WorldWideScience

Sample records for multiple ip hosts

  1. IPs

    African Journals Online (AJOL)

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  2. Host-Tree Monoterpenes and Biosynthesis of Aggregation Pheromones in the Bark Beetle Ips paraconfusus

    Directory of Open Access Journals (Sweden)

    John A. Byers

    2012-01-01

    Full Text Available A paradigm developed in the 1970s that Ips bark beetles biosynthesize their aggregation pheromone components ipsenol and ipsdienol by hydroxylating myrcene, a host tree monoterpene. Similarly, host α-pinene was hydroxylated to a third pheromone component cis-verbenol. In 1990, however, we reported that amounts of ipsenol and ipsdienol produced by male Ips paraconfusus (Coleoptera: Scolytinae feeding in five host pine species were nearly the same, even though no detectable myrcene precursor was detected in one of these pines (Pinus sabiniana. Subsequent research showed ipsenol and ipsdienol are also biosynthesized from smaller precursors such as acetate and mevalonate, and this de novo pathway is the major one, while host tree myrcene conversion by the beetle is the minor one. We report concentrations of myrcene, α-pinene and other major monoterpenes in five pine hosts (Pinus ponderosa, P. lambertiana, P. jeffreyi, P. sabiniana, and P. contorta of I. paraconfusus. A scheme for biosynthesis of ipsdienol and ipsenol from myrcene and possible metabolites such as ipsenone is presented. Mass spectra and quantities of ipsenone are reported and its possible role in biosynthesis of aggregation pheromone. Coevolution of bark beetles and host trees is discussed in relation to pheromone biosynthesis, host plant selection/suitability, and plant resistance.

  3. Host based internet protocol (IP) packet analysis to enhance network security

    International Nuclear Information System (INIS)

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  4. Responses of Ips pini (Say), Pityogenes knechteli Swaine and Associated Beetles (Coleoptera) to Host Monoterpenes in Stands of Lodgepole Pine

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    2003-01-01

    We conducted seven experiments in stands of mature lodgepole pine in southern British Columbia to elucidate the role of host volatiles in the semiochemical ecology of the pine engraver, Ips pini (Say) (Coleoptera: Scolytidae), with particular reference to the behavioral responses of predators and competing species of bark beetles. Our results demonstrated that the...

  5. Dynamic Optimization for IPS2 Resource Allocation Based on Improved Fuzzy Multiple Linear Regression

    Directory of Open Access Journals (Sweden)

    Maokuan Zheng

    2017-01-01

    Full Text Available The study mainly focuses on resource allocation optimization for industrial product-service systems (IPS2. The development of IPS2 leads to sustainable economy by introducing cooperative mechanisms apart from commodity transaction. The randomness and fluctuation of service requests from customers lead to the volatility of IPS2 resource utilization ratio. Three basic rules for resource allocation optimization are put forward to improve system operation efficiency and cut unnecessary costs. An approach based on fuzzy multiple linear regression (FMLR is developed, which integrates the strength and concision of multiple linear regression in data fitting and factor analysis and the merit of fuzzy theory in dealing with uncertain or vague problems, which helps reduce those costs caused by unnecessary resource transfer. The iteration mechanism is introduced in the FMLR algorithm to improve forecasting accuracy. A case study of human resource allocation optimization in construction machinery industry is implemented to test and verify the proposed model.

  6. Host-tree monoterpenes and biosynthesis of aggregation pheromones in the bark beetle ips paraconfusus

    Science.gov (United States)

    In the 1970-80s, vapors of the common conifer tree monoterpenes, myrcene and a-pinene, were shown to serve as precursors of ipsenol, ipsdienol and cis-verbenol, aggregation pheromone components of Ips paraconfusus. A paradigm developed that Ips bark beetles utilize pre-formed monoterpene precursors ...

