bernilai sama dengan OSPF IPv6 yaitu 10 detik. Kata kunci: OSPF, IPv4, Ipv6, delay, konvergensi Abstract OSPF (Open Shortest Path First is a routing protocol that opened and supported by a wide range of network devices. IPv4 has reached the maximum limit on the number of addresses that IPv6 are a solution in this case. Same as IPv4, IPv6 also has begun to be implemented for the OSPF routing protocol, therefore this study wiould design an IPv6 OSPF routing protocol and as a comparison will be compared to IPv4 OSPF. Cisco Packet Tracer 5.3 software was used to simulate the made network design. This research would compare two pieces of network-based routing protocol OSPF, OSPF for IPv4 and IPv6. The

  20. Current Status of IPv6 Management

    OpenAIRE

    Astic , Isabelle; Festor , Olivier

    2002-01-01

    Nowadays, we are at an important time of the development of the IPv6 (Internet Protocol version 6) network. Until now, this protocol was used only between IPv6 «islands». These islands were connected by IPv4 (Internet Protocol version 4) networks. So the transport of IPv6 packets was made through IPv4 ones, or into MPLS (MultiProtocol Label Switching) tunnels. Now, that real IPv6 native equipment appears, it is possible to create real native IPv6 networks.Because in these networks, IPv4 does ...

  1. Esimerkkiyrityksen IPv6-lähiverkko

    OpenAIRE

    Palkki, Ville

    2013-01-01

    Insinöörityön tavoitteena oli suunnitella ja toteuttaa esimerkkiyrityksen IPv6-lähiverkko. Toisena tavoitteena oli suunnitella esimerkkiyrityksen siirtyminen IPv4-protokollasta IPv6-protokollaan. Työssä käsiteltiin IPv6-protokollaa ensin teoreettisesti ja tämän jälkeen suunniteltiin sekä rakennettiin toimiva IPv6-lähiverkko. Aluksi työssä käytiin läpi IPv6-protokollan etuja verrattuna vanhaan IPv4-protokollaan. Teoriaosuudessa selvitettiin myös IPv6-protokollan rakennetta ja lähetysformaa...

  2. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  3. DNS and BIND on IPv6

    CERN Document Server

    Liu, Cricket

    2011-01-01

    If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6-Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.a

  4. IPv6 Test Bed for Testing Aeronautical Applications

    Science.gov (United States)

    Wilkins, Ryan; Zernic, Michael; Dhas, Chris

    2004-01-01

    Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.

  5. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  6. IPv6 Testing

    National Research Council Canada - National Science Library

    Landis, Christopher B

    2006-01-01

    .... The DoD is also forming working relationships to conduct testing and share information. IPv6 was developed to resolve the issues of IPv4, mainly the limited amount of addresses and lack of security...

  7. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  8. IPv6 Geolocation Using Latency Constraints

    Science.gov (United States)

    2014-03-01

    ground truth datasets. In doing so, we investigate the following: • What is the accuracy of CBG when geolocating IPv6 hosts? • What are the accuracy...the overall PL is shorter for IPv6 than IPv4 which is consistent to what was found in recent work discussed in Section 3.5. Note that the average PL...growth of IPv6 addresses has increased significantly since 2010.The rate of increase of IPv6 usage is expected to continue; thus the need to determine

  9. IPv6-specific misconfigurations in the DNS

    NARCIS (Netherlands)

    Hendriks, Luuk; de Boer, Pieter-Tjerk; Pras, Aiko

    2017-01-01

    With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection

  10. CORPORATE MIGRATION FROM IPv4 TO IPv6 USING DIFFERENT TRANSITION MECHANISMS

    OpenAIRE

    Nellore Karthikeyan*, K.Chandra Mouli

    2016-01-01

    Currently, the Internet world is confronting the huge issue that is exhaustion of IP addresses with the IPv4 protocol. This paper contains the imperative hypothetical ideas of new era Internet Protocol IPv6 which tackles the issue of IP tending to furthermore concentrate on IPv6 address design, directing and three mechanisms of migration from IPv4 to IPv6 system: Dual Stack, Translation and Tunneling utilizing Network Simulator as Packet tracer. This paper more accentuation on network migrati...

  11. Siirtyminen IPv6-protokollaan yrityksen verkkolaitteistossa

    OpenAIRE

    Lindén, Kalle

    2012-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, mitä muutoksia Päijät-Hämeen koulutuskonsernin (PHKK) tietoverkon runkolaitteissa tarvitsee tehdä, jotta voidaan ottaa IPv6-protokolla käyttöön. Siirtyminen IPv6-protokollaan tulee olemaan välttämätön toimenpide, koska IPv4-protokollasta loppuvat uudet yksilölliset osoitteet. IPv4- ja IPv6-protokollien suurimmat erot ovat osoitekentän koon kasvaminen 32 bitistä 128 bittiin. Aluksi IPv4-osoitteistuksessa oli käytössä luokallinen osoitejärjest...

  12. High-frequency mapping of the IPv6 Internet using Yarrp

    OpenAIRE

    Gaston, Eric W.

    2017-01-01

    Approved for public release; distribution is unlimited Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important component of global critical infrastructure and network policy. Unfortunately, the tools and techniques used to perform active network topology discovery were designed for Internet Protocol version 4 (IPv4), leading ...

  13. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security concerns when implementing IPv...

  14. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  15. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  16. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  17. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  18. Design and implementation of scalable IPv4-IPv6 internetworking gateway

    Science.gov (United States)

    Zhu, Guo-sheng; Yu, Shao-hua; Dai, Jin-you

    2008-11-01

    This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to modify the data forwarding plane.A SIP ALG of 3GPP IMS(IP Multimedia Subsystem)was implemented and tested under real China Next Generation Internet(CNGI) network environment.IPv4 SIP UEs can communicate with IPv6 SIP UEs through the gateway.

  19. Migrating Applications to IPv6

    CERN Document Server

    York, Dan

    2011-01-01

    If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. Explore changes you need to make in your application's user interfaceMake sure your application is retrieving corre

  20. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-11-01

    Full Text Available This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when...

  1. IPv6 geolokace a vizualizace

    OpenAIRE

    Suchomel, Tomáš

    2011-01-01

    Tato diplomová práce se zabývá problematikou geolokace IPv6 adres a vizualizace jejich lokalit. Má za úkol prozkoumat oblast IPv6, dále porovnává současné přístupy ke geolokaci. Jejím hlavním cílem je vybudovat systém, který dokáže vytvořit geolokační databázi s pravidelnou aktualizací a který bude schopen zobrazit geografickou lokalitu IPv6 adresy na světové mapě. Geolokační systém nejprve získá geografické adresy pro jednotlivé prefixy IPv6 z veřejně přístupného systému Whois. Tyto adresy t...

  2. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  3. Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2014-09-01

    Full Text Available The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation is IPv6. Many methods for the implementation of IPv6, one with tunneling. 6to4 is a tunneling method that can be directly implemented on an IPv4 network. This study compared the performance level of a pure IPv4 network, IPv6 6to4 tunneling with pure and searching FTP throughput performance. Throughput results obtained pure IPv6 is smaller than the value of 42.9% pure IPv4 throughput, 6to4 tunneling is smaller than 39.4% pure IPv4 and IPv6 pure value 53.626% greater throughput than 6to4 tunneling configuration.

  4. Caracterización de IPv6

    Directory of Open Access Journals (Sweden)

    Carlos A. Castillo Medina

    2013-05-01

    Full Text Available The present paper attempts to survey the current state of the network protocol called IPv6; starting from the evolution of IPv4 (which motivated the design of new features to the details that are comprised in the new version of the Internet Protocol. The main sections explain the drawbacks of IPv4 that can be overcome by implementing IPv6, highlighting aspects such as security, mobility, and Quality of Service (QoS.

  5. From IPv4 to eternity - the HEPiX IPv6 working group

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    The much-heralded exhaustion of the IPv4 networking address space has finally started. While many of the research and education networks have been ready and poised for years to carry IPv6 traffic, there is a well-known lack of academic institutes using the new protocols. One reason for this is an obvious absence of pressure due to the extensive use of NAT or that most currently still have sufficient IPv4 addresses. More importantly though, the fact is that moving your distributed applications to IPv6 involves much more than the routing, naming and addressing solutions provided by your campus and national networks. Application communities need to perform a full analysis of their applications, middleware and tools to confirm how much development work is required to use IPv6 and to plan a smooth transition. A new working group of HEPiX (http://www.hepix.org) was formed in Spring 2011 to address exactly these issues for the High Energy Physics community. The HEPiX IPv6 Working Group has been investigating the ma...

  6. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  7. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  8. Dynamics of Abusive IPv6 Networks

    Science.gov (United States)

    2014-09-01

    39 List of References 43 Initial Distribution List 47 vii THIS PAGE INTENTIONALLY LEFT BLANK viii List of Figures Figure 1.1 Google User IPv6 Adoption...2 Figure 1.1: Google User IPv6 Adoption Statistics, from June 2014 [3] For example, as a result of expanding use of IPv6, it is hypothesized that a...excessive annoyance of poorly crafted advertising emails, they can sometimes contain attachments or links to scam offers, phishing attempts, or malicious

  9. An IPv6 Multihomed Host for Outbound Traffic

    Science.gov (United States)

    Chen, Chin-Ling; Cao, Sheng-Lung

    Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host architecture to connect both IPv6 network and 6to4 network. This paper describes a load balance mechanism that allows applications on multihomed devices to utilize the individual networks efficiently to transmit streams that could be part of a session. We experiment the relevant parameters in the IPv6 testbed environment to demonstrate its effectiveness.

  10. Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    Directory of Open Access Journals (Sweden)

    Rosli Athirah

    2018-01-01

    Full Text Available The deployment of Internet Protocol version 6 (IPv6 has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6 equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.

  11. PROPUESTA DE CONEXIÓN DE ENTORNOS IPv6 MEDIANTE UN BACKBONE MPLS/IPv4

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gelvez García

    2013-09-01

    Full Text Available Las redes actuales MPLS/IPv4 presentan las ventajas de poder implementar ingeniería de tráfico, así como realizar diferenciación de flujos mediante clases de servicio (CoS frente a las redes con enrutamiento IP tradicional. En aras de aprovechar cualidades estratégicas durante la etapa de coexistencia entre IPv4 e IPv6 existen 4 métodos para proveer conectividad a islas IPv6 [1] remotas a través de una infraestructura de core MPLS con IPv4 nativo [2], sin embargo una de las formas que permite un rápida y fácil provisión de la misma dados los mínimos requisitos de configuración y de equipos es la de disponer túneles IPv6 en los enrutadores de acceso (CE de la red. No obstante, sus cuatro variantes (manual, GRE, 6to4 e IPv6 compatible IPv4 [3] resultan adecuadas o no según las características inherentes de la red a interconectar; por tanto este artículo presenta las ventajas y desventajas propias de la utilización de cada técnica de entunelamiento como resultado de la interconexión con los cuatro tipos de túneles de una red emulada mediante GNS3+Dynamips.

  12. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    International Nuclear Information System (INIS)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-01-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  13. Enabling IPv6 at FZU - WLCG Tier2 in Prague

    Science.gov (United States)

    Kouba, Tomáš; Chudoba, Jiří; Eliáš, Marek

    2014-06-01

    The usage of the new IPv6 protocol in production is becoming reality in the HEP community and the Computing Centre of the Institute of Physics in Prague participates in many IPv6 related activities. Our contribution presents experience with monitoring in HEPiX distributed IPv6 testbed which includes 11 remote sites. We use Nagios to check availability of services and Smokeping for monitoring the network latency. Since it is not always trivial to setup DNS in a dual stack environment properly, we developed a Nagios plugin for checking whether a domain name is resolvable when using only IP protocol version 6 and only version 4. We will also present local area network monitoring and tuning related to IPv6 performance. One of the most important software for a grid site is a batch system for a job execution. We will present our experience with configuring and running Torque batch system in a dual stack environment. We also discuss the steps needed to run VO specific jobs in our IPv6 testbed.

  14. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  15. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  16. A Literature Survey on Handoff for Mobile IPv6

    OpenAIRE

    Zongpu Jia; Gaolei Wang; Ran Zhao

    2011-01-01

    With the development of network technology, IPv6 will be widely used in the next generation Internet, IPv6 will be used in the next generation Internet, IPv6 could combine mobile networks and fixed wireless networks closely, which brings great convenience to people’s live. The handoff delay of Mobile IPv6 seriously affected the real-time communication service quality, therefore various improvement methods based on the basic Mobile IPv6 protocol are proposed. The working principle of Mob...

  17. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  18. TRANSPORTE DE VOZ (VoIP SOBRE REDES IPv4 e IPv6

    Directory of Open Access Journals (Sweden)

    Fausto Alexander Gamboa

    2012-05-01

    Full Text Available El presente artículo tiene como finalidad evaluar el comportamiento de la VoIP en redes IPv6 y compararlo con IPv4, de igual manera presentar las arquitecturas que la soportan. Con el fin de que los resultados sean los más cercanos a la realidad, el artículo no solo se soporta en simulaciones si no en implementaciones reales. Dentro de las conclusiones más sobresalientes se encontró que la VoIP6 presenta mejor rendimiento ante el Jitter y el retardo que VoIPv4.

  19. Investigating the Performance of the MPT Multipath Communication Library in IPv4 and IPv6

    Directory of Open Access Journals (Sweden)

    Béla Almási

    2016-01-01

    Full Text Available The currently used mobile devices (laptops, tablets, mobile phones contain many built-in network cards for communication (e.g. Wi-Fi, 3G, Bluetooth, etc.. A natural request could be combining the resources of the different network connection possibilities in order to increase the throughput of the communication. Unfortunately the standard IP communication technology does not support it: the communication is restricted to one IP address (i.e. to one interface. The Multipath TCP (MPTCP specification (appeared in January 2013 offers a Transport layer solution of using more than one interface in a TCP communication session. In this paper we investigate a Network layer solution. The MPT multipath communication library opens the multipath communication possibility in the Network layer. Using the MPT library, applications built on the UDP protocol are also able to perform multipath communication. The MPT library was developed by using a full dual-stack technology, which means the MPT based multipath environment can be used both in IPv4 and IPv6. Protocol version change is also possible: an IPv6 based application is able to run in an IPv4 multipath environment, and an IPv4 application can be used in an IPv6 multipath environment. In this paper we give a short overview on the MPT communication library’s working mechanism and detailed numerical examples will be shown to present how the MPT library aggregates the paths’ throughput in IPv4 and IPv6 environments. The main contribution of the paper is to demonstrate the effective throughput aggregation property of the MPT library in IPv6 and in mixed (i.e. protocol version change environments.

  20. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  1. Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2015-03-01

    Full Text Available Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA dan didelegasikan ke melalui otoritas masing-masing benua. IP sendiri terdiri dari 2 jenis versi yaitu IPv4 dan IPv6 dimana alokasi IPv4 dinyatakan habis di tingkat IANA pada bulan April 2011. Oleh karena itu, penggunaan IP diarahkan kepada penggunaan IPv6. Untuk melihat bagaimana kematangan suatu organisasi terhadap implementasi IPv6, penelitian ini mencoba membuat sebuah model tingkat kematangan penerapan IPv6. Konsep dasar dari model ini mengambil konsep Capability Maturity Model Integrated (CMMI, dengan beberapa tambahan yaitu roadmap migrasi IPv6 di Indonesia, Request for Comment (RFC yang terkait dengan IPv6 serta beberapa best-practice implementasi dari IPv6. Dengan konsep tersebut, penelitian ini menghasilkan konsep Capability Maturity for IPv6 Implementation.

  2. Kondisi Migrasi Internet Protocol version 6 (IPv6 di Indonesia

    Directory of Open Access Journals (Sweden)

    Fahrizal Lukman Budiono

    2011-06-01

    Full Text Available    Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri. Saat ini, jaringan Internet di Indonesia berikut perangkat-perangkat pendukungnya hingga di tingkat end user masih menggunakan Internet Protocol version 4 (IPv4. Kenyataan yang dihadapi dunia sekarang adalah menipisnya persediaan alamat IPv4 yang dialokasikan. Hal ini dikarenakan jumlah alamat yang dapat didukung oleh IPv4 adalah 232 bits, sedangkan data terakhir didapatkan bahwa alokasi IPv4 telah habis dialokasikan pada akhir April 2011 di tingkat Internet Assigned Numbers Authority (IANA, organisasi yang mengelola sumberdaya protokol Internet dunia. Untuk mempercepat migrasi, stakeholder internet di Indonesia yaitu Kementerian Komunikasi dan Informatika dan Industri Penyelenggara Internet membentuk ID-IPv6TF. Dalam studi ini, ditemukan bahwa implementasi IPv6 di Indonesia termasuk dalam kategori baik dibandingkan dengan negara lain di dunia. Namun, terlihat bahwa perkembangan ini masih sporadis dengan kurangnya peran koordinator, serta sosialiasi ke masyarakat yang tidak ada.

  3. IPv4 to IPv6 Transition: Optimal Routing Protocol within Dual Stack and Tunneling

    OpenAIRE

    Aparna Sivaprakash; S. Kayalvizhi

    2016-01-01

    The number of global internet users has been growing exponentially, necessitating a much larger number of unique IP addresses for all the connected networking devices. The prevalent IP version 4 is not able to meet the current requirement for IP addresses. To meet the future IP address requirement, a new version IPv6 has been introduced since 1999. However IPv6 is not backward compatible with IPv4.since it is not possible to migrate all the networking devices to ...

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  5. Discovery of IPV6 Router Interface Addresses via Heuristic Methods

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS by Matthew D. Gray September...AND SUBTITLE DISCOVERY OF IPV6 ROUTER INTERFACE ADDRESSES VIA HEURISTIC METHODS 5. FUNDING NUMBERS CNS-1111445 6. AUTHOR(S) Matthew D. Gray 7...Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude

  6. Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-06-01

    Full Text Available Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4 yang memiliki 4 miliar alamat unik. Data dari potaroo.net pada 18 maret 2011, diperkirakan alokasi IPv4 berakhir pada bulan May 2011. Dalam menghadapi keterbatasan IPv4 tersebut, dibuatlah konsep pengalamatan baru IPv6 yang memiliki jumlah alamat 6,5 x 1038 alamat unik. Di Indonesia sendiri dalam rangka mengantisipasi habisnya penggunaan IPv4 tersebut, stakeholder internet di Indonesia yang dikomandoi oleh Kementerian Komunikasi dan Informatika cq. Ditjen Postel membentuk Indonesia IPv6 Task Force (ID-IPv6TF. ID-IPv6TF merumuskan peta jalan / roadmap migrasi ke IPv6 versi 2 yang berakhir pada 2012. Studi ini melakukan evaluasi formatif sejauhmana kesiapan migrasi dari IPv4 ke IPv6 di Indonesia pada tingkat Penyelenggara Jaringan Internet  dengan melihat dari dimensi kesiapan aplikasi, strategi migrasi dan kesiapan infrastruktur. Kesiapan migrasi tersebut dikategorkan menjadi 5 level yaitu IPv6 Agnostic, IPv6 Aware,. Hasil studi menunjukkan bahwa Indonesia berada pada level IPv6 Savvy dengan distribusi level yang beragam.

  7. IPv6 Monitoring in Nederland : De Nulmeting

    NARCIS (Netherlands)

    Boen-Leo, M.; Holtzer, A.; Tijmes, M.R.; Smets, R.

    2010-01-01

    In dit document wordt de mate van uitrol van IPv6 in Nederland per april 2010 beschreven. De 'nulmeting' is uitgevoerd in opdracht van het Ministerie van Ecnomische Zaken en is de eerste van twee metingen die in 2010 worden uitgevoerd. Allereerst wordt een korte uitleg gegeven over IPv6 en het

  8. Implantación de IPv6 : red, mecanismos de transición IPv4-IPv6, servicios de aplicación y migración de aplicaciones

    OpenAIRE

    Rodríguez Hervella, Juan Francisco

    2003-01-01

    El presente proyecto fin de carrera trata los aspectos más importantes de la gestión y migración de las redes IP hacia el nuevo protocolo de red IPv6 y pone gran énfasis en experiencias de implantación de los mismos. A lo largo de este proyecto se profundiza sobre los distintos mecanismos de transición IPv4/IPv6 existentes, concretamente se describen y se prueban (en entornos Linux y FreeBSD) los siguientes: .Túneles 6t04, automáticos, configurados. .Mecanismo DSTM, TRT, ISATAP, NAT-PT. Tambi...

  9. Measuring and Comparing the Stability of Internet Paths over IPv4 & IPv6

    OpenAIRE

    Golkar, Forough

    2014-01-01

    Enormous Internet growth is an obvious trend nowadays while Internet protocol version 4 address space exhaustion led into the invention of Internet protocol version 6 and subsequently raised the transitioning challenges from one protocol to the other one. As the Internet protocol version 6 have not been around for a long time, thus there is a limitation knowledge in topology, routing change and performance of IPv6. Several studies are going on in order to getting the information about IPv6 wh...

  10. Application of IPv6 in GIS

    Science.gov (United States)

    Wang, Zhen-feng; Wang, Liang

    2008-10-01

    The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.

  11. Modeling the IPv6 internet AS-level topology

    Science.gov (United States)

    Xiao, Bo; Liu, Lian-dong; Guo, Xiao-chen; Xu, Ke

    2009-02-01

    To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA’s Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose of modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.

  12. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  13. Inkubasi Implementasi Ipv6 di Lingkungan PT Telekomunikasi Indonesia Tbk

    Directory of Open Access Journals (Sweden)

    Lunel Candra

    2013-12-01

    ABSTRACT As a network and information service provider in Indonesia, PT Telekomunikasi Indonesia (Telkom is facing a number of problems of exhausted IP addresses, which is also being faced by global telecommunications world. IP addresses widely used todays, i.e. IPv4, have a limitation in terms of number and will be out soon. However, there are some solutions that can be done by telecom operators including implementation of NAT (Network Address Translation 444, dual stack IPv4 and IPv6, tunneling, and native IPv6. Each of the solutions mentioned above have advantages and disadvantages, but the target native IPv6 as main target seems to be the only feasible solution to be addressed by IT industry players, including Telkom. Telkom RDC as the unit mainly focusing in the research of IT technology has been reviewing and testing a lab-scale IPv6 implementation. This also focused on the capabilities incubation for enabling IPv6 on existing telecommunications equipment and interoperability test between the devices. This study provides the result of function, multi-layer integration and interoperability test of IPv6 conducted in Telkom RDC OASIS v6 lab, which also can be considered as references for decision makers within the company to adopt IP technology to be implemented in the future.

  14. IPv6 for Future Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard

    2001-01-01

    The functionalities of the next generation Internet protocol, IPv6, havebecome increasingly interesting due to the current merging of the traditionalcellular mobile communications and the traditional data-communications intothe future wireless systems, as e.g., UMTS. IPv6 provides several...... enhancedfunctionalities requested for the future mobile systems. In this article thelargest advantages in relation to mobile systems are presented. Variousaspects of introducing IP throughout the entire mobile network (core, accessand termainals) are also presented along with an illustration of the abilitiesof the future...

  15. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  16. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  17. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  18. The Impact of IPv6 on Penetration Testing

    NARCIS (Netherlands)

    Ottow, Christiaan; van Vliet, Frank; de Boer, Pieter-Tjerk; Pras, Aiko

    In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and

  19. Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

    Directory of Open Access Journals (Sweden)

    Elidjen Elidjen

    2010-12-01

    Full Text Available Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4. 

  20. Flow-based detection of IPv6-specific network layer attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de O. Schmidt, Ricardo; de Boer, Pieter-Tjerk; Pras, Aiko; Tuncer, Daphne; Koch, Robert; Badonne, Rémi; Stiller, Burkhard

    2017-01-01

    With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been

  1. Protocolo IPv6 com pilha dupla em um campus universitário

    Directory of Open Access Journals (Sweden)

    Fernando Barreto

    2015-11-01

    Full Text Available Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil para administradores de rede IPv4. Com o objetivo de reduzir essa dificuldade, este artigo apresenta uma comparação entre IPv4 e IPv6 com foco no dia a dia de administração de rede de campus. Esse artigo também apresenta as soluções, experiências e lições adquiridas de uma implementação de sucesso do IPv6, utilizando a técnica de Pilha Dupla em um pequeno campus universitário.

  2. Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6 di Indonesia dengan Interim Maturity Level (IML

    Directory of Open Access Journals (Sweden)

    Riza Azmi

    2012-12-01

    Full Text Available Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000. Dengan habisnya IPv4, terdapat beberapa metode untuk melakukan migrasi ke peenomoran baru IPv6. Terkait dengan hal tersebut, penelitian ini mencoba mengukur tingkat kematangan beberapa penyelenggara jasa internet di Indonesia dalam hal implementasi IPv6 dengan menggunakan konsep Capability Maturity Model for IPv6 Implementation. Metode assesmen yang dilakukan dengan Interim Maturity Level, yaitu dengan memberikan seperangkat pertanyaan yang diisi sendiri oleh penyelenggara jasa internet. Hasil yang didapat adalah, sebagian besar penyelenggara internet masih berada pada Level 2 – Savvy.

  3. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  4. Análise de campo do desempenho de acessos Web em IPv6.

    OpenAIRE

    Pirani, Deivis Fernandes

    2014-01-01

    Este trabalho apresenta um estudo de campo, comparativo, sobre a utilização dos protocolos IPv4 e IPv6 no acesso a páginas web. Foi considerada a perspectiva de um usuário real deste tipo de serviço, no atual período de transição do IPv4 para o IPv6. Para que tal estudo pudesse ser realizado, foi desenvolvido um arranjo no qual três configurações de endereçamento do Protocolo de Internet, IPv4, IPv6 e Pilha Dupla (IPv4+IPv6), foram utilizadas nos acessos às 100 páginas web, com suporte ao I v...

  5. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  6. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  7. Nivel de desempeño en redes IPv4 con respecto a redes IPv6 con MPLS y RSVP

    Directory of Open Access Journals (Sweden)

    Alexis Guevara Peña

    2011-06-01

    Full Text Available This paper contains relevant information of the state of art of traffic engineering, MPLS (Multiprotocol Lable Switching and RSVP (Resource Reservation Protocol, as a case study and the techniques used under the new version of IPV6, against IPV4 version. The paper is intended to serve as a framework for the study of Engineering Traffic Based on the new version of IPV6, specifically MPLS and RSVP, takinginto account relevant considerations necessary when making decisions regarding the stability of the Backbone remains the key to Internet service providers that have recently stabilized its IPv4 infrastructure.

  8. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  9. Modelo para la integración de redes IPv4 – IPv6 basado en túneles

    Directory of Open Access Journals (Sweden)

    Danilo López

    2010-12-01

    Full Text Available The intention of this paper is to set up a general model in order to interconnect heterogeneous nets IPv4-IPv6, guarantying the integrity of the data, making use of transition techniques.

  10. RIPng- A next Generation Routing Protocal (IPv6) | Falaye | Journal ...

    African Journals Online (AJOL)

    ... Information Protocol Next Generation (RIPng) owing to the current depletion rate of IPv4. ... that support the Internet Protocol Version 6 (IPv6).addressing scheme. ... A brief history is given; its various versions are discussed, and detailed ...

  11. IPv6:n käyttöönotto PK-yrityksessä

    OpenAIRE

    Salonen, Arttu Petteri

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on selvittää, kuinka IPv6-yhteydet otetaan käyt-töön PK-yrityksessä. Työssä selvitetään minkälaiset vaatimukset IPv6 asettaa lait-teistolle ja minkälaisia käytännön asioita yrityksen täytyy huomioida IPv6:n käyt-töönotossa. Lisäksi työssä on laboratoriosimulaation avulla havainnollistettu eri käyt-töjärjestelmien tukea IPv6:lle ja käyttöönottoon liittyviä reititin- ja osoitekonfiguraati-oita. Käyttöönoton lisäksi opinnäytetyössä esitellään IPv6-protokoll...

  12. MULTI-LINK SUPPORT FOR IPV6 NETWORKS

    Directory of Open Access Journals (Sweden)

    Cüneyt Akınlar

    2016-03-01

    Full Text Available IPv6 ağ konfigürasyonu için genel pratik ağ üzerindeki her fiziksel bağ için ayrı bir altağ öneki atamaktır. Bu uygulama hem birden fazla ağ öneki gereksimine sebep olur, hem de elle yönetim ve konfigürasyon gerektirir. Buna alternatif konfigürasyon yöntemi bütün bağları IPv6 seviyesinde bir köprü ile bağlamak ve bu sayede bütün ağ için tek bir ağ öneki ataması yapmaktır. Bu metoda çoklu-bağ öneki ismi verilir. Bu makalede IPv6 ağları için çoklu-bağ öneki oto-konfigürasyonu konusu ele alınmıştır. Öncelikle tek yönlendiricili ağlar için coklu-bağ desteğinin nasıl gerçekleneceği tarif edilmiş, daha sonra bu yöntemin çok yönlendiricili ağlara nasıl uygulanacağı anlatılmıştır. Önerilen oto-konfigürasyon yöntemleri standart alıcı otokonfigürasyon protokollerini tamamlamakta ve IPv6 ağlarının yaygın kurulum ve kullanımları için gerekli tak-çalıştır metodolojine olanak sağlamaktadır

  13. Initial results from an IPv6 Darknet

    OpenAIRE

    Ronan, John; Ford, Matthew; Stevens, Jonathan

    2006-01-01

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background ‘noise’ on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration. We have created what may be the world’s first IPv6 darknet to help us observe the ‘n...

  14. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  15. Optimization in Mobile IPv6 with Dynamic DNS

    OpenAIRE

    塩津, 達郎

    2005-01-01

    機器の高性能化により、モバイル端末においてもインターネットを利用した様々なアプリケーションを利用する要求が増え、無線通信環境の充実により、モバイル端末への通信を継続する仕組みが求められるようになった。 移動中の継続的な通信を可能とする技術の一つとして Mobile IPv6 がある。Mobile IPv6 にり、端末が移動しても通信を継続できる移動透過性が提供される。この移動透過性を実現するために、Mobile IPv6 では移動する端末とその端末と通信をしている端末の仲介役となる Home Agent が必要になる。ところが、仲介役となる必要のない場合でも Home Agent が仲介役として動き、無駄なパケットがインターネット上に流れてしまう。 本論文では、Mobile IPv6 という技術に加えて、Dynamic DNS という技術を用いて、Mobile IPv6 ネットワークの最適化を行う手法を提案し、性能評価を行った。...

  16. IPv6 ネットワークの構築

    OpenAIRE

    山田, 純一

    2008-01-01

    富山大学では2006年,国立情報学研究所より,IPv6(Internet Protocol Version 6)の割り当てが承認された。IPv6は現在使用されているIPアドレスであるIPv4(Internet Protocol Version 4)の枯渇問題を解消するために開発されたIPアドレスである。このIPv6が誕生してから数年,今さらではあるがローカル環境にてIPv6ネットワークを構築し,検証を行ったので,ここに報告する。

  17. Something From Nothing (There): Collecting Global IPv6 Datasets from DNS

    NARCIS (Netherlands)

    Fiebig, T.; Borgolte, Kevin; Hao, Shuang; Kruegel, Christopher; Vigna, Giovanny; Spring, Neil; Riley, George F.

    2017-01-01

    Current large-scale IPv6 studies mostly rely on non-public datasets, asmost public datasets are domain specific. For instance, traceroute-based datasetsare biased toward network equipment. In this paper, we present a new methodologyto collect IPv6 address datasets that does not require access to

  18. The Department of Defense's Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    National Research Council Canada - National Science Library

    Perkins, Kyle L; Scott, Michael A

    2006-01-01

    .... The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM...

  19. IPv6 sobre AT

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo

    2011-12-01

    Full Text Available Providing Quality of Service (QoS from communication networks in a global environment, is now one of the main fields of research, mainly due to the increasing importance of applications such as VoIP, video conferencing, stream video and audio, distance education, among others. This article is presented as a technology for providing uality service, the integration of IPv6 and ATM. The main objective is to present and discuss the main considerations and solutions that exist in the integration of IP trafÞ c in ATM technology.

  20. IPv6 Monitoring in Nederland: De derde meting : TNO-White paper

    NARCIS (Netherlands)

    Boen-Leo, M.S.A.; Hartog, T.; Holtzer, A.C.G.; Schotanus, H.A.; Smets, R.C.J.; Tijmes, M.R.

    2011-01-01

    Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het

  1. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    Science.gov (United States)

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  2. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  3. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    addressing, new generation internet. 2. ... required the creation of the next generation of Internet ... IPv6 standards have defined the following Extension headers ..... addresses are represented as x:x:x:x:x:x:x:x, where each x is the hexadecimal ...

  5. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  6. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  7. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  8. Manfacturers, service providers gear up for the next Big Thing IPV6

    CERN Multimedia

    2003-01-01

    "IPv6 apparently is the heir apparent to the current communication standard, IPv4, and communications equipment manufacturers are taking this into consideration as they design their next-generation gear" (1/2 page).

  9. Metadata Modelling of the IPv6 Wireless Sensor Network in the Heihe River Watershed

    Directory of Open Access Journals (Sweden)

    Wanming Luo

    2013-03-01

    Full Text Available Environmental monitoring in ecological and hydrological watershed-scale research is an important and promising area of application for wireless sensor networks. This paper presents the system design of the IPv6 wireless sensor network (IPv6WSN in the Heihe River watershed in the Gansu province of China to assist ecological and hydrological scientists collecting field scientific data in an extremely harsh environment. To solve the challenging problems they face, this paper focuses on the key technologies adopted in our project, metadata modeling for the IPv6WSN. The system design introduced in this paper provides a solid foundation for effective use of a self-developed IPv6 wireless sensor network by ecological and hydrological scientists.

  10. IPv6 races across the Atlantic

    CERN Multimedia

    2003-01-01

    "...Scientists at the California Institute of Technology and the European Organization for Nuclear Research (CERN) have set a new Internet2 land speed record using IPv6, the next-generation Internet protocol. The team sustained a single stream transmission control protocol (TCP) rate of 983 Mbits/s for more than an hour between CERN's facility in Geneva and Chicago, spanning more than 7000 km" (1/2 page).

  11. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    Energy Technology Data Exchange (ETDEWEB)

    Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.

  12. Desempeño de la calidad del servicio (QoS sobre IPv6

    Directory of Open Access Journals (Sweden)

    Octavio José Salcedo Parra

    2011-06-01

    Full Text Available New applications such as VoIP, e-commerce and video conferencing are sensitive to network performance, making the network capacity to provide quality of service is increasingly important. IPv6 was developed to solve some of the problems of IPv4, such as QoS, security and IP address exhaustion. Current IP networks provide better trafficdelivery effort, therefore, offer no guarantee of quality service. However, there are services, including voice, with stringent requirements for delay and delay variation (jitter, which makes it necessary to add functionality to IP networks based on this protocol are capable of supporting such services. For its part, IPv6 uses 2 fields that can be used to implement QoS, which are: Flow Label and Traffic Class. This article describes the mechanisms and architectures that are used to provide QoS on a network. Later, you specify the features that use both IPv4 and IPv6 to implement QoS. In the last sections present the results of the comparison of 2 scenarios, which are evaluated.

  13. Teoretisk och praktisk genomgång av IPv6 och dess säkerhetsaspekter

    OpenAIRE

    Andersson, David

    2012-01-01

    Den här uppsatsen går teoretiskt och praktiskt igenom IPv6 för att skapa en förståelse för det nya protokollet. Uppsatsen beskriver utöver den teoretiska genomgången av protokollet även det praktiska arbete som ligger bakom implementationen som är tänkt att kunna ge såväl privatpersoner som mindre organisationer tillgång till en säker IPv6 lösning även om Internetleverantören endast kan erbjuda IPv4.   Arbetet är gjort på eget initiativ då behovet av kunskap kring IPv6 växer lavinartat och då...

  14. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  15. I6-FPS: Automating the ICMPv6 Filtering Rules

    Directory of Open Access Journals (Sweden)

    Wan Ali Wan Nor Ashiqin

    2018-01-01

    Full Text Available Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6 when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table. I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules.

  16. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  17. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  18. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  19. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  20. Estudi d'implantació de la IPv6 al CTTC

    OpenAIRE

    Escoda Ramon, Jordi

    2017-01-01

    In recent years, the number of devices connected to Internet has increased exponentially and in fact, it is estimated that the demand keep on increasing. When IPv4 protocol was introduced, this evolution was not expected. Over the years several limitations have arosen, including scalability and the unsustainable growth of the Internet routing table. In the late 90s, IPv6 protocol was defined to solve these issues and add new features. Currently, the Centre Tecnològic de Telecomunicacions de C...

  1. Threats and surprises behind IPv6 extension headers

    NARCIS (Netherlands)

    Hendriks, Luuk; Velan, Petr; de Oliveira Schmidt, Ricardo; De Boer, Pieter Tjerk; Pras, Aiko

    2017-01-01

    The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header - a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate

  2. Implementation and Evaluation of DSMIPv6 for MIPL

    Science.gov (United States)

    Wang, Mingli; Hu, Bo; Chen, Shanzhi; Sun, Qinxue

    Mobile IPv6 performs mobility management to mobile node within IPv6 networks. Since IPv6 is not widely deployed yet, it’s an important feature to let Mobile IPv6 support mobile node moving to IPv4 network and maintaining the established communications. DSMIPv6 specification extends Mobile IPv6 capabilities to allow dual stack mobile nodes to move within IPv4 and IPv6 networks. This paper describes the implementation of this feature based on open source MIPL under Linux. By performing experiments on testbed using the implementation, it is confirmed that the DSMIPv6 works as expected.

  3. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  4. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  5. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  6. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  7. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  8. CONFIGURACIÓN DE UNA RED DE NUEVA GENERACIÓN PARA CONECTIVIDAD CON INTERNET RESPALDADO POR UN SERVICIO DNS CON SOPORTE PARA IPV4 E IPV6.

    Directory of Open Access Journals (Sweden)

    Carlos Andrés Martínez

    2012-05-01

    Full Text Available Se presentan las características mas representativas de la implementación de la isla ipv6 del centro de computación de alto desempeño CECAD, realizando pruebas de conexión y desempeño en el tráfico interno con las subredes de la Universidad Distrital y posteriormente con su conexión a Internet a través del protocolo NAT-PT secundado por un servidor de nombres de domino recursivo como base de conectividad y soporte sobre estructuras Ipv4 e Ipv6 nativas.

  9. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  10. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  11. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  12. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  13. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  14. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  15. Strategic Studies Quarterly. Volume 6, Number 3. Fall 2012

    Science.gov (United States)

    2012-01-01

    in use, down to the level of specific version, the build number in use, and the history of security patches applied to it; • IP addresses of...IP addresses from 4,294,967,296 in IPv4 to 2128 in IPv6. It is recognized today that “deploying IPv6 is the only perennial way to ease pressure on...the public IPv4 address pool.”41 As the world begins a transition from using IPv4 to IPv6 as the dominant communications protocol for the global

  16. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  17. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  18. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  19. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  20. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  1. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  2. Tcam от IPv4 к IPv6

    OpenAIRE

    Багинян, А.; Долбилов, А.

    2013-01-01

    Статья посвящена проблемам современной маршрутизации сети Интернет. Рассматриваются проблемы выборки маршрутов сетей, использования политик безопасности и качества обслуживания передаваемой информации. Отдельный раздел посвящен примерам использования свойств маски сетей для сокращения размеров таблиц маршрутизации. Рассмотрены различные возможные варианты компоновки адресной памяти, проведено сравнение между маршрутизацией по протоколу Ipv4 и Ipv6, а так же рассмотрены варианты программных и ...

  3. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  4. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  5. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  6. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  7. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  8. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  9. Análisis de rendimiento en redes IPv6

    Directory of Open Access Journals (Sweden)

    Andrés Eugenio Enríquez-Lenis

    2015-01-01

    Full Text Available El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. El método utilizado fue el empírico, y la metodología seguida, el modelo en cascada, paradigma del ciclo de vida clásico en ingeniería que exige un enfoque sistemático y secuencial. El experimento se desarrolló en el laboratorio de telemática de la Facultad de Ingeniería, en la Universidad Libre en Cali, donde se dispuso de 8 enrutadores, 4 conmutadores y 5 computadores personales. Los instrumentos utilizados fueron el analizador de protocolos Wireshark, analizador de paquetes PRTG, SYSLOG y SNMP server para captura de alarmas y eventos, y herramientas para pruebas en la red: tracert/ traceroute, ping y telnet. Como resultados se observa que el rendimiento de una red IPv6 depende del grado de congestión y del tipo de tráfico que circula en la misma. La investigación permite concluir que aunque se disponga de mecanismos complejos de Calidad de Servicio y Diferenciación de Servicios en Internet, en condiciones de saturación, ninguno de estos mecanismos permite garantizar que los servicios y aplicaciones sensibles, funcionen adecuadamente.

  10. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Directory of Open Access Journals (Sweden)

    Peer Azmat Shah

    2014-01-01

    Full Text Available Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP, video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO, for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2 and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO.