  7. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun

    2014-09-05

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene being expressed in different tissues or at different developmental stages. To fully understand the functions of genes, it is essential to develop probabilistic models on multiple ChIP-Seq profiles to decipher the combinatorial regulatory mechanisms by multiple transcription factors. Results: In this work, we describe a probabilistic model (SignalSpider) to decipher the combinatorial binding events of multiple transcription factors. Comparing with similar existing methods, we found SignalSpider performs better in clustering promoter and enhancer regions. Notably, SignalSpider can learn higher-order combinatorial patterns from multiple ChIP-Seq profiles. We have applied SignalSpider on the normalized ChIP-Seq profiles from the ENCODE consortium and learned model instances. We observed different higher-order enrichment and depletion patterns across sets of proteins. Those clustering patterns are supported by Gene Ontology (GO) enrichment, evolutionary conservation and chromatin interaction enrichment, offering biological insights for further focused studies. We also proposed a specific enrichment map visualization method to reveal the genome-wide transcription factor combinatorial patterns from the models built, which extend our existing fine-scale knowledge on gene regulation to a genome-wide level. Availability and implementation: The matrix-algebra-optimized executables and source codes are available at the authors\\' websites: http://www.cs.toronto.edu/∼wkc/SignalSpider. Contact: Supplementary information: Supplementary data are available at Bioinformatics online.

  8. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun; Li, Yue; Peng, Chengbin; Zhang, Zhaolei

    2014-01-01

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene

  9. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  10. Importance of log size on host selection and reproductive success of Ips pini (Coleoptera: Scolytidae) in ponderosa pine slash of northern Arizona and western Montana

    Science.gov (United States)

    Brytten E. Steed; Michael R. Wagner

    2004-01-01

    Pine engraver, Ips pini (Say), often use thinning slash, and their populations are known to be influenced by the condition of this material. In our study, we evaluated the importance of three log diameters (5, 10, and 20 cm) and three lengths (60, 120, and 240 cm) on various parameters of bark beetle host attack, development, and emergence....

  11. Highly expressed loci are vulnerable to misleading ChIP localization of multiple unrelated proteins

    NARCIS (Netherlands)

    Teytelman, L.; Thurtle, D.M.; Rine, J.; van Oudenaarden, A.

    2013-01-01

    Chromatin immunoprecipitation (ChIP) is the gold-standard technique for localizing nuclear proteins in the genome. We used ChIP, in combination with deep sequencing (Seq), to study the genome-wide distribution of the Silent information regulator (Sir) complex in Saccharomyces cerevisiae. We analyzed

  12. Spatio-temporal model for multiple ChIP-seq experiments

    NARCIS (Netherlands)

    Ranciati, Saverio; Viroli, Cinzia; Wit, Ernst

    2015-01-01

    The increasing availability of ChIP-seq data demands for advanced statistical tools to analyze the results of such experiments. The inherent features of high-throughput sequencing output call for a modelling framework that can account for the spatial dependency between neighboring regions of the

  13. Combining multiple ChIP-seq peak detection systems using combinatorial fusion.

    Science.gov (United States)

    Schweikert, Christina; Brown, Stuart; Tang, Zuojian; Smith, Phillip R; Hsu, D Frank

    2012-01-01

    Due to the recent rapid development in ChIP-seq technologies, which uses high-throughput next-generation DNA sequencing to identify the targets of Chromatin Immunoprecipitation, there is an increasing amount of sequencing data being generated that provides us with greater opportunity to analyze genome-wide protein-DNA interactions. In particular, we are interested in evaluating and enhancing computational and statistical techniques for locating protein binding sites. Many peak detection systems have been developed; in this study, we utilize the following six: CisGenome, MACS, PeakSeq, QuEST, SISSRs, and TRLocator. We define two methods to merge and rescore the regions of two peak detection systems and analyze the performance based on average precision and coverage of transcription start sites. The results indicate that ChIP-seq peak detection can be improved by fusion using score or rank combination. Our method of combination and fusion analysis would provide a means for generic assessment of available technologies and systems and assist researchers in choosing an appropriate system (or fusion method) for analyzing ChIP-seq data. This analysis offers an alternate approach for increasing true positive rates, while decreasing false positive rates and hence improving the ChIP-seq peak identification process.

  14. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    OpenAIRE

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  15. PARAGON-IPS: A Portable Imaging Software System For Multiple Generations Of Image Processing Hardware

    Science.gov (United States)

    Montelione, John

    1989-07-01

    Paragon-IPS is a comprehensive software system which is available on virtually all generations of image processing hardware. It is designed for an image processing department or a scientist and engineer who is doing image processing full-time. It is being used by leading R&D labs in government agencies and Fortune 500 companies. Applications include reconnaissance, non-destructive testing, remote sensing, medical imaging, etc.

  16. Roles of calcium and IP3 in impaired colon contractility of rats following multiple organ dysfunction syndrome

    Directory of Open Access Journals (Sweden)

    C. Zheyu

    2007-10-01

    Full Text Available The purpose of the present study was to explore changes in rat colon motility, and determine the roles of calcium and inositol (1,4,5-triphosphate (IP3 in colon dysmotility induced by multiple organ dysfunction syndrome (MODS caused by bacteria peritonitis. The number of stools, the contractility of the muscle strips and the length of smooth muscle cells (SMC in the colon, the concentration of calcium and IP3 in SMC, and serum nitric oxide were measured. Number of stools, fecal weight, IP3 concentration in SMC and serum nitric oxide concentration were 0.77 ± 0.52 pellets, 2.51 ± 0.39 g, 4.14 ± 2.07 pmol/tube, and 113.95 ± 37.89 µmol/L, respectively, for the MODS group (N = 11 vs 1.54 ± 0.64 pellets, 4.32 ± 0.57 g, 8.19 ± 3.11 pmol/tube, and 37.42 ± 19.56 µmol/L for the control group (N = 20; P < 0.05. After treatment with 0.1 mM acetylcholine and 0.1 M potassium chloride, the maximum contraction stress of smooth muscle strips, the length of SMC and the changes of calcium concentration were 593 ± 81 and 458 ± 69 g/cm³, 48.1 ± 11.8 and 69.2 ± 15.7 µM, 250 ± 70 and 167 ± 48%, respectively, for the control group vs 321 ± 53 and 284 ± 56 g/cm³, 65.1 ± 18.5 and 87.2 ± 23.7 µM, 127 ± 35 and 112 ± 35% for the MODS group (P < 0.05. Thus, colon contractility was decreased in MODS, a result possibly related to reduced calcium concentration and IP3 in SMC.

  17. An integrated model of multiple-condition ChIP-Seq data reveals predeterminants of Cdx2 binding.

    Directory of Open Access Journals (Sweden)

    Shaun Mahony

    2014-03-01

    Full Text Available Regulatory proteins can bind to different sets of genomic targets in various cell types or conditions. To reliably characterize such condition-specific regulatory binding we introduce MultiGPS, an integrated machine learning approach for the analysis of multiple related ChIP-seq experiments. MultiGPS is based on a generalized Expectation Maximization framework that shares information across multiple experiments for binding event discovery. We demonstrate that our framework enables the simultaneous modeling of sparse condition-specific binding changes, sequence dependence, and replicate-specific noise sources. MultiGPS encourages consistency in reported binding event locations across multiple-condition ChIP-seq datasets and provides accurate estimation of ChIP enrichment levels at each event. MultiGPS's multi-experiment modeling approach thus provides a reliable platform for detecting differential binding enrichment across experimental conditions. We demonstrate the advantages of MultiGPS with an analysis of Cdx2 binding in three distinct developmental contexts. By accurately characterizing condition-specific Cdx2 binding, MultiGPS enables novel insight into the mechanistic basis of Cdx2 site selectivity. Specifically, the condition-specific Cdx2 sites characterized by MultiGPS are highly associated with pre-existing genomic context, suggesting that such sites are pre-determined by cell-specific regulatory architecture. However, MultiGPS-defined condition-independent sites are not predicted by pre-existing regulatory signals, suggesting that Cdx2 can bind to a subset of locations regardless of genomic environment. A summary of this paper appears in the proceedings of the RECOMB 2014 conference, April 2-5.

  18. Host Selection Behavior and the Fecundity of Plutella xylostella (Lepidoptera: Plutellidae) on Multiple Host Plants

    Science.gov (United States)

    Huang, Bin; Shi, Zhanghong; Hou, Youming

    2014-01-01

    Abstract Insect herbivores often have higher densities on host plants grown in monocultures than those in diverse environments. The underlying mechanisms are thought to be that polyphagous insects have difficulty in selecting food or oviposition sites when multiple host plants exist. However, this hypothesis needs to be extensively investigated. Our field experiments revealed that the population of the diamondback moths, Plutella xylostella (L.) (Lepidoptera: Plutellidae), significantly decreased in a mixed cropping field compared with a monoculture. To determine the reasons for the reduction in population in the mixed cropping field, the takeoff behavior and fecundity of females in no-choice and free-choice laboratory environments were compared by video recordings of host selection by P. xylostella . Adults displayed a significantly higher takeoff frequency in free-choice environments than those in no-choice treatments and preferred landing on Brassica campestris (L.) or Brassica juncea (Coss) plants in contrast with Brassica oleracea (L.). Female adults in the free-choice environment also laid fewer eggs compared with the monoculture. Olfaction experiments demonstrated orientation by P. xylostella to host volatiles when presented with a choice between plant odors and clean air, but females showed no preference when odors from three Brassicaceae species were presented simultaneously. We conclude that mixed cropping alters the host-finding behavior of P. xylostella resulting in reduced oviposition. PMID:25527573