  11. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    Science.gov (United States)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  12. Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2012-01-01

    Full Text Available The Internet of Things (IoT requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offered by the IPv6 addressing and core network. Glowbal IP's main advantages with regard to 6LoWPAN/IPv6 are not only that it presents a low overhead to reach a higher performance on a regular basis, but also that it determines the session and identifies global access by means of a session layer defined over the application layer. Technologies without any native support for IP are thereby adaptable to IP e.g. IEEE 802.15.4 and Bluetooth Low Energy. This extension towards the IPv6 network opens access to the features and methods of the devices through a homogenous access based on WebServices (e.g. RESTFul/CoAP. In addition to this, Glowbal IP offers global interoperability among the different devices, and interoperability with external servers and users applications. All in all, it allows the storage of information related to the devices in the network through the extension of the Domain Name System (DNS from the IPv6 core network, by adding the Service Directory extension (DNS-SD to store information about the sensors, their properties and functionality. A step forward in network-based information systems is thereby reached, allowing a homogenous discovery, and access to the devices from the IoT. Thus, the IoT capabilities are exploited by allowing an easier and more transparent integration of the end users applications with sensors for the future evaluations and

  13. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  14. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  15. Methods for Intelligent Mapping of the IPV6 Address Space

    Science.gov (United States)

    2015-03-01

    the " Internet of Things " ( IoT ). (2013, Jan. 7). Forbes. [Online]. Available: http://www.forbes.com/sites/quora/2013/01/07/ how-many- things -are...currently-connected-to-the- internet -of- things - iot / 57 [13] G. Huston, “IPv4 address report,” Mar 2015. [Online]. Available: http://www.potaroo.net/tools/ipv4...distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Due to the rapid growth of the Internet , the available pool of unique

  16. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  17. Revisión de la seguridad en la implementación de servicios sobre IPv6

    Directory of Open Access Journals (Sweden)

    Raul Bareño Gutierrez

    2016-01-01

    Full Text Available En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.

  18. Propuesta de interconexión mediante técnicas de entunelamiento de Islas IPv6 a través de una infraestructura de core MPLS/IPv4 con enrutadores de distribución doble

    Directory of Open Access Journals (Sweden)

    Danilo López

    2012-06-01

    Full Text Available The tunneling techniques have been widely used to interconnect IPv6 islands over native MPLS Core Infrastructure IPv4. However, due to limited scalability, it is usual to adopt other strategies as 6PE or 6VPE interconnection, which are much more complex to implement. This article proposes and implements level simulation using GNS3+Dynamips, a solution that makes use of tunneling techniques in the PE (Provider Edge (type double-stack of the network, reducing the drawbacks of the mesh scalability own tunnels on routers CE (Customer Edge and without the complexity and requirements regarding proper equipment and solutions 6VPE 6PE.

  19. Evolution of IPv6 Internet topology with unusual sudden changes

    International Nuclear Information System (INIS)

    Ai Jun; Su Zhan; Li Hui; Zhao Hai; Carley, Kathleen M.

    2013-01-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased

  20. Evolution of IPv6 Internet topology with unusual sudden changes

    Science.gov (United States)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  1. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  2. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  3. First-in-human safety and immunogenicity investigations of three adjuvanted reduced dose inactivated poliovirus vaccines (IPV-Al SSI) compared to full dose IPV Vaccine SSI when given as a booster vaccination to adolescents with a history of IPV vaccination at 3, 5, 12months and 5years of age.

    Science.gov (United States)

    Lindgren, Line M; Tingskov, Pernille N; Justesen, Annette H; Nedergaard, Bettina S; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Sørensen, Charlotte; Dietrich, Jes; Thierry-Carstensen, Birgit

    2017-01-23

    There is a demand of affordable IPV in the World. Statens Serum Institut (SSI) has developed three reduced dose IPV formulations adsorbed to aluminium hydroxide; 1/3 IPV-Al, 1/5 IPV-Al and 1/10 IPV-Al SSI, and now report the results of the first investigations in humans. 240 Danish adolescents, aged 10-15years, and childhood vaccinated with IPV were booster vaccinated with 1/3 IPV-Al, 1/5 IPV-Al, 1/10 IPV-Al or IPV Vaccine SSI. The booster effects (GMTRs) of the three IPV-Al SSI were compared to IPV Vaccine SSI, and evaluated for non-inferiority. The pre-vaccination GMTs were similar across the groups; 926 (type 1), 969 (type 2) and 846 (type 3) in the total trial population. The GMTRs by poliovirus type and IPV formulation were: Type 1: 17.0 (1/3 IPV-Al), 13.0 (1/5 IPV-Al), 7.1 (1/10 IPV-Al) and 42.2 (IPV Vaccine SSI). Type 2: 12.5 (1/3 IPV-Al), 13.1 (1/5 IPV-Al), 7.6 (1/10 IPV-Al) and 47.8 (IPV Vaccine SSI). Type 3: 14.5 (1/3 IPV-Al), 16.2 (1/5 IPV-Al), 8.9 (1/10 IPV-Al) and 62.4 (IPV Vaccine SSI) Thus, the three IPV-Al formulations were highly immunogenic, but inferior to IPV Vaccine SSI, in this booster vaccination trial. No SAE and no AE of severe intensity occurred. 59.2% of the subjects reported at least one AE. Injection site pain was the most frequent AE in all groups; from 24.6% to 43.3%. Injection site redness and swelling frequencies were<5% in most and<10% in all groups. The most frequent systemic AEs were fatigue (from 8.2% to 15.0%) and headache (from 15.0% to 28.3%). Most AEs were of mild intensity. In conclusion, the three IPV-Al SSI were safe in adolescents and the booster effects were satisfactory. ClinicalTrials.gov registration number: NCT02280447. Copyright © 2016. Published by Elsevier Ltd.

  4. IPV Screening and Readiness to Respond to IPV in Ob-Gyn Settings: A Patient-Physician Study

    Directory of Open Access Journals (Sweden)

    Katherine M. Jones

    2018-01-01

    Full Text Available Purpose. Intimate partner violence (IPV is a serious, preventable public health concern that largely affects women of reproductive age. Obstetrician-gynecologists (ob-gyns have a unique opportunity to identify and support women experiencing IPV to improve women’s health. Considering recent efforts to increase IPV awareness and intervention, the present study aimed to provide a current evaluation of nationally representative samples to assess ob-gyn readiness to respond to IPV as well as patient IPV-related experiences. Methods. 400 ob-gyns were randomly selected from American College of Obstetricians and Gynecologists’ (ACOG Collaborative Ambulatory Research Network. Each physician was mailed one physician survey and 25 patient surveys. Results. IPV training/education and IPV screening practices were associated with most measures of ob-gyn readiness to respond to IPV. Among respondents, 36.8% endorsed screening all patients at annual exams; however, 36.8% felt they did not have sufficient training to assist individuals in addressing IPV. Workplace encouragement of IPV response was associated with training, screening, detection, preparation/knowledge, response practices, and resources. Thirty-one percent of patients indicated their ob-gyn had asked about possible IPV experiences during their medical visit. Conclusion. Findings highlight specific gaps in ob-gyns’ IPV knowledge and response practices to be further addressed by IPV training.

  5. Movilidad en IPV6: simulación con Network Simulator

    Directory of Open Access Journals (Sweden)

    Javier Eduardo Carvajal Escobar

    2013-07-01

    Full Text Available IP Móvil es la propuesta de Internet Engineering Task Force (IETF para el protocolo de movilidad llamado MIPv6. Este protocolo se ha convertido en la columna vertebral de las nuevas tecnologías de redes inalámbricas mediante las cuales se busca proveer de un servicio ininterrumpido mientras se está en movimiento. Este artículo presenta una visión general del funcionamiento de dicho protocolo, los términos relacionados con este y los nuevos ensajes que vienen dentro del encabezado de movilidad en IPv6. Después se realiza una simulación de dicho protocolo con el software Network Simulator 2, bajo licencia GNU de distribución libre. Como resultado de la simulación se obtiene un archivo de trazas en el cual se plasman todos los eventos.

  6. Funcionalidad, diseño, simulación y configuración de dispositivos para una red MPLS en entorno IPV6

    OpenAIRE

    Reyes Altamirano, Rolando Javier

    2014-01-01

    The final degree is intended to raise awareness of the operation, design, infrastructure elements, simulating a MPLS network in IPv6 environment due to high demand from users to the internet, increased smartphone devices, pc, tablet, high QoS, video conference, VoIP, data. MPLS is the dominant technology in the core of the network is able to open multiple paths between a source and a destination, and integrate multiple services for the same channel, this joined the IPV6 protocol that supplies...

  7. Happy World IPv6 Day!

    CERN Multimedia

    Adrian Giordani (iSGTW)

    2011-01-01

    Almost 20 years after Tim Berners-Lee posted a summary of his World Wide Web project on the newsgroup, there are more than two billion users worldwide, and billions more web pages. It has transformed the way we socialize, conduct business, and even changed the way we do science. But unfortunately, the number of available Internet addresses has not grown at the same place to accommodate these changes.   The number of Internet addresses is fixed because of the way the Internet operates: data is routed through the Internet in packets that use numeric addresses to encode its origin and its destination. The layer of communication at this level is called Internet Protocol (IP), originally developed by Vint Cerf, a program manager at the US Department of Defense Advanced Research Projects Agency and now Vice President and Chief Internet Evangelist of Google, USA, and member of numerous boards including as Commissioner for the Broadband Commission for Digital Development in 2010. IPv4 addresses, w...

  8. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  9. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    International Nuclear Information System (INIS)

    Anwar, Farhat; Masud, Mosharrof H; Latif, Suhaimi A

    2013-01-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6

  10. IPv6 ネットワークにおける BGP 経路制御トラヒックの解析

    OpenAIRE

    有田, 真也

    2004-01-01

    インターネットは 1990 年代に急速に普及し、我々の生活やビジネスを変えるまでに至っている。現在、インターネットのパケット通信において主に利用されているのは IPv4 である。しかし、インターネットが爆発的に普及するにつれて IP アドレスの枯渇など、IPv4 の欠点がいくつか明らかになり、新たなインターネットプロトコルであるIPv6 が開発された。最近では、IPv6 の実装も着実に進んでおり、日本ではさまざまな応用分野で IPv6 のビジネス化を狙った実証実験が行われている。こうした状況で、本論文は IPv6 ネットワークの BGP 経路制御トラヒックの解析を行った。そして、少数の不安定な経路が IPv6 ネットワークにおける Routing Instability に大きな影響を与えていることや Routing Instability の統計的特徴を明らかにした。...

  11. Production of high titer attenuated poliovirus strains on the serum-free PER.C6(®) cell culture platform for the generation of safe and affordable next generation IPV.

    Science.gov (United States)

    Sanders, Barbara P; Oakes, Isabel de los Rios; van Hoek, Vladimir; Liu, Ying; Marissen, Wilfred; Minor, Philip D; Wimmer, Eckard; Schuitemaker, Hanneke; Custers, Jerome H H V; Macadam, Andrew; Cello, Jeronimo; Edo-Matas, Diana

    2015-11-27

    As poliovirus eradication draws closer, alternative Inactivated Poliovirus Vaccines (IPV) are needed to overcome the risks associated with continued use of the Oral Poliovirus Vaccine and of neurovirulent strains used during manufacture of conventional (c) IPV. We have previously demonstrated the susceptibility of the PER.C6(®) cell line to cIPV strains; here we investigated the suspension cell culture platform for growth of attenuated poliovirus strains. We examined attenuated Sabin strain productivity on the PER.C6(®) cell platform compared to the conventional Vero cell platform. The suitability of the suspension cell platform for propagation of rationally-attenuated poliovirus strains (stabilized Sabin type 3 S19 derivatives and genetically attenuated and stabilized MonoCre(X) strains), was also assessed. Yields were quantified by infectious titer determination and D-antigen ELISA using either serotype-specific polyclonal rabbit sera for Sabin strains or monoclonal cIPV-strain-specific antibodies for cIPV, S19 and MonoCre(X) strains. PER.C6(®) cells supported the replication of Sabin strains to yields of infectious titers that were in the range of cIPV strains at 32.5°C. Sabin strains achieved 30-fold higher yields (pSabin strain productivity on the PER.C6(®) cell platform was maintained at 10l scale. Yields of infectious titers of S19 and MonoCre(X) strains were 0.5-1 log10 lower than seen for cIPV strains, whereas D-antigen yield and productivities in doses/ml using rationally-attenuated strains were in line with yields reported for cIPV strains. Sabin and rationally-attenuated polioviruses can be grown to high infectious titers and D-antigen yields. Sabin strain infection shows increased productivity on the PER.C6(®) cell platform as compared to the conventional Vero cell platform. Novel cell platforms with the potential for higher yields could contribute to increased affordability of a next generation of IPV vaccines needed for achieving and

  12. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs

    OpenAIRE

    Dominic Savio, Lourdes Gino

    2016-01-01

    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  13. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  14. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  15. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  16. IPv6-Based Smart Metering Network for Monitoring Building Electricity

    Directory of Open Access Journals (Sweden)

    Dong Xu

    2013-01-01

    Full Text Available A smart electricity monitoring system of building is presented using ZigBee and internet to establish the network. This system consists of three hardware layers: the host PC, the router, and the sensor nodes. A hierarchical ant colony algorithm is developed for data transmission among the wireless sensor nodes. The wireless communication protocol is also designed based on IPv6 protocol on IEEE 802.15.4 wireless network. All-IP approach and peer-to-peer mode are integrated to optimize the network building. Each node measures the power, current, and voltage and transmits them to the host PC through the router. The host software is designed for building test characteristics, having a tree hierarchy and a friendly interface for the user. The reliability and accuracy of this monitoring system are verified in the experiment and application.

  17. ESTADO DEL ARTE DE IPTV Y CONSIDERACIONES TÉCNICAS PARA SU MIGRACIÓN A IPV6 EN COLOMBIA

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2011-08-01

    Full Text Available El artículo tiene como objetivos centrales hacer una revisión del estado del arte de IPTV (Televisión a través de IP y una propuesta para la implementación de esta tecnología en Colombia sobre una red IPv6. La convergencia de las teleco-municaciones ha dado origen a aplicaciones IP que permiten acceso a contenidos audiovisuales digitalizados a través de re-des que hacen uso de dicho protocolo. Se abordanestudios ac-tuales que tratan características fundamentales de televisión sobre la red de datos,  como el funcionamiento, la arquitectura, los estándares en los que se basa, propuestas para evaluar las políticas de calidad de servicio y por ultimo consideraciones técnicas para su implementación en una red IPv6.

  18. HIV Positive Diagnosis During Pregnancy Increases Risk of IPV Postpartum Among Women with No History of IPV in Their Relationship.

    Science.gov (United States)

    Groves, Allison K; Reyes, H Luz McNaughton; Moodley, Dhayendre; Maman, Suzanne

    2017-07-24

    There has been limited study of whether and for whom physical intimate partner violence (IPV) is a consequence of an HIV-positive diagnosis. Per the diathesis stress model, the consequences of HIV infection may be worse for women with a history of IPV. We hypothesize that the positive association between HIV diagnosis in pregnancy and postpartum IPV will be exacerbated for women with a history of IPV. Data come from a prospective cohort study with 1015 participants who completed a baseline antenatal and 9-month postpartum visit. Using logistic regression analyses, we found a statistically significant interaction between HIV diagnosis, history of IPV and postpartum IPV (AOR: 0.40, 95% CI 0.17-0.96). The findings were in the opposite direction as expected: HIV-diagnosis was not associated with IPV for women with a history of IPV (AOR: 2.17, 95% CI 1.06, 4.42). However, HIV-positive women without a history of IPV faced more than two times the risk of incident postpartum IPV than HIV-negative women (AOR: 2.17, 95% CI 1.06, 4.42). Interventions to reduce incident and ongoing IPV during the perinatal period are needed.

  19. Japanese Women’s Perceptions of Intimate Partner Violence (IPV)

    Science.gov (United States)

    Nagae, Miyoko; Dancy, Barbara L.

    2013-01-01

    Intimate partner violence (IPV) is a serious problem in Japan. The purpose of this study was to describe IPV as perceived by Japanese adult females who were in a heterosexual marriage and lived with their spouses at the time of IPV. Using a cross-sectional retroactive qualitative description research design with individual face-to-face in-depth interviews, a purposive sample of 11 Japanese adult females from three urban areas in Japan was interviewed. All women reported that they and their husbands were born in Japan. At the time of the interview, the women had a mean age of 38 years whereas at the time of the IPV, their mean age was 28 years. Data was analyzed using the directed qualitative content analysis method. The results revealed that IPV occurred at the women’s homes primarily at night. All the women reported that they experienced physical and emotional abuse and 82% reported experiencing sexual abuse. Additionally, 64% reported that their parents-in-law emotionally abused them. Communication between these women and their husbands were characterized as unilateral with the husbands initiating and dominating the conversations with orders, lectures, and reprimands. The women identified that the cultural influences of the Japanese patriarchal system that reinforces male superiority and dominance and women inferiority were directly related to IPV. The implication is that health professionals need to actively advocate for effective legislation and policies to address IPV in Japan. PMID:19465572

  20. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  1. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  2. Intimate partner violence (IPV)

    DEFF Research Database (Denmark)

    Rasch, Vibeke; Van, Toan Ngo; Nguyen, Hanh Thi Thuy

    2018-01-01

    BACKGROUND: Intimate partner violence (IPV) is a global problem that affects one-third of all women. The present study aims to develop and determine the validity of a screening instrument for the detection of IPV in pregnant women in Tanzania and Vietnam and to determine the minimum number...

  3. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    OpenAIRE

    Nelson Enrique Vera Parra; Danilo Alfonso López; Héctor Cristyan Manta Caro

    2014-01-01

    En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN), redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M), al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro....

  4. The association between child exposure to intimate partner violence (IPV) and perpetration of IPV in adulthood-A systematic review.

    Science.gov (United States)

    Kimber, Melissa; Adham, Sami; Gill, Sana; McTavish, Jill; MacMillan, Harriet L

    2018-02-01

    Increasingly recognized as a distinct form of childhood maltreatment, children's exposure to intimate partner violence (IPV) has been shown to be associated with an array of negative psychosocial outcomes, including elevated risk for additional violence over the life course. Although studies have identified child exposure to IPV as a predictor of IPV perpetration in adulthood, no review has critically evaluated the methodology of this quantitative work. The present study examines the association between childhood exposure to IPV and the perpetration of IPV in adulthood based on a systematic review of the literature from inception to January 4, 2016. Databases searched included Medline, Embase, PsycINFO, CINAHL, Cochrane Database of Systematic Reviews, Sociological Abstracts and ERIC. Database searches were complemented with backward and forward citation chaining. Studies were critically appraised using the Quality Assessment Tool for Observational Cohort and Cross-Sectional Studies. Of 5601 articles identified by the search, 19 studies were included for data extraction. Sixteen of these studies found that child exposure to IPV was significantly and positively associated with adult IPV perpetration; three studies reported null findings. The methodological quality of the studies was low. Work thus far has tended to focus on child exposure to physical IPV and the perpetration of physical IPV within heterosexual contexts. In addition, measures of child exposure to IPV vary in their classification of what exposure entails. We critically discuss the strengths and limitations of the existing evidence and the theoretical frameworks informing this work. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Domain Name Server Security (DNSSEC) Protocol Deployment

    Science.gov (United States)

    2014-10-01

    Platform How IPv6 and DNSSEC Change the Intranets OARC Workshop San Francisco, March 2011 Materials available at: https://indico.dns-oarc.net...DNSSEC In Operation NIC .sn The Mensa project - Measuring DNS Health and Security How IPv6 and DNSSEC change the Intranets DNSSEC Update for DE...Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill Global IPv6 Summit, Taipei, Taiwan, November 2011 TWCERT/CC

  6. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  7. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  8. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  9. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  10. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    Science.gov (United States)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource

  11. Safety and immunogenicity of a primary series of Sabin-IPV with and without aluminum hydroxide in infants.

    Science.gov (United States)

    Verdijk, Pauline; Rots, Nynke Y; van Oijen, Monique G C T; Weldon, William C; Oberste, M Steven; Okayasu, Hiromasa; Sutter, Roland W; Bakker, Wilfried A M

    2014-09-03

    An inactivated poliovirus vaccine (IPV) based on attenuated poliovirus strains (Sabin-1, -2 and -3) was developed for technology transfer to manufacturers in low- and middle-income countries in the context of the global polio eradication initiative. Safety and immunogenicity of Sabin-IPV (sIPV) was evaluated in a double-blind, randomized, controlled, dose-escalation trial in the target population. Healthy infants (n=20/group) aged 56-63 days, received a primary series of three intramuscular injections with low-, middle- or high-dose sIPV with or without aluminum hydroxide or with the conventional IPV based on wild poliovirus strains (wIPV). Virus-neutralizing titers against both Sabin and wild poliovirus strains were determined before and 28 days after three vaccinations. The incidence of local and systemic reactions was comparable with the wIPV. Seroconversion rates after three vaccinations were 100% for type 2 and type 3 polioviruses (both Sabin and wild strains) and 95-100% for type 1 polioviruses. Median titers were high in all groups. Titers were well above the log2(titer) correlated with protection (=3) for all groups. Median titers for Sabin-2 were 9.3 (range 6.8-11.5) in the low-dose sIPV group, 9.2 (range 6.8-10.2) in the low-dose adjuvanted sIPV group and 9.8 (range 5.5-15.0) in the wIPV group, Median titers against MEF-1 (wild poliovirus type 2) were 8.2 (range 4.8-10.8) in the low-dose sIPV group, 7.3 (range 4.5-10.2) in the low-dose adjuvanted Sabin-IPV group and 10.3 (range 8.5-17.0) in the wIPV group. For all poliovirus types the median titers increased with increasing dose levels. sIPV and sIPV adjuvanted with aluminum hydroxide were immunogenic and safe at all dose levels, and comparable with the wIPV. EudraCTnr: 2011-003792-11, NCT01709071. Copyright © 2014. Published by Elsevier Ltd.

  12. АНАЛІЗ МЕТОДІВ ВИРІШЕННЯ ПРОБЛЕМ ЩОДО ВПРОВАДЖЕННЯ ПРОТОКОЛУ IPV6

    OpenAIRE

    Созонник, Галина Дмитрівна; Гамза, Дмитро Євгенійович

    2017-01-01

    IPv6 implementation problems research IPv6 implementation problems research, analysis of the IPv6 advantages and its’ compatibility with IPv4; methods of transition from IPv6 to IPv4, transitional technologies

  13. Modelování IPv6 v prostředí OMNeT++

    OpenAIRE

    Černý, Marek

    2011-01-01

    OMNeT++ je diskrétní simulátor hojně používaný k vytváření nejrůznějších síťových simulací. Lze jej dále rozšířit např. frameworkem INET, který obsahuje modely protokolů a zařízení z prostředí TCP/IP síti. V této práci se soustředíme na zkoumání současných možností balíku INET modelovat internetový protokol verze 6. Obzvláště se zaměřujeme na podporu směrování. V rámci implementace pak byly vytvořeny moduly dual-stack směrovače a dual-stack klienta s podporou manuální i automatické IPv6 adres...

  14. Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

    Directory of Open Access Journals (Sweden)

    Dileep Basam

    2016-01-01

    Full Text Available Moving Target IPv6 Defense (MT6D imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.

  15. Antibody responses of Macaca fascicularis against a new inactivated polio vaccine derived from Sabin strains (sIPV) in DTaP-sIPV vaccine.

    Science.gov (United States)

    Sato, Y; Shiosaki, K; Goto, Y; Sonoda, K; Kino, Y

    2013-05-01

    Antibody responses of Macaca fascicularis against a new tetravalent vaccine composed of diphtheria toxoid, tetanus toxoid, acellular pertussis antigens, and inactivated poliovirus derived from Sabin strains (sIPV) was investigated to predict an optimal dose of sIPV in a new tetravalent vaccine (DTaP-sIPV) prior to conducting a dose-defined clinical study. Monkeys were inoculated with DTaP-sIPVs containing three different antigen units of sIPVs: Vaccine A (types 1:2:3 = 3:100:100 DU), Vaccine B (types 1:2:3 = 1.5:50:50 DU), and Vaccine C (types 1:2:3 = 0.75:25:25 DU). There was no difference in the average titers of neutralizing antibody against the attenuated or virulent polioviruses between Vaccines A and B. The average neutralizing antibody titers of Vaccine C tended to be lower than those of Vaccines A and B. The sIPV antigens did not affect the anti-diphtheria or anti-tetanus antibody titers of DTaP-sIPV. Furthermore, the average neutralizing antibody titers of Vaccine A against the attenuated and virulent polioviruses were comparable between M. fascicularis and humans. These results suggest that M. fascicularis may be a useful animal model for predicting the antibody responses to sIPVs in humans, and that it may be likely to reduce the amount of sIPVs contained in DTaP-sIPVs, even for humans. Copyright © 2013 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  16. Immunogenicity and safety of three aluminium hydroxide adjuvanted vaccines with reduced doses of inactivated polio vaccine (IPV-Al) compared with standard IPV in young infants in the Dominican Republic: a phase 2, non-inferiority, observer-blinded, randomised, and controlled dose investigation trial.

    Science.gov (United States)

    Rivera, Luis; Pedersen, Rasmus S; Peña, Lourdes; Olsen, Klaus J; Andreasen, Lars V; Kromann, Ingrid; Nielsen, Pernille I; Sørensen, Charlotte; Dietrich, Jes; Bandyopadhyay, Ananda S; Thierry-Carstensen, Birgit

    2017-07-01

    Cost and supply constraints are key challenges in the use of inactivated polio vaccine (IPV). Dose reduction through adsorption to aluminium hydroxide (Al) is a promising option, and establishing its effectiveness in the target population is a crucial milestone in developing IPV-Al. The aim of this clinical trial was to show the non-inferiority of three IPV-Al vaccines to standard IPV. In this phase 2, non-inferiority, observer-blinded, randomised, controlled, single-centre trial in the Dominican Republic, healthy infants aged 6 weeks, not previously polio vaccinated, were allocated after computer-generated randomisation by block-size of four, to receive one of four IPV formulations (three-times reduced dose [1/3 IPV-Al], five-times reduced dose [1/5 IPV-Al], ten-times reduced dose [1/10 IPV-Al], or IPV) intramuscularly in the thigh at 6, 10, and 14 weeks of age. The primary outcome was seroconversion for poliovirus types 1, 2, and 3 with titres more than or equal to four-fold higher than the estimated maternal antibody titre and more than or equal to 8 after three vaccinations. Non-inferiority was concluded if the lower two-sided 90% CI of the seroconversion rate difference between IPV-Al and IPV was greater than -10%. The safety analyses were based on the safety analysis set (randomly assigned participants who received at least one trial vaccination) and the immunogenicity analyses were based on the per-protocol population. This study is registered with ClinicalTrials.gov registration, number NCT02347423. Between Feb 2, 2015, and Sept 26, 2015, we recruited 824 infants. The per-protocol population included 820 infants; 205 were randomly assigned to receive 1/3 IPV-Al, 205 to receive 1/5 IPV-Al, 204 to receive 1/10 IPV-Al, and 206 to receive IPV. The proportion of individuals meeting the primary endpoint of seroconversion for poliovirus types 1, 2, and 3 was already high for the three IPV-Al vaccines after two vaccinations, but was higher after three vaccinations

  17. Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population

    Science.gov (United States)

    Pardede, A. M. H.; Maulita, Y.; Buaton, R.

    2018-03-01

    When someone wants to be registered in an institution such as Birth Certificate, School, Higher Education, e-ID card, Tax, BPJS, Bank, Driving License, Passport and others then have to register and do registration one by one and have registration number or account respectively agency. It may be said that everyone is bothered with the registration process, from the moment of birth must be registered to be registered as a resident, to enter the school must also registration, it is considered ineffective and efficient because one must continue to register one by one and there is repetition of ownership registration number which vary each agency. Seeing these problems need to find a solution or attempt how to keep the affairs of registration is not repetitive and quite once and the number applies to all agencies. The presence of the latest technology that IPv6 brings opportunities for the efficiency and effectiveness of the registration system. The method used in this research is the exploration and modeling of system development with NDLC (Network Development Life Cycle) to produce a model to build IPv6 implementation on e-ID card. The results of the study will show that the public has one registration number.

  18. Intimate partner violence: IPV in the LGBT community.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Nationally, the rates of intimate partner violence (IPV) among lesbian, gay, bisexual, or transgender (LGBT) individuals are similar to or greater than rates for heterosexuals. Many have experienced psychological and physical abuse as sexual minorities, making it difficult for them to seek help for IPV. Physician behavior, such as not assuming that all patients are heterosexual, being nonjudgmental, and using inclusive language, can empower LGBT patients to disclose IPV. Also, physicians should ascertain the degree to which the patient is out. The threat of being outed can be an aspect of the power and control exerted by an abusive partner and a significant barrier to seeking help. Physicians should screen for IPV and intervene in a similar manner with LGBT and non-LGBT patients, but they should be aware of potential limitations in resources for LGBT patients, such as shelters. As sexual minorities experiencing IPV, LGBT individuals are at greater risk of depression and substance abuse than are non-LGBT individuals. Minority stress, resulting from stigmatization and discrimination, can be exacerbated by IPV. Physicians should learn about legal issues for LGBT individuals and the availability of community or advocacy programs for LGBT perpetrators or victims of IPV. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  19. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  20. Inactivated polio vaccine development for technology transfer using attenuated Sabin poliovirus strains to shift from Salk-IPV to Sabin-IPV.

    Science.gov (United States)

    Bakker, Wilfried A M; Thomassen, Yvonne E; van't Oever, Aart G; Westdijk, Janny; van Oijen, Monique G C T; Sundermann, Lars C; van't Veld, Peter; Sleeman, Eelco; van Nimwegen, Fred W; Hamidi, Ahd; Kersten, Gideon F A; van den Heuvel, Nico; Hendriks, Jan T; van der Pol, Leo A

    2011-09-22

    Industrial-scale inactivated polio vaccine (IPV) production dates back to the 1960s when at the Rijks Instituut voor de Volksgezondheid (RIV) in Bilthoven a process was developed based on micro-carrier technology and primary monkey kidney cells. This technology was freely shared with several pharmaceutical companies and institutes worldwide. In this contribution, the history of one of the first cell-culture based large-scale biological production processes is summarized. Also, recent developments and the anticipated upcoming shift from regular IPV to Sabin-IPV are presented. Responding to a call by the World Health Organization (WHO) for new polio vaccines, the development of Sabin-IPV was continued, after demonstrating proof of principle in the 1990s, at the Netherlands Vaccine Institute (NVI). Development of Sabin-IPV plays an important role in the WHO polio eradication strategy as biocontainment will be critical in the post-OPV cessation period. The use of attenuated Sabin strains instead of wild-type Salk polio strains will provide additional safety during vaccine production. Initially, the Sabin-IPV production process will be based on the scale-down model of the current, and well-established, Salk-IPV process. In parallel to clinical trial material production, process development, optimization and formulation research is being carried out to further optimize the process and reduce cost per dose. Also, results will be shown from large-scale (to prepare for future technology transfer) generation of Master- and Working virus seedlots, and clinical trial material (for phase I studies) production. Finally, the planned technology transfer to vaccine manufacturers in low and middle-income countries is discussed. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. Návrh integrace IPv6 do počítačové sítě Mendelovy univerzity v Brně v oblasti směrování

    OpenAIRE

    Filip, Tomáš

    2015-01-01

    This master thesis deals with integration of IPv6 network protocol into production computer network of Mendel University in Brno in the routing field. The integration includes the Dual Stack transition mechanism, IPv6 address plan, static routing at the perimeter of the university network, and OSPFv3 and MP-BGP routing protocols. Proposed integration plan was verified in the Laboratory of computer networking at the Department of Informatics at FBE MENDELU, and it serves as a template for a fi...

  2. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Sehwa Song

    2009-01-01

    Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.

  3. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  4. ERADIKASI POLIO DAN IPV (INACTIVATED POLIO VACCINE

    Directory of Open Access Journals (Sweden)

    Gendrowahyuhono Gendrowahyuhono

    2012-09-01

    Full Text Available In the year 1988, World Health Organization (WHO claims that polio viruses should be eradicated after year 2000. However, until year 2010 the world have not been free from polio viruses circulation. So many effort had been achieved and it is estimated that the world will be free from polio virus after the year 2013. Control of poliomyelitis in Indonesia has been commenced since 1982 with routine immunization of polio program and the National Immunization Days (NID has been commenced since 1995,1996,2005 and 2006. When the world is free from polio virus, WHO suggests several alternative effort to maintain the world free from polio viruses : I stop the OPV (Oral Polio Vaccine and no polio immunization, 2 stop OPV and stock pile mOPV (monovalent OPV, 3 use OPV and IPV (Inactivated Polio Vaccine in a certain times, 4 use IPV only in a certain times. IPV has been used routinely in develop countries but has not been used in the developing countries. Several studies in development countries has been conducted, but had not been done in the developing countries. Indonesia collaboration with WHO has conducted the study of IPV in Yogyakarta Province since year 2002 until year 2010. The overall aim of the study is to compile the necessary data that will inform global and national decision-making regarding future polio immunization policies for the OPV cessation era. The data generated from the study will be particularly important to make decisions regarding optimal IPV use in developing tropical countries. It is unlikely that this data can be assembled through other means than through this study. The tentative result of the study shows that OPV immunization coverage in the year 2004 is 99% in four district and 93 % in the Yogyakarta city. Environment surveillance shows that there are 65.7% polio virus detected from 137 sewage samples pre IPV swich, and 4.8% polio virus detected from 83 sewage samples post IPV swich. Survey polio antibody serologis shows

  5. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  6. RAZVOJ MODELA IN SIMULACIJA IZČRPANJA IPv4 NASLOVNEGA PROSTORA

    OpenAIRE

    Ciber, Peter

    2014-01-01

    Magistrsko delo obravnava razvoj modela in simulacijo izčrpanja IPv4 naslovnega prostora. Za dodeljevanje IPv4 naslovnega prostora skrbi organizacija IANA, ki je po petih celinah sveta dodelila velike kose IPv4 naslovnega prostora. V Evropi tako za nadaljnjo razdelitev skrbi organizacija RIPE NCC, v Afriki AFRINIC, v azijsko-pacifiški regiji APNIC, v Ameriki ARIN v Latinski Ameriki in Karibih pa LACNIC. Zanimalo nas je koliko in kako je IANA razdelila IPv4 naslove po celinah in kako so region...

  7. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies.

    Science.gov (United States)

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W

    We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21-22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. In 2012, 60 healthy adult males aged 19-23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvanted Sabin-IPV (aSabin-IPV), or conventional Salk-IPV. In the original study, blood was collected at days 0 (before) and 28 (after vaccination), respectively. In this study, an additional blood sample was collected 21-22 months after vaccination, and tested for neutralizing antibodies to Sabin poliovirus types 1, 2 and 3. We collected sera from 59/60 (98.3%) subjects; 59/59 (100%) remained seropositive to all poliovirus types, 21-22 months after vaccination. The decay curves were very similar among the study groups. Between day 28 and 21-22 months, there was a reduction of ⩾87.4% in median antibody levels for all poliovirus types in all study groups, with no significant differences between the study groups. The decay of poliovirus antibodies over a 21-22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  8. Diseño e implementación de IPv6 en un sistema embebido

    Directory of Open Access Journals (Sweden)

    Danilo Alfonso López Sarmiento

    2013-09-01

    Full Text Available This paper presents a procedure for the implementation of new-generation protocols in an embedded system. The aim is to show that such an implementation can be connected to the Internet via IPv6. This, for its part, reveals some necessary aspects for supporting the procedure and for actual implementation of a web server (as proof of successful operation. A microcontroller that allows the use of Ethernet (FreescaleColdfire V1 was selected to facilitate handling FreeRTOS and the uIP protocol stack. We found it necessary to write an additional algorithm for the management of the link layer. Since there is no established standard or methodology for these developments in different microcontrollers, characterization must be achieved depending on the particular hardware being used, including certain files that ensure the performance of each of the layers regarding the protocol stack in question.

  9. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  10. Modelo test-bed de simulación y evaluación de criptografía de curva elíptica en redes IPv6 de próxima generación

    Directory of Open Access Journals (Sweden)

    Nelson Enrique Vera Parra

    2014-04-01

    Full Text Available En la actualidad, las redes móviles e inalámbricas de nueva generación, tales como las redes de área personal IPv6 de baja potencia (6LoWPAN, redes de sensores inalámbricos sobre IPv6 y redes móviles IPv6 jerárquicas se encuentran bajo rigurosa investigación y desarrollo, pues representan el paso por seguir en la evolución de las redes Machine-to-Machine (M2M, al tiempo que apoyan el acceso de banda ancha de la próxima generación de tecnologías y sistemas inteligentes sobre Internet futuro. Estas redes de nueva generación imponen restricciones en cuanto al poder de procesamiento, ancho de banda y recursos de energía, lo que re¬presenta una gran limitante en la implementación de mecanismos de seguridad. En este sentido, en lo últimos años han surgido diversas propuestas para la administración de claves, procedimientos de firma digital y cifrado de datos basados en curvas elípticas e híper-elípticas, que logran niveles de seguridad equivalentes a los algoritmos convencionales basados en algoritmos Diffie-Hellman y Rivest-Shamir-Adleman (RSA, pero que reducen la longitud de clave y, por ende, los recursos computacionales y de red asociados. Este artículo examina los algoritmos basados en criptografía de curvas elípticas (ECC y su aplicación a redes móviles e inalámbricas de nueva generación habilitadas para IPv6. Así mismo, describe un modelo de simulación para la evaluación de ECC, donde se comparan los recursos computacionales necesarios y las limitaciones en mecanismos ligeros de seguridad.

  11. Implementasi Dan Perancangan Online Charging System (OCS IPTV Multichannel pada Jaringan IPv6

    Directory of Open Access Journals (Sweden)

    Bagus Wahyu Nugraha

    2014-03-01

    Full Text Available IPTV didefinisikan sebagai layanan multimedia berbentuk data seperti televisi, video, audio, text, grafik yang dikirimkan melalui jaringan berbasisi IP tetapi harus diberikan dengan persyaratan seperti QOS dan experience, security, interactivity dan reliability.  Beberapa  feature yang  dimiliki oleh IPTV ini adalah IPTV dapat menyiarkan secara live  atau prerecorded digital video program-program pendidikan, komersial, scheduling / penjadwalan program dsb. Tentunya hal ini menggunakan IPTV akan menguntungkan dari sisi bisnis mengingat semakin banyaknya pengguna broadband. Dengan konvergen antara televisi, telephone dan access internet, IPTV dapat berkembang sesuai dengan tren masa kini yaitu IP based, sehingga mudah di akses oleh pengguna dan proses charging/billing yang sesuai dengan standar bisnis yang ada. Oleh karena itu, “Design and Implementation Online Charging System (OCS IPTV Multichannel on IPv6 Network“ dibuat sebagai layanan konten yang dapat digunakan untuk teknologi yang menggunakan IP based. Dalam pembuatan rancang bangun system billing pada IPTV ini dihasilkan sebuah software yang user friendly sehingga penyedia layanan IPTV dapat dengan mudah menggunakan software yang telah dibuat.

  12. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Science.gov (United States)

    2010-09-17

    ... importance of the Internet to U.S. innovation, prosperity, education, and political and cultural life, NTIA... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Internet..., the U.S. Government, and the Internet Economy AGENCY: National Telecommunications and Information...

  13. Mobile IPv6における分散ホームエージェントの実現

    OpenAIRE

    福田, 浩章

    2005-01-01

    電子機器端末の小型化技術や通信技術の発達により、身の周りのあらゆる電子機器がなんらかのかたちでインターネットに接続されるようになってきた。こうしたときにさらなる利便性として求められるものが、移動通信のサポートである。Mobile IPv6 技術は、移動中の継続的な通信を支援する技術の一つである。MobileIPv6 では移動中でも同じIP アドレスを使い続けることができる。これはホームエージェントと呼ばれるノードが移動端末の所在を把握し、他の端末との通信を仲介することにより実現される。このホームエージェントは、基本的には1 台の設置を前提として仕様が決められている。本研究では複数のホームエージェントをネットワーク上に分散して配置する仕組みを提案し、実現する。それにより、Mobile IPv6 の運用における全体的なネットワークの効率化と負荷分散を目指す。...

  14. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  15. IPV among Adolescent Reproductive Health Patients: The Role of Relationship Communication

    Science.gov (United States)

    Messinger, Adam M.; Davidson, Leslie L.; Rickert, Vaughn I.

    2011-01-01

    Population-specific data on factors that affect intimate partner violence (IPV) are needed on female adolescents and young adults, a cohort at greatest risk of IPV in the United States (Rennison, 2001). Studies have frequently overlooked the role of relationship communication as a gatekeeper to IPV (Ridley & Feldman, 2003). To address this…

  16. ApertosオペレーティングシステムによるIPv6ルータの構築

    OpenAIRE

    伊藤, 純一郎; 横手, 靖彦; 所, 真理雄; Jun-ichiro, Itoh; Yasuhiko, Yokote; Mario, Tokoro; 慶応義塾大学理工学研究科計算機科学専攻:Sony CSL; ソニー(株)アーキテクチャ研究所; 慶応義塾大学:Sony CSL; Department of Computer Science, Keio University:Sony CSL; Architecture Laboratory, Sony Corporation; Keio University:Sony CSL

    1997-01-01

    インターネットで現在利用されているIPv4プロトコルは,インターネットの爆発的成長に耐えられない,という指摘がある.このため,IPv6プロトコルが提案され,現在移行へ向けた考察が行われている.しかしながら,現在のルータソフトウェア構成法では,今後行われるプロトコル策定やプロトコルの仕様変更などに柔軟に対処することが困難である.本論文では,Apertosオペレーティングシステム上にIPv6ルータのプロトコル処理部を実装することで,これらの問題の解決を目指している.本方法では,並行オブジェクトによるソフトウェア構成によりプロトコル処理部のモジュール間の独立性を確保し,自己反映計算に基づくOSアーキテクチャの利用によりプログラマに最適なプログラミング環境を提供することができる....

  17. Empirical analysis of the effects and the mitigation of IPv4 address exhaustion

    OpenAIRE

    Richter, Philipp

    2017-01-01

    IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its pool of available IPv4 addresses. IPv4 scarcity is now reality. In the subsequent years, IPv4 a...

  18. Intimate partner violence: office screening for victims and perpetrators of IPV.

    Science.gov (United States)

    Chen, Ping-Hsin; Jacobs, Abbie; Rovi, Susan L D

    2013-09-01

    Intimate partner violence (IPV) affects more than 12 million individuals annually. Power and control are central concepts underlying abusive relationships. Physicians may see IPV victims, perpetrators, and their children for annual examinations, as well as for injuries and health conditions associated with abuse. In 2013, the US Preventive Services Task Force recommended that women of childbearing age (ie, 14 to 46 years) be screened for IPV. Brief, validated screening tools, such as the 4-item Hurt, Insult, Threaten, and Scream (HITS), can be used to facilitate screening. Physicians should always assess patients whose medical histories or presenting symptoms or injuries are consistent with abuse. Risk factors for IPV and consequences of abuse include general health conditions (eg, asthma, irritable bowel syndrome), reproductive issues (eg, gynecologic disorders, unintended pregnancies), psychological conditions (eg, depression, sleep disturbances), and risky health behaviors (eg, substance use, poor health care adherence). Tools for identifying perpetrators are under investigation. To prepare the practice to address IPV, physicians should educate themselves and staff and learn about community and national resources. By identifying and responding to IPV, clinicians may be able to reduce IPV and interrupt the intergenerational cycle of violence. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  19. Persistence of hepatitis B immune memory until 9-10 years of age following hepatitis B vaccination at birth and DTaP-IPV-HB-PRP∼T vaccination at 2, 4 and 6 months.

    Science.gov (United States)

    Kosalaraksa, Pope; Chokephaibulkit, Kulkanya; Benjaponpitak, Suwat; Pancharoen, Chitsanu; Chuenkitmongkol, Sunate; B'Chir, Siham; Da Costa, Xavier; Vidor, Emmanuel

    2018-01-15

    To evaluate the long-term persistence of anti-hepatitis B surface (HBs) antibodies and the response to a HB challenge re-vaccination in children who had received a primary series of DTaP-IPV-HB-PRP∼T (Hexaxim™) or DTaP-IPV-HB/PRP∼T (Infanrix hexa™). Two cohorts of participants who had previously received HB vaccine at birth followed by either DTaP-IPV-HB-PRP∼T or DTaP-IPV-HB/PRP∼T co-administered with PCV7 at 2, 4, 6 months of age in a randomized, Phase III, observer-blind study in Thailand, were followed up for anti-HBs antibodies (geometric mean concentrations [GMCs] and seroprotection [SP] rate [% of participants with a titer ≥10 mIU/mL]) at 12-18 months of age and 9-10 years of age. A monovalent HB challenge re-vaccination was administered at 9-10 years of age and the anamnestic response was evaluated. Anti-HBs GMCs and SP rates in the DTaP-IPV-HB-PRP∼T and DTaP-IPV-HB/PRP∼T groups were high and similar post-primary vaccination series (2477 mIU/mL and 99.5% and 2442 mIU/mL and 99.5%, respectively) and declined to a similar extent in each group at 12-18 months (154.5 mIU/mL and 90.8% and 162.3 mIU/mL and 96.5%, respectively). Antibody levels further declined at 9-10 years of age (13.3 mIU/mL and 49.3% and 8.0 mIU/mL and 42.9%) and a strong anamnestic response occurred in each group post-HB challenge re-vaccination (92.8% and 98.7%, respectively). The kinetics of long-term anti-HBs antibody persistence were similar following a primary series of DTaP-IPV-HB-PRP∼T or DTaP-IPV-HB/PRP∼T. The response to a subsequent HB challenge re-vaccination was strong and similar in each group, demonstrating persisting immune memory.

  20. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  1. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  2. Decay of Sabin inactivated poliovirus vaccine (IPV)-boosted poliovirus antibodies

    OpenAIRE

    Resik, Sonia; Tejeda, Alina; Fonseca, Magile; Sein, Carolyn; Hung, Lai Heng; Martinez, Yenisleidys; Diaz, Manuel; Okayasu, Hiromasa; Sutter, Roland W.

    2015-01-01

    Introduction: We conducted a follow-on study to a phase I randomized, controlled trial conducted in Cuba, 2012, to assess the persistence of poliovirus antibodies at 21–22 months following booster dose of Sabin-IPV compared to Salk-IPV in adults who had received multiple doses of oral poliovirus vaccine (OPV) during childhood. Methods: In 2012, 60 healthy adult males aged 19–23 were randomized to receive one booster dose, of either Sabin-inactivated poliovirus vaccine (Sabin-IPV), adjuvant...

  3. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  4. A Randomized, Controlled Study of DTaP-IPV-HB-PRP-T, a Fully Liquid Hexavalent Vaccine, Administered in a 3-, 5- and 11- to 12-month Schedule.

    Science.gov (United States)

    Vesikari, Timo; Silfverdal, Sven-Arne; Jordanov, Emilia; Feroldi, Emmanuel

    2017-01-01

    To assess the immunogenicity and safety of a fully liquid, ready-to-use hexavalent DTaP-IPV-HB-PRP-T vaccine when administered in a 2 + 1 schedule at 3, 5 and 11-12 months of age. Phase III, randomized, active-controlled, observer-blind, multicenter study. Infants were randomized to receive DTaP-IPV-HB-PRP-T (N = 275) or a licensed control hexavalent vaccine (DTaP-IPV-HB//PRP~T: N = 275), both given in coadministration with Prevenar 13. Serum was analyzed for immune responses to all vaccine antigens. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was tested at completion of the primary series using predefined seroprotection (SP) rate and vaccine response (VR) rates. Safety was assessed using parental reports. Noninferiority of DTaP-IPV-HB-PRP-T to the control vaccine was demonstrated postdose 3 for each antigen, and the SP (for D, T, poliovirus 1, 2 and 3, hepatitis B and polyribosylribitol phosphate) and VR rates (for pertussis toxin and filamentous hemagglutinin) were high in each group. SP rates for D, T, polio 1, 2, 3 and VR rates for pertussis toxin and filamentous hemagglutinin were similar in each group. For hepatitis B, SP rate was slightly higher for DTaP-IPV-HB//PRP~T (99.6%) than DTaP-IPV-HB-PRP-T (96.4%), and for PRP, SP rate was higher for DTaP-IPV-HB-PRP-T (93.5%) than DTaP-IPV-HB//PRP~T (85.2%). For Prevenar 13, the SP rate was high for each serotype and similar for both groups. All vaccines were well tolerated. These study findings confirm the safety and immunogenicity and thus the suitability of this fully liquid hexavalent vaccine for administration in a 2 + 1 schedule.

  5. Decay of Sabin inactivated poliovirus vaccine (IPV-boosted poliovirus antibodies

    Directory of Open Access Journals (Sweden)

    Sonia Resik

    2015-01-01

    Conclusion: The decay of poliovirus antibodies over a 21–22-month period was similar regardless of the type of booster vaccine used, suggesting the scientific data of Salk IPV long-term persistence and decay may be broadly applicable to Sabin IPV.

  6. Analysis of the dose-sparing effect of adjuvanted Sabin-inactivated poliovirus vaccine (sIPV).

    Science.gov (United States)

    Li, Zhuofan; Ding, Wenting; Guo, Qi; Liu, Ze; Zhu, Zhe; Song, Shaohui; Li, Weidong; Liao, Guoyang

    2018-03-30

    Sabin-based inactivated poliovirus vaccine(sIPV) is gradually replacing live-attenuated oral polio vaccine(OPV). Sabin-inactivated poliovirus vaccine(sIPV) has played a vital role in reducing economic burden of poliomyelitis and maintaining appropriate antibody levels in the population. However, due to its high cost and limited manufacturing capacity, sIPV cannot reach its full potential for global poliovirus eradication in developing countries. Therefore, to address this situation, we designed this study to evaluate the dose-sparing effects of AS03, CpG oligodeoxynucleotides (CpG-ODN) and polyinosinic:polycytidylic acid (PolyI:C) admixed with sIPV in rats. Our results showed that a combination of 1/4-dose sIPV adjuvanted with AS03 or AS03 with BW006 provides a seroconversion rate similar to that of full-dose sIPV without adjuvant and that, this rate is 5-fold higher than that of 1/4-dose sIPV without adjuvant after the first immunization. The combination of AS03 or AS03 with BW006 as an adjuvant effectively reduced sIPV dose by at least 4-fold and induced both humoral and cellular immune responses. Therefore, our study revealed that the combination of AS03 or AS03 with BW006 is a promising adjuvant for sIPV development.

  7. Immunogenicity and Reactogenicity of DTPa-IPV/Hib Vaccine Co-administered With Hepatitis B Vaccine for Primary and Booster Vaccination of Taiwanese Infants

    Directory of Open Access Journals (Sweden)

    Pei-Lan Shao

    2011-06-01

    Full Text Available Immunogenicity and reactogenicity of the combined diphtheria-tetanus-acellular pertussis-inactivated poliovirus-Haemophilus influenzae type b (Hib conjugate vaccine (DTPa-IPV/Hib, Infanrix™-IPV + Hib was assessed when co-administered with hepatitis B (HBV vaccine. Seventy healthy infants received DTPa-IPV/Hib at 1.5, 3.5, 6 and 15–18 months, and HBV at birth, 1.5, 6 and 15–18 months of age. Serological responses were assessed. Diphtheria, tetanus, Hib and pertussis seroprotection/seropositivity rates were 100% after primary vaccination. Post-primary immune responses to poliovirus could not be evaluated for technical reasons. However, after the booster dose, seroprotection/seropositivity rates, including poliovirus, were 100%. Over 95% were seroprotected against HBV. Post-booster geometric mean antibody concentrations/titers (GMC/GMTs rose from 14-fold to 45-fold, indicating effective priming against all antigens, including polioviruses. DTPa-IPV/Hib was well tolerated alone or co-administered with HBV. No serious adverse events were considered related to vaccination. Primary and booster vaccination with combined DTPa-IPV/Hib and HBV was immunogenic and well tolerated. Combination vaccines enable vaccine providers to conveniently provide routine pediatric immunizations, with minimal discomfort.

  8. Innovative IPV from attenuated Sabin poliovirus or newly designed alternative seed strains.

    Science.gov (United States)

    Hamidi, Ahd; Bakker, Wilfried A M

    2012-11-01

    This article gives an overview of the patent literature related to innovative inactivated polio vaccine (i-IPV) based on using Sabin poliovirus strains and newly developed alternative recombinant poliovirus strains. This innovative approach for IPV manufacturing is considered to attribute to the requirement for affordable IPV in the post-polio-eradication era, which is on the horizon. Although IPV is a well-established vaccine, the number of patent applications in this field was seen to have significantly increased in the past decade. Currently, regular IPV appears to be too expensive for universal use. Future affordability may be achieved by using alternative cell lines, alternative virus seed strains, improved and optimized processes, dose sparing, or the use of adjuvants. A relatively short-term option to achieve cost-price reduction is to work on regular IPV, using wild-type poliovirus strains, or on Sabin-IPV, based on using attenuated poliovirus strains. This price reduction can be achieved by introducing efficiency in processing. There are also multiple opportunities to work on dose sparing, for example, by using adjuvants or fractional doses. Renewed interest in this field was clearly reflected in the number and diversity of patent applications. In a later stage, several innovative approaches may become even more attractive, for example the use of recombinant virus strains or even a totally synthetic vaccine. Currently, such work is mainly carried out by research institutes and universities and therefore clinical data are not available.

  9. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  10. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  11. Concomitant administration of diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) with pentavalent rotavirus vaccine in Japanese infants.

    Science.gov (United States)

    Tanaka, Yoshiyuki; Yokokawa, Ruriko; Rong, Han Shi; Kishino, Hiroyuki; Stek, Jon E; Nelson, Margaret; Lawrence, Jody

    2017-06-03

    Rotavirus is the leading cause of severe acute gastroenteritis in infants and young children. Most children are infected with rotavirus, and the health and economic burdens of rotavirus gastroenteritis on healthcare systems and families are considerable. In 2012 pentavalent rotavirus vaccine (RV5) and diphtheria, tetanus, acellular pertussis and inactivated poliovirus vaccine derived from Sabin strains (DTaP-sIPV) were licensed in Japan. We examined the immunogenicity and safety of DTaP-sIPV when administrated concomitantly with RV5 in Japanese infants. A total of 192 infants 6 to 11 weeks of age randomized to Group 1 (N = 96) received DTaP-sIPV and RV5 concomitantly, and Group 2 (N = 96) received DTaP-sIPV and RV5 separately. Antibody titer to diphtheria toxin, pertussis antigens (PT and FHA), tetanus toxin, and poliovirus type 1, 2, and 3 were measured at 4 to 6 weeks following 3-doses of DTaP-sIPV. Seroprotection rates for all components of DTaP-sIPV were 100% in both groups, and the geometric mean titers for DTaP-sIPV in Group 1 were comparable to Group 2. Incidence of systemic AEs (including diarrhea, vomiting, fever, and nasopharyngitis) were lower in Group 1 than in Group 2. All vaccine-related AEs were mild or moderate in intensity. There were no vaccine-related serious AEs, no deaths, and no cases of intussusception during the study. Concomitant administration of DTaP-sIPV and RV5 induced satisfactory immune responses to DTaP-sIPV and acceptable safety profile. The administration of DTaP-sIPV given concomitantly with RV5 is expected to facilitate compliance with the vaccination schedule and improve vaccine coverage in Japanese infants.

  12. The Relationship Between Family, Parent, and Child Characteristics and Intimate-Partner Violence (IPV) Among Ukrainian Mothers.

    Science.gov (United States)

    Burlaka, Viktor; Grogan-Kaylor, Andrew; Savchuk, Olena; Graham-Bermann, Sandra A

    2017-07-01

    To assess the prevalence of intimate partner violence (IPV) in a sample of Ukrainian mothers of schoolchildren, and to examine the relationship between IPV and family, parent, and child characteristics utilizing multilevel models. Mothers of children aged 9-16 (n = 278, 93.5% Ukrainians) answered the Revised Conflict Tactics Scale (CTS2) assessing IPV. We also examined the relationship between IPV and maternal age, education, employment and marital status, family income, and rural or urban residence. Eighty-one percent of women reported psychological violence and 58% reported physical assault. On average, women reported 66 instances of IPV during the last year. Multilevel modeling revealed that lower maternal education, unemployment, not living with the husband or partner, and urban residency were associated with higher IPV victimization. Younger age and family income were not significantly related to IPV. IPV was a significant social problem in the present sample of Ukrainian mothers of school age children. Future policy and violence prevention programming should focus on supporting academic and employment opportunities for women, particularly for those living in urban areas.

  13. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    Science.gov (United States)

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  14. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    Directory of Open Access Journals (Sweden)

    Jordi Casademont

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  15. Effects of PREPARE, a Multi-component, School-Based HIV and Intimate Partner Violence (IPV) Prevention Programme on Adolescent Sexual Risk Behaviour and IPV: Cluster Randomised Controlled Trial.

    Science.gov (United States)

    Mathews, Catherine; Eggers, Sander M; Townsend, Loraine; Aarø, Leif E; de Vries, Petrus J; Mason-Jones, Amanda J; De Koker, Petra; McClinton Appollis, Tracy; Mtshizana, Yolisa; Koech, Joy; Wubs, Annegreet; De Vries, Hein

    2016-09-01

    Young South Africans, especially women, are at high risk of HIV. We evaluated the effects of PREPARE, a multi-component, school-based HIV prevention intervention to delay sexual debut, increase condom use and decrease intimate partner violence (IPV) among young adolescents. We conducted a cluster RCT among Grade eights in 42 high schools. The intervention comprised education sessions, a school health service and a school sexual violence prevention programme. Participants completed questionnaires at baseline, 6 and 12 months. Regression was undertaken to provide ORs or coefficients adjusted for clustering. Of 6244 sampled adolescents, 55.3 % participated. At 12 months there were no differences between intervention and control arms in sexual risk behaviours. Participants in the intervention arm were less likely to report IPV victimisation (35.1 vs. 40.9 %; OR 0.77, 95 % CI 0.61-0.99; t(40) = 2.14) suggesting the intervention shaped intimate partnerships into safer ones, potentially lowering the risk for HIV.

  16. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  17. Peer Influence on IPV by Young Adult Males: Investigating the Case for a Social Norms Approach.

    Science.gov (United States)

    McKool, Marissa; Stephenson, Rob; Winskell, Kate; Teten Tharp, Andra; Parrott, Dominic

    2017-08-01

    Nearly 32% of women report experiencing physical violence from an intimate partner and more than 8% report being raped by a significant other in their lifetime. Young people's perceptions that their peers perpetrate relationship violence have been shown to increase the odds of self-reported perpetration. Yet, limited research has been conducted on this relationship as individuals begin to age out of adolescence. The present study sought to examine the link between the perception of peer perpetration of intimate partner violence (IPV) and self-reported IPV perpetration among a sample of predominately young adult (21-35 years) males. This study also explored the discordance between the perception of peer IPV behavior and self-reported perpetration. Data from 101 male peer dyads ( n = 202) were taken from a study on the effects of alcohol and bystander intervention in Atlanta, Georgia. Thirty-six percent ( n = 73) of men reported perpetrating physical IPV and 67% ( n = 135) reported perpetrating sexual IPV in the past 12 months. Nearly 35% ( n = 55) of the sample reported that none of their peers had perpetrated physical IPV, which contradicted their friend's self-report of physical IPV perpetration. Similarly, 68% ( n = 115) of the men perceived none of their peers to have perpetrated sexual IPV, which contradicted their friend's self-report of sexual IPV perpetration. Discordance variables were significantly associated with self-reported perpetration for both physical (χ 2 = 152.7, p peer IPV perpetration among young adult males. Findings suggest a traditional social norms approach to IPV prevention, which seeks to persuade individuals that negative behaviors are less common than perceived, may not be the best approach given a significant number of men believed their friends were nonviolent when they had perpetrated violence.

  18. Adding insult to injury: intimate partner violence among women and men reporting activity limitations.

    Science.gov (United States)

    Cohen, Marsha M; Forte, Tonia; Du Mont, Janice; Hyman, Ilene; Romans, Sarah

    2006-08-01

    Women with activity limitations (ALs) are at risk for Intimate partner violence (IPV). This study examined IPV in men versus women with ALs. Data from the Canadian 1999 General Social Survey compared physical, sexual, emotional, and financial IPV from a current/expartner in 5 years for men and women with ALs compared with those without ALs. Logistic regression examined sex differences in IPV among those with ALs, adjusting for sociodemographic factors. Rates of physical (11.9% versus 7.8%; p women with compared with without ALs. A similar pattern was seen for men, with greater rates of physical (9.2% versus 6.6%; p = 0.006), emotional (22.6% versus 18.2%; p = 0.002), and financial (2.6% versus 1.4%; p = 0.005) IPV in men with ALs than men without ALs. Risk factors for IPV included younger age, being divorced/separated or single, and having lower income and poorer health. Women with ALs were more likely than men to experience any IPV (29.1% versus 24.9%) and more severe and more incidents of IPV. In multivariable analysis, women were no longer at greater risk for "any IPV" after adjusting for sociodemographic variables (odds ratio = 1.09; 95% confidence interval, 0.88-1.36). This is the first study to document IPV rates in men with ALs. Women with ALs were more likely to be divorced/separated, living in poverty, and in poorer health than men with ALs. These factors accounted for sex differences in IPV rates.

  19. A Randomized Controlled Study of a Fully Liquid DTaP-IPV-HB-PRP-T Hexavalent Vaccine for Primary and Booster Vaccinations of Healthy Infants and Toddlers in Latin America.

    Science.gov (United States)

    López, Pío; Arguedas Mohs, Adriano; Abdelnour Vásquez, Arturo; Consuelo-Miranda, Maria; Feroldi, Emmanuel; Noriega, Fernando; Jordanov, Emilia; B Chir, Siham; Zambrano, Betzana

    2017-11-01

    Hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-HB-PRP-T)-containing vaccines are increasingly the standard of care. This study evaluated the primary series (NCT01177722) and booster (NCT01444781) of a fully liquid DTaP-IPV-HB-PRP-T vaccine in Latin America. Infants (N = 1375) received hepatitis B vaccine at birth and were randomized to one of 3 batches of the investigational DTaP-IPV-HB-PRP-T or licensed control vaccine (DTaP-HB-IPV//PRP-T) at 2-4 to 6 months of age, coadministered with 7-valent pneumococcal conjugate vaccine (PCV7) (2-4-6 months) and rotavirus vaccine (2-4 months). A booster of either DTaP-IPV-HB-PRP-T or control was given at 12-24 months, coadministered with PCV7. Immunogenicity was assessed by validated assays and safety from parental reports. Primary series seroprotection and vaccine response rates were equivalent for DTaP-IPV-HB-PRP-T batches. For pooled batches, noninferiority to the control vaccine was demonstrated for each antigen. There were no descriptive differences in antibody persistence or booster response between DTaP-IPV-HB-PRP-T and the control. The booster responses to either vaccine following DTaP-IPV-HB-PRP-T primary series or to DTaP-IPV-HB-PRP-T following a control vaccine primary series were similar. The anti-aP component (filamentous hemagglutinin [FHA] and pertussis toxin [PT]) vaccine response and anti-Haemophilus influenzae type b (PRP) series seroprotection (≥0.15 µg/mL) rates were ≥73.0% after 2 primary series doses. Antipyretics had no effect on the immune response, and an extra (oral) polio vaccination had no effect on the antipolio booster response. Responses to PCV7 and rotavirus vaccine were similar for each coadministration. There were no safety concerns observed with any vaccine. These results confirm the suitability of the fully liquid DTaP-IPV-HB-PRP-T vaccine for primary and booster vaccination of infants.

  20. Factors associated with recent intimate partner violence experience amongst currently married women in Afghanistan and health impacts of IPV: a cross sectional study.

    Science.gov (United States)

    Gibbs, Andrew; Corboz, Julienne; Jewkes, Rachel

    2018-05-03

    Intimate partner violence (IPV) is exceedingly common in conflict and post-conflict settings. We first seek to describe factors associated with past 12 month IPV amongst currently married women in Afghanistan, focused on the factors typically assumed to drive IPV. Second, to describe whether IPV is independently associated with a range of health outcomes. Cross-sectional analysis of currently married Afghan women, comprising the baseline study of a trial to prevent IPV. We use multinomial regression, reporting adjusted relative-risk ratios to model factors associated with the different forms of IPV, comparing no IPV, emotional IPV only, and physical IPV and emotional IPV. Second we assessed whether experience of emotional IPV, and physical IPV, were independently associated with health outcomes, reporting adjusted ß coefficients and adjusted odds ratios as appropriate. Nine hundred thirty five currently married women were recruited, 11.8% experienced only emotional IPV and 23.1% experienced physical and emotional IPV. Emotional IPV only was associated with attending a women's group, greater food insecurity, her husband having more than one wife, experiencing other forms of family violence, and more inequitable community gender norms. Experiencing both physical IPV and emotional IPV was associated with attending a women's group, more childhood trauma, husband cruelty, her husband having more than one wife, experiencing other forms of family violence, more inequitable community gender norms, and greater reported disability. Emotional IPV and physical IPV were independently associated with worse health outcomes. IPV remains common in Afghanistan. Economic interventions for women alone are unlikely to prevent IPV and potentially may increase IPV. Economic interventions need to also work with husbands and families, and work to transform community level gender norms. NCT03236948 . Registered 28 July 2017, retrospectively registered.

  1. A fully liquid DTaP-IPV-Hep B-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Mexican children.

    Science.gov (United States)

    Aquino, Amalia Guadalupe Becerra; Brito, Maricruz Gutiérrez; Doniz, Carlos E Aranza; Herrera, Juan Francisco Galán; Macias, Mercedes; Zambrano, Betzana; Plennevaux, Eric; Santos-Lima, Eduardo

    2012-10-05

    To evaluate an investigational, fully liquid hexavalent diphtheria-tetanus-acellular pertussis-inactivated poliovirus-hepatitis B-Haemophilus influenzae type b (DTaP-IPV-Hep B-PRP-T: Hexaxim™) vaccine for primary and booster vaccination of healthy children in Mexico. Infants (N=1189) were randomized to receive one of three lots of the DTaP-IPV-Hep B-PRP-T vaccine or a licensed hexavalent control vaccine (Infanrix™ hexa) for primary vaccination at 2, 4 and 6 months. All participants who completed the primary series and agreed to participate in the booster part of the study received a dose of the investigational vaccine at 15-18 months of age. Validated serological assays and parental reports were used to assess immunogenicity and safety, respectively. Post-primary vaccination, ≥95.8% of participants in both the DTaP-IPV-Hep B-PRP-T and control groups were seroprotected (SP) against diphtheria, tetanus, poliovirus, hepatitis B and PRP, or had seroconverted (SC) to the pertussis toxin (PT) and filamentous hemagglutinin (FHA) pertussis antigens. The SP/SC rates induced by the three DTaP-IPV-Hep B-PRP-T lots were equivalent. No differences in SP/SC rates were observed between the pooled lots of investigational vaccine and the control vaccine. Antibody persistence at 15-18 months was comparable between groups, with strong increases in all antibody concentrations post-DTaP-IPV-Hep B-PRP-T booster. Both vaccines were well tolerated for primary vaccination, as was the booster dose of DTaP-IPV-Hep B-PRP-T. These study findings confirm the suitability of the combined, fully liquid DTaP-IPV-Hep B-PRP-T vaccine for inclusion in routine childhood vaccination schedules. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  3. Daddy's Days Away. A Deployment Activity Book for Parents & Children.

    Science.gov (United States)

    Marine Corps, Washington, DC.

    This booklet grew from an idea that the children of Marines might appreciate some special discussion of their family's separation during deployment. Information is provided for parents to help them express their feelings with their children about the deployment. Outlines of activities to do before leaving are included. Suggestions are given for…

  4. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV)

    Science.gov (United States)

    Machisa, Mercilene T.; Christofides, Nicola; Jewkes, Rachel

    2016-01-01

    Background Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV). The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health. Methods We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM) to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms) mediates the relationship between child abuse and IPV perpetration. Results Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective

  5. Structural Pathways between Child Abuse, Poor Mental Health Outcomes and Male-Perpetrated Intimate Partner Violence (IPV.

    Directory of Open Access Journals (Sweden)

    Mercilene T Machisa

    Full Text Available Violent trauma exposures, including child abuse, are risk factors for PTSD and comorbid mental health disorders. Child abuse experiences of men exacerbate adult male-perpetrated intimate partner violence (IPV. The relationship between child abuse, poor mental health and IPV perpetration is complex but research among the general population is lacking. This study describes the relationship and pathways between history of child abuse exposure and male-perpetrated IPV while exploring the potentially mediating effect of poor mental health.We analysed data from a randomly selected, two-stage clustered, cross-sectional household survey conducted with 416 adult men in Gauteng Province of South Africa. We used multinomial regression modelling to identify associated factors and Structural Equation Modelling (SEM to test the primary hypothesis that poor mental health (defined as abusing alcohol or having PTSD or depressive symptoms mediates the relationship between child abuse and IPV perpetration.Eighty eight percent of men were physically abused, 55% were neglected, 63% were emotionally abused and 20% were sexually abused at least once in their childhood. Twenty four percent of men had PTSD symptoms, 24% had depressive symptoms and 36% binge drank. Fifty six percent of men physically abused and 31% sexually abused partners at least once in their lifetime. Twenty two percent of men had one episode and 40% had repeat episodes of IPV perpetration. PTSD symptomatology risk increased with severity of child trauma and other trauma. PTSD severity increased the risk for binge drinking. Child trauma, other trauma and PTSD symptomatology increased the severity of depressive symptoms. PTSD symptomatology was comorbid with alcohol abuse and depressive symptoms. Child trauma, having worked in the year before the survey, other trauma and PTSD increased the risk of repeat episodes of IPV perpetration. Highly equitable gender attitudes were protective against single and

  6. The role of National Strategies in maintaining Competitive Edge in Information and Communication Technologies

    Directory of Open Access Journals (Sweden)

    Ciprian Popoviciu

    2006-12-01

    Full Text Available This paper examines the economical impact of IPv6, Internet Protocol's next generation. Technically, IPv6 represents an upgrade, an evolution that offers the resources necessary for deeper and wider market penetration of the IP technology, to support the needs of a global economy, to build new products and new services. Politically and economically it has the potential of being a quiet revolution. Countries that trailed US into the information revolution recognize this opportunity to take a leading role in its next expansion phase and have developed national strategies to help better position their respective economies. Despite understanding the constraints imposed by the current version of IP, the private sector is currently inclined to largely ignore IPv6 because of its initial deployment costs and long term returns. Forced by high investor expectations to focus exclusively on the immediate bottom line it trades long term growth opportunities for short term benefits revolving around productivity increases. The paper analyses the importance of a National Strategy in driving IPv6 adoption and in closing a widening knowledge and deployment gap between US and countries such as China, Japan, Korea and the EU.

  7. Effects of combat deployment on risky and self-destructive behavior among active duty military personnel.

    Science.gov (United States)

    Thomsen, Cynthia J; Stander, Valerie A; McWhorter, Stephanie K; Rabenhorst, Mandy M; Milner, Joel S

    2011-10-01

    Although research has documented negative effects of combat deployment on mental health, few studies have examined whether deployment increases risky or self-destructive behavior. The present study addressed this issue. In addition, we examined whether deployment effects on risky behavior varied depending on history of pre-deployment risky behavior, and assessed whether psychiatric conditions mediated effects of deployment on risky behavior. In an anonymous survey, active duty members of the U.S. Marine Corps and U.S. Navy (N = 2116) described their deployment experiences and their participation in risky recreational activities, unprotected sex, illegal drug use, self-injurious behavior, and suicide attempts during three time frames (civilian, military pre-deployment, and military post-deployment). Respondents also reported whether they had problems with depression, anxiety, or PTSD during the same three time frames. Results revealed that risky behavior was much more common in civilian than in military life, with personnel who had not deployed, compared to those who had deployed, reporting more risky behavior and more psychiatric problems as civilians. For the current time period, in contrast, personnel who had deployed (versus never deployed) were significantly more likely to report both risky behavior and psychiatric problems. Importantly, deployment was associated with increases in risky behavior only for personnel with a pre-deployment history of engaging in risky behavior. Although psychiatric conditions were associated with higher levels of risky behavior, psychiatric problems did not mediate associations between deployment and risky behavior. Implications for understanding effects of combat deployment on active duty personnel and directions for future research are discussed. Published by Elsevier Ltd.

  8. Framework en estructuras con direccionamiento IPV6 sobre OSSTMM para la corrección de vulnerabilidades de seguridad en un laboratorio de la academia CISCO de la ESPOCH

    OpenAIRE

    Martínez Santander, Carlos José

    2015-01-01

    Se elaboró una propuesta para realizar un Framework en estructuras con direccionamiento IPv6 sobre Open Source Security Testing Methodology Manual (OSSTMM) para la corrección de vulnerabilidades de seguridad en un laboratorio de Academia Local de redes (CISCO) de la Escuela Superior Politécnica de Chimborazo.Se recopilo tendencias sobre vulnerabilidades de seguridad, además de una experimentación, análisis y aplicación, para solucionar errores de seguridad en arquitecturas I...

  9. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  10. PROTOTIPO PARA EL ANÁLISIS DEL RENDIMIENTO EN EL TRÁFICO DE UN SERVICIO BROADCAST UTILIZANDO LOS PROTOCOLOS HTTP Y RTP SOBRE IPV6 EN UNA RED ACADÉMICA DE TECNOLOGÍA AVANZADA

    Directory of Open Access Journals (Sweden)

    Roberto Ferro

    2011-08-01

    Full Text Available En el presente artículo se condensan los resultados obtenidos de la implementación y modelado de un Prototipo de Servicio Streaming sobre el Sistema Operativo Fedora 13 con el Programa VLC en la Red de Investigación y  Tecnología Avanzada de la Universidad Distrital RITA-UD sobre IPV6 utilizando como cliente la Universidad Minuto de Dios vía RUMBO mediante un Tunel 6a4.

  11. Intrusion Detection and light weight Firewall for the 6LoWPAN networks

    OpenAIRE

    Shreenivas, Dharmini

    2014-01-01

    IPv6 over Low power WPAN (6loWPAN) is an adaption layer introduced between the link layer and the network layer in the TCP/IP protocol stack to t the IPv6 datagrams over the IEEE 802.15.4 link layer. 6loWPAN networks comprise of internet enabled resource-constrained smart objects which are interconnected with each other through the Internet Protocol (IPv6). In Internet of Things (IoT), smart devices of the 6loWPAN networks are connected to the unsecured public Internet. RPL (Routing Protocol ...

  12. Dynamic profiles of neutralizing antibody responses elicited in rhesus monkeys immunized with a combined tetravalent DTaP-Sabin IPV candidate vaccine.

    Science.gov (United States)

    Sun, Mingbo; Ma, Yan; Xu, Yinhua; Yang, Huijuan; Shi, Li; Che, Yanchun; Liao, Guoyang; Jiang, Shude; Zhang, Shumin; Li, Qihan

    2014-02-19

    The World Health Organization has recommended that a Sabin inactivated polio vaccine (IPV) should gradually and synchronously replace oral polio vaccines for routine immunizations because its benefits in eliminating vaccine-associated paralytic poliomyelitis have been reported in different phases of clinical trials. It is also considered important to explore new tetravalent diphtheria, tetanus, and acellular pertussis-Sabin IPV (DTaP-sIPV) candidate vaccines for possible use in developing countries. In this study, the immunogenicity of a combined tetravalent DTaP-sIPV candidate vaccine was investigated in primates by evaluating the neutralizing antibody responses it induced. The dynamic profiles of the antibody responses to each of the separate antigenic components and serotypes of Sabin IPV were determined and their corresponding geometric mean titers were similar to those generated by the tetravalent diphtheria, tetanus, and acellular pertussis-conventional IPV (DTaP-cIPV), the tetravalent diphtheria, tetanus, and acellular pertussis (DTaP), and Sabin IPV vaccines in the control groups. This implies that protective immunogenic effects are conferred by this combined tetravalent formulation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  14. THE ATTENUATING EFFECT OF EMPOWERMENT ON IPV-RELATED PTSD SYMPTOMS IN BATTERED WOMEN LIVING IN DOMESTIC VIOLENCE SHELTERS

    Science.gov (United States)

    Perez, Sara; Johnson, Dawn M.; Wright, Caroline Vaile

    2010-01-01

    Intimate partner violence (IPV) is associated with significant psychological distress, including posttraumatic stress disorder (PTSD). However, factors that attenuate the impact of IPV on PTSD remain largely unknown. Using hierarchical regression, this investigation explored the impact of resource acquisition and empowerment on the relationship between IPV and PTSD. Empowerment demonstrated greater relative importance over resource acquisition. Specifically, empowerment was found to attenuate the impact of IPV severity on PTSD at low and moderate levels of violence. The importance of fostering empowerment and addressing PTSD in addition to provision of resources in battered women is discussed. PMID:22411301

  15. Lightweight MIPv6 with IPSec Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Mobility management is a desired feature for the emerging Internet of Things (IoT. Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for

  16. Microfinance Participation, Control Over Resources, and Justification of IPV: Results From a Nationally Representative Sample of Women.

    Science.gov (United States)

    Murshid, Nadine Shaanta

    2016-04-13

    A high percentage of men and women are purported to justify intimate partner violence (IPV) in countries that are steeped in patriarchy even in the presence of programs such as microfinance that aim to address gender equity. This article examines two assertions that emerge from the literature on microfinance and its potential for positive outcomes for women who participate in it: (a) Microfinance participation is associated with reduced justification of IPV, and (b) microfinance participants with control over their own resources are less likely to justify IPV when compared with microfinance participants who do not have control over their resources. Couples data from a nationally representative survey, the Bangladesh Demographic and Health Survey, were used in the present study. Propensity score matching and logistic regression analyses were conducted to reveal that (a) microfinance participation was not associated with justification of IPV and that (b) women who participated in microfinance were less likely to justify IPV when they had no control over their resources. Implications for practitioners and policymakers are discussed. © The Author(s) 2016.

  17. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Science.gov (United States)

    Stephenson, Rob; Finneran, Catherine

    2013-01-01

    The paper describes the creation of a new scale to measure intimate partner violence (IPV) among gay and bisexual men. Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S). Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence. A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90). The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures. The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  18. The IPV-GBM scale: a new scale to measure intimate partner violence among gay and bisexual men.

    Directory of Open Access Journals (Sweden)

    Rob Stephenson

    Full Text Available The paper describes the creation of a new scale to measure intimate partner violence (IPV among gay and bisexual men.Seven focus group discussions were held with gay and bisexual men, focusing on defining intimate partner violence: 30 forms of IPV were identified. A venue-recruited sample of 912 gay and bisexual men was surveyed, examining definitional understanding and recent experiences of each of the 30 forms of IPV. Participants were also asked questions from the CDC definition of intimate partner violence and the short-form of the Conflicts Tactics Scale (CTS2S. Factor analysis of responses to the definitional questions was used to create the IPV-GBM scale, and the prevalence of intimate partner violence was compared with that identified by the CDC and CTS2S measures of intimate partner violence.A 23-item scale, with 5 unique domains, was created, with strong internal reliability (Cronbach Alpha >.90. The IPV-GBM scale mirrored both the CDC and CTS2S definitions of intimate partner violence, but contained additional domains such as controlling violence, monitoring behaviors, emotional violence, and HIV-related violence. The new scale identified a significantly higher prevalence of IPV than either of the more commonly used measures.The results presented here provide encouraging evidence for a new, more accurate measure of intimate partner violence among gay and bisexual men in the U.S.

  19. Migración de redes de voz IPv4 a IPv6

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-03-01

    Full Text Available This article discusses the current state of voice networks and IP networks running on version 6, and the different architectures that can be implemented. The results analyze the benefits of voice over IP networks with version 6 over version 4 and its influence on the quality of service, from measuring and evaluating outstanding parametersdelay, jitter and packet loss.

  20. How do primary health care teams learn to integrate intimate partner violence (IPV) management? A realist evaluation protocol.

    Science.gov (United States)

    Goicolea, Isabel; Vives-Cases, Carmen; San Sebastian, Miguel; Marchal, Bruno; Kegels, Guy; Hurtig, Anna-Karin

    2013-03-23

    Despite the existence of ample literature dealing, on the one hand, with the integration of innovations within health systems and team learning, and, on the other hand, with different aspects of the detection and management of intimate partner violence (IPV) within healthcare facilities, research that explores how health innovations that go beyond biomedical issues-such as IPV management-get integrated into health systems, and that focuses on healthcare teams' learning processes is, to the best of our knowledge, very scarce if not absent. This realist evaluation protocol aims to ascertain: why, how, and under what circumstances primary healthcare teams engage (if at all) in a learning process to integrate IPV management in their practices; and why, how, and under what circumstances team learning processes lead to the development of organizational culture and values regarding IPV management, and the delivery of IPV management services. This study will be conducted in Spain using a multiple-case study design. Data will be collected from selected cases (primary healthcare teams) through different methods: individual and group interviews, routinely collected statistical data, documentary review, and observation. Cases will be purposively selected in order to enable testing the initial middle-range theory (MRT). After in-depth exploration of a limited number of cases, additional cases will be chosen for their ability to contribute to refining the emerging MRT to explain how primary healthcare learn to integrate intimate partner violence management. Evaluations of health sector responses to IPV are scarce, and even fewer focus on why, how, and when the healthcare services integrate IPV management. There is a consensus that healthcare professionals and healthcare teams play a key role in this integration, and that training is important in order to realize changes. However, little is known about team learning of IPV management, both in terms of how to trigger such learning

  1. A DTAP–IPV//PRP~T VACCINE: A REVIEW OF 16 YEARS’ CLINICAL EXPERIENCE

    Directory of Open Access Journals (Sweden)

    Stanley A. Plotkin

    2012-01-01

    Full Text Available Owing to their low reactogenicity, confirmed efficacy and availability in combination vaccines, acellular pertussis (aP-inactivated poliovirus (IPV combined vaccines are now included in various national immunization programs worldwide. We provide an overview of 16 years of clinical experience with a diphtheria (D, tetanus (T, aP, IPV and Haemophilus influenzae type b (Hib polysaccharide conjugated to tetanus protein (PRP~T combined vaccine (DTaP–IPV//PRP~T — Pentaxim, Sanofi Pasteur, France. Good immunogenicity has been demonstrated after primary vaccination with Pentaxim, regardless of the population ethnicity and primary vaccination schedule. A booster vaccination in the second year of life also resulted in a high immune response for each antigen. Furthermore, 10 years of national surveillance in Sweden has demonstrated the effectiveness of Pentaxim in controlling pertussis. As is the case for other aP-containing combined vaccines, Pentaxim is well tolerated, with the safety profile being better than for whole-cell pertussiscontaining combination vaccines for primary and booster vaccinations.