  19. IP Centrex

    OpenAIRE

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  20. Effects of actonomycin D and ultraviolet irradiation on multiplication of brome mosaic virus in host and non-host cells

    International Nuclear Information System (INIS)

    Maekawa, K.; Furusawa, I.; Okuno, T.

    1981-01-01

    The modes of multiplication of brome mosaic virus (BMV) were compared in protoplasts isolated from host and non-host plants. BMV actively multiplied in the leaves and isolated mesophyll protoplasts of barley, a host of BMV. BMV multiplication in barley protoplasts was inhibited by addition of actinomycin D immediately after inoculation or by u.v. irradiation of the protoplasts before inoculation. In contrast, although BMV could not multiply in leaves of radish and turnip (non-hosts for BMV) it multiplied at a low level in protoplasts isolated from these two plant species. Moreover, u.v. irradiation, or the addition of actinomycin D, enhanced multiplication of BMV in radish and turnip protoplasts. These results suggest that (i) in the host cells replication of BMV is dependent on cellular metabolism of nucleic acid and protein, and (ii) in the non-host cells a substance(s) inhibitory to replication of BMV is synthesized. (author)

  1. Detection of a rare BCR-ABL tyrosine kinase fusion protein in H929 multiple myeloma cells using immunoprecipitation (IP)-tandem mass spectrometry (MS/MS).

    Science.gov (United States)

    Breitkopf, Susanne B; Yuan, Min; Pihan, German A; Asara, John M

    2012-10-02

    Hypothesis directed proteomics offers higher throughput over global analyses. We show that immunoprecipitation (IP)-tandem mass spectrometry (LC-MS/MS) in H929 multiple myeloma (MM) cancer cells led to the discovery of a rare and unexpected BCR-ABL fusion, informing a therapeutic intervention using imatinib (Gleevec). BCR-ABL is the driving mutation in chronic myeloid leukemia (CML) and is uncommon to other cancers. Three different IP-MS experiments central to cell signaling pathways were sufficient to discover a BCR-ABL fusion in H929 cells: phosphotyrosine (pY) peptide IP, p85 regulatory subunit of phosphoinositide-3-kinase (PI3K) IP, and the GRB2 adaptor IP. The pY peptides inform tyrosine kinase activity, p85 IP informs the activating adaptors and receptor tyrosine kinases (RTKs) involved in AKT activation and GRB2 IP identifies RTKs and adaptors leading to ERK activation. Integration of the bait-prey data from the three separate experiments identified the BCR-ABL protein complex, which was confirmed by biochemistry, cytogenetic methods, and DNA sequencing revealed the e14a2 fusion transcript. The tyrosine phosphatase SHP2 and the GAB2 adaptor protein, important for MAPK signaling, were common to all three IP-MS experiments. The comparative treatment of tyrosine kinase inhibitor (TKI) drugs revealed only imatinib, the standard of care in CML, was inhibitory to BCR-ABL leading to down-regulation of pERK and pS6K and inhibiting cell proliferation. These data suggest a model for directed proteomics from patient tumor samples for selecting the appropriate TKI drug(s) based on IP and LC-MS/MS. The data also suggest that MM patients, in addition to CML patients, may benefit from BCR-ABL diagnostic screening.

  2. Multiple blood feeding and host-seeking behavior in Aedes aegypti and Aedes albopictus (Diptera: Culicidae).

    Science.gov (United States)

    Farjana, Thahsin; Tuno, Nobuko

    2013-07-01

    The body size of mosquitoes can influence a number of bionomic factors, such as their blood-feeding ability, host attack rate, and fecundity. All of these traits are important determinants of their potential to transmit diseases. Among abiotic and biotic factors, high temperature and low nutrition in the developing stages of mosquitoes generally result in small adults. We studied the relationship between body size and multiple feeding in a gonotrophic cycle and some fecundity attributes by using three strains of two competent vector species, Aedes aegypti (L.) and Aedes albopictus (Skuse). We raised small and large mosquitoes under low and high food conditions in the laboratory to measure parameters of fecundity and blood-feeding behavior. Fecundity was positively correlated with body size in both species, whereas the number of bloodmeals, the frequency of host-seeking behavior, and egg retention were negatively correlated with body size in the Ae. albopictus Nagasaki strain. We found that multiple feeding and host-seeking behavior were negatively correlated with body size, i.e., small mosquitoes tended to have more contact with hosts. We found that two mechanisms that inhibit engorged mosquitoes from seeking out hosts, distension-induced and oocyte-induced inhibition, were not strong enough to limit host-seeking behavior, and multiple feeding increased fecundity. Size-dependent multiple feeding and host-seeking behavior affect contact frequency with hosts and should be considered when predicting how changes in mosquito body size affect disease transmission.

  3. Multiple Resource Host Architecture (MRHA) for the Mobile Detection Assessment Response System (MDARS) Revision A

    National Research Council Canada - National Science Library

    Everett, H

    2000-01-01

    The Mobile Detection Assessment and Response System (MDARS) program employs multiple robotic security platforms operating under the high level control of a remote host, with the direct supervision of a human operator...

  4. DMXAA: An antivascular agent with multiple host responses

    International Nuclear Information System (INIS)

    Baguley, Bruce C.; Ching, L.-M.

    2002-01-01

    Purpose: To measure host responses to the antivascular agent DMXAA (5,6-dimethylxanthenone-4-acetic acid) and to compare them with those of other antivascular agents. Methods: Induction of tumor necrosis was measured in s.c. murine Colon 38 carcinomas growing in normal or tumor necrosis factor (TNF) receptor-1 knockout mice. Plasma and tumor tissue TNF concentrations were measured by ELISA. Plasma concentrations of 5-hydroxyindoleacetic acid (as a measure of serotonin release) and nitrite (as a measure of nitric oxide release) were measured by high-performance liquid chromatography. Results: Administration of DMXAA to tumor-bearing mice increased plasma and tumor tissue-associated TNF, in addition to increasing plasma nitric oxide, distinguishing its action from that of mitotic poisons that had an antivascular action. Results from TNF receptor-1 knockout mice showed that TNF played an important role in both its antitumor action and its host toxicity. Release of serotonin occurred in response to mitotic poisons, as well as to DMXAA. Conclusions: The antivascular action of DMXAA involves in situ production in tumor tissue of a cascade of vasoactive events, including a direct effect on vascular endothelial cells and indirect vascular effects involving TNF, other cytokines, serotonin, and nitric oxide. Now that Phase I clinical trials of DMXAA are completed, the optimization of this cascade in cancer patients is a major challenge. Plasma 5-hydroxyindoleacetic acid concentrations may provide a useful surrogate marker for the antivascular effects of DMXAA and other antivascular agents

  5. Ifabiyi, IP

    African Journals Online (AJOL)

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  6. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    Science.gov (United States)

    2003-04-01

    IP-HORNET, Metropolitan Optical Networks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION...OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500...Gemelos, and L. G. Kazovsky, “CSMA/CA MAC protocols for IP-HORNET: An IP over WDM metropolitan area ring netowrk ,” in Proceedings of GLOBE- COM’00

  7. Integrated microarray and ChIP analysis identifies multiple Foxa2 dependent target genes in the notochord.

    Science.gov (United States)

    Tamplin, Owen J; Cox, Brian J; Rossant, Janet

    2011-12-15

    The node and notochord are key tissues required for patterning of the vertebrate body plan. Understanding the gene regulatory network that drives their formation and function is therefore important. Foxa2 is a key transcription factor at the top of this genetic hierarchy and finding its targets will help us to better understand node and notochord development. We performed an extensive microarray-based gene expression screen using sorted embryonic notochord cells to identify early notochord-enriched genes. We validated their specificity to the node and notochord by whole mount in situ hybridization. This provides the largest available resource of notochord-expressed genes, and therefore candidate Foxa2 target genes in the notochord. Using existing Foxa2 ChIP-seq data from adult liver, we were able to identify a set of genes expressed in the notochord that had associated regions of Foxa2-bound chromatin. Given that Foxa2 is a pioneer transcription factor, we reasoned that these sites might represent notochord-specific enhancers. Candidate Foxa2-bound regions were tested for notochord specific enhancer function in a zebrafish reporter assay and 7 novel notochord enhancers were identified. Importantly, sequence conservation or predictive models could not have readily identified these regions. Mutation of putative Foxa2 binding elements in two of these novel enhancers abrogated reporter expression and confirmed their Foxa2 dependence. The combination of highly specific gene expression profiling and genome-wide ChIP analysis is a powerful means of understanding developmental pathways, even for small cell populations such as the notochord. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Effectiveness of Cedar Oil Products for Preventing Host Use by Ips avulsus (Eichhoff) (Coleoptera: Curculionidae) in a Modified Small-Bolt Assay