  2. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    Science.gov (United States)

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    Science.gov (United States)

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  4. Malicious Activity Simulation Tool (MAST) and Trust

    Science.gov (United States)

    2015-06-01

    development considerations assesses whether an application is capable of operating in an IPV6 environment as well as how well it maintains its...configuration files. MAST, as a desktop application, likely does not need to provide any additional protection to its resources beyond what is ...from ASD STIG Mitigation APP3980 Medium The designer will ensure the application is compliant with IPv6 multicast addressing and features an IPv6

  5. Intimate partner violence and its association with maternal depressive symptoms 6–8 months after childbirth in rural Bangladesh

    Directory of Open Access Journals (Sweden)

    Zarina N. Kabir

    2014-09-01

    Full Text Available Background: The prevalence of intimate partner violence (IPV, a gross violation of human rights, ranges widely across the world with higher prevalence reported in low- and middle-income countries. Evidence related mainly to physical health shows that IPV has both direct and indirect impacts on women's health. Little is known about the impact of IPV on the mental health of women, particularly after childbirth. Objective: To describe the prevalence of IPV experienced by women 6–8 months after childbirth in rural Bangladesh and the factors associated with physical IPV. The study also aims to investigate the association between IPV and maternal depressive symptoms after childbirth. Design: The study used cross-sectional data at 6–8 months postpartum. The sample included 660 mothers of newborn children. IPV was assessed by physical, emotional, and sexual violence. The Edinburgh Postnatal Depression Scale assessed maternal depressive symptoms. Results: Prevalence of physical IPV was 52%, sexual 65%, and emotional 84%. The husband's education (OR: 0.41, CI: 0.23–0.73, a poor relationship with the husband (OR: 2.64, CI: 1.07–6.54, and emotional violence by spouse (OR: 1.58, CI: 1.35–1.83 were significantly associated with physical IPV experienced by women. The perception of a fussy and difficult child (OR: 1.05, CI: 1.02–1.08, a poor relationship with the husband (OR: 4.95, CI: 2.55–9.62, and the experience of physical IPV (OR: 2.83, CI: 1.72–4.64 were found to be significant predictors of maternal depressive symptoms among women 6–8 months after childbirth. Neither forced sex nor emotional violence by an intimate partner was found to be significantly associated with maternal depressive symptoms 6–8 months postpartum. Conclusions: It is important to screen for both IPV and depressive symptoms during pregnancy and postpartum. Since IPV and spousal relationships are the most important predictors of maternal depressive symptoms in this

  6. Accounting for Intimate Partner Violence: A Biographical Analysis of Narrative Strategies Used by Men Experiencing IPV From Their Female Partners.

    Science.gov (United States)

    Corbally, Melissa

    2015-10-01

    Intimate partner violence (IPV) is a serious social issue which affects the medium- and long-term health outcomes of many individuals worldwide. The cost of IPV on the physical and psychological well-being of individuals, in addition to its wider economic costs in responding to abused persons, is significant. Presently, there is a lack of understanding about the nature of female-initiated IPV and how men account for their experiences of it. This study examined male victims' life stories of their IPV experiences from their intimate partners. Using the biographical narrative interpretive method, three cases were analyzed from a social constructionist perspective to examine what narrative strategies men used to account for their experiences of being abused by their female partners. Three dominant narrative strategies were used by respondents: the fatherhood narrative, the good husband narrative, and the abuse narrative. The abuse narrative had a unique narrative form, which reflected respondents' disassociation between their identities as men and also as abused persons. Dominant conflicting discourses of masculinity and intimate partner abuse disadvantaged men in identifying IPV and secondly in responding appropriately. This study found that men prefer to use dominant discursive identities as legitimate means from which to disclose IPV experiences. The findings from this study illustrate that broad questioning by professionals regarding fatherhood may be most helpful in promoting disclosures of IPV if this is suspected. © The Author(s) 2014.

  7. A fully liquid DTaP-IPV-HB-PRP-T hexavalent vaccine for primary and booster vaccination of healthy Turkish infants and toddlers

    Science.gov (United States)

    Ceyhan, Mehmet; Yıldırım, İnci; Tezer, Hasan; Devrim, İlker; Feroldi, Emmanuel

    2017-08-23

    Background/aim: Immunogenicity and safety of a primary series of a fully liquid, hexavalent DTaP-IPV-HB-PRP-T vaccine given at 2, 3, and 4 months of age compared to licensed comparators and a DTaP-IPV-HB-PRP-T booster at 15?18 months were evaluated. Materials and methods: This was a Phase III, randomized, open-label trial. Primary series (no hepatitis B [HB] at birth) of DTaP-IPV-HB-PRP-T (N = 155) (group 1) or licensed control vaccines (DTaP-IPV//PRP-T and standalone HB: N = 155) (group 2) and DTaP-IPV-HB-PRP-T booster were administered. Noninferiority was evaluated 1 month postprimary series for anti-HB seroprotection (SP). All other analyses were descriptive. Safety was assessed from parental reports. Results: Postprimary series noninferiority of anti-HB ≥ 10 mIU/mL was demonstrated for the DTaP-IPV-HB-PRP-T vaccine (94.0%) compared to the licensed control (96.1%). Postprimary series primary SP and seroconversion (SC) rates were high and similar for both groups. Antibody persistence (prebooster) was high for each antigen and similar between groups except for HB, which was lower for DTaP-IPV-HB-PRP-T than for standalone HB. For each antigen except HB, DTaP-IPV-HB-PRP-T booster responses were high and similar in each group. Safety was good for primary and booster series and similar between groups. Conclusion: The DTaP-IPV-HB-PRP-T vaccine is immunogenic and safe when administered in a challenging primary series schedule without HB vaccination at birth.

  8. EPRI activities in support of new nuclear plant deployment

    International Nuclear Information System (INIS)

    Mulford, T.

    2007-01-01

    This paper describes the challenges to new plant deployment in the United States and discusses the role of the Electric Power Research Institute (EPRI) in efforts to address these challenges. These technical challenges include completing remaining design work, licensing review, and standardization required to ensure that new LWRs are a competitive near-term option. The costs for construction, licensing, and operation of new nuclear plants are uncertain and this uncertainty, along with concerns about construction schedule form a financial challenge to investment. Because the new process for licensing nuclear power plants in the United States has not been fully demonstrated, regulatory concerns also serve as a challenge to near-term commitments to build new nuclear power plants. EPRI is working in concert with utilities and vendors to upgrade certified LWR designs and obtain certification of new LWR designs. Specific technical areas being addressed by EPRI projects include updating the Utility Requirements Document (URD), seismic resolution, radiation protection, radioactive waste management, the development of utility planning tools, and staff optimization. EPRI's key on-going project, the New Plant Deployment Program Model (NPDPM), is designed to help prospective and actual new nuclear plant managers and staff to identify schedule and resource requirements from the point of the decision to build a plant through to the start of commercial operation. This model will describe and organize key activities and assess schedule, activity duration, logic relationships and critical path analysis. The new plant licensing and deployment process is a five to ten year activity representing a significant financial investment that requires coordination with federal and state regulators, designers, architect engineers, and numerous other contributing organizations. Planning is crucial to schedule and budget control. EPRI has also supported projects to quantify the environmental

  9. IMPLEMENTASI IP V 6 MULTICAST DALAM JARINGAN WIRELESS

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi Prasetyo

    2015-04-01

    Full Text Available Teleconferencing is a media technology to create a long-distance communication of audio data and video can also be data. With teleconferencing you can perform a communication with another person that much with a relatively low cost. At this time the use of computers in a network more complex. Some time ago has developed a new network protocol, the IPv6 is a solution to overcome the deficiencies found on previous generation protocol is IPv4 Multicast is a communication mechanism of one-to-many, or point-to-multipoint. In IPv6 technology, multicast is a basic feature and has become the standard specification of every router. In the implementation is done using IPv6 multicast teleconferencing application on the LAN network topology. At the teleconference has been observed with the amount of traffic parameters that occurred during the last teleconference. Used in this study SDR and RAT teleconferencing applications. SDR (Session Directory Tool and RAT (Robust Audio Tool used for teleconferencing, which is part of the MBone tools. Protocol MLD (Multicast Listener Directory is also used in this study for multicast signaling can run well.

  10. Verification Test for Ultra-Light Deployment Mechanism for Sectioned Deployable Antenna Reflectors

    Science.gov (United States)

    Zajac, Kai; Schmidt, Tilo; Schiller, Marko; Seifart, Klaus; Schmalbach, Matthias; Scolamiero, Lucio

    2013-09-01

    The ultra-light deployment mechanism (UDM) is based on three carbon fibre reinforced plastics (CFRP) curved tape springs made of carbon fibre / cyanate ester prepregs.In the frame of the activity its space application suitability for the deployment of solid reflector antenna sections was investigated. A projected diameter of the full reflector of 4 m to 7 m and specific mass in the order of magnitude of 2.6kg/m2 was focused for requirement derivation.Extensive verification tests including health checks, environmental and functional tests were carried out with an engineering model to enable representative characterizing of the UDM unit.This paper presents the design and a technical description of the UDM as well as a summary of achieved development status with respect to test results and possible design improvements.

  11. NASA Lewis advanced IPV nickel-hydrogen technology

    Science.gov (United States)

    Smithrick, John J.; Britton, Doris L.

    1993-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts. Some of the advancements are as follows: to use 26 percent potassium hydroxide electrolyte to improve cycle life and performance, to modify the state of the art cell design to eliminate identified failure modes and further improve cycle life, and to develop a lightweight nickel electrode to reduce battery mass, hence reduce launch and/or increase satellite payload. A breakthrough in the LEO cycle life of individual pressure vessel nickel-hydrogen battery cells was reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 accelerated LEO cycles at 80 percent DOD compared to 3,500 cycles for cells containing 31 percent KOH. Results of the boiler plate cell tests have been validated at NWSC, Crane, Indiana. Forty-eight ampere-hour flight cells containing 26 and 31 percent KOH have undergone real time LEO cycle life testing at an 80 percent DOD, 10 C. The three cells containing 26 percent KOH failed on the average at cycle 19,500. The three cells containing 31 percent KOH failed on the average at cycle 6,400. Validation testing of NASA Lewis 125 Ah advanced design IPV nickel-hydrogen flight cells is also being conducted at NWSC, Crane, Indiana under a NASA Lewis contract. This consists of characterization, storage, and cycle life testing. There was no capacity degradation after 52 days of storage with the cells in the discharged state, on open circuit, 0 C, and a hydrogen pressure of 14.5 psia. The catalyzed wall wick cells have been cycled for over 22,694 cycles with no cell failures in the continuing test. All three of the non-catalyzed wall wick cells failed (cycles 9,588; 13,900; and 20,575). Cycle life test results of the Fibrex nickel electrode has demonstrated the feasibility of an improved nickel electrode giving a higher specific energy nickel-hydrogen cell. A nickel-hydrogen boiler plate cell using an 80

  12. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  13. Identifying intimate partner violence (IPV) during the postpartum period in a Greek sample.

    Science.gov (United States)

    Vivilaki, Victoria G; Dafermos, Vassilis; Daglas, Maria; Antoniou, Evagelia; Tsopelas, Nicholas D; Theodorakis, Pavlos N; Brown, Judith B; Lionis, Christos

    2010-12-01

    Research has highlighted the wide impact of intimate partner violence (IPV) and the public health role of community health professionals in detection of victimized women. The purpose of this study was to identify postpartum emotional and physical abuse and to validate the Greek version of the Women Abuse Screening Tool (WAST) along with its sensitivity and specificity. Five hundred seventy-nine mothers within 12 weeks postpartum were recruited from the perinatal care registers of the Maternity Departments of two public hospitals in Athens, Greece. Participants were randomly selected by clinic or shift. The WAST and the Partner Violence Screen (PVS) surveys were administered in random order to the mothers from September 2007 to January 2008. The WAST was compared with the PVS as a criterion standard. Agreement between the screening instruments was examined. The psychometric measurements that were performed included: two independent sample t tests, reliability coefficients, explanatory factor analysis using a Varimax rotation, and Principal Components Method. Confirmatory analysis-also called structural equation modeling-of principal components was conducted by Linear Structural Relations. A receiver operating characteristic (ROC) analysis was carried out to evaluate the global functioning of the scale. Two hundred four (35.6%) of the mothers screened were identified as experiencing IPV. Scores on the WAST correlated well with those on the PVS; the internal consistency of the WAST Greek version-tested using Cronbach's alpha coefficient-was found to be 0.926 and that of Guttman's split-half coefficient was 0.924. Our findings confirm the multidimensionality of the WAST, demonstrating a two-factor structure. The area under ROC curve (AUC) was found to be 0.824, and the logistic estimate for the threshold score of 0/1 fitted the model sensitivity at 99.7% and model specificity at 64.4%. Our data confirm the validity of the Greek version of the WAST in identifying IPV

  14. Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications

    Directory of Open Access Journals (Sweden)

    Sama Salam Samaan

    2018-01-01

    Full Text Available In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols. Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end delay. After examining the simulation results, a conclusion will be extracted to reveal the findings of which protocol performs the best upon implementation within a IPv6 WAN. OPNET modeler simulator is used to evaluate the accomplishment of these protocols. To get the results, three scenarios are designed, one for each protocol.

  15. Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance

    Science.gov (United States)

    Patil, Dipali P.; Patil, G. A.

    2010-11-01

    Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.

  16. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    Science.gov (United States)

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  17. Router Dual IPv4/IPv6: una transición hacia las Redes IPv6

    OpenAIRE

    Marco Hernández; César Acevedo; César Berdeja; Keith Peña

    2006-01-01

    Desde su inicio, Internet ha crecido rápidamente transformándose desde una red de investigación a una red comercial con un alcance mundial. Internet se ha convertido en un medio apropiado y económico para la colaboración de usuarios, aprendizaje, comercio electrónico y entretenimiento. Un consenso común indica que Internet se podría transformar en el medio común para la convergencia de la comunicación de voz, video y datos. Al mismo tiempo, está evolucionando desde un servicio sin garantías h...

  18. Immunogenicity, Safety and Reactogenicity of a Booster Dose of the 10-Valent Pneumococcal Nontypeable H. influenzae Protein D Conjugate Vaccine Coadministered With DTPa-IPV-Hib in Dutch Children: A Randomized Controlled Trial.

    Science.gov (United States)

    van den Bergh, Menno R; Spijkerman, Judith; François, Nancy; Swinnen, Kristien; Borys, Dorota; Schuerman, Lode; Veenhoven, Reinier H; Sanders, Elisabeth A M

    2016-07-01

    Immune responses and safety profiles may be affected when vaccines are coadministered. We evaluated the immunogenicity, safety and reactogenicity of a booster dose of the 10-valent pneumococcal nontypeable Haemophilus influenzae protein D-conjugate (PHiD-CV; Synflorix GSK Vaccines) and DTPa-IPV-Hib (Pediacel Sanofi Pasteur MSD) when coadministered. We performed booster assessment in a randomized controlled trial in the Netherlands. Of 780 enrolled healthy infants, 774 toddlers participated in the booster phase and received (1:1:1) (1) PHiD-CV + DTPa-HBV-IPV/Hib (Infanrix hexa, GSK Vaccines), (2) PHiD-CV + DTPa-IPV-Hib, or (3) 7-valent pneumococcal conjugate vaccine (7vCRM, Prevenar/Prevnar, Pfizer, Inc.) + DTPa-IPV-Hib at 2, 3, 4 and 11-13 months old. Blood samples were taken postprimary, prebooster, 1 and 12 months postbooster. Antipneumococcal antibody responses were comparable between both PHiD-CV groups, except for serotype 18C (conjugated to tetanus toxoid). Anti-18C antibody geometric mean concentrations (GMCs) were higher when coadministered with DTPa-HBV-IPV/Hib. For each vaccine serotype, the percentages of children with antibody concentration ≥ 0.20 μg/mL were within the same ranges between PHiD-CV groups (93.8%-100%). The same was observed for the percentages of participants with opsonophagocytic activity titer ≥ 8 (90.9%-100%). When comparing both DTPa-IPV-Hib groups, postbooster antidiphtheria antibody GMCs were higher when coadministered with 7vCRM, while antitetanus and antipolyribosyl-ribitol phosphate antibody GMCs were higher with PHiD-CV coadministration. Regardless, antibody levels to these antigens were well above thresholds. Safety and reactogenicity profiles were comparable between groups. Coadministration of a booster dose of PHiD-CV and DTPa-IPV-Hib was immunogenic and well tolerated.

  19. SAVAH: Source Address Validation with Host Identity Protocol

    Science.gov (United States)

    Kuptsov, Dmitriy; Gurtov, Andrei

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.

  20. Energy expenditure, nutritional status, body composition and physical fitness of Royal Marines during a 6-month operational deployment in Afghanistan.

    Science.gov (United States)

    Fallowfield, Joanne L; Delves, Simon K; Hill, Neil E; Cobley, Rosalyn; Brown, Pieter; Lanham-New, Susan A; Frost, Gary; Brett, Stephen J; Murphy, Kevin G; Montain, Scott J; Nicholson, Christopher; Stacey, Michael; Ardley, Christian; Shaw, Anneliese; Bentley, Conor; Wilson, Duncan R; Allsopp, Adrian J

    2014-09-14

    Understanding the nutritional demands on serving military personnel is critical to inform training schedules and dietary provision. Troops deployed to Afghanistan face austere living and working environments. Observations from the military and those reported in the British and US media indicated possible physical degradation of personnel deployed to Afghanistan. Therefore, the present study aimed to investigate the changes in body composition and nutritional status of military personnel deployed to Afghanistan and how these were related to physical fitness. In a cohort of British Royal Marines (n 249) deployed to Afghanistan for 6 months, body size and body composition were estimated from body mass, height, girth and skinfold measurements. Energy intake (EI) was estimated from food diaries and energy expenditure measured using the doubly labelled water method in a representative subgroup. Strength and aerobic fitness were assessed. The mean body mass of volunteers decreased over the first half of the deployment ( - 4·6 (sd 3·7) %), predominately reflecting fat loss. Body mass partially recovered (mean +2·2 (sd 2·9) %) between the mid- and post-deployment periods (Penergy expenditure (mean 15 167 (sd 1883) kJ) measured in a subgroup of volunteers. However, despite the body mass loss, aerobic fitness and strength were well maintained. Nutritional provision for British military personnel in Afghanistan appeared sufficient to maintain physical capability and micronutrient status, but providing appropriate nutrition in harsh operational environments must remain a priority.

  1. Practical Evaluation of Stateful NAT64/DNS64 Translation

    Directory of Open Access Journals (Sweden)

    SKOBERNE, N.

    2011-08-01

    Full Text Available It is often suggested that the approach to IPv6 transition is dual-stack deployment; however, it is not feasible in certain environments. As Network Address Translation -- Protocol Translation (NAT-PT has been deprecated, stateful NAT64 and DNS64 RFCs have been published, supporting only IPv6-to-IPv4 translation scenario. Now the question of usability in the real world arises. In this paper, we systematically test a number of widely used application-layer network protocols to find out how well they traverse Ecdysis, the first open source stateful NAT64 and DNS64 implementation. We practically evaluated 18 popular protocols, among them HTTP, RDP, MSNP, and IMAP, and discuss the shortcomings of such translations that might not be apparent at first sight.

  2. A scope of the problem: Post-deployment reintegration challenges in a National Guard Unit.

    Science.gov (United States)

    Wilcox, Sherrie L; Oh, Hyunsung; Redmond, Sarah A; Chicas, Joseph; Hassan, Anthony M; Lee, Pey-Jiuan; Ell, Kathleen

    2015-01-01

    More Reserve and Guard members have been activated in the past few years than in any other time in history. In addition to the high rates of psychological and behavioral challenges among military personnel, there are other equally important post-deployment reintegration challenges. Post-deployment reintegration challenges are particularly important to Reserve and Guard members, who transition rapidly from civilian-military-civilian. This study aims to describe the scope of challenges that a battalion of National Guard members (NGM) report experiencing after returning from a one-year deployment to Iraq. This article reports data from a sample of 126 NGM who recently returned from a one-year deployment to Iraq. The scope of post-deployment problems at baseline, 3- and 6-month post-deployment are presented. Overall, the rates of post-deployment psychological and behavioral problems were elevated upon returning from deployment and remained fairly constant for up to 6 months post-deployment. Approximately 30% of respondents were unsatisfied with their relationship and upwards of 30% reported family reintegration challenges. Comparisons with similar research and implications for prevention and improvement of post-deployment quality of life are addressed.

  3. Comparison of IPV to tOPV week 39 boost of primary OPV vaccination in Indian infants: an open labelled randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Suman Kanungo

    2017-01-01

    Conclusions: This study indicates that an IPV boost at week 39 is equivalent to tOPV in intestinal immunity, and provides higher seroconversion compared to tOPV. The major limitation of the study was the additional OPV doses receive by infants during pulse polio immunization resulted in additional mucosal boosting, diminishing the impact of IPV or tOPV boost at week 39. However, IPV for OPV boost should prove to be a step forward in the global polio eradication initiative to reduce the problem of circulating vaccine-derived poliovirus (cVDPV.

  4. Alcohol Use, Hostile Sexism, and Religious Self-Regulation: Investigating Risk and Protective Factors of IPV Perpetration.

    Science.gov (United States)

    Lynch, Kellie R; Renzetti, Claire M

    2017-05-01

    Research suggests that the relationship between alcohol use and intimate partner violence (IPV) is moderated by a range of other factors. Therefore, we investigated the relationship between alcohol use, hostile sexism, and religious self-regulation with perpetration. Using a national sample of 255 men, we found that hostile sexism was associated with physical violence toward a partner and alcohol use was positively associated with psychological abuse toward a partner. With regard to religious self-regulation, we found that introjected religious self-regulation was positively associated with hostile sexism and positively associated with perpetrating physical IPV. Identified religious self-regulation was negatively associated with physical violence perpetration. We also found significant interactions among our independent measures on physical IPV perpetration. These analyses suggest that increased alcohol consumption elevates the risk for physical violence perpetration among men who are high in introjected religious self-regulation and low in hostile sexism, while reducing the risk for perpetration in men who are high in identified religious self-regulation and low in hostile sexism. Implications and limitations of the findings are discussed.

  5. Health and Health Care From the Perspective of Intimate Partner Violence Adult Female Victims in Shelters: Impact of IPV, Unmet Needs, Barriers, Experiences, and Preferences.

    Science.gov (United States)

    Wadsworth, Pamela; Kothari, Catherine; Lubwama, Grace; Brown, Cathy L; Frank Benton, Jennifer

    Intimate partner violence (IPV) predicts poor health for victims and their children, but little is known about the perspective of victims. This study reports the perspectives of adult female IPV victims about the impact of IPV on their health and barriers of health care access for themselves and their children. The majority rated their health as good to excellent (69%). However, 83.5% indicated that IPV negatively affected their health; 53.5% had unmet health care needs. Mental health care was the most common unmet need for women; children's unmet needs were immunizations and preventive care. Transportation difficulties posed the biggest barrier to health care access.

  6. Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

    OpenAIRE

    Zulkiflee M.; Robiah Y.; Nur Azman Abu; Shahrin S.

    2012-01-01

    Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some t...

  7. Morphing structures using soft polymers for active deployment

    International Nuclear Information System (INIS)

    Daynes, Stephen; Grisdale, Amy; Trask, Richard; Seddon, Annela

    2014-01-01

    In this study, we take inspiration from morphing strategies observed in nature, origami design and stiffness tailoring principles in engineering, to develop a thin walled, low cost, bistable cell geometry capable of reversibly unfolding from a flat configuration to a highly textured configuration. Finite element analysis was used to model the cell deployment and capture the experimentally observed bistability of the reinforced silicone elastomer. Through the combination of flexible elastomers with locally reinforced regions enables a highly tailorable and controllable deployment response. These cells are bistable allowing them to maintain their shape when either deployed or retracted without sustained actuation. It is proposed that such deployable cells with reversible surfaces and texture change can be used as a means of adaptive camouflage. (fast track communication)

  8. Promotion of Latina Health: Intersectionality of IPV and Risk for HIV/AIDS.

    Science.gov (United States)

    Rountree, Michele A; Granillo, Teresa; Bagwell-Gray, Meredith

    2016-04-01

    Latina women in the United States are vulnerable to two intersecting public health concerns: intimate partner violence (IPV) and subsequent risk for HIV/AIDS infection. Examination of the cultural and contextual life factors of this understudied population is crucial to developing culturally relevant HIV interventions. Focus groups with Latinas (15 monolingual; 10 bilingual) who have experienced IPV were conducted. Monolingual and bilingual Latinas endorsed that they were concerned about HIV infection, naming partner infidelity and experiences of forced and coerced sex as primary reasons for their concern. However, monolingual participants had lower levels of HIV knowledge, spending much time discussing myths of HIV infection, whereas bilingual participants spent more time discussing specific prevention techniques, including challenges related to the violence in their relationships. These findings suggest that HIV/AIDS prevention programs for Latinas need to pay close attention to the different historical, contextual, and cultural experiences of this at-risk group of women. © The Author(s) 2015.

  9. IPV v2.0 : upgrading the established inactivated polio vaccine production process

    NARCIS (Netherlands)

    Thomassen, Y.E.

    2014-01-01

    The first vaccine against poliovirus (PV), the causative agent of poliomyelitis, was developed in the 1950s by Jonas Salk. The vaccine (IPV) consists of an injected dose of purified and inactivated wild-type PVs (all three serotypes). Soon after this discovery, at the Rijks Instituut voor de

  10. Phase II and III Clinical Studies of Diphtheria-Tetanus-Acellular Pertussis Vaccine Containing Inactivated Polio Vaccine Derived from Sabin Strains (DTaP-sIPV).

    Science.gov (United States)

    Okada, Kenji; Miyazaki, Chiaki; Kino, Yoichiro; Ozaki, Takao; Hirose, Mizuo; Ueda, Kohji

    2013-07-15

    Phase II and III clinical studies were conducted to evaluate immunogenicity and safety of a novel DTaP-IPV vaccine consisting of Sabin inactivated poliovirus vaccine (sIPV) and diphtheria-tetanus-acellular pertussis vaccine (DTaP). A Phase II study was conducted in 104 healthy infants using Formulation H of the DTaP-sIPV vaccine containing high-dose sIPV (3, 100, and 100 D-antigen units for types 1, 2, and 3, respectively), and Formulations M and L, containing half and one-fourth of the sIPV in Formulation H, respectively. Each formulation was administered 3 times for primary immunization and once for booster immunization. A Phase III study was conducted in 342 healthy infants who received either Formulation M + oral polio vaccine (OPV) placebo or DTaP + OPV. The OPV or OPV placebo was orally administered twice between primary and booster immunizations. Formulation M was selected as the optimum dose. In the Phase III study, the seropositive rate was 100% for all Sabin strains after primary immunization, and the neutralizing antibody titer after booster immunization was higher than in the control group (DTaP + OPV). All adverse reactions were clinically acceptable. DTaP-sIPV was shown to be a safe and immunogenic vaccine. JapicCTI-121902 for Phase II study, JapicCTI-101075 for Phase III study (http://www.clinicaltrials.jp/user/cte_main.jsp).

  11. Enhancing assessment of interpersonal violence (IPV) pregnancy-related homicide risk within nursing curricula.

    Science.gov (United States)

    Clements, Paul Thomas; Holt, Karyn E; Hasson, Catherine M; Fay-Hillier, Theresa

    2011-12-01

    Pregnancy and motherhood traditionally represent evolution of the next generation; yet, contemporary research and analyses confirm that this time can also be manifested in fear by the expectant mother within an environment of battering, cruelty, physical and emotional abuse, and sexual assault. Often to the surprise of many healthcare providers, the Centers for Disease Control and Prevention have consistently reported that Interpersonal Violence (IPV) related homicide is a leading cause of traumatic death among new and expectant mothers. In spite of these staggering statistical and anecdotal findings, universal screening for violence during pregnancy continues to be minimal. Forensic nurses might be prompted to respond to the consequences of violence and its resultant negative effects on expectant mothers by strategically incorporating systematic and consistent assessment into foundational nursing curricula regarding IPV as a leading risk factor for injury or death. © 2011 International Association of Forensic Nurses.

  12. The Long War and Parental Combat Deployment: Effects on Military Children and At-Home Spouses

    Science.gov (United States)

    Lester, Patricia; Peterson, Kris; Reeves, James; Knauss, Larry; Glover, Dorie; Mogil, Catherine; Duan, Naihua; Saltzman, William; Pynoos, Robert; Wilt, Katherine; Beardslee, William

    2010-01-01

    Objective: Given the growing number of military service members with families and the multiple combat deployments characterizing current war time duties, the impact of deployments on military children requires clarification. Behavioral and emotional adjustment problems were examined in children (aged 6 through 12) of an active duty Army or Marine…

  13. Concomitant administration of a fully liquid, ready-to-use DTaP-IPV-HB-PRP-T hexavalent vaccine with a meningococcal serogroup C conjugate vaccine in infants.

    Science.gov (United States)

    Vesikari, Timo; Borrow, Ray; Da Costa, Xavier; Richard, Patrick; Eymin, Cécile; Boisnard, Florence; Lockhart, Stephen

    2017-01-11

    DTaP-IPV-HB-PRP-T or hexavalent vaccines are indicated for primary and booster vaccination of infants and toddlers against diphtheria, tetanus, pertussis, hepatitis B, poliomyelitis and invasive diseases caused by Haemophilus influenzae type b (Hib). The present study evaluates the safety and immunogenicity of a ready-to-use hexavalent vaccine when co-administered with a meningococcal serogroup C conjugate (MenC) vaccine in infants. This was a phase III, open-label, randomised, multicentre study conducted in Finland. Healthy infants, aged 46-74days (n=350), were randomised in a ratio of 1:1 to receive DTaP-IPV-HB-PRP-T vaccine at two, three and four months, either with a MenC vaccine co-administered at two and four months (Group 1; n=175) or without MenC vaccine (Group 2; n=175). All infants also received routine rotavirus and 13-valent pneumococcal conjugate vaccines. The proportion of participants with an anti-HBs concentration ⩾10mIU/mL assessed one month after the third dose of DTaP-IPV-HB-PRP-T vaccine was 97.5% [95%CI: 93.1-99.3] in the coadministration group and 96.1% [95%CI: 91.8-98.6] in the group without MenC vaccine. The proportion of participants with an anti-MenC SBA titre ⩾8 assessed one month after the second dose of MenC vaccine was 100% in the coadministration group. Both primary objectives were achieved. Secondary immunogenicity and safety analyses showed that co-administration of DTaP-IPV-HB-PRP-T and MenC vaccines did not impact the immune response to the antigens of each of the two vaccines. All vaccines were well tolerated and the safety profile of DTaP-IPV-HB-PRP-T vaccine was similar in both groups. ClinicalTrials.gov identifier: NCT01839175; EudraCT number: 2012-005547-24. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  14. Benchmarking promotion and deployment activities regarding intelligent vehicle safety systems in the EU

    NARCIS (Netherlands)

    Kievit, M. de; Malone, K.M.; Zwijnenberg, H.; Arem, B. van

    2008-01-01

    This paper presents the results of a Benchmarking study performed in the European Union on Awareness and Promotion & Deployment activities related to Intelligent Vehicle Safety (IVS) systems (1). The study, commissioned by the European Commission under the Intelligent Car Initiative (a i2010

  15. Scoping study to expedite development of a field deployable and portable instrument for UF6 enrichment assay

    OpenAIRE

    Chan, CYG; Valentine, JD; Russo, RE

    2017-01-01

    The primary objective of the present study is to identity the most promising, viable technologies that are likely to culminate in an expedited development of the next-generation, field-deployable instrument for providing rapid, accurate, and precise enrichment assay of uranium hexafluoride (UF6). UF6 is typically involved, and is arguably the most important uranium compound, in uranium enrichment processes. As the first line of defense against proliferation, accurate analytical techniques t...

  16. [Inactivated poliovirus vaccines: an inevitable choice for eliminating poliomyelitis].

    Science.gov (United States)

    Vidor, J D; Jean-Denis, Shu

    2016-12-06

    The inactivated poliovirus vaccine (IPV) is a very old tool in the fight against poliomyelitis. Though supplanted by oral poliovirus vaccine (OPV) in the 1960s and 1970s, the IPV has now become an inevitable choice because of the increasingly recognized risks associated with continuous use of OPVs. Following the pioneering work of Jonas Salk, who established key principles for the IPV, considerable experience has accumulated over the years. This work has led to modern Salk IPV-containing vaccines, based on the use of inactivated wildtype polioviruses, which have been deployed for routine use in many countries. Very good protection against paralysis is achieved with IPV through the presence of circulating antibodies able to neutralize virus infectivity toward motor neurons. In addition, with IPV, a variable degree of protection against mucosal infection (and therefore transmission) through mucosal antibodies and immune cells is achieved, depending on previous exposure of subjects to wildtype or vaccine polioviruses. The use of an IPV-followed-by-OPV sequential immunization schedule has the potential advantage of eliminating the vaccine-associated paralytic poliomyelitis (VAPP) risk, while limiting the risks of vaccine-derived poliovirus (VDPVs). Sabin strain-derived IPVs are new tools, only recently beginning to be deployed, and data are being generated to document their performance. IPVs will play an irreplaceable role in global eradication of polio.

  17. Search Results | Page 82 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-01-01

    Results 811 - 820 of 8491 ... IPv6 deployment. Published date. January 1, 2010. Studies. -. Welcome address by Prof. Z.D. Kadzamira, Chairman, UA, at the UbuntuNet Connect 2010. Published date. January 1, 2010. Studies. -. CHAIN project and prospects for Sub Saharan Africa. Published date. January 1, 2010. Pages.

  18. Systematization of the Introduction of IPV and Switch from tOPV to bOPV in the Americas.

    Science.gov (United States)

    Pedreira, Cristina; Thrush, Elizabeth; Jauregui, Barbara

    2017-07-01

    The synchronized introduction of the inactivated polio vaccine (IPV) and the switch from trivalent oral polio vaccine (tOPV) to bivalent oral polio vaccine (bOPV) has constituted an effort without precedents, and with astonishing results. Within the established time frame, all countries in our region managed to carry out the decision, planning, and introduction of this vaccine and subsequent switch to their national immunization schedules.The purpose of this article is to systematize the process of IPV introduction and switch in Latin America and the Caribbean, which constitutes an important piece in the documentation of the polio legacy in the Americas. Regional level as well as country perspectives and viewpoints are described. Analyzing and summarizing the lessons learned from the introduction of IPV and the switch from tOPV to bOPV can be useful for the introduction of new vaccines in the Pan American Health Organization (PAHO) region and in other regions of the world, and to help our own region successfully carry out another synchronized vaccine introduction in the future, if necessary. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  19. Comprehensive Routing Security Development and Deployment for the Internet

    Science.gov (United States)

    2015-02-01

    Legacy addresses are IPv4 addresses . As the market for IPv4 addresses becomes stronger, it is anticipated that those who hold legacy space will...express and transmit the information needed to stop route leaks. 4.8.7 Uncertain Address Records. Larger ISPs, especially those who have a long history ...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS . 1. REPORT DATE (DD

  20. What pre-deployment and early post-deployment factors predict health function after combat deployment?: a prospective longitudinal study of Operation Enduring Freedom (OEF)/Operation Iraqi Freedom (OIF) soldiers.

    Science.gov (United States)

    McAndrew, Lisa M; D'Andrea, Elizabeth; Lu, Shou-En; Abbi, Bhavna; Yan, Grace W; Engel, Charles; Quigley, Karen S

    2013-04-30

    Physical and mental function are strong indicators of disability and mortality. OEF/OIF Veterans returning from deployment have been found to have poorer function than soldiers who have not deployed; however the reasons for this are unknown. A prospective cohort of 790 soldiers was assessed both pre- and immediately after deployment to determine predictors of physical and mental function after war. On average, OEF/OIF Veterans showed significant declines in both physical (t=6.65, pfunction (t=7.11, pdeployment function, poorer physical function after deployment was associated with older age, more physical symptoms, blunted systolic blood pressure reactivity and being injured. After controlling for pre-deployment function, poorer mental function after deployment was associated with younger age, lower social desirability, lower social support, greater physical symptoms and greater PTSD symptoms. Combat deployment was associated with an immediate decline in both mental and physical function. The relationship of combat deployment to function is complex and influenced by demographic, psychosocial, physiological and experiential factors. Social support and physical symptoms emerged as potentially modifiable factors.

  1. Benchmarking Promotion and Deployment Activities Regarding Intelligent Vehicle Safety Systems in the European Union

    NARCIS (Netherlands)

    de Kievit, M.; Malone, K.M.; Zwijnenberg, H.; van Arem, B.

    2008-01-01

    This paper presents the results of a Benchmarking study performed in the European Union on Awareness and Promotion & Deployment activities related to Intelligent Vehicle Safety (IVS) systems (1). The study, commissioned by the European Commission under the Intelligent Car Initiative (a i2010

  2. Aggression by Children Exposed to IPV: Exploring the Role of Child Depressive Symptoms, Trauma-Related Symptoms, & Warmth in Family Relationships.

    Science.gov (United States)

    Piotrowski, Caroline C; Cameranesi, Margherita

    2018-06-01

    Multi-informant reports of aggression by siblings in families with and without a history of IPV were compared. Associations between aggressive behavior and child depressive and trauma-related symptoms, as well as maternal and sibling warmth were also explored. Mothers, observers and the siblings themselves reported on aggressive behaviour. Mothers reported on child trauma-related symptoms while children provided self-report on depressive symptoms and mother-child and sibling warmth. The frequency of observed aggression did not differ across groups on average, although more sibling dyads exposed to IPV engaged in aggression than those not exposed. Child reports of sibling aggression did not differ across groups but mothers reported significantly less aggressive behavior by children exposed to IPV than those not exposed. Regression results indicated that depressive and trauma-related symptoms were significant risk factors for aggression, while the role of mother-child and sibling warmth was more complex. Results were discussed within a developmental psychopathology framework.

  3. Validation test of advanced technology for IPV nickel-hydrogen flight cells: Update

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the low-earth-orbit (LEO) cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. An advanced 125 Ah IPV nickel-hydrogen cell was designed. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion. The advanced cell design is in the process of being validated using real time LEO cycle life testing of NWSC, Crane, Indiana. An update of validation test results confirming this technology is presented.

  4. Law no. 111/1996 on the safe deployment of nuclear activities - A law central to the Romanian nuclear law system

    International Nuclear Information System (INIS)

    Chiripus, Vlad-Ionut

    2004-01-01

    Law no. 111/1996 on the safe deployment of nuclear activities was published in its original form in the Official Gazette of Romania, Part no. 267 of 29th October 1996. The complexity of this law prevents from performing a comprehensive analysis of the legal provisions thereof for which reason the author shall review only those aspects he consider to be relevant to the issues dealt with by this law. Furthermore, as the author intends his undertaking to be a comparative analysis of Law no. 111/1996 in its successive stages - from its issue till the present - he uses mostly the present tense even though the law has been amended and in some respects the changes are quite significant. The presentation contains the following three sections: 1. Passing of Law no. 111/1996 on the safe deployment of nuclear activities - a turning point in the development of the Romanian nuclear law; 2. The successive modifications of Law no. 111/1996 on safe deployment of nuclear activities; 3. Law no. 193/2003 for the modification and completion of Law no. 111/1996 on the safe deployment of nuclear activities - a key moment in the modernization of Romanian nuclear law and harmonization with the relevant international requirement. In conclusion, the issue of Law no. 111/1996 on safe deployment of nuclear activities represents a turning point in the development of Romanian nuclear law. From this moment on one may regard it as a modern area of the Romanian law, European in spirit. The pre-existent legal framework - namely the Law no. 61/1974 on the deployment of activities in the Romanian nuclear field - was no longer up to the existing standards and its replacement by a new, modern law, fully harmonized with the European and NATO accession requirements was a must. Such a new, European law was to fully guarantee the safe deployment of nuclear activities for exclusively peaceful purposes, so that the requirements regarding the nuclear safety, protection of professionally exposed personnel

  5. Probing next Generation Portuguese Academic Network

    Science.gov (United States)

    Friacas, Carlos; Massano, Emanuel; Domingues, Monica; Veiga, Pedro

    2008-01-01

    Purpose: The purpose of this article is to provide several viewpoints about monitoring aspects related to recent deployments of a new technology (IPv6). Design/methodology/approach: Several views and domains were used, with a common point: the Portuguese research and education network (RCTS). Findings: A significant amount of work is yet to be…

  6. Scoping study to expedite development of a field deployable and portable instrument for UF6 enrichment assay

    Energy Technology Data Exchange (ETDEWEB)

    Chan, George; Valentine, John D.; Russo, Richard E.