    Science.gov (United States)

    B. L. Strom; L. M. Roton

    2011-01-01

    Insecticide products based on cedar oil are readily available, but evaluations against pine bark beetles (Coleoptera: Curculionidae: Scolytinae) are lacking. In the southeastern U.S., the southern pine beetle, Dendroctonus frontalis Zimm, is the major bark beetle pest for which tree protectants are applied. However, Ips avulsus (Eichhoff) are more consistently...

  9. Isolation and extreme sex-specific expression of cytochrome P450 genes in the bark beetle, Ips paraconfusus, following feeding on the phloem of host ponderosa pine, Pinus ponderosa.

    Science.gov (United States)

    Huber, D P W; Erickson, M L; Leutenegger, C M; Bohlmann, J; Seybold, S J

    2007-06-01

    We have identified cDNAs and characterized the expression of 13 novel cytochrome P450 genes of potential importance in host colonization and reproduction by the California fivespined ips, Ips paraconfusus. Twelve are of the Cyp4 family and one is of the Cyp9 family. Following feeding on host Pinus ponderosa phloem, bark beetle transcript levels of several of the Cyp4 genes increased or decreased in males only or in both sexes. In one instance (IparaCyp4A5) transcript accumulated significantly in females, but declined significantly in males. The Cyp9 gene (Cyp9T1) transcript levels in males were > 85 000 x higher at 8 h and > 25 000 x higher at 24 h after feeding compared with nonfed controls. Transcript levels in females were approximately 150 x higher at 24 h compared with nonfed controls. Cyp4G27 transcript was present constitutively regardless of sex or feeding and served as a better housekeeping gene than beta-actin or 18S rRNA for the real-time TaqMan polymerase chain reaction analysis. The expression patterns of Cyp4AY1, Cyp4BG1, and, especially, Cyp9T1 in males suggest roles for these genes in male-specific aggregation pheromone production. The differential transcript accumulation patterns of these bark beetle P450s provide insight into ecological interactions of I. paraconfusus with its host pines.

  10. Codivergence and multiple host species use by fig wasp populations of the Ficus pollination mutualism

    Directory of Open Access Journals (Sweden)

    McLeish Michael J

    2012-01-01

    Full Text Available Abstract Background The interaction between insects and plants takes myriad forms in the generation of spectacular diversity. In this association a species host range is fundamental and often measured using an estimate of phylogenetic concordance between species. Pollinating fig wasps display extreme host species specificity, but the intraspecific variation in empirical accounts of host affiliation has previously been underestimated. In this investigation, lineage delimitation and codiversification tests are used to generate and discuss hypotheses elucidating on pollinating fig wasp associations with Ficus. Results Statistical parsimony and AMOVA revealed deep divergences at the COI locus within several pollinating fig wasp species that persist on the same host Ficus species. Changes in branching patterns estimated using the generalized mixed Yule coalescent test indicated lineage duplication on the same Ficus species. Conversely, Elisabethiella and Alfonsiella fig wasp species are able to reproduce on multiple, but closely related host fig species. Tree reconciliation tests indicate significant codiversification as well as significant incongruence between fig wasp and Ficus phylogenies. Conclusions The findings demonstrate more relaxed pollinating fig wasp host specificity than previously appreciated. Evolutionarily conservative host associations have been tempered by horizontal transfer and lineage duplication among closely related Ficus species. Independent and asynchronistic diversification of pollinating fig wasps is best explained by a combination of both sympatric and allopatric models of speciation. Pollinator host preference constraints permit reproduction on closely related Ficus species, but uncertainty of the frequency and duration of these associations requires better resolution.

  11. Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators

    NARCIS (Netherlands)

    Bianchi, G.; Hesselman, C.E.W.; Eertink, E.H.; Eertink, Henk; Kermani, P.; Lee, S.J.; Widya, I.A.; Huizer, E.

    We consider the distribution of channels of live multimedia content (e.g., radio or TV broadcasts) via multiple content aggregators. In our work, an aggregator receives channels from content sources and redistributes them to a potentially large number of mobile hosts. Each aggregator can offer a

  12. A Sequential Circuit-Based IP Watermarking Algorithm for Multiple Scan Chains in Design-for-Test

    Directory of Open Access Journals (Sweden)

    C. Wu

    2011-06-01

    Full Text Available In Very Large Scale Integrated Circuits (VLSI design, the existing Design-for-Test(DFT based watermarking techniques usually insert watermark through reordering scan cells, which causes large resource overhead, low security and coverage rate of watermark detection. A novel scheme was proposed to watermark multiple scan chains in DFT for solving the problems. The proposed scheme adopts DFT scan test model of VLSI design, and uses a Linear Feedback Shift Register (LFSR for pseudo random test vector generation. All of the test vectors are shifted in scan input for the construction of multiple scan chains with minimum correlation. Specific registers in multiple scan chains will be changed by the watermark circuit for watermarking the design. The watermark can be effectively detected without interference with normal function of the circuit, even after the chip is packaged. The experimental results on several ISCAS benchmarks show that the proposed scheme has lower resource overhead, probability of coincidence and higher coverage rate of watermark detection by comparing with the existing methods.

  13. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    International Nuclear Information System (INIS)

    Bin Abas, Faizulsalihin; Takayama, Shigeru

    2015-01-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and ''Cloud'' System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster

  14. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    Science.gov (United States)

    Abas, Faizulsalihin bin; Takayama, Shigeru

    2015-02-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and "Cloud" System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster.

  15. Multiple factors and processes involved in host cell killing by bacteriophage Mu: characterization and mapping.

    Science.gov (United States)

    Waggoner, B T; Marrs, C F; Howe, M M; Pato, M L

    1984-07-15

    The regions of bacteriophage Mu involved in host cell killing were determined by infection of a lambda-immune host with 12 lambda pMu-transducing phages carrying different amounts of Mu DNA beginning at the left end. Infecting lambda pMu phages containing 5.0 (+/- 0.2) kb or less of the left end of Mu DNA did not kill the lambda-immune host, whereas lambda pMu containing 5.1 kb did kill, thus locating the right end of the kil gene between approximately 5.0 and 5.1 kb. For the Kil+ phages the extent of killing increased as the multiplicity of infection (m.o.i.) increased. In addition, killing was also affected by the presence of at least two other regions of Mu DNA: one, located between 5.1 and 5.8 kb, decreased the extent of killing; the other, located between 6.3 and 7.9 kb, greatly increased host cell killing. Killing was also assayed after lambda pMu infection of a lambda-immune host carrying a mini-Mu deleted for most of the B gene and the middle region of Mu DNA. Complementation of mini-Mu replication by infecting B+ lambda pMu phages resulted in killing of the lambda-immune, mini-Mu-containing host, regardless of the presence or absence of the Mu kil gene. The extent of host cell killing increased as the m.o.i. of the infecting lambda pMu increased, and was further enhanced by both the presence of the kil gene and the region located between 6.3 and 7.9 kb. These distinct processes of kil-mediated killing in the absence of replication and non-kil-mediated killing in the presence of replication were also observed after induction of replication-deficient and kil mutant prophages, respectively.

  16. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    Science.gov (United States)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  17. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  18. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  19. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  20. Infectious Bursal Disease Virus-Host Interactions: Multifunctional Viral Proteins that Perform Multiple and Differing Jobs

    Directory of Open Access Journals (Sweden)

    Yao Qin

    2017-01-01

    Full Text Available Infectious bursal disease (IBD is an acute, highly contagious and immunosuppressive poultry disease caused by IBD virus (IBDV. The consequent immunosuppression increases susceptibility to other infectious diseases and the risk of subsequent vaccination failure as well. Since the genome of IBDV is relatively small, it has a limited number of proteins inhibiting the cellular antiviral responses and acting as destroyers to the host defense system. Thus, these virulence factors must be multifunctional in order to complete the viral replication cycle in a host cell. Insights into the roles of these viral proteins along with their multiple cellular targets in different pathways will give rise to a rational design for safer and effective vaccines. Here we summarize the recent findings that focus on the virus–cell interactions during IBDV infection at the protein level.