    2017-09-14

    The primary objective of the present study is to identity the most promising, viable technologies that are likely to culminate in an expedited development of the next-generation, field-deployable instrument for providing rapid, accurate, and precise enrichment assay of uranium hexafluoride (UF6). UF6 is typically involved, and is arguably the most important uranium compound, in uranium enrichment processes. As the first line of defense against proliferation, accurate analytical techniques to determine the uranium isotopic distribution in UF6 are critical for materials verification, accounting, and safeguards at enrichment plants. As nuclear fuel cycle technology becomes more prevalent around the world, international nuclear safeguards and interest in UF6 enrichment assay has been growing. At present, laboratory-based mass spectrometry (MS), which offers the highest attainable analytical accuracy and precision, is the technique of choice for the analysis of stable and long-lived isotopes. Currently, the International Atomic Energy Agency (IAEA) monitors the production of enriched UF6 at declared facilities by collecting a small amount (between 1 to 10 g) of gaseous UF6 into a sample bottle, which is then shipped under chain of custody to a central laboratory (IAEA’s Nuclear Materials Analysis Laboratory) for high-precision isotopic assay by MS. The logistics are cumbersome and new shipping regulations are making it more difficult to transport UF6. Furthermore, the analysis is costly, and results are not available for some time after sample collection. Hence, the IAEA is challenged to develop effective safeguards approaches at enrichment plants. In-field isotopic analysis of UF6 has the potential to substantially reduce the time, logistics and expense of sample handling. However, current laboratory-based MS techniques require too much infrastructure and operator expertise for field deployment and operation. As outlined in the IAEA Department of Safeguards Long

  7. Intimate partner violence and women's economic and non-economic activities in Minya, Egypt.

    Science.gov (United States)

    Yount, Kathryn M; Zureick-Brown, Sarah; salem, Rania

    2014-06-01

    Intimate partner violence (IPV) against women is widespread, but its implications for their economic and non-economic activities are understudied. Leveraging new data from 564 ever-married women aged 22–65 in rural Minya, Egypt, we estimated logistic regressions and zero-inflated negative binomial regressions to test spillover, compensation, and patriarchal bargaining theories about the influences of women's exposure to IPV on their engagement in and time spent on market, subsistence, domestic, and care work. Supporting compensation theory, exposures to lifetime, recent, and chronic physical or sexual IPV were associated with higher adjusted odds of performing market work in the prior month, and exposures to recent and chronic IPV were associated with higher adjusted odds of performing subsistence work in this period. Supporting compensation and patriarchal bargaining theories, exposures to recent and chronic IPV were associated with more time spent on domestic work in the prior day. Supporting spillover and patriarchal bargaining theories, exposures to lifetime IPV of all forms were associated with lower adjusted odds of performing mostly nonspousal care work in the prior day, and this association was partially mediated by women's generalized anxiety. Women in rural Minya who are exposed to IPV may escalate their housework to fulfill local norms of feminine domesticity while substituting economic activities for nonspousal care work to enhance their economic independence from violent partners.

  8. The risk for marital infidelity across a year-long deployment.

    Science.gov (United States)

    Balderrama-Durbin, Christina; Stanton, Kimberley; Snyder, Douglas K; Cigrang, Jeffrey A; Talcott, G Wayne; Smith Slep, Amy M; Heyman, Richard E; Cassidy, Daniel G

    2017-08-01

    Military deployment can create significant relationship strain. Although most couples navigate the challenges of deployment successfully, this period may render some couples more vulnerable to adverse relationship outcomes such as infidelity due to a convergence of factors including geographic separation and reduced emotional and physical intimacy. Despite anecdotal reports of increased rates of infidelity during deployment, empirical findings are lacking. This study used a prospective design to examine the prevalence and risk factors of infidelity across the deployment cycle including a year-long deployment to Iraq. A total of 63 married male Airmen were assessed both pre- and 6-9 months postdeployment. The rate of sexual infidelity prior to deployment (21%) was commensurate with the lifetime rate of sexual involvement outside the marriage in representative community samples of men. Across the deployment period, the prevalence of sexual infidelity was strikingly high (22.6%) compared with annual community estimates (1.5-4%; Allen et al., 2005). Findings demonstrated that service members with a prior history of separation, steps toward divorce, and relationship distress prior to deployment had elevated risk for infidelity over the deployment cycle. Moreover, roughly 75% of Airmen who experienced infidelity over the deployment cycle divorced by 6-9 months postdeployment whereas only 5% of service members without infidelity divorced during this same time period. Considering well-documented adverse impacts of infidelity and divorce, the current findings may assist in identifying military couples at risk for infidelity and informing targeted prevention or early intervention strategies for these couples prior to or immediately following deployment. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Treatment Deployment Evaluation Tool

    International Nuclear Information System (INIS)

    M. A. Rynearson; M. M. Plum

    1999-01-01

    The U.S. Department of Energy (DOE) is responsible for the final disposition of legacy spent nuclear fuel (SNF). As a response, DOE's National Spent Nuclear Fuel Program (NSNFP) has been given the responsibility for the disposition of DOE-owned SNF. Many treatment technologies have been identified to treat some forms of SNF so that the resulting treated product is acceptable by the disposition site. One of these promising treatment processes is the electrometallurgical treatment (EMT) currently in development; a second is an Acid Wash Decladding process. The NSNFP has been tasked with identifying possible strategies for the deployment of these treatment processes in the event that a treatment path is deemed necessary. To support the siting studies of these strategies, economic evaluations are being performed to identify the least-cost deployment path. This model (tool) was developed to consider the full scope of costs, technical feasibility, process material disposition, and schedule attributes over the life of each deployment alternative. Using standard personal computer (PC) software, the model was developed as a comprehensive technology economic assessment tool using a Life-Cycle Cost (LCC) analysis methodology. Model development was planned as a systematic, iterative process of identifying and bounding the required activities to dispose of SNF. To support the evaluation process, activities are decomposed into lower level, easier to estimate activities. Sensitivity studies can then be performed on these activities, defining cost issues and testing results against the originally stated problem

  10. Pulmonary Function and Respiratory Health of Military Personnel Before Southwest Asia Deployment.

    Science.gov (United States)

    Skabelund, Andrew J; Rawlins, Frederic A; McCann, Edward T; Lospinoso, Joshua A; Burroughs, Lorraine; Gallup, Roger A; Morris, Michael J

    2017-09-01

    Significant concern exists regarding the respiratory health of military personnel deployed to Southwest Asia, given their exposures to numerous environmental hazards. Although the deployed military force is generally assumed to be fit, the pre-deployment respiratory health of these individuals is largely unknown. Soldiers deploying to Southwest Asia were recruited from the pre-deployment processing center at Fort Hood, Texas. Participants completed a general and respiratory health questionnaire and performed baseline spirometry. One thousand six hundred ninety-three pre-deployment evaluations were completed. The average age of the participants was 32.2 y, and 83.1% were male. More than one third of surveyed solders had a smoking history, 73% were overweight or obese, and 6.2% reported a history of asthma. Abnormal spirometry was found in 22.3% of participants. Soldiers with abnormal spirometry reported more asthma (10.1% vs 5.1%, P military personnel that delineates factors potentially associated with the development of pulmonary symptoms and/or disease. This study suggests that deploying soldiers are older, heavier, frequently smoke, and may have undiagnosed pre-deployment lung disease. Abnormal spirometry is common but may not represent underlying disease. Self-reported asthma, wheezing, and slower 2-mile run times were predictive of abnormal spirometry. Pre-deployment evaluation of military personnel identified numerous soldiers with active pulmonary symptoms and abnormal spirometry. When combined with questions regarding asthma history, wheezing and exercise intolerance, spirometry may identify individuals at risk for deployment-related respiratory complaints. Copyright © 2017 by Daedalus Enterprises.

  11. Differential Child Maltreatment Risk Across Deployment Periods of US Army Soldiers.

    Science.gov (United States)

    Taylor, Christine M; Ross, Michelle E; Wood, Joanne N; Griffis, Heather M; Harb, Gerlinde C; Mi, Lanyu; Song, Lihai; Strane, Douglas; Lynch, Kevin G; Rubin, David M

    2016-01-01

    We described the risk for maltreatment among toddlers of US Army soldiers over different deployment cycles to develop a systematic response within the US Army to provide families appropriate supports. We conducted a person-time analysis of substantiated maltreatment reports and medical diagnoses among children of 112,325 deployed US Army soldiers between 2001 and 2007. Risk of maltreatment was elevated after deployment for children of soldiers deployed once but not for children of soldiers deployed twice. During the 6 months after deployment, children of soldiers deployed once had 4.43 substantiated maltreatment reports and 4.96 medical diagnoses per 10,000 child-months. The highest maltreatment rate among children of soldiers deployed twice occurred during the second deployment for substantiated maltreatment (4.83 episodes per 10,000 child-months) and before the first deployment for medical diagnoses of maltreatment (3.78 episodes per 10,000 child-months). We confirmed an elevated risk for child maltreatment during deployment but also found a previously unidentified high-risk period during the 6 months following deployment, indicating elevated stress within families of deployed and returning soldiers. These findings can inform efforts by the military to initiate and standardize support and preparation to families during periods of elevated risk.

  12. Remote Systems Design & Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  13. Quality function deployment

    International Nuclear Information System (INIS)

    1981-10-01

    This book indicates quality function deployment with quality and deployment of quality function, process and prospect of quality function deployment and development, product process and conception of quality table, deployment of quality demand, design of quality table and application of concurrent multi design, progress design and quality development, main safe part and management of important function part, quality development and deployment of method of construction, quality deployment and economics, total system of quality function deployment and task of quality function deployment in the present and future.

  14. Effect of military deployment in operational area on the trend of smoking among troops

    International Nuclear Information System (INIS)

    Parvez, S.; Mubarik, H.

    2015-01-01

    To identify effect of military deployment in operational area on trend of smoking cigarettes among troops. Study Design: Descriptive cross-sectional study. Place and Duration of study: The study was carried out in an Army Brigade deployed in Operation Al-Mizan, Swat, from Jan to March 2014. Material and Methods: Whole troops of an army brigade deployed in operation Al-Mizan, Swat were the part of present study. Total strength of brigade comprised of 1850 troops. Out of these 1850, officers constituted 53 (2.86%) and rest 1797 (97.14%) were Junior Commissioned officers (JCOs), noncommissioned officers (NCOs) and soldiers. All ranks other than officers were collectively termed as soldiers. All the individuals were given structured questionnaire to fill. The information was gathered on variables like age, rank, unit, education, duration of deployment in operational area, habit of smoking, intensity of smoking (number of cigarettes smoked daily) and change in the habit and intensity of smoking after being deployed in the operational area. Information was also gathered from the individuals about the reasons for change in the habit (starting or stopping smoking) and intensity of smoking after deployment in operational area. Forty nine individuals with less than 6 months duration in operational area were excluded. All the other officers and soldiers (1801) having served more than 6 months in the operational area were included in the study. Results: There were total 1801 individuals included in the study. Officers constituted 52 (2.88%) of the total and rest 1749 (97.12%) were soldiers. The mean age of officers was 26.34 ± 4.6 years and mean age of soldiers was 27.92 ± 4.5 years. The overall frequency of smoking in officers and soldiers in the operational area came out to be 29.6%, however the overall frequency of smoking in these individuals before coming to operational area was 26.8%. There were 3 officers and 47 soldiers who started smoking in the operational area

  15. Towards Next Generation Internet Management:CNGI-CERNET2EXPERIENCES

    Institute of Scientific and Technical Information of China (English)

    Jia-Hai Yang; Hui Zhang; Jin-Xiang Zhang; Chang-Qing An

    2009-01-01

    Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks'management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes.While each management node can perform management tasks autonomously and independently, it can finish more sophis-ticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies,especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.

  16. Immunogenicity and safety of primary and booster vaccination with 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens in a hexavalent DTPa-HBV-IPV/Hib combination vaccine in comparison with the licensed Infanrix hexa

    Science.gov (United States)

    Vesikari, Timo; Rivera, Luis; Korhonen, Tiina; Ahonen, Anitta; Cheuvart, Brigitte; Hezareh, Marjan; Janssens, Winnie; Mesaros, Narcisa

    2017-01-01

    ABSTRACT Safety and immunogenicity of 2 investigational formulations of diphtheria, tetanus and Haemophilus influenzae type b antigens of the combined diphtheria-tetanus-acellular pertussis-hepatitis B-inactivated poliomyelitis-Hib vaccine (DTPa-HBV-IPV/Hib) were evaluated in a Primary (NCT01248884) and a Booster vaccination (NCT01453998) study. In the Primary study, 721 healthy infants (randomized 1:1:1) received 3 doses of DTPa-HBV-IPV/Hib formulation A (DATAPa-HBV-IPV/Hib), or B (DBTBPa-HBV-IPV/Hib) or the licensed DTPa-HBV-IPV/Hib vaccine (Infanrix hexa, GSK; control group) at 2, 3, 4 months of age. Infants were planned to receive a booster dose at 12–15 months of age with the same formulation received in the Primary study; however, following high incidence of fever associated with the investigational formulations in the Primary study, the Booster study protocol was amended and all infants yet to receive a booster dose (N = 385) received the licensed vaccine. In the Primary study, non-inferiority of 3-dose vaccination with investigational formulations compared with the licensed vaccine was not demonstrated due to anti-pertactin failing to meet the non-inferiority criterion. Post-primary vaccination, most infants had seroprotective levels of anti-diphtheria (100% of infants), anti-tetanus antigens (100%), against hepatitis B (≥ 97.5% across groups), polyribosyl-ribitol-phosphate (≥ 88.0%) and poliovirus types 1–3 (≥ 90.5%). Seropositivity rates for each pertussis antigen were 100% in all groups. Higher incidence of fever (> 38°C) was reported in infants receiving the investigational formulations (Primary study: 75.0% [A] and 72.1% [B] vs 58.8% [control]; Booster study, before amendment: 49.4% and 46.6% vs 37.4%, respectively). The development of the investigational formulations was not further pursued. PMID:28340322

  17. Cognitive ability and risk of post-traumatic stress disorder after military deployment

    DEFF Research Database (Denmark)

    Nissen, Lars R.; Karstoft, Karen-Inge; Vedtofte, Mia S.

    2017-01-01

    Background: Studies of the association between pre-deployment cognitive ability and post-deployment post-traumatic stress disorder (PTSD) have shown mixed results. Aims: To study the influence of pre-deployment cognitive ability on PTSD symptoms 6-8 months post-deployment in a large population...

  18. Active wavefront control challenges of the NASA Large Deployable Reflector (LDR)

    Science.gov (United States)

    Meinel, Aden B.; Meinel, Marjorie P.; Manhart, Paul K.; Hochberg, Eric B.

    1989-01-01

    The 20-m Large Deployable Reflector will have a segmented primary mirror. Achieving diffraction-limited performance at 50 microns requires correction for the errors of tilt and piston of the primary mirror. This correction can be obtained in two ways, the use of an active primary or a correction at a demagnified pupil of the primary. A critical requirement is the means for measurement of the wavefront error and maintaining phasing during the observation of objects that may be too faint for determining the error. Absolute phasing can only be determined using a cooperative source. Maintenance of phasing can be done with an on-board source. A number of options are being explored as discussed below. The many issues concerning the assessment and control of an active segmented mirror will be addressed with an early construction of the Precision Segmented Reflector testbed.

  19. Active wavefront control challenges of the NASA Large Deployable Reflector (LDR)

    Science.gov (United States)

    Meinel, Aden B.; Meinel, Marjorie P.; Manhart, Paul K.; Hochberg, Eric B.

    1989-09-01

    The 20-m Large Deployable Reflector will have a segmented primary mirror. Achieving diffraction-limited performance at 50 microns requires correction for the errors of tilt and piston of the primary mirror. This correction can be obtained in two ways, the use of an active primary or a correction at a demagnified pupil of the primary. A critical requirement is the means for measurement of the wavefront error and maintaining phasing during the observation of objects that may be too faint for determining the error. Absolute phasing can only be determined using a cooperative source. Maintenance of phasing can be done with an on-board source. A number of options are being explored as discussed below. The many issues concerning the assessment and control of an active segmented mirror will be addressed with an early construction of the Precision Segmented Reflector testbed.

  20. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.

    Science.gov (United States)

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  1. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Seung-Wha Yoo

    2009-07-01

    Full Text Available Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob, which employs Mobility Support Points (MSPs to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  2. The Deployment Life Study: Longitudinal Analysis of Military Families Across the Deployment Cycle

    Science.gov (United States)

    2016-01-01

    deployment. The 11 events, grouped by type of trauma, are as follows: • combat – engaging in hand-to-hand combat – being physically knocked over...leaving home; missing classes at school because you don’t like your school; missing after-school activities (such as school activities, sports ) because...you don’t feel like participating; missing after-school activities (such as school activi- ties, sports ) because of transportation problems/issues

  3. Adding Big Data Analytics to GCSS-MC

    Science.gov (United States)

    2014-09-30

    9. Hadoop and Ubuntu have a conflict with IPV6 . The workaround we will use is to disable IPV6 (a) sudo nano /etc/sysctl.conf • add these lines to the...end of the file – # disable ipv6 – net.ipv6.conf.all.disable_ipv6 = 1 – net.ipv6.conf.default.disable_ipv6 = 1 – net.ipv6.conf.lo.disable_ipv6 = 1 10...to see if the changes took place (a) cat /proc/sys/net/ ipv6 /conf/all/disable_ipv6 • you want to see a return of 1 13. change directory (a) cd /usr

  4. Mother's IPV, Child Maltreatment Type and the Presence of PTSD in Children and Adolescents.

    Science.gov (United States)

    Castro, Maravillas; Alcántara-López, Mavi; Martínez, Antonia; Fernández, Visitación; Sánchez-Meca, Julio; López-Soler, Concepción

    2017-09-17

    This correlational cross-sectional study was designed to investigate whether the intimate partner violence (IPV) suffered by mothers (physical and psychological maltreatment), child eyewitness of psychological and physical maltreatment suffered by the mother, the neglect suffered by children, and the maltreatment (physical and psychological) directly suffered by children are statistically associated to post-traumatic stress disorder (PTSD) symptoms exhibited by the child. In addition, the prevalence of child PTSD was estimated, as well as the concordance between the PTSD symptoms assessed by the Child PTSD Symptom Scale (CPSS) and the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) criteria for child PTSD. The sample consisted of 152 Spanish children aged 8 to 17 and their mothers, who were recruited from Centers of Specialized Assistance for Women Victims of IPV. PTSD prevalence was 20.4%. The results of a canonical correlation analysis showed that the two types of maltreatment with the largest contribution to the canonical variable were physical maltreatment directly suffered by the child, and child eyewitness of physical maltreatment suffered by the mother. The potential developmental pathway of PTSD when both children and mothers suffer severe maltreatment needs to be examined, and this will contribute to the choice of the most effective type of specialized intervention.

  5. Gender-specific mortality in DTP-IPV- and MMR±MenC-eligible age groups to determine possible sex-differential effects of vaccination: an observational study.

    Science.gov (United States)

    Schurink-van't Klooster, Tessa M; Knol, Mirjam J; de Melker, Hester E; van der Sande, Marianne A B

    2015-03-24

    Several studies suggested that vaccines could have non-specific effects on mortality depending on the type of vaccine. Non-specific effects seem to be different in boys and girls. In this study we want to investigate whether there are differences in gender-specific mortality among Dutch children according to the last vaccination received. We tested the hypothesis that the mortality rate ratio for girls versus boys is more favourable for girls following MMR±MenC vaccination (from 14 months of age) compared with the ratio following DTP-IPV vaccination (2-13 months of age). Secondarily, we investigated whether there were gender-specific changes in mortality following booster vaccination at 4 years of age. This observational study included all Dutch children aged 0-11 years from 2000 until 2011. Age groups were classified according to the last vaccination offered. The mortality rates for all natural causes of death were calculated by gender and age group. Incidence rate ratios (IRRs) were computed using a multivariable Poisson analysis to compare mortality in boys and girls across different age groups. The study population consisted of 6,261,472 children. During the study period, 14,038 children (0.22%) died, 91% of which were attributed to a known natural cause of death. The mortality rate for natural causes was higher among boys than girls in all age groups. Adjusted IRRs for girls compared with boys ranged between 0.81 (95% CI 0.74-0.89) and 0.91 (95% CI 0.77-1.07) over the age groups. The IRR did not significantly differ between all vaccine-related age groups (p=0.723), between children 2-13 months (following DTP-IPV vaccination) and 14 months-3 years (following MMR±MenC vaccination) (p=0.493) and between children 14 months-3 years and 4-8 years old (following DTP-IPV vaccination) (p=0.868). In the Netherlands, a high income country, no differences in gender-specific mortality related to the type of last vaccination received were observed in DTP-IPV- and MMR

  6. Occupational correlates of low back pain among U.S. Marines following combat deployment.

    Science.gov (United States)

    MacGregor, Andrew J; Dougherty, Amber L; Mayo, Jonathan A; Rauh, Mitchell J; Galarneau, Michael R

    2012-07-01

    Many U.S. Marines have experienced routine combat deployments during Operation Iraqi Freedom, which present numerous occupational hazards that may result in low back pain (LBP). The objective of this retrospective cohort study was to identify new-onset LBP among Marines following initial deployment to Operation Iraqi Freedom. Active duty Marines deployed to Iraq or Kuwait between 2005 and 2008 were identified from deployment records and linked to medical databases (n = 36,680). The outcome of interest was an International Classification of Diseases, 9th Revision, Clinical Modification code indicating LBP (724.2) within 1 year postdeployment. Multivariate logistic regression examined the effect of occupation on LBP. Overall, 4.1% (n = 1,517) of Marines were diagnosed with LBP. After adjusting for covariates, the service/supply (odds ratio 1.33, 95% confidence interval, 1.12-1.59) and electrical/mechanical/craftsworker occupations (odds ratio 1.31, 95% confidence interval, 1.12-1.53) had higher odds of LBP when compared to the administrative/other referent group. Within these groups, the highest LBP prevalence was in the construction (8.6%) and law enforcement (6.2%) subgroups. Although infantry occupations purposefully engage the enemy and often face sustained physical rigors of combat, LBP was most prevalent in noninfantry occupations. Future studies should include detailed exposure histories to elucidate occupation-specific etiologies of LBP in order to guide prevention efforts.

  7. Validation test of advanced technology for IPV nickel-hydrogen flight cells - Update

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    Individual pressure vessel (IPV) nickel-hydrogen technology was advanced at NASA Lewis and under Lewis contracts with the intention of improving cycle life and performance. One advancement was to use 26 percent potassium hydroxide (KOH) electrolyte to improve cycle life. Another advancement was to modify the state-of-the-art cell design to eliminate identified failure modes. The modified design is referred to as the advanced design. A breakthrough in the LEO cycle life of IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent KOH electrolyte was about 40,000 LEO cycles compared to 3,500 cycles for cells containing 31 percent KOH. The boiler plate test results are in the process of being validated using flight hardware and real time LEO testing. The primary function of the advanced cell is to store and deliver energy for long-term, LEO spacecraft missions. The new features of this design are: (1) use of 26 percent rather than 31 percent KOH electrolyte; (2) use of a patented catalyzed wall wick; (3) use of serrated-edge separators to facilitate gaseous oxygen and hydrogen flow within the cell, while still maintaining physical contact with the wall wick for electrolyte management; and (4) use of a floating rather than a fixed stack (state-of-the-art) to accommodate nickel electrode expansion due to charge/discharge cycling. The significant improvements resulting from these innovations are: extended cycle life; enhanced thermal, electrolyte, and oxygen management; and accommodation of nickel electrode expansion.

  8. A Comparison of Dependent Primary Care Utilization Rates Based on Deployments

    Science.gov (United States)

    2009-03-09

    analysis to obtain the deployment data was completed by ASMR , another contractor used to Health Care Utilization and Deployments 15 complete...2007. The deployment dataset was created by ASMR using all encounter data for active duty Soldiers and running the Social Security numbers of these

  9. Immunogenicity and Safety of a Booster Injection of DTap-IPV//Hib (Pentaxim) Administered Concomitantly With Tetravalent Dengue Vaccine in Healthy Toddlers 15-18 Months of Age in Mexico: A Randomized Trial.

    Science.gov (United States)

    Melo, Flor Irene Rodriguez; Morales, José Juan Renteria; De Los Santos, Abiel Homero Mascareñas; Rivas, Enrique; Vigne, Claire; Noriega, Fernando

    2017-06-01

    The live, attenuated, tetravalent dengue vaccine (CYD-TDV) is licensed in a number of dengue endemic countries for individuals ≥9 years of age. Before the integration of any vaccine into childhood vaccination schedules, a lack of immune interference and acceptable safety when coadministered with other recommended vaccines should be demonstrated. This randomized, multi-center phase III trial was conducted in Mexico. Healthy toddlers (n = 732) received a booster dose of a licensed pentavalent combination vaccine [diphtheria, tetanus, acellular pertussis, inactivated polio vaccine and Haemophilus influenzae type b (DTaP-IPV//Hib)] either concomitantly or sequentially, with the second dose of CYD-TDV administered as a 3-dose schedule. Antibody titers against diphtheria toxoid, tetanus toxoid and pertussis antigens were measured by enzyme-linked immunosorbent assay. Antibodies against poliovirus and dengue serotypes were measured using a plaque reduction neutralization test. Noninferiority was demonstrated for each of the DTaP-IPV//Hib antigens if the lower limit of the 2-sided 95% confidence interval of the difference in seroconversion rates between the 2 groups (CYD-TDV and placebo) was ≥10%. Safety of both vaccines was assessed. Noninferiority in immune response was demonstrated for all DTaP-IPV//Hib antigens. After 3 doses of CYD-TDV, no difference was observed in the immune response for CYD-TDV between groups. There were no safety concerns during the study. Coadministration of the DTaP-IPV//Hib booster vaccine with CYD-TDV has no observed impact on the immunogenicity or safety profile of the DTaP-IPV//Hib booster vaccine. No difference was observed on the CYD-TDV profile when administered concomitantly or sequentially with the DTaP-IPV//Hib booster vaccine.

  10. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2016-10-01

    Group, Family Advocacy, Child and Family Behavioral Health, Soldier Readiness Program (SRP), Family Life Chaplain Training Center, Fort Hood Housing ...resilience and child well-being, Soldier and non-deploying parents must successfully meet the challenges of caregiving throughout the deployment cycle ...reintegration program to reduce parenting stress and promote family resilience in Active Duty military families through all phases of the deployment cycle

  11. Home front: post-deployment mental health and divorces.

    Science.gov (United States)

    Negrusa, Brighita; Negrusa, Sebastian

    2014-06-01

    Since 2003, about 14 % of U.S. Army soldiers have reported symptoms of posttraumatic stress disorder (PTSD) following deployments. In this article, we examine how post-deployment symptoms of PTSD and of other mental health conditions are related to the probability of divorce among married active-duty U.S. Army soldiers. For this purpose, we combine Army administrative individual-level longitudinal data on soldiers' deployments, marital history, and sociodemographic characteristics with their self-reported post-deployment health information. Our estimates indicate that time spent in deployment increases the divorce risk among Army enlisted personnel and that PTSD symptoms are associated with further increases in the odds of divorce. Although officers are generally less likely to screen positive for PTSD than enlisted personnel, we find a stronger relationship between PTSD symptoms and divorces among Army officers who are PTSD-symptomatic than among enlisted personnel. We estimate a larger impact of deployments on the divorce risk among female soldiers, but we do not find a differential impact of PTSD symptoms by gender. Also, we find that most of the effect of PTSD symptoms occurs early in the career of soldiers who deploy multiple times.

  12. Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN under Error-Prone Channel Condition

    Directory of Open Access Journals (Sweden)

    Tsung-Han Lee

    2013-01-01

    Full Text Available 6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4. One view is that IP architecture is not suitable for low-rate wireless personal area network. It is a challenge to implement the IPv6 protocol stack into IEEE 802.15.4 devices due to that the size of IPv6 packet is much larger than the maximum packet size of IEEE 802.15.4 in data link layer. In order to solve this problem, 6LoWPAN provides header compression to reduce the transmission overhead for IP packets. In addition, two selected routing schemes, mesh-under and route-over routing schemes, are also proposed in 6LoWPAN to forward IP fragmentations under IEEE 802.15.4 radio link. The distinction is based on which layer of the 6LoWPAN protocol stack is in charge of routing decisions. In route-over routing scheme, the routing distinction is taken at the network layer and, in mesh-under, is taken by the adaptation layer. Thus, the goal of this research is to understand the performance of two routing schemes in 6LoWPAN under error-prone channel condition.

  13. Cloud Environment Automation: from infrastructure deployment to application monitoring

    Science.gov (United States)

    Aiftimiei, C.; Costantini, A.; Bucchi, R.; Italiano, A.; Michelotto, D.; Panella, M.; Pergolesi, M.; Saletta, M.; Traldi, S.; Vistoli, C.; Zizzi, G.; Salomoni, D.

    2017-10-01

    The potential offered by the cloud paradigm is often limited by technical issues, rules and regulations. In particular, the activities related to the design and deployment of the Infrastructure as a Service (IaaS) cloud layer can be difficult to apply and time-consuming for the infrastructure maintainers. In this paper the research activity, carried out during the Open City Platform (OCP) research project [1], aimed at designing and developing an automatic tool for cloud-based IaaS deployment is presented. Open City Platform is an industrial research project funded by the Italian Ministry of University and Research (MIUR), started in 2014. It intends to research, develop and test new technological solutions open, interoperable and usable on-demand in the field of Cloud Computing, along with new sustainable organizational models that can be deployed for and adopted by the Public Administrations (PA). The presented work and the related outcomes are aimed at simplifying the deployment and maintenance of a complete IaaS cloud-based infrastructure.

  14. Design of the De-Orbit Sail Boom Deployment Unit

    Science.gov (United States)

    Meyer, Sebastian; Hillebrandt, Martin; Straubel, Marco; Huhne, Christian

    2014-06-01

    The design of the De-Orbit Sail boom deployment unit is strongly driven by volume constraints, which are given by the cubesat container. Four CFRP (carbon fiber reinforced polymer) booms [4] with a cross-sectional shape of a double-omega and a length of 3.6 m are reeled on one spool in the center of the unit. The deployment of the four booms are controlled by an electric motor, which acts on the boom spool. Due to the volume limitation caused by the dimensions of the cubesat deployer the deployment unit has little room for the mechanisms components. With the aim to achieve a robust design, the deployment concept of the unit has greatly changed during the development process. The history of the design as well as the mechanisms are described. Additionally the results of the flight model testing are presented.

  15. Fractional-Dose Inactivated Poliovirus Vaccine Campaign - Sindh Province, Pakistan, 2016.

    Science.gov (United States)

    Pervaiz, Aslam; Mbaeyi, Chukwuma; Baig, Mirza Amir; Burman, Ashley; Ahmed, Jamal A; Akter, Sharifa; Jatoi, Fayaz A; Mahamud, Abdirahman; Asghar, Rana Jawad; Azam, Naila; Shah, Muhammad Nadeem; Laghari, Mumtaz Ali; Soomro, Kamaluddin; Wadood, Mufti Zubair; Ehrhardt, Derek; Safdar, Rana M; Farag, Noha

    2017-12-01

    Following the declaration of eradication of wild poliovirus (WPV) type 2 in September 2015, trivalent oral poliovirus vaccine (tOPV) was withdrawn globally to reduce the risk for type 2 vaccine-derived poliovirus (VDPV2) transmission; all countries implemented a synchronized switch to bivalent OPV (type 1 and 3) in April 2016 (1,2). Any isolation of VDPV2 after the switch is to be treated as a potential public health emergency and might indicate the need for supplementary immunization activities (3,4). On August 9, 2016, VDPV2 was isolated from a sewage sample taken from an environmental surveillance site in Hyderabad, Sindh province, Pakistan. Possible vaccination activities in response to VDPV2 isolation include the use of injectable inactivated polio vaccine (IPV), which poses no risk for vaccine-derived poliovirus transmission. Fractional-dose, intradermal IPV (fIPV), one fifth of the standard intramuscular dose, has been developed to more efficiently manage limited IPV supplies. fIPV has been shown in some studies to be noninferior to full-dose IPV (5,6) and was used successfully in response to a similar detection of a single VDPV2 isolate from sewage in India (7). Injectable fIPV was used for response activities in Hyderabad and three neighboring districts. This report describes the findings of an assessment of preparatory activities and subsequent implementation of the fIPV campaign. Despite achieving high coverage (>80%), several operational challenges were noted. The lessons learned from this campaign could help to guide the planning and implementation of future fIPV vaccination activities.

  16. Stratus Ocean Reference Station (20 degs S, 85 degs W) Mooring Recovery and Deployment Cruise, STRATUS 8, R/V Ronald H. Brown Cruise 07-09, October 9, 2007-November 6, 2007

    National Research Council Canada - National Science Library

    Whelan, Sean; Lord, Jeff; Grados, Carmen; Yu, Lisan; Morales, Luis; Galbraith, Nancy; de Szoeke, Simon P; O'Leary, Megan; Weller, Robert; Bouchard, Paul

    2007-01-01

    .... During the October 2007 cruise on the NOAA ship Ronald H. Brown to the ORS Stratus site, the primary activities were recovery of the Stratus 7 WHOI surface mooring that had been deployed in October 2006, deployment of a new (Stratus...

  17. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  18. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  19. Finding Their Way Back In: Family Reintegration Following Guard Deployment.

    Science.gov (United States)

    Messecar, Deborah C

    2017-03-01

    The aim of this study was to describe deployed National Guard members' and their families' perceptions of their experience with family reintegration, and the causes and conditions of challenges reintegration presents after deployment. A total of 26 National Guard members and 19 family members participated in individual (n = 22), couples (n = 6), or focus group (n = 17) interviews. In-depth interviews were used to assess needs and maximize input from military families regarding deployment-related experiences and reintegration issues. Qualitative coding and analysis of data were completed using NVivo. Finding their way back in is the key process that the military members must complete to successfully reestablish their desired social connections with the family and reclaim their place within the family. Several conditions shape the degree of challenges with reintegration that veterans and their family will encounter. These include preparation for deployment, length and type of deployment, communication during deployment, and finally, awareness of how deployment changes the military member and the family. Support resources dedicated to providing National Guard members and their families with assistance in preparing for deployments and educating them about the importance of communication during deployment should be maintained and expanded. Broader educational efforts that increase awareness of what to expect regarding how deployment changes the military member and the family are needed. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  20. Deploying Embodied AI into Virtual Worlds

    Science.gov (United States)

    Burden, David J. H.

    The last two years have seen the start of commercial activity within virtual worlds. Unlike computer games where Non-Player-Character avatars are common, in most virtual worlds they are the exception — and until recently in Second Life they were non-existent. However there is real commercial scope for Als in these worlds — in roles from virtual sales staff and tutors to personal assistants. Deploying an embodied AI into a virtual world offers a unique opportunity to evaluate embodied Als, and to develop them within an environment where human and computer are on almost equal terms. This paper presents an architecture being used for the deployment of chatbot driven avatars within the Second Life virtual world, looks at the challenges of deploying an AI within such a virtual world, the possible implications for the Turing Test, and identifies research directions for the future.

  1. Iron Status of Deployed Military Members

    Science.gov (United States)

    2017-01-04

    ready force Deploy with and care for the warrior Care for all entrusted to our care Nursing Competencies and Practice: Patient outcomes...duties, physical activities, iron intake through diet ). This additional information would improve the ability to determine factors associated with

  2. The effect of deployment frequencies on the military divorce rate

    OpenAIRE

    Arenstein, Stacy J.

    2011-01-01

    Approved for public release; distribution is unlimited. The primary goal of this research is to investigate whether the length and frequency of deployments affect the likelihood of divorce. The study uses data from the Contingency Tracking System (CTS) and the Active Duty Military Personnel file. The sample includes all active duty Navy and Marine Corps members from 2000 to 2009. Three models of divorce are estimated, each with a different control for the stress of deployment on the f...

  3. A Study on an Energy Conservation and Interconnection Scheme between WSN and Internet Based on the 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Runtong Zhang

    2015-01-01

    Full Text Available Wireless sensor network (WSN, which has broad application prospects, consists of small nodes with sensing, computation, and communications capabilities. IPv6 is used over low power WPAN (wireless personal area network which is run by 6LoWPAN technology on the LoWPAN devices. In order to establish seamless connection of two heterogeneous networks, that is, WSN and IPv6 network, this paper proposes an improved energy conservation and interconnection scheme (ECIS based on the analysis of the current schemes. Detailed design of each functional component in the new scheme is proposed, and an expansion of the SSCS module in NS2 802.15.4 simulator is examined. Comprehensive experiments on the simulation platform show that the newly proposed scheme is advantageous over existing results.

  4. An innovative deployable solar panel system for Cubesats

    Science.gov (United States)

    Santoni, Fabio; Piergentili, Fabrizio; Donati, Serena; Perelli, Massimo; Negri, Andrea; Marino, Michele

    2014-02-01

    One of the main Cubesat bus limitations is the available on-board power. The maximum power obtained using body mounted solar panels and advanced triple junction solar cells on a triple unit Cubesat is typically less than 10 W. The Cubesat performance and the mission scenario opened to these small satellite systems could be greatly enhanced by an increase of the available power. This paper describes the design and realization of a modular deployable solar panel system for Cubesats, consisting of a modular hinge and spring system that can be potentially used on-board single (1U), double(2U), triple (3U) and six units (6U) Cubesats. The size of each solar panels is the size of a lateral Cubesat surface. The system developed is the basis for a SADA (Solar Array Drive Assembly), in which a maneuvering capability is added to the deployed solar array in order to follow the apparent motion of the sun. The system design trade-off is discussed, comparing different deployment concepts and architectures, leading to the final selection for the modular design. A prototype of the system has been realized for a 3U Cubesat, consisting of two deployable solar panel systems, made of three solar panels each, for a total of six deployed solar panels. The deployment system is based on a plastic fiber wire and thermal cutters, guaranteeing a suitable level of reliability. A test-bed for the solar panel deployment testing has been developed, supporting the solar array during deployment reproducing the dynamical situation in orbit. The results of the deployment system testing are discussed, including the design and realization of the test-bed, the mechanical stress given to the solar cells by the deployment accelerations and the overall system performance. The maximum power delivered by the system is about 50.4 W BOL, greatly enhancing the present Cubesat solar array performance.

  5. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    Science.gov (United States)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  6. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...

  7. Neural activity and emotional processing following military deployment: Effects of mild traumatic brain injury and posttraumatic stress disorder.

    Science.gov (United States)

    Zuj, Daniel V; Felmingham, Kim L; Palmer, Matthew A; Lawrence-Wood, Ellie; Van Hooff, Miranda; Lawrence, Andrew J; Bryant, Richard A; McFarlane, Alexander C

    2017-11-01

    Posttraumatic Stress Disorder (PTSD) and mild traumatic brain injury (mTBI) are common comorbidities during military deployment that affect emotional brain processing, yet few studies have examined the independent effects of mTBI and PTSD. The purpose of this study was to examine distinct differences in neural responses to emotional faces in mTBI and PTSD. Twenty-one soldiers reporting high PTSD symptoms were compared to 21 soldiers with low symptoms, and 16 soldiers who reported mTBI-consistent injury and symptoms were compared with 16 soldiers who did not sustain an mTBI. Participants viewed emotional face expressions while their neural activity was recorded (via event-related potentials) prior to and following deployment. The high-PTSD group displayed increased P1 and P2 amplitudes to threatening faces at post-deployment compared to the low-PTSD group. In contrast, the mTBI group displayed reduced face-specific processing (N170 amplitude) to all facial expressions compared to the no-mTBI group. Here, we identified distinctive neural patterns of emotional face processing, with attentional biases towards threatening faces in PTSD, and reduced emotional face processing in mTBI. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. High-Frequency Mapping of the IPV6 Internet Using YARRP

    Science.gov (United States)

    2017-03-01

    Network CIDR Classless Inter-Domain Routing DNS Domain Name System HMAC Hashed Message Authentication Code HTTP Hypertext Transfer Protocol IANA...is connected (i.e., the interconnection of the routers that make up the network). Topology mapping can be conducted through either passive or active...means. In passive topology mapping, inferences are made about network connections based on data-plane traffic observed at specific points such as web

  9. Deployment Technology of a Heliogyro Solar Sail for Long Duration Propulsion

    Science.gov (United States)

    Peerawan, Wiwattananon; Bryant, Robert G.; Edmonson, William W.; Moore, William B.; Bell, Jared M.

    2015-01-01

    Interplanetary, multi-mission, station-keeping capabilities will require that a spacecraft employ a highly efficient propulsion-navigation system. The majority of space propulsion systems are fuel-based and require the vehicle to carry and consume fuel as part of the mission. Once the fuel is consumed, the mission is set, thereby limiting the potential capability. Alternatively, a method that derives its acceleration and direction from solar photon pressure using a solar sail would eliminate the requirement of onboard fuel to meet mission objectives. MacNeal theorized that the heliogyro-configured solar sail architecture would be lighter, less complex, cheaper, and less risky to deploy a large sail area versus a masted sail. As sail size increases, the masted sail requires longer booms resulting in increased mass, and chaotic uncontrollable deployment. With a heliogyro, the sail membrane is stowed as a roll of thin film forming a blade when deployed that can extend up to kilometers. Thus, a benefit of using a heliogyro-configured solar sail propulsion technology is the mission scalability as compared to masted versions, which are size constrained. Studies have shown that interplanetary travel is achievable by the heliogyro solar sail concept. Heliogyro solar sail concept also enables multi-mission missions such as sample returns, and supply transportation from Earth to Mars as well as station-keeping missions to provide enhanced warning of solar storm. This paper describes deployment technology being developed at NASA Langley Research Center to deploy and control the center-of-mass/center-of-pressure using a twin bladed heliogyro solar sail 6-unit (6U) CubeSat. The 6U comprises 2x2U blade deployers and 2U for payload. The 2U blade deployers can be mounted to 6U or larger scaled systems to serve as a non-chemical in-space propulsion system. A single solar sail blade length is estimated to be 2.4 km with a total area from two blades of 720 m2; total allowable weight

  10. Soldier Dimensions and Operational Readiness in U.S. Army Forces Deployed to Kosovo

    National Research Council Canada - National Science Library

    Castro, Carl

    1999-01-01

    .... In a recent study of U.S. Army units deployed to Kosovo in support of a multinational peacekeeping mission, soldier attitudes and health were surveyed on site, mid-way during a 6-month deployment...

  11. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cell - Update II

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1992-01-01

    An update of validation test results confirming the breakthrough in LEO cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV) nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles, compared to 3500 cycles for cells containing 31 percent KOH. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2X normal rate). The depth-of-discharge was 80 percent. Six 48-Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16,000 cycles during the continuing test.

  12. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  13. Realization and testing of a deployable space telescope based on tape springs

    Science.gov (United States)

    Lei, Wang; Li, Chuang; Zhong, Peifeng; Chong, Yaqin; Jing, Nan

    2017-08-01

    For its compact size and light weight, space telescope with deployable support structure for its secondary mirror is very suitable as an optical payload for a nanosatellite or a cubesat. Firstly the realization of a prototype deployable space telescope based on tape springs is introduced in this paper. The deployable telescope is composed of primary mirror assembly, secondary mirror assembly, 6 foldable tape springs to support the secondary mirror assembly, deployable baffle, aft optic components, and a set of lock-released devices based on shape memory alloy, etc. Then the deployment errors of the secondary mirror are measured with three-coordinate measuring machine to examine the alignment accuracy between the primary mirror and the deployed secondary mirror. Finally modal identification is completed for the telescope in deployment state to investigate its dynamic behavior with impact hammer testing. The results of the experimental modal identification agree with those from finite element analysis well.

  14. Performance analysis for wireless networks: an analytical approach by multifarious Sym Teredo.

    Science.gov (United States)

    Punithavathani, D Shalini; Radley, Sheryl

    2014-01-01

    IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol.

  15. Postpartum Intimate Partner Violence and Health Risks Among Young Mothers in the United States: A Prospective Study

    Science.gov (United States)

    Ickovics, Jeannette; Lewis, Jessica B.; Magriples, Urania; Kershaw, Trace S.

    2014-01-01

    The study assessed the relationship between postpartum intimate partner violence (IPV) and postpartum health risks among young mothers over time. Data were collected from 2001 to 2005 on young women aged 14–25 attending obstetrics and gynecology clinics in two US cities. Postpartum IPV (i.e., emotional, physical, sexual) was assessed at 6 and 12 months after childbirth (n = 734). Four types of postpartum IPV patterns were examined: emerged IPV, dissipated IPV, repeated IPV, and no IPV. Emerged IPV occurred at 12 months postpartum, not 6 months postpartum. Dissipated IPV occurred at 6 months postpartum, not 12 months postpartum. Repeated IPV was reported at 6 months and 12 months postpartum. Postpartum health risks studied at both time points were perceived stress, depression, fear of condom negotiation, condom use, infant sleeping problems, and parental stress. Repeated measures analysis of covariance was used. The proportion of young mothers reporting IPV after childbirth increased from 17.9 % at 6 months postpartum to 25.3 % at 12 months postpartum (P postpartum IPV were associated with increased perceived stress, depression, fear of condom negotiation, and infant sleeping problems as well as decreased condom use (P postpartum IPV was associated with decreased depression (P postpartum period. PMID:24562504

  16. The Design and Implementation of a Novel Open Source Massive Deployment System

    Directory of Open Access Journals (Sweden)

    Steven J. H. Shiau

    2018-06-01

    Full Text Available The hypervisor and container are emerging cloud computing and fog computing technologies, which enable rapid system deployment. However, both of the technologies depend on the operating system (OS and applications that are installed on the host machines. System deployment is the activity to deliver and install OSs and applications onto computers. Such deployment activities are widely required in the infrastructure of cloud computing, fog computing, high-performance computing clusters, and classrooms of computer education. Albeit the concept of system deployment is not new, traditional solutions cannot support the rapid evolution of open source file systems. Furthermore, existing solutions cannot support the massive deployment of disks in a computer as well as the massive deployment in large-scale computers. To resolve the issue, the authors proposed novel system architecture as well as software that is openly available. The experiments are undertaken by deploying a Linux system to 1 to 30 Universal Serial Bus (USB flash drives in a single machine and to 1 to 32 machines in a network using the software that is being developed in this work. The results have demonstrated the feasibility and efficiency of the proposed work. The relationships between the bus bandwidth, the writing rate of the USB flash drive, and the number of flash drives were also formulated as a govern equation. Performance evaluation and cost savings in comparing to the deployment cases adopting commercial software were also provided for demonstrating the performance enhancement and cost reduction by using the novel deployment system. In general, the proposed architecture and the developed software are highly effective from the aspects of both performance and cost.

  17. Testing Deceptive Honeypots

    Science.gov (United States)

    2014-09-01

    42 Figure 26. IPv6 address of traffic by region (cmand.org). .................................... 42 Figure 27. Web honeypot traffic...distribution for IPv6 addresses. Unfortunately, only a few honeypots support IPv6 address like Dionaea. 11 We studied mostly two honeypot technologies...used data from cmand.org (183,713 IPv4 packets and 199 IPv6 packets) from May 30, 2011, to November 26, 2013. For the web honeypot, data were

  18. Analyzed immunogenicity of fractional doses of Sabin-inactivated poliovirus vaccine (sIPV) with intradermal delivery in rats.

    Science.gov (United States)

    Ma, Lei; Cai, Wei; Sun, Mingbo; Cun, Yina; Zhou, Jian; Liu, Jing; Hu, Wenzhu; Zhang, Xinwen; Song, Shaohui; Jiang, Shude; Liao, Guoyang

    2016-12-01

    The live-attenuated oral polio vaccine (OPV) will be no longer used when wild poliovirus (WPV) eliminating in worldwide, according to GPEI (the Global Polio Eradication Initiative) Reports. It is planning to replace OPV by Sabin-based inactivated poliovirus vaccine (sIPV) in developing countries, with purpose of reducing of the economic burden and maintaining of the appropriate antibody levels in population. It studied serial fractional doses immunized by intradermal injection (ID) in rats, to reduce consume of antigen and financial burden, maintaining sufficient immunogenicity; Methods: Study groups were divided in 4 groups of dose gradient, which were one-tenth (1/10), one-fifth (1/5), one-third (1/3) and one-full dose (1/1), according to the volume of distribution taken from the same batch of vaccine (sIPV). Wistar rats were injected intradermally with the needle and syringe sing the mantoux technique taken once month for 3 times. It was used as positive control that intramuscular inoculation (IM) was injected with one-full dose (1/1) with same batch of sIPV. PBS was used as negative control. Blood samples were collected via tail vein. After 30 d with 3 round of immunization, it analyzed the changes of neutralization antibody titers in the each group by each immunization program end; Results: The results of seroconversion had positive correlation with different doses in ID groups. The higher concentration of D-antigen (D-Ag) could conduct higher seroconversion. Furthermore, different types of viruses had different seroconversion trend. It showed that the geometric mean titers (GMTs) of each fractional-dose ID groups increased by higher concentration of D-Ag, and it got significant lower than the full-dose IM group. At 90 th days of immunization, the GMTs for each poliovirus subtypes of fractional doses were almost higher than 1:8, implied that it could be meaning positive seroprotection titer for polio vaccine types, according to WHO suggestion; Conclusions

  19. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  20. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  1. Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

    Directory of Open Access Journals (Sweden)

    D. Shalini Punithavathani

    2014-01-01

    Full Text Available IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT. However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS, which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol.

  2. Collaboration Services: Enabling Chat in Disadvantaged Grids

    Science.gov (United States)

    2014-06-01

    grids in the tactical domain" [2]. The main focus of this group is to identify what we call tactical SOA foundation services. By this we mean which...Here, only IPv4 is supported, as differences relating to IPv4 and IPv6 addressing meant that this functionality was not easily extended to use IPv6 ...multicast groups. Our IPv4 implementation is fully compliant with the specification, whereas the IPv6 implementation uses our own interpretation of

  3. Airborne Deployment and Calibration of Microwave Atmospheric Sounder on 6U CubeSat

    Science.gov (United States)

    Padmanabhan, S.; Brown, S. T.; Lim, B.; Kangaslahti, P.; Russell, D.; Stachnik, R. A.

    2015-12-01

    To accurately predict how the distribution of extreme events may change in the future we need to understand the mechanisms that influence such events in our current climate. Our current observing system is not well-suited for observing extreme events globally due to the sparse sampling and in-homogeneity of ground-based in-situ observations and the infrequent revisit time of satellite observations. Observations of weather extremes, such as extreme precipitation events, temperature extremes, tropical and extra-tropical cyclones among others, with temporal resolution on the order of minutes and spatial resolution on the order of few kms (cost passive microwave sounding and imaging sensors on CubeSats that would work in concert with traditional flagship observational systems, such as those manifested on large environmental satellites (i.e. JPSS,WSF,GCOM-W), to monitor weather extremes. A 118/183 GHz sensor would enable observations of temperature and precipitation extremes over land and ocean as well as tropical and extra-tropical cyclones. This proposed project would enable low cost, compact radiometer instrumentation at 118 and 183 GHz that would fit in a 6U Cubesat with the objective of mass-producing this design to enable a suite of small satellites to image the key geophysical parameters needed to improve prediction of extreme weather events. We take advantage of past and current technology developments at JPL viz. HAMSR (High Altitude Microwave Scanning Radiometer), Advanced Component Technology (ACT'08) to enable low-mass, low-power high frequency airborne radiometers. In this paper, we will describe the design and implementation of the 118 GHz temperature sounder and 183 GHz humidity sounder on the 6U CubeSat. In addition, we will discuss the maiden airborne deployment of the instrument during the Plain Elevated Convection at Night (PECAN) experiment. The successful demonstration of this instrument on the 6U CubeSat would pave the way for the development of a

  4. Solar sail deployment experiment

    OpenAIRE

    Shimose, Shigeru; 下瀬 滋

    2006-01-01

    Solar Sail move by receiving momentum of photons in sunlight. This paper presents results of some Spin-Stabilized Solar Sail deployment experiment. ISAS has successfully deployed, for the first time in the world, the polyimide Solar Sail taking advantage of centrifugal force in space. Based on this result, the new deployment mechanism is being developed which retracts the 50 m diameter sail.

  5. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight battery cells

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1990-01-01

    A breakthrough in the low-earth-orbit (LEO) cycle life of individual pressure vessel (IPV) nickel hydrogen battery cells is reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40,000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. The effect of KOH concentration on cycle life was studied. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min charge (2 x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The next step is to validate these results using flight hardware and real time LEO test. NASA Lewis has a contract with the Naval Weapons Support Center (NWSC), Crane, Indiana to validate the boiler plate test results. Six 48 A-hr Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells) and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The cells were cycled for over 8000 cycles in the continuing test. There were no failures for the cells containing 26 percent KOH. There were two failures, however, for the cells containing 31 percent KOH.

  6. CMS software deployment on OSG

    International Nuclear Information System (INIS)

    Kim, B; Avery, P; Thomas, M; Wuerthwein, F

    2008-01-01

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment

  7. CMS software deployment on OSG

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B; Avery, P [University of Florida, Gainesville, FL 32611 (United States); Thomas, M [California Institute of Technology, Pasadena, CA 91125 (United States); Wuerthwein, F [University of California at San Diego, La Jolla, CA 92093 (United States)], E-mail: bockjoo@phys.ufl.edu, E-mail: thomas@hep.caltech.edu, E-mail: avery@phys.ufl.edu, E-mail: fkw@fnal.gov

    2008-07-15

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment.

  8. An ARM Mobile Facility Designed for Marine Deployments

    Science.gov (United States)

    Wiscombe, W. J.

    2007-05-01

    The U.S. Dept. of Energy's ARM (Atmospheric Radiation Measurements) Program is designing a Mobile Facility exclusively for marine deployments. This marine facility is patterned after ARM's land Mobile Facility, which had its inaugural deployment at Point Reyes, California, in 2005, followed by deployments to Niger in 2006 and Germany in 2007 (ongoing), and a planned deployment to China in 2008. These facilities are primarily intended for the study of clouds, radiation, aerosols, and surface processes with a goal to include these processes accurately in climate models. They are preferably embedded within larger field campaigns which provide context. They carry extensive instrumentation (in several large containers) including: cloud radar, lidar, microwave radiometers, infrared spectrometers, broadband and narrowband radiometers, sonde-launching facilities, extensive surface aerosol measurements, sky imagers, and surface latent and sensible heat flux devices. ARM's Mobile Facilities are designed for 6-10 month deployments in order to capture climatically-relevant datasets. They are available to any scientist, U.S. or international, who wishes to submit a proposal during the annual Spring call. The marine facility will be adapted to, and ruggedized for, the harsh marine environment and will add a scanning two-frequency radar, a boundary-layer wind profiler, a shortwave spectrometer, and aerosol instrumentation adapted to typical marine aerosols like sea salt. Plans also include the use of roving small UAVs, automated small boats, and undersea autonomous vehicles in order to address the point-to-area-average problem which is so crucial for informing climate models. Initial deployments are planned for small islands in climatically- interesting cloud regimes, followed by deployments on oceanic platforms (like decommissioned oil rigs and the quasi-permanent platform of this session's title) and eventually on large ships like car carriers plying routine routes.

  9. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2017-10-01

    Traumatic Stress Studies (ISTSS) Conference. Chicago, IL. 2. Kritikos*, T.K. & DeVoe, E.R. Relationship quality of recently deployed military...prevention and family orientation of the study . We continue to have impact on multiple disciplinary areas, including social work, psychology , and public...resilience in Active Duty military families through all phases of the deployment cycle. The study will be conducted in three phases. In phase 1

  10. Development, deployment and operations of ATLAS databases

    International Nuclear Information System (INIS)

    Vaniachine, A. V.; von der Schmitt, J. G.

    2008-01-01

    In preparation for ATLAS data taking, a coordinated shift from development towards operations has occurred in ATLAS database activities. In addition to development and commissioning activities in databases, ATLAS is active in the development and deployment (in collaboration with the WLCG 3D project) of the tools that allow the worldwide distribution and installation of databases and related datasets, as well as the actual operation of this system on ATLAS multi-grid infrastructure. We describe development and commissioning of major ATLAS database applications for online and offline. We present the first scalability test results and ramp-up schedule over the initial LHC years of operations towards the nominal year of ATLAS running, when the database storage volumes are expected to reach 6.1 TB for the Tag DB and 1.0 TB for the Conditions DB. ATLAS database applications require robust operational infrastructure for data replication between online and offline at Tier-0, and for the distribution of the offline data to Tier-1 and Tier-2 computing centers. We describe ATLAS experience with Oracle Streams and other technologies for coordinated replication of databases in the framework of the WLCG 3D services

  11. DoD Cybersecurity Weakness as Reported in Audit Reports Issued From August 1, 2014, Through July 31, 2015 (REDACTED)

    Science.gov (United States)

    2015-09-25

    Protocol Version 6 ( IPv6 ). The Federal and DoD requirements were not completed because the DoD Chief Information Officer (CIO) and U.S. Cyber Command...had not made IPv6 a priority. Further, the DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration efforts...According to the report, the continued use of IPv4 will delay the potential benefits of IPv6 , such as improved communication, warfighter mobility

  12. Link Between Deployment Factors and Parenting Stress in Navy Families

    Science.gov (United States)

    2016-04-11

    5a. CONTRACT NUMBER N/A Families 5b. GRANT NUMBER HT9404-13-1-TS05 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHOR(S) 5d...Purpose: Many service members today are married, and many also have children; deployments affect all members of the military family . The purpose of this...conducted. Findings: As deployment factors increased, parenting stress increased for fathers in the reintegration period, with a potential mediation

  13. An Exploratory Study Using Cortisol to Describe the Response of Incarcerated Women IPV Survivors to MAMBRA Intervention

    Directory of Open Access Journals (Sweden)

    Janette Y. Taylor

    2016-01-01

    Full Text Available Objective. To determine if incarcerated women survivors of IPV had a physiological response to the Music and Account-Making for Behavioral-Related Adaptation (MAMBRA intervention, as measured by cortisol levels. Methods. A single-group repeated measures designed exploratory study was used to pilot-test MAMBRA. A convenience sample (n=33 was recruited in a Midwestern women’s correctional facility. Serving as their own control, participants provided demographics and pre-/post-MAMBRA salivary samples while attending four MAMBRA sessions. Baseline data were compared to participants’ data collected over the remaining 3 MAMBRA sessions. Data were analyzed with descriptive and univariate statistics with an alpha of .05 and post-hoc power of .65. Results. Participants were predominantly White (52%, single (80%, and early middle-aged (x-AGE=38.7±9.4, with a history of physical/nonphysical spousal abuse. Using a subsample (n=26, salivary cortisol decreased between the pre-/post-MAMBRA over the sessions (F(3,75=4.59, p<.01. Conclusion. Participants had a physiological response to the MAMBRA intervention as evidenced by the decreased cortisol between the pre-/post-MAMBRA. This is the first step in examining MAMBRA’s clinical utility as an intervention for female IPV survivors. Future longitudinal studies will examine MAMBRA’s effectiveness given this change in cortisol.

  14. Longitudinal changes in glucocorticoid receptor exon 1F methylation and psychopathology after military deployment.

    Science.gov (United States)

    Schür, R R; Boks, M P; Rutten, B P F; Daskalakis, N P; de Nijs, L; van Zuiden, M; Kavelaars, A; Heijnen, C J; Joëls, M; Kahn, R S; Geuze, E; Vermetten, E; Vinkers, C H

    2017-07-25

    Several cross-sectional studies have demonstrated the relevance of DNA methylation of the glucocorticoid receptor exon 1 F region (GR-1 F ) for trauma-related psychopathology. We conducted a longitudinal study to examine GR-1 F methylation changes over time in relation to trauma exposure and the development of post-deployment psychopathology. GR-1 F methylation (52 loci) was quantified using pyrosequencing in whole blood of 92 military men 1 month before and 6 months after a 4-month deployment period to Afghanistan. GR-1 F methylation overall (mean methylation and the number of methylated loci) and functional methylation (methylation at loci associated with GR exon 1 F expression) measures were examined. We first investigated the effect of exposure to potentially traumatic events during deployment on these measures. Subsequently, changes in GR-1 F methylation were related to changes in mental health problems (total Symptom Checklist-90 score) and posttraumatic stress disorder (PTSD) symptoms (Self-Report Inventory for PTSD). Trauma exposure during deployment was associated with an increase in all methylation measures, but development of mental health problems 6 months after deployment was only significantly associated with an increased functional methylation. Emergence of post-deployment PTSD symptoms was not related to increased functional methylation over time. Pre-deployment methylation levels did not predict post-deployment psychopathology. To our knowledge, this is the first study to prospectively demonstrate trauma-related increases in GR-1 F methylation, and it shows that only increases at specific functionally relevant sites predispose for post-deployment psychopathology.

  15. Vial usage, device dead space, vaccine wastage, and dose accuracy of intradermal delivery devices for inactivated poliovirus vaccine (IPV).

    Science.gov (United States)

    Jarrahian, Courtney; Rein-Weston, Annie; Saxon, Gene; Creelman, Ben; Kachmarik, Greg; Anand, Abhijeet; Zehrung, Darin

    2017-03-27

    Intradermal delivery of a fractional dose of inactivated poliovirus vaccine (IPV) offers potential benefits compared to intramuscular (IM) delivery, including possible cost reductions and easing of IPV supply shortages. Objectives of this study were to assess intradermal delivery devices for dead space, wastage generated by the filling process, dose accuracy, and total number of doses that can be delivered per vial. Devices tested included syringes with staked (fixed) needles (autodisable syringes and syringes used with intradermal adapters), a luer-slip needle and syringe, a mini-needle syringe, a hollow microneedle device, and disposable-syringe jet injectors with their associated filling adapters. Each device was used to withdraw 0.1-mL fractional doses from single-dose IM glass vials which were then ejected into a beaker. Both vial and device were weighed before and after filling and again after expulsion of liquid to record change in volume at each stage of the process. Data were used to calculate the number of doses that could potentially be obtained from multidose vials. Results show wide variability in dead space, dose accuracy, overall wastage, and total number of doses that can be obtained per vial among intradermal delivery devices. Syringes with staked needles had relatively low dead space and low overall wastage, and could achieve a greater number of doses per vial compared to syringes with a detachable luer-slip needle. Of the disposable-syringe jet injectors tested, one was comparable to syringes with staked needles. If intradermal delivery of IPV is introduced, selection of an intradermal delivery device can have a substantial impact on vaccine wasted during administration, and thus on the required quantity of vaccine that needs to be purchased. An ideal intradermal delivery device should be not only safe, reliable, accurate, and acceptable to users and vaccine recipients, but should also have low dead space, high dose accuracy, and low overall

  16. Community integration after deployment to Afghanistan: a longitudinal investigation of Danish soldiers.

    Science.gov (United States)

    Karstoft, Karen-Inge; Armour, Cherie; Andersen, Søren B; Bertelsen, Mette; Madsen, Trine

    2015-04-01

    In the years following military deployment, soldiers may experience problems integrating into the community. However, little is known about the nature and prevalence of these problems and if they relate to posttraumatic symptomatology. In a prospective, longitudinal study of Danish soldiers deployed to Afghanistan in 2009 (N = 743), we assessed community reintegration difficulties 2.5 years after home coming (study sample: N = 454). Furthermore, symptoms of posttraumatic stress disorder (PTSD) were assessed before, during, and after deployment. Trajectories of PTSD symptoms from a previously published latent growth mixture modeling analysis were used to address whether community reintegration difficulties differ as a result of course and level of PTSD symptoms. Between 3.6 and 18.0% reported to have some, a lot, or extreme difficulties in reintegration domains such as interpersonal functioning, productivity, community involvement, and self-care. Mean level of reintegration difficulties differed significantly across six PTSD symptom trajectories (range 6.35-36.00); with more symptomatic trajectories experiencing greater community reintegration difficulties. Reintegration difficulties after deployment are present in less than 20% of Danish soldiers who return from Afghanistan. Difficulties are greater in individuals who follow symptomatic PTSD trajectories in the first years following deployment than in those who follow a low-stable trajectory with no or few symptoms.

  17. Gender differences in the effects of deployment-related stressors and pre-deployment risk factors on the development of PTSD symptoms in National Guard Soldiers deployed to Iraq and Afghanistan.

    Science.gov (United States)

    Polusny, Melissa A; Kumpula, Mandy J; Meis, Laura A; Erbes, Christopher R; Arbisi, Paul A; Murdoch, Maureen; Thuras, Paul; Kehle-Forbes, Shannon M; Johnson, Alexandria K

    2014-02-01

    Although women in the military are exposed to combat and its aftermath, little is known about whether combat as well as pre-deployment risk/protective factors differentially predict post-deployment PTSD symptoms among women compared to men. The current study assesses the influence of combat-related stressors and pre-deployment risk/protective factors on women's risk of developing PTSD symptoms following deployment relative to men's risk. Participants were 801 US National Guard Soldiers (712 men, 89 women) deployed to Iraq or Afghanistan who completed measures of potential risk/protective factors and PTSD symptoms one month before deployment (Time 1) and measures of deployment-related stressors and PTSD symptoms about 2-3 months after returning from deployment (Time 2). Men reported greater exposure to combat situations than women, while women reported greater sexual stressors during deployment than men. Exposure to the aftermath of combat (e.g., witnessing injured/dying people) did not differ by gender. At Time 2, women reported more severe PTSD symptoms and higher rates of probable PTSD than did men. Gender remained a predictor of higher PTSD symptoms after accounting for pre-deployment symptoms, prior interpersonal victimization, and combat related stressors. Gender moderated the association between several risk factors (combat-related stressors, prior interpersonal victimization, lack of unit support and pre-deployment concerns about life/family disruptions) and post-deployment PTSD symptoms. Elevated PTSD symptoms among female service members were not explained simply by gender differences in pre-deployment or deployment-related risk factors. Combat related stressors, prior interpersonal victimization, and pre-deployment concerns about life and family disruptions during deployment were differentially associated with greater post-deployment PTSD symptoms for women than men. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. Active remote observing system for the 1-m telescope at Tonantzintla Observatory

    Science.gov (United States)

    Bernal, Abel; Martínez, Luis A.; Hernández, Héctor; Garfias, Fernando; Ángeles, Fernando

    2006-06-01

    We have designed and installed a new active remote observing system for the 1-m, f/15 telescope at the Tonantzintla Observatory. This remote system is operated in real-time through the Internet, allowing an observer to control the building, the telescope (pointing, guiding and focusing) and the CCD image acquisition at the main and finder telescopes from the Instituto de Astronomia headquarters in Mexico City (150 KM away). The whole system was modeled within the Unified Modeling Language (UML) and the design has proved to be versatile enough for a variety of astronomical instruments. We describe the system architecture and how different subsystems (telescope control, main telescope and finder image acquisition, weather station, videoconference, etc.) that are based on different operative system platforms (Linux, Windows, uIP) have been integrated. We present the first results of an IPv6 over IPv4 tunnel. Recent remote direct imaging and spectroscopic observations have been used to test the astronomical site. We conclude that this remote system is an excellent tool for supporting research and graduated observational astronomy programs.

  19. Tether Deployer And Brake

    Science.gov (United States)

    Carroll, Joseph A.; Alexander, Charles M.

    1993-01-01

    Design concept promises speed, control, and reliability. Scheme for deploying tether provides for fast, free, and snagless payout and fast, dependable braking. Developed for small, expendable tethers in outer space, scheme also useful in laying transoceanic cables, deploying guidance wires to torpedoes and missiles, paying out rescue lines from ship to ship via rockets, deploying antenna wires, releasing communication and power cables to sonobuoys and expendable bathythermographs, and in reeling out lines from fishing rods.

  20. Features of the Calculation Deployment Large Transformable Structures of Different Configurations

    Directory of Open Access Journals (Sweden)

    V. N. Zimin

    2014-01-01

    Full Text Available Despite the significant progress achieved in the design of space transformable structures to ensure a smooth and reliable deployment remains an important task. This type of construction can consist of dozens, hundreds or even thousands of interconnected elements. Deployment transformable space structures in orbit to test their performance in orbital conditions are associated with high material costs. Full deploy: experimental development process transformable structures involve a number of fundamental difficulties: It is impossible to eliminate the influence of gravity and resistance forces conditions. Thus, to calculate deploy of large transformable structures of various configurations is an important stage of their creation. Simulation provides an opportunity to analyze various schemes of deploy, to reveal their advantages and possible disadvantages. For numerical analysis of deploy of such structures is necessary to use modern software modeling of the dynamics of multi-component of mechanical systems such as EULER and Adams. Simulation of deployment space transformable structures was performed taking as example folding flat antenna contours diameter of 5 m and 20 m, foldable spatial calibration reflector diameter of 3 m, deployable antenna reflector truss-type aperture 3×6 m.The results of the calculations represent following characteristics: the time of adoption of the working position structures; form intermediate positions structures during deployment; dependence of opening angles and angular velocities of the design links on the time. The parameters of these calculations can be used as input in the development of structural elements providing deployment. They can also be used to prepare stands for experimental testing of disclosure designs in ground conditions. It should be noted that the theoretical models are the only way to analyze the deployment of such structures for possible emergency situations.

  1. Post-deployment family violence among UK military personnel.

    Science.gov (United States)

    Kwan, Jamie; Jones, Margaret; Somaini, Greta; Hull, Lisa; Wessely, Simon; Fear, Nicola T; MacManus, Deirdre

    2017-12-19

    Research into violence among military personnel has not differentiated between stranger- and family-directed violence. While military factors (combat exposure and post-deployment mental health problems) are risk factors for general violence, there has been limited research on their impact on violence within the family environment. This study aims to compare the prevalence of family-directed and stranger-directed violence among a deployed sample of UK military personnel and to explore risk factors associated with both family- and stranger-directed violence. This study utilised data from a large cohort study which collected information by questionnaire from a representative sample of randomly selected deployed UK military personnel (n = 6711). The prevalence of family violence immediately following return from deployment was 3.6% and 7.8% for stranger violence. Family violence was significantly associated with having left service, while stranger violence was associated with younger age, male gender, being single, having a history of antisocial behaviour as well as having left service. Deployment in a combat role was significantly associated with both family and stranger violence after adjustment for confounders [adjusted odds ratio (aOR) = 1.92 (1.25-2.94), p = 0.003 and aOR = 1.77 (1.31-2.40), p violence both inside and outside the family environment and should be considered in violence reduction programmes for military personnel. Further research using a validated measurement tool for family violence would improve comparability with other research.

  2. Fusion Power Deployment

    International Nuclear Information System (INIS)

    Schmidt, J.A.; Ogden, J.M.

    2002-01-01

    Fusion power plants could be part of a future portfolio of non-carbon dioxide producing energy supplies such as wind, solar, biomass, advanced fission power, and fossil energy with carbon dioxide sequestration. In this paper, we discuss key issues that could impact fusion energy deployment during the last half of this century. These include geographic issues such as resource availability, scale issues, energy storage requirements, and waste issues. The resource needs and waste production associated with fusion deployment in the U.S. should not pose serious problems. One important feature of fusion power is the fact that a fusion power plant should be locatable within most local or regional electrical distribution systems. For this reason, fusion power plants should not increase the burden of long distance power transmission to our distribution system. In contrast to fusion power, regional factors could play an important role in the deployment of renewable resources such as wind, solar and biomass or fossil energy with CO2 sequestration. We examine the role of these regional factors and their implications for fusion power deployment

  3. Emerging trends in communication networks

    CERN Document Server

    Hasan, Syed Faraz

    2014-01-01

    This book covers the state of the art in communication networks with the help of illustrative diagrams and recent references published in reputed journals and magazines. The book gives readers a glimpse into the next generation of communication networks. It explores topics that are currently in the research phase and/or are expected to be deployed in recent future such as LTE networks and IPv6 networks. This book is written for students/researchers who wish to come up to date with the recent trends in telecommunications.

  4. Modelling Risk to US Military Populations from Stopping Blanket Mandatory Polio Vaccination.

    Science.gov (United States)

    Burgess, Colleen; Burgess, Andrew; McMullen, Kellie

    2017-01-01

    Transmission of polio poses a threat to military forces when deploying to regions where such viruses are endemic. US-born soldiers generally enter service with immunity resulting from childhood immunization against polio; moreover, new recruits are routinely vaccinated with inactivated poliovirus vaccine (IPV), supplemented based upon deployment circumstances. Given residual protection from childhood vaccination, risk-based vaccination may sufficiently protect troops from polio transmission. This analysis employed a mathematical system for polio transmission within military populations interacting with locals in a polio-endemic region to evaluate changes in vaccination policy. Removal of blanket immunization had no effect on simulated polio incidence among deployed military populations when risk-based immunization was employed; however, when these individuals reintegrated with their base populations, risk of transmission to nondeployed personnel increased by 19%. In the absence of both blanket- and risk-based immunization, transmission to nondeployed populations increased by 25%. The overall number of new infections among nondeployed populations was negligible for both scenarios due to high childhood immunization rates, partial protection against transmission conferred by IPV, and low global disease incidence levels. Risk-based immunization driven by deployment to polio-endemic regions is sufficient to prevent transmission among both deployed and nondeployed US military populations.

  5. Remotely deployable aerial inspection using tactile sensors

    Science.gov (United States)

    MacLeod, C. N.; Cao, J.; Pierce, S. G.; Sullivan, J. C.; Pipe, A. G.; Dobie, G.; Summan, R.

    2014-02-01

    For structural monitoring applications, the use of remotely deployable Non-Destructive Evaluation (NDE) inspection platforms offer many advantages, including improved accessibility, greater safety and reduced cost, when compared to traditional manual inspection techniques. The use of such platforms, previously reported by researchers at the University Strathclyde facilitates the potential for rapid scanning of large areas and volumes in hazardous locations. A common problem for both manual and remote deployment approaches lies in the intrinsic stand-off and surface coupling issues of typical NDE probes. The associated complications of these requirements are obviously significantly exacerbated when considering aerial based remote inspection and deployment, resulting in simple visual techniques being the preferred sensor payload. Researchers at Bristol Robotics Laboratory have developed biomimetic tactile sensors modelled on the facial whiskers (vibrissae) of animals such as rats and mice, with the latest sensors actively sweeping their tips across the surface in a back and forth motion. The current work reports on the design and performance of an aerial inspection platform and the suitability of tactile whisking sensors to aerial based surface monitoring applications.

  6. What explains post-traumatic stress disorder (PTSD) in UK service personnel: deployment or something else?

    Science.gov (United States)

    Jones, M; Sundin, J; Goodwin, L; Hull, L; Fear, N T; Wessely, S; Rona, R J

    2013-08-01

    In previous studies an association between deployment to Iraq or Afghanistan and an overall increased risk for post-traumatic stress disorder (PTSD) in UK armed forces has not been found. The lack of a deployment effect might be explained by including, in the comparison group, personnel deployed on other operations or who have experienced traumatic stressors unrelated to deployment. The sample comprised 8261 regular UK armed forces personnel who deployed to Iraq, Afghanistan or other operational areas or were not deployed. Participants completed the PTSD CheckList-Civilian Version (PCL-C) and provided information about deployment history, demographic and service factors, serious accidents and childhood experiences. Deployment to Iraq or Afghanistan [odds ratio (OR) 1.2, 95% confidence interval (CI) 0.6-2.2] or elsewhere (OR 1.1, 95% CI 0.6-2.0) was unrelated to PTSD although holding a combat role was associated with PTSD if deployed to Iraq or Afghanistan (OR 2.7, 95% CI 1.9-3.9). Childhood adversity (OR 3.3, 95% CI 2.1-5.0), having left service (OR 2.7, 95% CI 1.9-4.0) and serious accident (OR 2.1, 95% CI 1.4-3.0) were associated with PTSD whereas higher rank was protective (OR 0.3, 95% CI 0.12-0.76). For the majority of UK armed forces personnel, deployment whether to Iraq, Afghanistan or elsewhere confers no greater risk for PTSD than service in the armed forces per se but holding a combat role in those deployed to Iraq or Afghanistan is associated with PTSD. Vulnerability factors such as lower rank, childhood adversity and leaving service, and having had a serious accident, may be at least as important as holding a combat role in predicting PTSD in UK armed forces personnel.

  7. Deployment Methods for an Origami-Inspired Rigid-Foldable Array

    Science.gov (United States)

    Zirbel, Shannon A.; Trease, Brian P.; Magleby, Spencer P.; Howell, Larry L.

    2014-01-01

    The purpose of this work is to evaluate several deployment methods for an origami-inspired solar array at two size scales: 25-meter array and CubeSat array. The array enables rigid panel deployment and introduces new concepts for actuating CubeSat deployables. The design for the array was inspired by the origami flasher model (Lang, 1997; Shafer, 2001). Figure 1 shows the array prototyped from Garolite and Kapton film at the CubeSat scale. Prior work demonstrated that rigid panels like solar cells could successfully be folded into the final stowed configuration without requiring the panels to flex (Zirbel, Lang, Thomson, & al., 2013). The design of the array is novel and enables efficient use of space. The array can be wrapped around the central bus of the spacecraft in the case of the large array, or can accommodate storage of a small instrument payload in the case of the CubeSat array. The radial symmetry of this array around the spacecraft is ideally suited for spacecraft that need to spin. This work focuses on several actuation methods for a one-time deployment of the array. The array is launched in its stowed configuration and it will be deployed when it is in space. Concepts for both passive and active actuation were considered.

  8. Механизми за транзиција од IPv4 во IPv6

    OpenAIRE

    Gelev, Saso; Sokolovski, Aleksandar

    2010-01-01

    Без сомнение информатичките технологии станаа значаен дел од нашиот живот. Инженерските иновации значително ги подобруваат мрежните технологии и ги следат во чекор со брза адаптација на компјутерските комуникации. Од друга страна, трендот за конвергирање на сите комуникации, податоци, видео и звук, во еден единствен мрежен протокол доведува до лимитирање на ресурсите за понатамошно посвојување од страна на компјутерско комуникациските базирани сервиси. Адресниот простор на IPv4 не може ...

  9. Scientific Grid activities and PKI deployment in the Cybermedia Center, Osaka University.

    Science.gov (United States)

    Akiyama, Toyokazu; Teranishi, Yuuichi; Nozaki, Kazunori; Kato, Seiichi; Shimojo, Shinji; Peltier, Steven T; Lin, Abel; Molina, Tomas; Yang, George; Lee, David; Ellisman, Mark; Naito, Sei; Koike, Atsushi; Matsumoto, Shuichi; Yoshida, Kiyokazu; Mori, Hirotaro

    2005-10-01

    The Cybermedia Center (CMC), Osaka University, is a research institution that offers knowledge and technology resources obtained from advanced researches in the areas of large-scale computation, information and communication, multimedia content and education. Currently, CMC is involved in Japanese national Grid projects such as JGN II (Japan Gigabit Network), NAREGI and BioGrid. Not limited to Japan, CMC also actively takes part in international activities such as PRAGMA. In these projects and international collaborations, CMC has developed a Grid system that allows scientists to perform their analysis by remote-controlling the world's largest ultra-high voltage electron microscope located in Osaka University. In another undertaking, CMC has assumed a leadership role in BioGrid by sharing its experiences and knowledge on the system development for the area of biology. In this paper, we will give an overview of the BioGrid project and introduce the progress of the Telescience unit, which collaborates with the Telescience Project led by the National Center for Microscopy and Imaging Research (NCMIR). Furthermore, CMC collaborates with seven Computing Centers in Japan, NAREGI and National Institute of Informatics to deploy PKI base authentication infrastructure. The current status of this project and future collaboration with Grid Projects will be delineated in this paper.

  10. Influence of military component and deployment-related experiences on mental disorders among Canadian military personnel who deployed to Afghanistan: a cross-sectional survey

    Science.gov (United States)

    Boulos, David; Fikretoglu, Deniz

    2018-01-01

    Objective The primary objective was to explore differences in mental health problems (MHP) between serving Canadian Armed Forces (CAF) components (Regular Force (RegF); Reserve Force (ResF)) with an Afghanistan deployment and to assess the contribution of both component and deployment experiences to MHP using covariate-adjusted prevalence difference estimates. Additionally, mental health services use (MHSU) was descriptively assessed among those with a mental disorder. Design Data came from the 2013 CAF Mental Health Survey, a cross-sectional survey of serving personnel (n=72 629). Analyses were limited to those with an Afghanistan deployment (population n=35 311; sampled n=4854). Logistic regression compared MHP between RegF and ResF members. Covariate-adjusted prevalence differences were computed. Primary outcome measure The primary outcomes were MHP, past-year mental disorders, identified using the WHO’s Composite International Diagnostic Interview, and past-year suicide ideation. Results ResF personnel were less likely to be identified with a past-year anxiety disorder (adjusted OR (AOR)=0.72 (95% CI 0.58 to 0.90)), specifically both generalised anxiety disorder and panic disorder, but more likely to be identified with a past-year alcohol abuse disorder (AOR=1.63 (95% CI 1.04 to 2.58)). The magnitude of the covariate-adjusted disorder prevalence differences for component was highest for the any anxiety disorder outcome, 2.8% (95% CI 1.0 to 4.6); lower for ResF. All but one deployment-related experience variable had some association with MHP. The ‘ever felt responsible for the death of a Canadian or ally personnel’ experience had the strongest association with MHP; its estimated covariate-adjusted disorder prevalence difference was highest for the any (of the six measured) mental disorder outcome (11.2% (95% CI 6.6 to 15.9)). Additionally, ResF reported less past-year MHSU and more past-year civilian MHSU. Conclusions Past-year MHP differences were

  11. The Role of Natural Support Systems in the Post-deployment Adjustment of Active Duty Military Personnel.

    Science.gov (United States)

    Welsh, Janet A; Olson, Jonathan; Perkins, Daniel F; Travis, Wendy J; Ormsby, LaJuana

    2015-09-01

    This study examined the relations among three different types of naturally occurring social support (from romantic partners, friends and neighbors, and unit leaders) and three indices of service member well-being (self reports of depressive symptoms, satisfaction with military life, and perceptions of unit readiness) for service members who did and did not report negative experiences associated with military deployment. Data were drawn from the 2011 Community Assessment completed anonymously by more than 63,000 USAF personnel. Regression analyses revealed that higher levels of social support was associated with better outcomes regardless of negative deployment experiences. Evidence of moderation was also noted, with all forms of social support moderating the impact of negative deployment experiences on depressive symptoms and support from unit leaders moderating the impact of negative deployment experience on satisfaction with military life. No moderation was found for perceptions of unit readiness. Subgroup analyses revealed slightly different patterns for male and female service members, with support providing fewer moderation effects for women. These findings may have value for military leaders and mental health professionals working to harness the power of naturally occurring relationships to maximize the positive adjustment of service members and their families. Implications for practices related to re-integration of post-deployment military personnel are discussed.

  12. Evaluating PTSD on Reproductive Outcomes: Women Deployed in Iraq and Afghanistan

    Science.gov (United States)

    2009-10-01

    Center attacks and its effect on pregnancy outcome . Paediatric and Perinatal Epidemiology, 2005. 19(5): p. 334-41. 6. Xiong, X., et al., Exposure ...health system. Thus, the effect of women’s military service on reproductive outcomes is a key concern. Due to the unique situation of women in the... exposure to PTSD as a consequence of deployment is one example of recent concern. A recent study found women who had deployed to Iraq/Afghanistan

  13. Gender differences among veterans deployed in support of the wars in Afghanistan and Iraq.

    Science.gov (United States)

    Street, Amy E; Gradus, Jaimie L; Giasson, Hannah L; Vogt, Dawne; Resick, Patricia A

    2013-07-01

    The changing scope of women's roles in combat operations has led to growing interest in women's deployment experiences and post-deployment adjustment. To quantify the gender-specific frequency of deployment stressors, including sexual and non-sexual harassment, lack of social support and combat exposure. To quantify gender-specific post-deployment mental health conditions and associations between deployment stressors and posttraumatic stress disorder (PTSD), to inform the care of Veterans returning from the current conflicts. National mail survey of OEF/OIF Veterans randomly sampled within gender, with women oversampled. The community. In total, 1,207 female and 1,137 male Veterans from a roster of all Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) Veterans. Response rate was 48.6 %. Deployment stressors (including combat and harassment stress), PTSD, depression, anxiety and alcohol use, all measured via self-report. Women were more likely to report sexual harassment (OR = 8.7, 95% CI: 6.9, 11) but less likely to report combat (OR = 0.62, 95 % CI: 0.50, 0.76). Women and men were equally likely to report symptoms consistent with probable PTSD (OR = 0.87, 95 % CI: 0.70, 1.1) and symptomatic anxiety (OR = 1.1, 9 5% CI: 0.86, 1.3). Women were more likely to report probable depression (OR = 1.3, 95 % CI: 1.1, 1.6) and less likely to report problematic alcohol use (OR = 0.59, 9 5% CI: 0.47, 0.72). With a five-point change in harassment stress, adjusted odds ratios for PTSD were 1.36 (95 % CI: 1.23, 1.52) for women and 1.38 (95 % CI: 1.19, 1.61) for men. The analogous associations between combat stress and PTSD were 1.31 (95 % CI: 1.24, 1.39) and 1.31 (95 % CI: 1.26, 1.36), respectively. Although there are important gender differences in deployment stressors-including women's increased risk of interpersonal stressors-and post-deployment adjustment, there are also significant similarities. The post-deployment adjustment of our nation's growing population of

  14. Effects of Combat Deployment on Anthropometrics and Physiological Status of U.S. Army Special Operations Forces Soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Williams, Kelly W; Murphy, Nancy E; Margolis, Lee M; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-03-01

    U.S. Army Special Operations Forces (SOF) soldiers deploy frequently and conduct military operations through special warfare and surgical strike capabilities. Tasks required to execute these capabilities may induce physical and mental stress and have the potential to degrade soldier physiological status. No investigations have longitudinally characterized whether combat deployment alters anthropometrics or biochemical markers of physiological status in a SOF population of frequent deployers. Effects of modern combat deployment on longitudinal changes in anthropometrics and physiological status of elite U.S. Army SOF soldiers (n = 50) were assessed. Changes in measures of body composition, grip strength, physiological status, and health behaviors from baseline to postdeployment were determined with paired t test and McNemar's statistic. Baseline measures were obtained between 4 and 8 weeks before deployment. Deployment length was a uniform duration of time between 3 and 6 months (all soldiers completed the same length of deployment). Post hoc analyses determined change in body mass within quartiles of baseline body mass with paired t test and associations between change in sex hormone-binding globulin (SHBG) and change in body mass with correlation coefficient. The study was approved by the Human Use Review Committee at the U.S. Army Research Institute of Environmental Medicine, Natick, Massachusetts. In response to deployment, increases in lean mass (77.1 ± 7.6 to 77.8 ± 7.5 kg), maximum grip strength (57.9 ± 7.2 to 61.6 ± 8.8 kg), and conduct of aerobic (156 ± 106 to 250 ± 182 minutes/week) and strength training (190 ± 101 to 336 ± 251 minutes/week) exercise were observed (p < 0.05). Increases in serum SHBG (35.42 ± 10.68 to 38.77 ± 12.26 nmol/L) and decreases in serum cortisol (443.2 ± 79.3 to 381.9 ± 111.6 nmol/L) were also observed (p < 0.05). Body mass changes were dependent on baseline body mass. Soldiers in the lowest quartile of baseline body

  15. Vaginal yeast infections while deployed in Southwest/Central Asia, active component females, U.S. Armed Forces, 2008-2013.

    Science.gov (United States)

    2014-08-01

    In field settings, female service members may not have adequate access to bathrooms, showers, laundry, or sanitary products necessary to maintain adequate feminine hygiene; therefore, service women may be at risk for vaginal yeast infections while deployed. During the 6-year surveillance period, nearly 3,000 U.S. military service women were diagnosed with at least one clinically significant yeast infection while supporting combat operations in Southwest/Central Asia. The crude overall incidence rate was 35.1 per 1,000 person-years (p-yrs). Overall incidence rates were higher among black, non-Hispanic service women, and among those in the Army and Air Force, in enlisted grades, and in communications/intelligence and motor transport occupations. The yearly rate of yeast infections was relatively stable from 2008 through 2010, then decreased in 2011 through 2013. Prior to deploying to austere operational settings, female service members should be provided practical and useful information, realistic training, and material support to decrease the risk of acquiring and increase the effectiveness of treating clinically and military operationally significant yeast infections.

  16. Part 8. Deployment considerations

    International Nuclear Information System (INIS)

    Dance, K.D.; Chang, Y.I.; Daly, T.A.

    1980-01-01

    This report addresses considerations of fast breeder reactor development and deployment from a national perspective. Nations vary greatly in their expertise and interest relative to nuclear power, and hence a single set of steps to be taken by a nation in decision-making on breeder development and deployment cannot be presented. The approach taken in this report is to present discussions on key factors influencing the breeder development and deployment decisions, especially in non-breeder nations, by drawing upon historical perspectives of the Light Water Reactor for comparison

  17. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    OBJECTIVE: Insight on how different missions have impacted rates of mental health service (MHS) utilization is unexplored. We compared postdeployment MHS utilization in a national cohort of first-time deployed to missions in Balkan, Iraq, and Afghanistan respectively. METHODS: A prospective...... national cohort study of 13 246 first-time deployed in the period 1996 through 2012 to missions in Balkan area, Iraq, or Afghanistan respectively. Soldiers 'MHS utilization was also compared with a 5:1 sex-, age-, and calendar year-matched never-deployed background population. Postdeployment utilization...... of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  18. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  19. Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions

    OpenAIRE

    Anass RGHIOUI; Anass KHANNOUS; Mohammed BOUHORMA

    2014-01-01

    RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from intern...

  20. Diagnostic assays for active infection with human herpesvirus 6 (HHV-6).

    Science.gov (United States)

    Caserta, Mary T; Hall, Caroline Breese; Schnabel, Kenneth; Lofthus, Geraldine; Marino, Andrea; Shelley, Lynne; Yoo, Christina; Carnahan, Jennifer; Anderson, Linda; Wang, Hongyue

    2010-05-01

    Human herpesvirus 6 (HHV-6) causes ubiquitous infection in early childhood with lifelong latency or persistence. Reactivation of HHV-6 has been associated with multiple diseases including encephalitis. Chromosomal integration of HHV-6 also occurs. Previous studies have suggested that the detection of HHV-6 DNA in plasma is an accurate marker of active viral replication. We sought to determine whether PCR assays on plasma could correctly differentiate between primary HHV-6 infection, chromosomal integration of HHV-6 and latent HHV-6 infection. We performed qualitative PCR, real-time quantitative PCR (RQ-PCR), and reverse-transcriptase PCR (RT-PCR) assays on samples of peripheral and cord blood mononuclear cells, as well as plasma, from groups of subjects with well defined HHV-6 infection, including subjects with chromosomally integrated HHV-6. The detection of HHV-6 DNA in plasma was 92% sensitive compared to viral isolation for the identification of primary infection with HHV-6. All plasma samples from infants with chromosomally integrated HHV-6 had HHV-6 DNA detectable in plasma while only 5.6% were positive by RT-PCR. The specificity of plasma PCR for active replication of HHV-6 was 84% compared to viral culture while the specificity of RT-PCR was 98%. Our results demonstrate that qualitative or quantitative PCR of plasma is insufficient to distinguish between active viral replication and chromosomal integration with HHV-6. We found a higher specificity of RT-PCR performed on PBMC samples compared to PCR or RQ-PCR performed on plasma when evaluating samples for active HHV-6 replication. Copyright 2010 Elsevier B.V. All rights reserved.

  1. Space Situational Awareness of Large Numbers of Payloads From a Single Deployment

    Science.gov (United States)

    Segerman, A.; Byers, J.; Emmert, J.; Nicholas, A.

    2014-09-01

    The nearly simultaneous deployment of a large number of payloads from a single vehicle presents a new challenge for space object catalog maintenance and space situational awareness (SSA). Following two cubesat deployments last November, it took five weeks to catalog the resulting 64 orbits. The upcoming Kicksat mission will present an even greater SSA challenge, with its deployment of 128 chip-sized picosats. Although all of these deployments are in short-lived orbits, future deployments will inevitably occur at higher altitudes, with a longer term threat of collision with active spacecraft. With such deployments, individual scientific payload operators require rapid precise knowledge of their satellites' locations. Following the first November launch, the cataloguing did not initially associate a payload with each orbit, leaving this to the satellite operators. For short duration missions, the time required to identify an experiment's specific orbit may easily be a large fraction of the spacecraft's lifetime. For a Kicksat-type deployment, present tracking cannot collect enough observations to catalog each small object. The current approach is to treat the chip cloud as a single catalog object. However, the cloud dissipates into multiple subclouds and, ultimately, tiny groups of untrackable chips. One response to this challenge may be to mandate installation of a transponder on each spacecraft. Directional transponder transmission detections could be used as angle observations for orbit cataloguing. Of course, such an approach would only be employable with cooperative spacecraft. In other cases, a probabilistic association approach may be useful, with the goal being to establish the probability of an element being at a given point in space. This would permit more reliable assessment of the probability of collision of active spacecraft with any cloud element. This paper surveys the cataloguing challenges presented by large scale deployments of small spacecraft

  2. Light Duty Utility Arm deployment in Tank WM-188

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, M.W.

    1999-12-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of Non-Compliance (NON) Consent Order requirements and several other ongoing initiatives.

  3. Light Duty Utility Arm Deployment in Tank WM-188

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, Michael W

    2000-01-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of NonCompliance (NON) Consent Order requirements and several other ongoing initiatives.

  4. Light Duty Utility Arm deployment in Tank WM-188

    International Nuclear Information System (INIS)

    Patterson, M.

    1999-01-01

    The Light Duty Utility Arm (LDUA) was successfully deployed in Tank WM-188 during February and March of 1999 at the Idaho Nuclear Technology and Engineering Center (INTEC) tank farm at the Idaho National Engineering and Environmental Laboratory. Some equipment problems were identified, but most were indicative of any first time activity. Deployment during cold weather imposed additional equipment risks, but in general, equipment response to the winter conditions was better than expected. Three end effectors were demonstrated during the deployment. All performed as expected, although the limited resolution of the Alternating Current Field Measurement end effector cannot absolutely confirm tank integrity, which is necessary for future tank inspections. Four heel samples were taken with the sampler end effector and a broad spectrum of analyses were performed. A detailed inspection of the tank interior was performed with the High Resolution Stereo Video System end effector. The sample information is proving invaluable to the development of new treatment flowsheets and waste forms. It is expected that the LDUA will be deployed for tank inspections through the next several years to support other Notice of Non-Compliance (NON) Consent Order requirements and several other ongoing initiatives

  5. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  6. Determining the Optimal C-130 Deployed Crew Ratio

    Science.gov (United States)

    2014-06-13

    components. The active component operates at a 1:2 (with a goal of 1:3) deploy-to- dwell while the ARC plans a 1:5 ( Stenner , 2011, pp. 5, 10). This...Rand Corporation, 2011. Rand Corporation. Intratheater Airlift Functional Solution Analysis. Santa Monica: Rand Corporation, 2011. Stenner

  7. Assessing the PACE of California residential solar deployment: Impacts of Property Assessed Clean Energy programs on residential solar photovoltaic deployment in California, 2010-2015

    Energy Technology Data Exchange (ETDEWEB)

    Deason, Jeff; Murphy, Sean

    2018-04-04

    A new study by Berkeley Lab found that residential Property Assessed Clean Energy (R-PACE) programs increased deployment of residential solar photovoltaic (PV) systems in California, raising it by about 7-12% in cities that adopt these programs. R-PACE is a financing mechanism that uses a voluntary property tax assessment, paid off over time, to facilitate energy improvements and, in some jurisdictions, water and resilience measures. While previous studies demonstrated that early, regional R-PACE programs increased solar PV deployment, this new analysis is the first to demonstrate these impacts from the large, statewide R-PACE programs dominating the California market today, which use private capital to fund the upfront costs of the improvements. Berkeley Lab estimated the impacts using econometric techniques on two samples: -Large cities only, allowing annual demographic and economic data as control variables -All California cities, without these annual data Analysis of both samples controls for several factors other than R-PACE that would be expected to drive solar PV deployment. We infer that on average, cities with R-PACE programs were associated with greater solar PV deployment in our study period (2010-2015). In the large cities sample, solar PV deployment in jurisdictions with R-PACE programs was higher by 1.1 watts per owner-occupied household per month, or 12%. Across all cities, solar PV deployment in jurisdictions with R-PACE programs was higher by 0.6 watts per owner-occupied household per month, or 7%. The large cities results are statistically significant at conventional levels; the all-cities results are not. The estimates imply that the majority of solar PV deployment financed by R-PACE programs would likely not have occurred in their absence. Results suggest that R-PACE programs have increased PV deployment in California even in relatively recent years, as R-PACE programs have grown in market share and as alternate approaches for financing solar PV

  8. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  9. Stratus Ocean Reference Station (20 deg S, 85 deg W) Mooring Recovery and Deployment Cruise, R/V Ronald H. Brown Cruise 06-07, October 9-October 27, 2006

    National Research Council Canada - National Science Library

    Bigorre, Sebastien; Weller, Robert; Lord, Jeff; Whelan, Sean; Galbraith, Nancy; Wolfe, Dan; Bariteau, Ludovic; Ghate, Virendra; Zajaczkovski, Uriel; Vera, Alvaro

    2007-01-01

    .... During the October 2006 cruise of NOAA's R/V Ronald H. Brown to the ORS Stratus site, the primary activities where recovery of the Stratus 6 WHOI surface mooring that had been deployed in October...

  10. Influence of military component and deployment-related experiences on mental disorders among Canadian military personnel who deployed to Afghanistan: a cross-sectional survey.

    Science.gov (United States)

    Boulos, David; Fikretoglu, Deniz

    2018-03-12

    The primary objective was to explore differences in mental health problems (MHP) between serving Canadian Armed Forces (CAF) components (Regular Force (RegF); Reserve Force (ResF)) with an Afghanistan deployment and to assess the contribution of both component and deployment experiences to MHP using covariate-adjusted prevalence difference estimates. Additionally, mental health services use (MHSU) was descriptively assessed among those with a mental disorder. Data came from the 2013 CAF Mental Health Survey, a cross-sectional survey of serving personnel (n=72 629). Analyses were limited to those with an Afghanistan deployment (population n=35 311; sampled n=4854). Logistic regression compared MHP between RegF and ResF members. Covariate-adjusted prevalence differences were computed. The primary outcomes were MHP, past-year mental disorders, identified using the WHO's Composite International Diagnostic Interview, and past-year suicide ideation. ResF personnel were less likely to be identified with a past-year anxiety disorder (adjusted OR (AOR)=0.72 (95% CI 0.58 to 0.90)), specifically both generalised anxiety disorder and panic disorder, but more likely to be identified with a past-year alcohol abuse disorder (AOR=1.63 (95% CI 1.04 to 2.58)). The magnitude of the covariate-adjusted disorder prevalence differences for component was highest for the any anxiety disorder outcome, 2.8% (95% CI 1.0 to 4.6); lower for ResF. All but one deployment-related experience variable had some association with MHP. The 'ever felt responsible for the death of a Canadian or ally personnel' experience had the strongest association with MHP; its estimated covariate-adjusted disorder prevalence difference was highest for the any (of the six measured) mental disorder outcome (11.2% (95% CI 6.6 to 15.9)). Additionally, ResF reported less past-year MHSU and more past-year civilian MHSU. Past-year MHP differences were identified between components. Our findings suggest that although

  11. Staged deployment of the International Fusion Materials Irradiation Facility

    International Nuclear Information System (INIS)

    Takeuchi, H.; Sugimoto, M.; Nakamura, H.

    2001-01-01

    The International Fusion Materials Irradiation Facility (IFMIF) employs an accelerator based D-Li intense neutron source as defined in the 1995-96 Conceptual Design Activity (CDA) study. In 1999, IEA mandated a review of the CDA IFMIF design for cost reduction without change to its original mission. This objective was accomplished by eliminating the previously assumed possibility of potential upgrade of IFMIF beyond the user requirements. The total estimated cost was reduced from $797.2 M to $487.8 M. An option of deployment in 3 stages was also examined to reduce the initial investment and annual expenditures during construction. In this scenario, full performance is achieved gradually with each interim stage as follows. 1st Stage: 20% operation for material selection for ITER breeding blanket, 2nd Stage: 50% operation to demonstrate materials performance of a reference alloy for DEMO, 3rd Stage: full performance operation ( 2MW/m 2 at 500cm 3 ) to obtain engineering data for potential DEMO materials under irradiation up to 100-200 dpa. In summary, the new, reduced cost IFMIF design and staged deployment still satisfies the original mission. The estimated cost of the 1st Stage facility is only $303.6 M making it financially much more attractive. Currently, IFMIF Key Element Technology Phase (KEP) is underway to reduce the key technology risk factors. (author)

  12. The impact of antecedent trauma exposure and mental health symptoms on the post-deployment mental health of Afghanistan-deployed Australian troops.

    Science.gov (United States)

    Searle, Amelia K; Van Hooff, Miranda; Lawrence-Wood, Ellie R; Grace, Blair S; Saccone, Elizabeth J; Davy, Carol P; Lorimer, Michelle; McFarlane, Alexander C

    2017-10-01

    Both traumatic deployment experiences and antecedent traumas increase personnel's risk of developing PTSD and depression. However, only cross-sectional studies have assessed whether antecedent trauma moderates stress reactions to deployment experiences. This study prospectively examines whether antecedent trauma moderates the association between deployment trauma and post-deployment PTSD and depressive symptoms after accounting for antecedent mental health problems, in a large Australian Defence Force (ADF) sample. In the ADF Middle East Area of Operations Prospective Study, currently-serving military personnel deployed to Afghanistan across 2010-2012 (n = 1122) completed self-reported measures at pre-deployment and post-deployment. Within multivariable regressions, associations between deployment trauma and PTSD and depressive symptoms at post-deployment were stronger for personnel with greater antecedent trauma. However, once adjusting for antecedent mental health problems, these significant interaction effects disappeared. Instead, deployment-related trauma and antecedent mental health problems showed direct associations with post-deployment mental health problems. Antecedent trauma was also indirectly associated with post-deployment mental health problems through antecedent mental health problems. Similar associations were seen with prior combat exposure as a moderator. Antecedent and deployment trauma were reported retrospectively. Self-reports may also suffer from social desirability bias, especially at pre-deployment. Our main effects results support the pervasive and cumulative negative effect of trauma on military personnel, regardless of its source. While antecedent trauma does not amplify personnel's psychological response to deployment trauma, it is indirectly associated with increased post-deployment mental health problems. Antecedent mental health should be considered within pre-deployment prevention programs, and deployment-trauma within post

  13. 48 CFR 11.002 - Policy.

    Science.gov (United States)

    2010-10-01

    ... significant inefficiencies or loss of markets to United States firms. Requiring activities are responsible for... the USGv6 Test Program. The applicability of IPv6 to agency networks, infrastructure, and applications...

  14. 5-Beam ADCP Deployment Strategy Considerations

    Science.gov (United States)

    Moore, T.; Savidge, D. K.; Gargett, A.

    2016-02-01

    With the increasing availability of 5 beam ADCPs and expanding opportunities for their deployment within both observatory and dedicated process study settings, refinements in deployment strategies are needed.Measuring vertical velocities directly with a vertically oriented acoustic beam requires that the instrument be stably mounted and leveled within fractions of a degree. Leveled shallow water deployments to date have utilized divers to jet pipes into the sand for stability, manually mount the instruments on the pipes, and level them. Leveling has been guided by the deployed instrument's pitch and roll output, available in real-time because of the observatory settings in which the deployments occurred. To expand the range of feasible deployments to deeper, perhaps non-real-time capable settings, alternatives to diver deployment and leveling must be considered. To determine stability requirements, mooring motion (heading, pitch and roll) has been sampled at 1Hz by gimballed ADCPs at a range of instrument deployment depths, and in shrouded and unshrouded cages. Conditions under which ADCP cages resting on the bottom experience significant shifts in tilt, roll or heading are assessed using co-located wind and wave measurements. The accuracy of estimating vertical velocities using all five beams relative to a well leveled vertical single beam is assessed from archived high frequency five beam data, to explore whether easing the leveling requirement is feasible.

  15. Risk assessment with current deployment strategies for fusiform rust-resistant loblolly and slash pines

    Science.gov (United States)

    Floyd Bridgwater; Tom Kubisiak; Tom Byram; Steve Mckeand

    2004-01-01

    In the southeastern USA, fusiform rust resistant loblolly and slash pines may be deployed as 1) ulked seed orchard mixes. 2) half-sibling (sib) family mixtures. 3) single half-sib families. 4) full-sib cross seeds or as 6) clones of individual genotypes. These deployment types are respectively greater genetic gains from higher selection intensity. Currently, bulked...

  16. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  17. Work stressors, depressive symptoms and sleep quality among US Navy members: a parallel process latent growth modelling approach across deployment.

    Science.gov (United States)

    Bravo, Adrian J; Kelley, Michelle L; Swinkels, Cindy M; Ulmer, Christi S

    2017-11-03

    The present study examined whether work stressors contribute to sleep problems and depressive symptoms over the course of deployment (i.e. pre-deployment, post-deployment and 6-month reintegration) among US Navy members. Specifically, we examined whether depressive symptoms or sleep quality mediate the relationships between work stressors and these outcomes. Participants were 101 US Navy members who experienced an 8-month deployment after Operational Enduring Freedom/Operation Iraqi Freedom. Using piecewise latent growth models, we found that increased work stressors were linked to increased depressive symptoms and decreased sleep quality across all three deployment stages. Further, increases in work stressors from pre- to post-deployment contributed to poorer sleep quality post-deployment via increasing depressive symptoms. Moreover, sleep quality mediated the association between increases in work stressors and increases in depressive symptoms from pre- to post-deployment. These effects were maintained from post-deployment through the 6-month reintegration. Although preliminary, our results suggest that changes in work stressors may have small, but significant implications for both depressive symptoms and quality of sleep over time, and a bi-directional relationship persists between sleep quality and depression across deployment. Strategies that target both stress and sleep could address both precipitating and perpetuating factors that affect sleep and depressive symptoms. © 2017 European Sleep Research Society.

  18. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  19. Computational modeling of interventions and protective thresholds to prevent disease transmission in deploying populations.

    Science.gov (United States)

    Burgess, Colleen; Peace, Angela; Everett, Rebecca; Allegri, Buena; Garman, Patrick

    2014-01-01

    Military personnel are deployed abroad for missions ranging from humanitarian relief efforts to combat actions; delay or interruption in these activities due to disease transmission can cause operational disruptions, significant economic loss, and stressed or exceeded military medical resources. Deployed troops function in environments favorable to the rapid and efficient transmission of many viruses particularly when levels of protection are suboptimal. When immunity among deployed military populations is low, the risk of vaccine-preventable disease outbreaks increases, impacting troop readiness and achievement of mission objectives. However, targeted vaccination and the optimization of preexisting immunity among deployed populations can decrease the threat of outbreaks among deployed troops. Here we describe methods for the computational modeling of disease transmission to explore how preexisting immunity compares with vaccination at the time of deployment as a means of preventing outbreaks and protecting troops and mission objectives during extended military deployment actions. These methods are illustrated with five modeling case studies for separate diseases common in many parts of the world, to show different approaches required in varying epidemiological settings.

  20. Computational Modeling of Interventions and Protective Thresholds to Prevent Disease Transmission in Deploying Populations

    Directory of Open Access Journals (Sweden)

    Colleen Burgess

    2014-01-01

    Full Text Available Military personnel are deployed abroad for missions ranging from humanitarian relief efforts to combat actions; delay or interruption in these activities due to disease transmission can cause operational disruptions, significant economic loss, and stressed or exceeded military medical resources. Deployed troops function in environments favorable to the rapid and efficient transmission of many viruses particularly when levels of protection are suboptimal. When immunity among deployed military populations is low, the risk of vaccine-preventable disease outbreaks increases, impacting troop readiness and achievement of mission objectives. However, targeted vaccination and the optimization of preexisting immunity among deployed populations can decrease the threat of outbreaks among deployed troops. Here we describe methods for the computational modeling of disease transmission to explore how preexisting immunity compares with vaccination at the time of deployment as a means of preventing outbreaks and protecting troops and mission objectives during extended military deployment actions. These methods are illustrated with five modeling case studies for separate diseases common in many parts of the world, to show different approaches required in varying epidemiological settings.

  1. IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Li MA

    2014-07-01

    Full Text Available The emergence of 6LoWPAN makes it possible that Wireless Sensor Networks access to the Internet. However, the cost of IP communication between 6LoWPAN wireless sensor node and external internet node is still relatively high. This paper proposed a new addressing configuration and compression scheme in 6LoWPAN network called IPHC-NAT, which largely reduced the proportion of the IP header in 6LoWPAN packet, designed and constructed a bidirectional data transmission gateway to connect 6LoWPAN wireless sensor node with IPv6 client. The experimental results show the feasibility of the design of IPHC-NAT and the data transmission efficiency has significantly been improved compared to the original 6LoWPAN network.

  2. The Stability of Intimate Partner Violence Perpetration From Adolescence to Emerging Adulthood in Sexual Minorities.

    Science.gov (United States)

    Shorey, Ryan C; Fite, Paula J; Cohen, Joseph R; Stuart, Gregory L; Temple, Jeff R

    2018-06-01

    The objective of this study was to examine the stability of physical and sexual intimate partner violence (IPV) perpetration from adolescence to emerging adulthood among sexual minorities. Adolescents who identified as a sexual minority (N = 135; 71.1% female; mean age = 15.02, standard deviation=.77; 34.1% African-American/black, 26.7% white, 22.2% Hispanic) from southeast Texas were assessed annually for 6 years on their IPV perpetration. Structural equation modeling demonstrated that physical IPV perpetration was modestly stable across years 1-4 (24.6%, 24.6%, 26.4%, and 21.6%, respectively), decreased in year 5 (18.6%), and increased in year 6 (24.5%). The stability of sexual IPV perpetration was high across all 6 years (14.3%, 13%, 14.9%, 10.8%, 12.4%, and 14.4%). This is the first study to examine the stability of IPV perpetration among sexual minority adolescents. Findings suggest that the development of interventions for IPV among sexual minority adolescents is needed, as IPV is unlikely to desist from adolescence to emerging adulthood. Copyright © 2017 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. Development and modeling of self-deployable structures

    Science.gov (United States)

    Neogi, Depankar

    Deployable space structures are prefabricated structures which can be transformed from a closed, compact configuration to a predetermined expanded form in which they are stable and can bear loads. The present research effort investigates a new family of deployable structures, called the Self-Deployable Structures (SDS). Unlike other deployable structures, which have rigid members, the SDS members are flexible while the connecting joints are rigid. The joints store the predefined geometry of the deployed structure in the collapsed state. The SDS is stress-free in both deployed and collapsed configurations and results in a self-standing structure which acquires its structural properties after a chemical reaction. Reliability of deployment is one of the most important features of the SDS, since it does not rely on mechanisms that can lock during deployment. The unit building block of these structures is the self-deployable structural element (SDSE). Several SDSE members can be linked to generate a complex building block such as a triangular or a tetrahedral structure. Different SDSE and SDS concepts are investigated in the research work, and the performance of SDS's are experimentally and theoretically explored. Triangular and tetrahedral prototype SDS have been developed and presented. Theoretical efforts include modeling the behavior of 2-dimensional SDSs. Using this design tool, engineers can study the effects of different packing configurations and deployment sequence; and perform optimization on the collapsed state of a structure with different external constraints. The model also predicts if any lockup or entanglement occurs during deployment.

  4. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  5. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    emphasis on wireless networks, distributed ... their own processing power, memory and other resources. The interconnection may be ... Networks that transfer data in the form of packets are called packet switched networks. Here, the data to.

  6. Sleep quality of German soldiers before, during and after deployment in Afghanistan-a prospective study.

    Science.gov (United States)

    Danker-Hopfe, Heidi; Sauter, Cornelia; Kowalski, Jens T; Kropp, Stefan; Ströhle, Andreas; Wesemann, Ulrich; Zimmermann, Peter L

    2017-06-01

    In this prospective study, subjective sleep quality and excessive daytime sleepiness prior to, during and after deployment of German soldiers in Afghanistan were examined. Sleep quality (Pittsburgh Sleep Quality Index; PSQI) and daytime sleepiness (Epworth Sleepiness Scale; ESS) were assessed in 118 soldiers of the German army, who were deployed in Afghanistan for 6 months (deployment group: DG) and in 146 soldiers of a non-deployed control group (CG) at baseline. Results of the longitudinal analysis are reported, based on assessments conducted prior to, during the deployment and afterwards in the DG, and in the CG in parallel. Sleep quality and daytime sleepiness in the DG were already impaired during the predeployment training phase and remained at that level during the deployment phase, which clearly indicates the need for more attention on sleep in young soldiers, already at this early stage. The percentage of impaired sleepers decreased significantly after deployment. Programmes to teach techniques to improve sleep and reduce stress should be implemented prior to deployment to reduce sleep difficulties and excessive daytime sleepiness and subsequent psychiatric disorders. © 2017 European Sleep Research Society.

  7. Advanced Deployable Structural Systems for Small Satellites

    Science.gov (United States)

    Belvin, W. Keith; Straubel, Marco; Wilkie, W. Keats; Zander, Martin E.; Fernandez, Juan M.; Hillebrandt, Martin F.

    2016-01-01

    One of the key challenges for small satellites is packaging and reliable deployment of structural booms and arrays used for power, communication, and scientific instruments. The lack of reliable and efficient boom and membrane deployment concepts for small satellites is addressed in this work through a collaborative project between NASA and DLR. The paper provides a state of the art overview on existing spacecraft deployable appendages, the special requirements for small satellites, and initial concepts for deployable booms and arrays needed for various small satellite applications. The goal is to enhance deployable boom predictability and ground testability, develop designs that are tolerant of manufacturing imperfections, and incorporate simple and reliable deployment systems.

  8. iPhone with Microsoft Exchange Server 2010 Business Integration and Deployment

    CERN Document Server

    Goodman, Steve

    2012-01-01

    iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment is a practical, step-by-step tutorial on planning, installing and configuring Exchange Server to deploy iPhones into your business. This book is aimed at system administrators who don't necessarily know about Exchange Server 2010 or ActiveSync-based mobile devices. A basic level of knowledge around Windows Servers is expected, and knowledge of smartphones and email systems in general will make some topics a little easier.

  9. Relation of Childhood Sexual Abuse, Intimate Partner Violence, and Depression to Risk Factors for HIV Among Black Men Who Have Sex With Men in 6 US Cities.

    Science.gov (United States)

    Williams, John K; Wilton, Leo; Magnus, Manya; Wang, Lei; Wang, Jing; Dyer, Typhanye Penniman; Koblin, Beryl A; Hucks-Ortiz, Christopher; Fields, Sheldon D; Shoptaw, Steve; Stephenson, Rob; O'Cleirigh, Conall; Cummings, Vanessa

    2015-12-01

    We assessed the relation of childhood sexual abuse (CSA), intimate partner violence (IPV), and depression to HIV sexual risk behaviors among Black men who have sex with men (MSM). Participants were 1522 Black MSM recruited from 6 US cities between July 2009 and December 2011. Univariate and multivariable logistic regression models were used. Participants reported sex before age 12 years with someone at least 5 years older (31.1%), unwanted sex when aged 12 to 16 years (30%), IPV (51.8%), and depression (43.8%). Experiencing CSA when aged 12 to 16 years was inversely associated with any receptive condomless anal sex with a male partner (adjusted odds ratio [AOR] = 0.50; 95% confidence interval [CI] = 0.29, 0.86). Pressured or forced sex was positively associated with any receptive anal sex (AOR = 2.24; 95% CI = 1.57, 3.20). Experiencing CSA when younger than 12 years, physical abuse, emotional abuse, having been stalked, and pressured or forced sex were positively associated with having more than 3 male partners in the past 6 months. Among HIV-positive MSM (n = 337), CSA between ages 12 and 16 years was positively associated with having more than 3 male partners in the past 6 months. Rates of CSA, IPV, and depression were high, but associations with HIV sexual risk outcomes were modest.

  10. Effect of KOH concentration on LEO cycle life of IPV nickel-hydrogen flight cells-update 2

    Science.gov (United States)

    Smithrick, John J.; Hall, Stephen W.

    1991-01-01

    An update of validation test results confirming the breakthrough in low earth orbit (LEO) cycle life of nickel-hydrogen cells containing 26 percent KOH electrolyte is presented. A breakthrough in the LEO cycle life of individual pressure vessel (IPV nickel-hydrogen cells has been previously reported. The cycle life of boiler plate cells containing 26 percent potassium hydroxide (KOH) electrolyte was about 40 000 LEO cycles compared to 3500 cycles for cells containing 31 percent KOH. This test was conducted at Hughes Aircraft Company under a NASA Lewis contract. The purpose was to investigate the effect of KOH concentration on cycle life. The cycle regime was a stressful accelerated LEO, which consisted of a 27.5 min charge followed by a 17.5 min discharge (2x normal rate). The depth of discharge (DOD) was 80 percent. The cell temperature was maintained at 23 C. The boiler plate test results are in the process of being validated using flight hardware and real time LEO test at the Naval Weapons Support Center (NWSC), Crane, Indiana under a NASA Lewis Contract. Six 48 Ah Hughes recirculation design IPV nickel-hydrogen flight battery cells are being evaluated. Three of the cells contain 26 percent KOH (test cells), and three contain 31 percent KOH (control cells). They are undergoing real time LEO cycle life testing. The cycle regime is a 90-min LEO orbit consisting of a 54-min charge followed by a 36-min discharge. The depth-of-discharge is 80 percent. The cell temperature is maintained at 10 C. The three 31 percent KOH cells failed (cycles 3729, 4165, and 11355). One of the 26 percent KOH cells failed at cycle 15314. The other two 26 percent KOH cells were cycled for over 16600 cycles during the continuing test.

  11. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  12. Patterns of Intimate Partner Violence and Sexual Risk Behavior among Young Heterosexually Active Men.

    Science.gov (United States)

    Casey, Erin A; Querna, Katherine; Masters, N Tatiana; Beadnell, Blair; Wells, Elizabeth A; Morrison, Diane M; Hoppe, Marilyn J

    2016-01-01

    Intimate partner violence (IPV) victimization is linked to sexual risk exposure among women. However, less is known about the intersection of IPV perpetration and sexual risk behavior among men. This study used data from a diverse, community sample of 334 heterosexually active young men, aged 18 to 25, across the United States to examine whether and how men with distinct IPV-related behavior patterns differed in sexual risk-related behavior and attitudes. Participants were recruited and surveyed online, and grouped conceptually based on the types of IPV perpetration behavior(s) used in a current or recent romantic relationship. Groups were then compared on relevant sexual risk variables. Men reporting both physical abuse and sexual coercion against intimate partners reported significantly higher numbers of lifetime partners, higher rates of nonmonogamy, greater endorsement of nonmonogamy, and less frequent condom use relative to nonabusive men or those reporting controlling behavior only. This group also had higher sexually transmitted infection (STI) exposure compared to men who used controlling behavior only and men who used sexual coercion only. Findings suggest that interventions with men who use physical and sexual violence need to account for not only the physical and psychological harm of this behavior but also the sexual risk to which men may expose their partners.

  13. Evaluation of DELTA PREP: A Project Aimed at Integrating Primary Prevention of Intimate Partner Violence Within State Domestic Violence Coalitions

    Science.gov (United States)

    Freire, Kimberley E.; Zakocs, Ronda; Le, Brenda; Hill, Jessica A.; Brown, Pamela; Wheaton, Jocelyn

    2018-01-01

    Background Intimate partner violence (IPV) has been recognized as a public health problem since the late 20th century. To spur IPV prevention efforts nationwide, the DELTA PREP Project selected 19 state domestic violence coalitions to build organizational prevention capacity and catalyze IPV primary prevention strategies within their states. Objective DELTA PREP’s summative evaluation addressed four major questions: (1) Did coalitions improve their prevention capacity during the project period? (2) Did coalitions serve as catalysts for prevention activities within their states during the project period? (3) Was initial prevention capacity associated with the number of prevention activity types initiated by coalitions by the end of the project? (4) Did coalitions sustain their prevention activities 6 months after the end of the project period? Results DELTA PREP achieved its capacity-building goal, with all 19 participant coalitions integrating prevention within their organizations and serving as catalysts for prevention activities in their states. At 6 months follow up, coalitions had sustained almost all prevention activities they initiated during the project. Baseline prevention capacity (Beginner vs. Intermediate) was not associated with the number of prevention activity types coalitions implemented by the end of the project. Conclusion Service and treatment organizations are increasingly asked to integrate a full spectrum of prevention strategies. Selecting organizations that have high levels of general capacity and readiness for an innovation like integrating a public health approach to IPV prevention will likely increase success in building an innovation-specific capacity, and in turn implementing an innovation. PMID:26245932

  14. Surrogate Joint Aerial Layer Network (JALN) Experiment: Applications of Commercial-Off-The-Shelf Technologies for Researching Future JALN Challenges

    Science.gov (United States)

    2014-12-01

    built-in device models. 6.2 Address Structure The address structure should also be reinvestigated. IPv6 offers addresses to automatically... IPv6 , Second Edition by Joseph Davies. Approved for Public Release; Distribution Unlimited. 36 8.0 LIST OF SYMBOLS, ABBREVIATIONS, AND...Graphical User Interface HTTP Hyper Text Transfer Protocol ICMP Internet Message Control Protocol IPv6 Internet Protocol version 6 JALN

  15. Structures and Mechanisms Design Concepts for Adaptive Deployable Entry Placement Technology

    Science.gov (United States)

    Yount, Bryan C.; Arnold, James O.; Gage, Peter J.; Mockelman, Jeffrey; Venkatapathy, Ethiraj

    2012-01-01

    System studies have shown that large deployable aerodynamic decelerators such as the Adaptive Deployable Entry and Placement Technology (ADEPT) concept can revolutionize future robotic and human exploration missions involving atmospheric entry, descent and landing by significantly reducing the maximum heating rate, total heat load, and deceleration loads experienced by the spacecraft during entry [1-3]. ADEPT and the Hypersonic Inflatable Aerodynamic Decelerator (HIAD) [4] share the approach of stowing the entry system in the shroud of the launch vehicle and deploying it to a much larger diameter prior to entry. The ADEPT concept provides a low ballistic coefficient for planetary entry by employing an umbrella-like deployable structure consisting of ribs, struts and a fabric cover that form an aerodynamic decelerator capable of undergoing hypersonic flight. The ADEPT "skin" is a 3-D woven carbon cloth that serves as a thermal protection system (TPS) and as a structural surface that transfers aerodynamic forces to the underlying ribs [5]. This paper focuses on design activities associated with integrating ADEPT components (cloth, ribs, struts and mechanisms) into a system that can function across all configurations and environments of a typical mission concept: stowed during launch, in-space deployment, entry, descent, parachute deployment and separation from the landing payload. The baseline structures and mechanisms were selected via trade studies conducted during the summer and fall of 2012. They are now being incorporated into the design of a ground test article (GTA) that will be fabricated in 2013. It will be used to evaluate retention of the stowed configuration in a launch environment, mechanism operation for release, deployment and locking, and static strength of the deployed decelerator. Of particular interest are the carbon cloth interfaces, underlying hot structure, (Advanced Carbon- Carbon ribs) and other structural components (nose cap, struts, and

  16. CMS Results of Grid-related activities using the early deployed LCG Implementations

    CERN Document Server

    Coviello, Tommaso; De Filippis, Nicola; Donvito, Giacinto; Maggi, Giorgio; Pierro, A; Bonacorsi, Daniele; Capiluppi, Paolo; Fanfani, Alessandra; Grandi, Claudio; Maroney, Owen; Nebrensky, H; Donno, Flavia; Jank, Werner; Sciabà, Andrea; Sinanis, Nick; Colling, David; Tallini, Hugh; MacEvoy, Barry C; Wang, Shaowen; Kaiser, Joseph; Osman, Asif; Charlot, Claude; Semenjouk, I; Biasotto, Massimo; Fantinel, Sergio; Corvo, Marco; Fanzago, Federica; Mazzucato, Mirco; Verlato, Marco; Go, Apollo; Khan Chia Ming; Andreozzi, S; Cavalli, A; Ciaschini, V; Ghiselli, A; Italiano, A; Spataro, F; Vistoli, C; Tortone, G

    2004-01-01

    The CMS Experiment is defining its Computing Model and is experimenting and testing the new distributed features offered by many Grid Projects. This report describes use by CMS of the early-deployed systems of LCG (LCG-0 and LCG-1). Most of the used features here discussed came from the EU implemented middleware, even if some of the tested capabilities were in common with the US developed middleware. This report describes the simulation of about 2 million of CMS detector events, which were generated as part of the official CMS Data Challenge 04 (Pre-Challenge-Production). The simulations were done on a CMS-dedicated testbed (CMS-LCG-0), where an ad-hoc modified version of the LCG-0 middleware was deployed and where the CMS Experiment had a complete control, and on the official early LCG delivered system (with the LCG-1 version). Modifications to the CMS simulation tools for events produc tion where studied and achieved, together with necessary adaptations of the middleware services. Bilateral feedback (betwee...

  17. Non-traditional Infrasound Deployment

    Science.gov (United States)

    McKenna, M. H.; McComas, S.; Simpson, C. P.; Diaz-Alvarez, H.; Costley, R. D.; Hayward, C.; Golden, P.; Endress, A.

    2017-12-01

    Historically, infrasound arrays have been deployed in rural environments where anthropological noise sources are limited. As interest in monitoring low energy sources at local distances grows in the infrasound community, it will be vital to understand how to monitor infrasound sources in an urban environment. Arrays deployed in urban centers have to overcome the decreased signal-to-noise ratio and reduced amount of real estate available to deploy an array. To advance the understanding of monitoring infrasound sources in urban environments, local and regional infrasound arrays were deployed on building rooftops on the campus at Southern Methodist University (SMU), and data were collected for one seasonal cycle. The data were evaluated for structural source signals (continuous-wave packets), and when a signal was identified, the back azimuth to the source was determined through frequency-wavenumber analysis. This information was used to identify hypothesized structural sources; these sources were verified through direct measurement and dynamic structural analysis modeling. In addition to the rooftop arrays, a camouflaged infrasound sensor was installed on the SMU campus and evaluated to determine its effectiveness for wind noise reduction. Permission to publish was granted by Director, Geotechnical and Structures Laboratory.

  18. Deployable Brake for Spacecraft

    Science.gov (United States)

    Rausch, J. R.; Maloney, J. W.

    1987-01-01

    Aerodynamic shield that could be opened and closed proposed. Report presents concepts for deployable aerodynamic brake. Brake used by spacecraft returning from high orbit to low orbit around Earth. Spacecraft makes grazing passes through atmosphere to slow down by drag of brake. Brake flexible shield made of woven metal or ceramic withstanding high temperatures created by air friction. Stored until needed, then deployed by set of struts.

  19. Severe Neuropsychiatric Reaction in a Deployed Military Member after Prophylactic Mefloquine

    Directory of Open Access Journals (Sweden)

    Alan L. Peterson

    2011-01-01

    Full Text Available Recent studies of military personnel who have deployed to Iraq and Afghanistan have reported a number of combat-related psychiatric disorders such as posttraumatic stress disorder, depression, and traumatic brain injury. This case report involves a 27-year-old male active-duty US military service member who developed severe depression, psychotic hallucinations, and neuropsychological sequelae following the prophylactic use of the antimalarial medication mefloquine hydrochloride. The patient had a recent history of depression and was taking antidepressant medications at the time of his deployment to the Middle East. Psychiatrists and other health care providers should be aware of the possible neuropsychiatric side effects of mefloquine in deployed military personnel and should consider the use of other medications for malaria prophylaxis in those individuals who may be at increased risk for side effects.

  20. Modeling the spread of polio in an IPV-vaccinated population: lessons learned from the 2013 silent outbreak in southern Israel.

    Science.gov (United States)

    Yaari, Rami; Kaliner, Ehud; Grotto, Itamar; Katriel, Guy; Moran-Gilad, Jacob; Sofer, Danit; Mendelson, Ella; Miller, Elizabeth; Huppert, Amit; Anis, E; Kopel, E; Manor, Y; Mor, O; Shulman, L; Singer, R; Weil, M

    2016-06-23

    Polio eradication is an extraordinary globally coordinated health program in terms of its magnitude and reach, leading to the elimination of wild poliovirus (WPV) in most parts of the world. In 2013, a silent outbreak of WPV was detected in Israel, a country using an inactivated polio vaccine (IPV) exclusively since 2005. The outbreak was detected using environmental surveillance (ES) of sewage reservoirs. Stool surveys indicated the outbreak to be restricted mainly to children under the age of 10 in the Bedouin population of southern Israel. In order to curtail the outbreak, a nationwide vaccination campaign using oral polio vaccine (OPV) was conducted, targeting all children under 10. A transmission model, fitted to the results of the stool surveys, with additional conditions set by the ES measurements, was used to evaluate the prevalence of WPV in Bedouin children and the effectiveness of the vaccination campaign. Employing the parameter estimates of the model fitting, the model was used to investigate the effect of alternative timings, coverages and dosages of the OPV campaign on the outcome of the outbreak. The mean estimate for the mean reproductive number was 1.77 (95 % credible interval, 1.46-2.30). With seasonal variation, the reproductive number maximum range was between zero and six. The mean estimate for the mean infectious periods was 16.8 (8.6-24.9) days. The modeling indicates the OPV campaign was effective in curtailing the outbreak. The mean estimate for the attack rate in Bedouin children under 10 at the end of 2014 was 42 % (22-65 %), whereas without the campaign the mean projected attack rate was 57 % (35-74 %). The campaign also likely shortened the duration of the outbreak by a mean estimate of 309 (2-846) days. A faster initiation of the OPV campaign could have reduced the incidence of WPV even if a lower coverage was reached, at the risk of prolonging the outbreak. OPV campaigns are essential for interrupting WPV transmission, even in a

  1. Aging in the Shadow of Violence: A Phenomenological Conceptual Framework for Understanding Elderly Women Who Experienced Lifelong IPV.

    Science.gov (United States)

    Band-Winterstein, Tova

    2015-01-01

    This article suggests a heuristic framework for understanding elderly women's "lived experience" of lifelong intimate partner violence (IPV). This framework is based on the phenomenological qualitative studies of 31 women, aged 60-83, using a semistructured interview guide. From the results, a matrix emerged built on two axes. The first axis consists of three phenomenological dimensions: suffering, a "ticking clock," and life wisdom. The second axis consists of four themes that emerged from the content analysis: loneliness, regret, being in a state of waiting, and being a living monument to perpetual victimhood. The practical implications of these phenomenological findings are then discussed.

  2. Non-Deployable Soldiers: Understanding the Army’s Challenge

    Science.gov (United States)

    2011-05-07

    Effects ( MFE ) specialties. As reflected in table 3, most Soldiers opted for DEIP within 90 days of LAD or after deployment.86 Unit Type from LAD...Eligible Takers Take % BCTs ៊ / Dep 14935 5163 34.6% 91-180 6663 1246 18.7% 181+ 841 89 10.6% Total 22439 6498 29.0% MFE ៊ / Dep 8352 2232 26.7% 91...MEDPROS Medical Protection System MFE Maneuver, Fires, and Effects MILPER Military Personnel [message] MMC Medical Management

  3. Accommodating Thickness in Origami-Based Deployable Arrays

    Science.gov (United States)

    Zirbel, Shannon A.; Magleby, Spencer P.; Howell, Larry L.; Lang, Robert J.; Thomson, Mark W.; Sigel, Deborah A.; Walkemeyer, Phillip E.; Trease, Brian P.

    2013-01-01

    The purpose of this work is to create deployment systems with a large ratio of stowed-to-deployed diameter. Deployment from a compact form to a final flat state can be achieved through origami-inspired folding of panels. There are many models capable of this motion when folded in a material with negligible thickness; however, when the application requires the folding of thick, rigid panels, attention must be paid to the effect of material thickness not only on the final folded state, but also during the folding motion (i.e., the panels must not be required to flex to attain the final folded form). The objective is to develop new methods for deployment from a compact folded form to a large circular array (or other final form). This paper describes a mathematical model for modifying the pattern to accommodate material thickness in the context of the design, modeling, and testing of a deployable system inspired by an origami six-sided flasher model. The model is demonstrated in hardware as a 1/20th scale prototype of a deployable solar array for space applications. The resulting prototype has a ratio of stowed-to-deployed diameter of 9.2 (or 1.25 m deployed outer diameter to 0.136 m stowed outer diameter).

  4. Unperceived intimate partner violence and women's health.

    Science.gov (United States)

    Sonego, Michela; Gandarillas, Ana; Zorrilla, Belén; Lasheras, Luisa; Pires, Marisa; Anes, Ana; Ordobás, María

    2013-01-01

    Women who experience intimate partner violence (IPV) often do not perceive themselves as abused. This study sought to estimate the health effects of unperceived IPV (uIPV), taking violence-free women as the reference, and to compare the effects of uIPV with those of perceived IPV (pIPV). We performed a cross-sectional population study through telephone interviews of 2835 women aged 18 to 70 years living in the region of Madrid and having an ongoing intimate partner relationship or contact with a former partner in the preceding year. Based on 26 questions from the Conflict Tactics Scale-1 and the Enquête Nacional sur les Violences envers les Femmes en France and the question "Do you feel abused by your partner?" a variable was constructed in three categories, namely, the absence of IPV, uIPV and pIPV. Using logistic regression, we analyzed the association between health problems, medication use, health-service utilization and IPV (perceived and unperceived) vis-à-vis the absence of IPV. There were 247 cases of uIPV and 96 of pIPV (prevalences of 8.8% and 3.4%, respectively). The multivariate analysis showed that a substantial number of the outcomes explored were associated with uIPV, pIPV, or both. The highest odds ratios (ORs) were obtained for depression (Patient Health Questionnaire-9≥10) (uIPV: OR 3.4, 95% CI 2.4-3.8; and pIPV: 4.1, 95%CI 2.5-6.8). In most problems, the ORs did not significantly differ between the two types of IPV. uIPV is 2.6 times more frequent than pIPV and is associated with at least as many health problems as pIPV. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  5. Supporting Knowledge Transfer in IS Deployment Projects

    Science.gov (United States)

    Schönström, Mikael

    To deploy new information systems is an expensive and complex task, and does seldom result in successful usage where the system adds strategic value to the firm (e.g. Sharma et al. 2003). It has been argued that innovation diffusion is a knowledge integration problem (Newell et al. 2000). Knowledge about business processes, deployment processes, information systems and technology are needed in a large-scale deployment of a corporate IS. These deployments can therefore to a large extent be argued to be a knowledge management (KM) problem. An effective deployment requires that knowledge about the system is effectively transferred to the target organization (Ko et al. 2005).

  6. Systematic review of mental health disorders and intimate partner violence victimisation among military populations.

    Science.gov (United States)

    Sparrow, Katherine; Kwan, Jamie; Howard, Louise; Fear, Nicola; MacManus, Deirdre

    2017-09-01

    There is growing awareness of the problem of intimate partner violence (IPV) among military populations. IPV victimisation has been shown to be associated with mental disorder. A better understanding of the link between IPV and mental disorder is needed to inform service development to meet the needs of military families. We aimed to systematically review the literature on the association between IPV victimisation and mental health disorders among military personnel. Searches of four electronic databases (Embase, Medline, PsycINFO, and Web of Science) were supplemented by reference list screening. Heterogeneity among studies precluded a meta-analysis. Thirteen studies were included. There was stronger evidence for an association between IPV and depression/alcohol problems than between IPV and PTSD. An association between IPV and mental health problems was more frequently found among veterans compared to active duty personnel. However, the link between IPV and alcohol misuse was more consistently found among active duty samples. Finally, among active duty personnel psychological IPV was more consistently associated with depression/alcohol problems than physical/sexual IPV. The review highlighted the lack of research on male IPV victimisation in the military. There is evidence that the burden of mental health need may be significant among military personnel who are victims of IPV. The influence of attitudes towards gender in the military on research in this area is discussed. Further research is needed to inform development of services and policy to reduce IPV victimisation and the mental health consequences among military personnel.

  7. Dating Violence Against HIV-Infected Youth in South Africa: Associations With Sexual Risk Behavior, Medication Adherence, and Mental Health.

    Science.gov (United States)

    Kidman, Rachel; Violari, Avy

    2018-01-01

    As perinatal HIV-infected youth become sexually active, the potential for onward transmission becomes an increasing concern. In other populations, intimate partner violence (IPV) is a risk factor for HIV acquisition. We build on this critical work by studying the role of IPV in facilitating onward transmission among HIV-infected youth-an important step toward effective intervention. Soweto, South Africa. Self-report surveys were completed by 129 perinatal HIV-infected female youth (aged 13-24 years). We calculated the IPV prevalence and used logistic models to capture the association between IPV and health outcomes known to facilitate onward HIV transmission (eg, risky sex, poor medication adherence, depression, and substance abuse). A fifth of perinatal HIV-infected participants reported physical and/or sexual IPV in the past year; one-third reported lifetime IPV. Childhood adversity was common and positively associated with IPV. Past-year physical and/or sexual IPV was positively correlated with high-risk sex [odds ratio (OR) = 8.96; 95% confidence interval (CI): 2.78 to 28.90], pregnancy (OR = 6.56; 95% CI: 1.91 to 22.54), poor medication adherence to antiretroviral therapy (OR = 5.37; 95% CI: 1.37 to 21.08), depression (OR = 4.25; 95% CI: 1.64 to 11.00), and substance abuse (OR = 4.11; 95% CI: 1.42 to 11.86). Neither past-year nor lifetime IPV was associated with viral load or HIV status disclosure to a partner. We find that IPV may increase risk for onward HIV transmission in perinatal HIV-infected youth by both increasing engagement in risky sexual behaviors and lowering medication adherence. HIV clinics should consider integrating primary IPV prevention interventions, instituting routine IPV screening, and collocating services for victims of violence.

  8. A Nodes Deployment Algorithm in Wireless Sensor Network Based on Distribution

    Directory of Open Access Journals (Sweden)

    Song Yuli

    2014-07-01

    Full Text Available Wireless sensor network coverage is a basic problem of wireless sensor network. In this paper, we propose a wireless sensor network node deployment algorithm base on distribution in order to form an efficient wireless sensor network. The iteratively greedy algorithm is used in this paper to choose priority nodes into active until the entire network is covered by wireless sensor nodes, the whole network to multiply connected. The simulation results show that the distributed wireless sensor network node deployment algorithm can form a multiply connected wireless sensor network.

  9. Accelerating the deployment of energy efficient and renewable energy technologies in South Africa

    Energy Technology Data Exchange (ETDEWEB)

    Shickman, Kurt [Trust for Conservation Innovation, San Francisco, CA (United States). Global Cool Cities Alliance (GCCA)

    2017-02-13

    Purpose of the project was to accelerate the deployment of energy efficient and renewable energy technologies in South Africa. Activities were undertaken to reduce barriers to deployment by improving product awareness for the South African market; market and policy intelligence for U.S. manufacturers; product/service availability; local technical capacity at the workforce, policymaker and expert levels; and ease of conducting business for these technologies/services in the South African market.

  10. The effect of military deployment on mental health

    DEFF Research Database (Denmark)

    Lyk-Jensen, Stéphanie; Weatherall, Cecilie Dohlmann; W. Jepsen, Peter

    for the non-deployed eligible men, and our results hold to various robustness checks. Our administrative records provide objective measures of mental health service use in the form of psychiatric diagnoses and purchase of mental health-related medication. The very rich data makes it possible to control......In this paper we estimate the causal effect of military deployment on soldiers’ mental health. To handle the selection bias problem, we use longitudinal data for deployed and non-deployed eligible men in a difference-in-differences setting. Using pair-wise matching, we impute deployment dates...... for important variables like intelligence tests and family background. We find significant adverse effects of military deployment on soldiers’ mental health service use. Highlights: - Causal effect of military deployment on soldiers’ use of mental health service - Using a difference-in-differences approach...

  11. Outcomes of AV Fistulas and AV Grafts after Interventional Stent-Graft Deployment in Haemodialysis Patients

    Energy Technology Data Exchange (ETDEWEB)

    Schmelter, Christopher, E-mail: christopher.schmelter@klinikum-ingolstadt.de; Raab, Udo, E-mail: udo.raab@klinikum-ingolstadt.de [Klinikum Ingolstadt, Department of Diagnostic and Interventional Radiology (Germany); Lazarus, Friedrich, E-mail: friedrich.lazarus@klinikum-ingolstadt.de [Klinikum Ingolstadt, Department of Nephrology (Germany); Ruppert, Volker, E-mail: volker.ruppert@klinikum-ingolstadt.de [Klinikum Ingolstadt, Department of Vascular Surgery (Germany); Vorwerk, Dierk, E-mail: dierk.vorwerk@klinikum-ingolstadt.de [Klinikum Ingolstadt, Department of Diagnostic and Interventional Radiology (Germany)

    2015-08-15

    PurposeThe study was designed to assess outcomes of arteriovenous (AV) accesses after interventional stent-graft deployment in haemodialysis patients.Materials and Methods63 haemodialysis patients with 66 AV fistulas and AV grafts were treated by interventional stent-graft deployment from 2006 to 2012 at our hospital. Data of these patients were retrospectively analysed for location of deployed stent-grafts, occurrence and location of (re-)stenosis and (re-)thrombosis. Complex stenosis was the most frequent indication for stent-graft deployment (45.5 %), followed by complications of angioplasty with vessel rupture or dissection (31.8 %).ResultsA high rate of procedural success was achieved (98.5 %). The most frequent location of the deployed stent-graft was the draining vein (66.7 %). Stent-graft deployment was more frequent in AV grafts than in AV fistulas. Primary patency was 45.5 % at 6 month, 31.3 % at 12 month and 19.2 % at 24 month. Primary patency was significantly better for AV fistulas than for AV grafts with deployed stent-grafts. Patency of the deployed stent-graft was much better than overall AV access primary patency with deployed stent-graft. Re-stenosis with thrombosis was the most frequent indication for re-intervention. Most frequent location of re-stenosis was the draining vein (37.1 %), followed by stenosis at the AV access (29.5 %) and the deployed stent-graft (23.5 %).ConclusionRe-stenosis and re-thrombosis remain frequent in AV fistulas and AV grafts in haemodialysis patients despite stent-graft deployment. Re-stenosis of the deployed stent-graft is, only in the minority of the cases, responsible for AV access dysfunction.

  12. Singular point analysis during rail deployment into vacuum vessel for ITER blanket maintenance

    International Nuclear Information System (INIS)

    Kakudate, Satoshi; Shibanuma, Kiyoshi

    2007-05-01

    Remote maintenance of the ITER blanket composed of about 400 modules in the vessel is required by a maintenance robot due to high gamma radiation of ∼500Gy/h in the vessel. A concept of rail-mounted vehicle manipulator system has been developed to apply to the maintenance of the ITER blanket. The most critical issue of the vehicle manipulator system is the feasibility of the deployment of the articulated rail composed of eight rail links into the donut-shaped vessel without any driving mechanism in the rail. To solve this issue, a new driving mechanism and procedure for the rail deployment has been proposed, taking account of a repeated operation of the multi-rail links deployed in the same kinematical manner. The new driving mechanism, which is deferent from those of a usual 'articulated arm' equipped with actuator in the every joint for movement, is composed of three mechanisms. To assess the feasibility of the kinematics of the articulated rail for rail deployment, a kinematical model composed of three rail links related to a cycle of the repeated operation for rail deployment was considered. The determinant det J' of the Jacobian matrix J' was solved so as to estimate the existence of a singular point of the transformation during rail deployment. As a result, it is found that there is a singular point due to det J'=0. To avoid the singular point of the rail links, a new location of the second driving mechanism and the related rail deployment procedure are proposed. As a result of the rail deployment test based on the new proposal using a full-scale vehicle manipulator system, the respective rail links have been successfully deployed within 6 h less than the target of 8 h in the same manner of the repeated operation under a synchronized cooperation among the three driving mechanisms. It is therefore concluded that the feasibility of the rail deployment of the articulated rail composed of simple structures without any driving mechanism has been demonstrated

  13. Disparities in Exposure to Intimate Partner Violence Among Transgender/Gender Nonconforming and Sexual Minority Primary Care Patients.

    Science.gov (United States)

    Valentine, Sarah E; Peitzmeier, Sarah M; King, Dana S; O'Cleirigh, Conall; Marquez, Samantha M; Presley, Cara; Potter, Jennifer

    2017-08-01

    We investigated the odds of intimate partner violence (IPV) among primary care patients across subgroups of transgender and gender nonconforming (TGNC) individuals relative to cisgender women, and cisgender sexual minority men and women relative to cisgender heterosexual men and women. Participants completed an IPV screener as part of routine primary care visits at an urban community health center (N = 7572). Electronic medical record data were pooled for all patients who received the IPV screener January 1 to December 31, 2014. Overall, 3.6% of the sample reported experiencing physical or sexual IPV in the past year. Compared to cisgender women (past-year prevalence 2.7%), all TGNC subgroups reported elevated odds of physical or sexual IPV, including transgender women (past-year prevalence 12.1%; adjusted odds ratio [AOR] = 5.0, 95% confidence interval [CI] = 2.9-8.6), transgender men (6.6%; AOR = 2.4, 95% CI: 1.2-4.6), gender non-binary individuals (8.2%, AOR = 3.1, 95% CI = 1.7-5.4), and TGNC individuals who did not report their gender identity (9.1%; AOR = 3.7, 95% CI = 2.2-6.3). The prevalence of isolation-related IPV and controlling behaviors was also high in some TGNC groups. Our findings support that IPV is prevalent across genders and sexual orientations. Clinical guidelines for IPV screening should be expanded to include TGNC individuals and not just cisgender women. Future research could explore the complex patterns by which individuals of different genders are at increased risk for different types of IPV, and investigate the best ways to screen TGNC patients and support TGNC survivors.

  14. Rover deployment system for lunar landing mission

    Science.gov (United States)

    Sutoh, Masataku; Hoshino, Takeshi; Wakabayashi, Sachiko

    2017-09-01

    For lunar surface exploration, a deployment system is necessary to allow a rover to leave the lander. The system should be as lightweight as possible and stored retracted when launched. In this paper, two types of retractable deployment systems for lunar landing missions, telescopic- and fold-type ramps, are discussed. In the telescopic-type system, a ramp is stored with the sections overlapping and slides out during deployment. In the fold-type system, it is stored folded and unfolds for the deployment. For the development of these ramps, a design concept study and structural analysis were conducted first. Subsequently, ramp deployment and rover release tests were performed using the developed ramp prototypes. Through these tests, the validity of their design concepts and functions have been confirmed. In the rover release test, it was observed that the developed lightweight ramp was sufficiently strong for a 50-kg rover to descend. This result suggests that this ramp system is suitable for the deployment of a 300-kg-class rover on the Moon, where the gravity is about one-sixth that on Earth. The lightweight and sturdy ramp developed in this study will contribute to both safe rover deployment and increase of lander/rover payload.

  15. Effects of Deployments on Homestation Job Stress and Burnout

    Science.gov (United States)

    2005-03-01

    training that may have left the deployees feeling under-prepared for the demands faced during the deployment. Upon returning to his or her homestation... face another day on the job. 01 2 3 4 5 6 7 33. I feel I am working too hard on my job. 01 2 3 4 5 6 7 34. Home station bureaucratic pressures...receive the recognitio it that I should receive. 3. There is too much bickering and fighting at w 4. I like my job better than the average

  16. Scarab III Remote Vehicle Deployment for Waste Retrieval and Tank Inspection

    International Nuclear Information System (INIS)

    Burks, B.L.; Falter, D.D.; Noakes, M.; Vesco, D.

    1999-01-01

    The Robotics Technology Development Program now known as the Robotics Crosscut Program, funded the development and deployment of a small remotely operated vehicle for inspection and cleanout of small horizontal waste storage tanks that have limited access. Besides the advantage of access through tank risers as small as 18-in. diameter, the small robotic system is also significantly less expensive to procure and to operate than larger remotely operated vehicle (ROV) systems. The vehicle specified to support this activity was the ROV Technologies, Inc., Scarab. The Scarab is a tracked vehicle with an independently actuated front and rear ''toe'' degree-of-freedom which allows the stand-off and angle of the vehicle platform with respect to the floor to be changed. The Scarab is a flexible remote tool that can be used for a variety of tasks with its primary uses targeted for inspection and small scale waste retrieval. The vehicle and any necessary process equipment are mounted in a deployment and containment enclosure to simplify deployment and movement of the system from tank to tank. This paper outlines the technical issues related to the Scarab vehicle and its deployment for use in tank inspection and waste retrieval operation

  17. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections....

  18. Advanced OS deployment system

    OpenAIRE

    Galiano Molina, Sebastián

    2007-01-01

    The main project’s objective is to design and build an OS deployment system taking advantage of the Linux OS and the Open Source community developments. This means to use existing technologies that modularize the system. With this philosophy in mind, the number of developed code lines within the project is keeping as small as possible. As REMBO, the OS deployment system to develop has to be transparent to the user. This means a system with a friendly user interface and no te...

  19. Renewable Energy: Policy Considerations for Deploying Renewables

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This information paper accompanies the IEA publication Deploying Renewables 2011: Best and Future Policy Practice (IEA, 2011a). It provides more detailed data and analysis on policies for Deploying Renewables, and is intended to complement the main publication. It provides an account of the strategic drivers underpinning renewable energy (RE) technology deployment (energy security, economic development and environment protection) and assesses RE technologies with respect to these drivers, including an estimate of GHG emissions reductions due to RE technologies. The paper also explores the different barriers to deploying renewables at a given stage of market maturity and discusses what tools policy makers can avail of to succeed in removing deployment barriers. An additional topical highlight explores the challenges associated with accelerating the diffusion of RE technologies in developing countries.

  20. Intelligent Advanced Communications IP Telephony Feasibility for the US Navy - Phase 3

    Science.gov (United States)

    2011-03-01

    115 FIGURE 6-4 STATIC IPV4 ADDRESSING .......................................................................... 116 FIGURE 6-5 VOIP ACCOUNT...alternative types of network addresses (e.g., both IPv4 and IPv6) in SDP for a specific media session. 2.6.4.3 SIP Requests Related RFC 2976... History -Info”, to capture the history of requests from a UA that arrive at a particular application server or user. RFC 3420 – introduces a new

  1. Sox11 Reduces Caspase-6 Cleavage and Activity.

    Directory of Open Access Journals (Sweden)

    Elaine Waldron-Roby

    Full Text Available The apoptotic cascade is an orchestrated event, whose final stages are mediated by effector caspases. Regulatory binding proteins have been identified for caspases such as caspase-3, -7, -8, and -9. Many of these proteins belong to the inhibitor of apoptosis (IAP family. By contrast, caspase-6 is not believed to be influenced by IAPs, and little is known about its regulation. We therefore performed a yeast-two-hybrid screen using a constitutively inactive form of caspase-6 for bait in order to identify novel regulators of caspase-6 activity. Sox11 was identified as a potential caspase-6 interacting protein. Sox11 was capable of dramatically reducing caspase-6 activity, as well as preventing caspase-6 self- cleavage. Several regions, including amino acids 117-214 and 362-395 within sox11 as well as a nuclear localization signal (NLS all contributed to the reduction in caspase-6 activity. Furthermore, sox11 was also capable of decreasing other effector caspase activity but not initiator caspases -8 and -9. The ability of sox11 to reduce effector caspase activity was also reflected in its capacity to reduce cell death following toxic insult. Interestingly, other sox proteins also had the ability to reduce caspase-6 activity but to a lesser extent than sox11.

  2. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    .... Gulf War health questions have resulted in controversy over potentially hazardous exposures during the deployment, the possibility of adverse affects from preventive health measures, and the role...

  3. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  4. Early identification of posttraumatic stress following military deployment

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Statnikov, Alexander; Andersen, Søren B

    2015-01-01

    BACKGROUND: Pre-deployment identification of soldiers at risk for long-term posttraumatic stress psychopathology after home coming is important to guide decisions about deployment. Early post-deployment identification can direct early interventions to those in need and thereby prevents...... the development of chronic psychopathology. Both hold significant public health benefits given large numbers of deployed soldiers, but has so far not been achieved. Here, we aim to assess the potential for pre- and early post-deployment prediction of resilience or posttraumatic stress development in soldiers...... by application of machine learning (ML) methods. METHODS: ML feature selection and prediction algorithms were applied to a prospective cohort of 561 Danish soldiers deployed to Afghanistan in 2009 to identify unique risk indicators and forecast long-term posttraumatic stress responses. RESULTS: Robust pre...

  5. Intimate partner violence trends in Brazil: data from two waves of the Brazilian National Alcohol and Drugs Survey.

    Science.gov (United States)

    Ally, Elizabeth Z; Laranjeira, Ronaldo; Viana, Maria C; Pinsky, Ilana; Caetano, Raul; Mitsuhiro, Sandro; Madruga, Clarice S

    2016-01-01

    To compare intimate partner violence (IPV) prevalence rates in 2006 and 2012 in a nationally representative household sample in Brazil. The associations between IPV and substance use were also investigated. IPV was assessed using the Conflict Tactic Scale-R in two waves (2006/2012) of the Brazilian Alcohol and Drugs Survey. Weighted prevalence rates and adjusted logistic regression models were calculated. Prevalence rates of IPV victimization decreased significantly, especially among women (8.8 to 6.3%). The rates of IPV perpetration also decreased significantly (10.6 to 8.4% for the overall sample and 9.2 to 6.1% in men), as well as the rates of bidirectional violence (by individuals who were simultaneously victims and perpetrators of violence) (3.2 to 2.4% for the overall sample). Alcohol increased the likelihood of being a victim (odds ratio [OR] = 1.6) and perpetrator (OR = 2.4) of IPV. Use of illicit drugs increased up to 4.5 times the likelihood of being a perpetrator. In spite of the significant reduction in most types of IPV between 2006 and 2012, violence perpetrated by women was not significantly reduced, and the current national rates are still high. Further, this study suggests that use of alcohol and other psychoactive drugs plays a major role in IPV. Prevention initiatives must take drug misuse into consideration.

  6. Intimate partner violence trends in Brazil: data from two waves of the Brazilian National Alcohol and Drugs Survey

    Directory of Open Access Journals (Sweden)

    Elizabeth Z. Ally

    2016-06-01

    Full Text Available Objective: To compare intimate partner violence (IPV prevalence rates in 2006 and 2012 in a nationally representative household sample in Brazil. The associations between IPV and substance use were also investigated. Methods: IPV was assessed using the Conflict Tactic Scale-R in two waves (2006/2012 of the Brazilian Alcohol and Drugs Survey. Weighted prevalence rates and adjusted logistic regression models were calculated. Results: Prevalence rates of IPV victimization decreased significantly, especially among women (8.8 to 6.3%. The rates of IPV perpetration also decreased significantly (10.6 to 8.4% for the overall sample and 9.2 to 6.1% in men, as well as the rates of bidirectional violence (by individuals who were simultaneously victims and perpetrators of violence (3.2 to 2.4% for the overall sample. Alcohol increased the likelihood of being a victim (odds ratio [OR] = 1.6 and perpetrator (OR = 2.4 of IPV. Use of illicit drugs increased up to 4.5 times the likelihood of being a perpetrator. Conclusions: In spite of the significant reduction in most types of IPV between 2006 and 2012, violence perpetrated by women was not significantly reduced, and the current national rates are still high. Further, this study suggests that use of alcohol and other psychoactive drugs plays a major role in IPV. Prevention initiatives must take drug misuse into consideration.

  7. Hearing Loss Associated with US Military Combat Deployment

    Science.gov (United States)

    2015-02-01

    Jason M. Jones Tomoko I. Hooper Isabel G. Jacobson Edward J. Boyko Report No. 13-59 The views expressed in this article are those of the...limited. A study of US Army soldiers who visited audiology clinics noted that hearing loss was identifi ed in 68.6% of post-deployment diagnoses and...disorders, hearing loss, military personnel Access this article online Quick Response Code: Website: www.noiseandhealth.org DOI: 10.4103/1463

  8. Optimization of Hydroacoustic Equipment Deployment at Foster Dam, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, James S.; Johnson, Gary E.; Ploskey, Gene R.; Hennen, Matthew J.; Fischer, Eric S.; Zimmerman, Shon A.

    2013-03-01

    The goal of the study was to optimize performance of the fixed-location hydroacoustic systems at Foster Dam (FOS) by determining deployment and data acquisition methods that minimized structural, electrical, and acoustic interference. Optimization of the hydroacoustic systems will establish methodology for sampling by active acoustic methods during this year-long evaluation of juvenile salmonid passage at FOS.

  9. Deploying Renewables - Best and Future Policy Practice

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-11-23

    The global energy system faces urgent challenges. Concerns about energy security are growing, as highlighted by the recent political turmoil in Northern Africa and the nuclear incident in Fukushima. At the same time, the need to respond to climate change is more critical than ever. Against this background, many governments have increased efforts to promote deployment of renewable energy -- low-carbon sources that can strengthen energy security. This has stimulated unprecedented rise in deployment, and renewables are now the fastest growing sector of the energy mix. This 'coming of age' of renewable energy also brings challenges. Growth is focused on a few of the available technologies, and rapid deployment is confined to a relatively small number of countries. In more advanced markets, managing support costs and system integration of large shares of renewable energy in a time of economic weakness and budget austerity has sparked vigorous political debate. The IEA's new report, Deploying Renewables 2011: Best and Future Policy Practice: - Provides a comprehensive review and analysis of renewable energy policy and market trends; - Analyses in detail the dynamics of deployment and provides best-practice policy principles for different stages of market maturity; - Assesses the impact and cost-effectiveness of support policies using new methodological tools and indicators; - Investigates the strategic reasons underpinning the pursuit of RE deployment by different countries and the prospects for globalisation of RE. This new book builds on and extends a 2008 IEA publication, drawing on recent policy and deployment experience world-wide. It provides guidance for policy makers and other stakeholders to avoid past mistakes, overcome new challenges and reap the benefits of deploying renewables -- today and tomorrow.

  10. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, Katherine A.; Hostick, Donna J.; Belzer, David B.; Livingston, Olga V.

    2007-11-08

    The purpose of this report is to compile information and conclusions gathered as part of three separate tasks undertaken as part of the overall project, “Modeling EERE Deployment Programs,” sponsored by the Planning, Analysis, and Evaluation office within the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE). The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address improvements to modeling in the near term, and note gaps in knowledge where future research is needed.

  11. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    ... of stress in causing chronic illness. The lack of comprehensive deployment health surveillance has made it difficult to determine possible causes of adverse health effects reported by Gulf War veterans...

  12. Deployment-related risk factors of low back pain

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Marott, Jacob Louis; Gyntelberg, Finn

    2014-01-01

    Where much is known about the consequences of spinal and low back pain (LBP) during military deployments, there is lesser knowledge of risk factors for LBP among the deployed forces. The objective of this study was to identify deployment-related exposures associated with LBP. The study was a ques...... their subordinates and involve medical personnel, especially deployed physiotherapists, by giving advice to soldiers of different military occupational specialties on how to optimize ergonomics at work....

  13. Systemic Factors Associated With Prosocial Skills and Maladaptive Functioning in Youth Exposed to Intimate Partner Violence.

    Science.gov (United States)

    Howell, Kathryn H; Thurston, Idia B; Hasselle, Amanda J; Decker, Kristina; Jamison, Lacy E

    2018-04-01

    Children are frequently present in homes in which intimate partner violence (IPV) occurs. Following exposure to IPV, children may develop behavioral health difficulties, struggle with regulating emotions, or exhibit aggression. Despite the negative outcomes associated with witnessing IPV, many children also display resilience. Guided by Bronfenbrenner's bioecological model, this study examined person-level, process-level (microsystem), and context-level (mesosystem) factors associated with positive and negative functioning among youth exposed to IPV. Participants were 118 mothers who reported on their 6- to 14-year-old children. All mothers experienced severe physical, psychological, and/or sexual IPV in the past 6 months. Linear regression modeling was conducted separately for youth maladaptive functioning and prosocial skills. The linear regression model for maladaptive functioning was significant, F(6, 110) = 9.32, p prosocial skills was also significant, F(6, 110) = 3.34, p prosocial skills. These findings provide critical knowledge on specific mutable factors associated with positive and negative functioning among children in the context of IPV exposure. Such factors could be incorporated into strength-based interventions following family violence.

  14. CoalFleet for tomorrow. An industry initiative to accelerate the deployment of advanced coal-based generation plants

    Energy Technology Data Exchange (ETDEWEB)

    Parkes, J.; Holt, N.; Phillips, J. [Electric Power Research Institute (United States)

    2006-07-01

    The industry initiative 'CoalFleet for tomorrow' was launched in November 2004 to accelerate the deployment and commercialization of clean, efficient, advanced coal power systems. This paper discusses the structure of CoalFleet and its strategy for reducing the cost, leadtime and risk of deploying advanced coal technologies such as combined-cycle power plants. 6 figs.

  15. Family Reintegration Following Guard Deployment

    Science.gov (United States)

    2010-09-20

    Somalia Peacekeepers. Journal of Consulting and Clinical Psychology, 72(5), 909-913. Haas DM . Pazdernik LA. Olsen CH. A cross-sectional survey of the...relationship between partner deployment and stress in pregnancy during wartime. Haas DM . Pazdernik LA. Partner deployment and stress in pregnant...Identify 3-5 key words relating to the proposal. (Required) I used MESH Headings instead of the CRISP Thesaurus for key

  16. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Directory of Open Access Journals (Sweden)

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  17. Implementation plan for deployment of Federal Interim Storage facilities for commercial spent nuclear fuel

    International Nuclear Information System (INIS)

    1985-01-01

    This document is the second annual report on plans for providing Federal Interim Storage (FIS) capacity. References are made to the first annual report as necessary (DOE/RW-0003, 1984). Background factors and aspects that were considered in the development of this deployment plan and activities and interactions considered to be required to implement an FIS program are discussed. The generic approach that the Department plans to follow in deploying FIS facilities is also described

  18. [Health status and intimate partner violence].

    Science.gov (United States)

    Sanz-Barbero, Belén; Rey, Lourdes; Otero-García, Laura

    2014-01-01

    To describe the prevalence of intimate partner violence (IPV) in Spain in the last year and at some point during the lifetime, to determine health status in women according to whether they had experienced IPV or not, and to analyze the individual variables associated with IPV in Spain. A cross-sectional study was performed of the database, Macrosurvey on Gender Violence in Spain 2011. This database includes data on 7,898 women older than 18 years old. The dependent variables were IPV-last year, IPV-ever in life. Covariates consisted of sociodemographic characteristics, socioeconomic status, maternal experience of IPV, social support, and self-care. The measure of association used was the OR with its 95% confidence interval (95% CI). A total of 3.6% of women had experienced IPV-last year and 12.2% ever in life. Female victims of IPV had poorer health than women who had not experienced IPV. Immigrant women living in Spain for 6 years or more were more likely to experience IPV-ever in life than Spanish women [OR (95% CI): 1.95 (1.50, 2.53)]. An interaction was found between nationality and the existence of children under 18 years old. Among women with children under 18 years old, immigrant women were more likely to experience IPV-last year than Spanish women [OR (95% CI): 1.99 (1.25, 3.17)]. Other variables associated with IPV were age, low socioeconomic status, low social support and having a mother who had experienced IPV. In Spain, some women have a higher probability of experiencing IPV. The variables associated with greater vulnerability to IPV should be taken into account when implementing measures to prevent or alleviate IPV. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  19. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...... statistical models of deployment areas, the performance analysis is carried out in the form of operator case studies for large-scale deployment scenarios, including realistic macro network layouts and inhomogeneous spatial traffic distributions. Deployment of small cells is performed by means of proposed...... heuristic deployment algorithms, which combine network coverage and spatial user density information. As a secondary aspect, deployment solutions achieving the same coverage performance are compared in terms of Total Cost of Ownership (TCO), in order to investigate the viability of different deployment...

  20. Galactose 6-sulfate sulfatase activity in Morquio syndrome

    International Nuclear Information System (INIS)

    Yutaka, T.; Okada, S.; Kato, T.; Inui, K.; Yabuuhi, H.

    1982-01-01

    The authors have prepared a new substrate, o-β-D-sulfo-galactosyl-(1-4)-β-D-6-sulfo-2-acetamido-2-deoxyglucosyl-(1-4)-D-[1- 3 H]galactitol, from shark cartilage keratan sulfate, for the assay of galactose 6-sulfate sulfatase activity. Using this substrate, they found there was a striking deficiency of galactose 6-sulfate sulfatase activity, in addition to the known deficiency of N-acetylgalactosamine 6-sulfate sulfatase, in the cultured skin fibroblasts of patients with Morquio syndrome. Their results could be explained by the hypothesis that accumulation of keratan sulfate and chondroitin 6-sulfate in Morquio syndrome is due to a deficiency of galactose 6-sulfate sulfatase and N-acetylgalactosamine 6-sulfate sulfatase activity, which are necessary for the degradation of these two mucopolysaccharides. (Auth.)