  1. Temporal Assessment of the Impact of Exposure to Cow Feces in Two Watersheds by Multiple Host-Specific PCR Assays

    Science.gov (United States)

    Exposure to feces in two watersheds with different management histories was assessed by tracking cattle feces bacterial populations using multiple host-specific PCR assays. In addition, environmental factors affecting the occurrence of these markers were identified. Each assay wa...

  2. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  3. Molecular interrogation of the feeding behaviour of field captured individual insects for interpretation of multiple host plant use.

    Directory of Open Access Journals (Sweden)

    James P Hereward

    Full Text Available The way in which herbivorous insect individuals use multiple host species is difficult to quantify under field conditions, but critical to understanding the evolutionary processes underpinning insect-host plant relationships. In this study we developed a novel approach to understanding the host plant interactions of the green mirid, Creontiades dilutus, a highly motile heteropteran bug that has been associated with many plant species. We combine quantified sampling of the insect across its various host plant species within particular sites and a molecular comparison between the insects' gut contents and available host plants. This approach allows inferences to be made as to the plants fed upon by individual insects in the field. Quantified sampling shows that this "generalist" species is consistently more abundant on two species in the genus Cullen (Fabaceae, its primary host species, than on any other of its numerous listed hosts. The chloroplast intergenic sequences reveal that C. dilutus frequently feeds on plants additional to the one from which it was collected, even when individuals were sampled from the primary host species. These data may be reconciled by viewing multiple host use in this species as an adaptation to survive spatiotemporally ephemeral habitats. The methodological framework developed here provides a basis from which new insights into the feeding behaviour and host plant relationships of herbivorous insects can be derived, which will benefit not only ecological interpretation but also our understanding of the evolution of these relationships.

  4. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  5. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  6. Real-time capture and reconstruction system with multiple GPUs for a 3D live scene by a generation from 4K IP images to 8K holograms.

    Science.gov (United States)

    Ichihashi, Yasuyuki; Oi, Ryutaro; Senoh, Takanori; Yamamoto, Kenji; Kurita, Taiichiro

    2012-09-10

    We developed a real-time capture and reconstruction system for three-dimensional (3D) live scenes. In previous research, we used integral photography (IP) to capture 3D images and then generated holograms from the IP images to implement a real-time reconstruction system. In this paper, we use a 4K (3,840 × 2,160) camera to capture IP images and 8K (7,680 × 4,320) liquid crystal display (LCD) panels for the reconstruction of holograms. We investigate two methods for enlarging the 4K images that were captured by integral photography to 8K images. One of the methods increases the number of pixels of each elemental image. The other increases the number of elemental images. In addition, we developed a personal computer (PC) cluster system with graphics processing units (GPUs) for the enlargement of IP images and the generation of holograms from the IP images using fast Fourier transform (FFT). We used the Compute Unified Device Architecture (CUDA) as the development environment for the GPUs. The Fast Fourier transform is performed using the CUFFT (CUDA FFT) library. As a result, we developed an integrated system for performing all processing from the capture to the reconstruction of 3D images by using these components and successfully used this system to reconstruct a 3D live scene at 12 frames per second.

  7. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  8. Ensuring Software IP Cleanliness

    OpenAIRE

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  9. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  10. Multiple candidate effectors from the oomycete pathogen Hyaloperonospora arabidopsidis suppress host plant immunity.

    Directory of Open Access Journals (Sweden)

    Georgina Fabro

    2011-11-01

    Full Text Available Oomycete pathogens cause diverse plant diseases. To successfully colonize their hosts, they deliver a suite of effector proteins that can attenuate plant defenses. In the oomycete downy mildews, effectors carry a signal peptide and an RxLR motif. Hyaloperonospora arabidopsidis (Hpa causes downy mildew on the model plant Arabidopsis thaliana (Arabidopsis. We investigated if candidate effectors predicted in the genome sequence of Hpa isolate Emoy2 (HaRxLs were able to manipulate host defenses in different Arabidopsis accessions. We developed a rapid and sensitive screening method to test HaRxLs by delivering them via the bacterial type-three secretion system (TTSS of Pseudomonas syringae pv tomato DC3000-LUX (Pst-LUX and assessing changes in Pst-LUX growth in planta on 12 Arabidopsis accessions. The majority (~70% of the 64 candidates tested positively contributed to Pst-LUX growth on more than one accession indicating that Hpa virulence likely involves multiple effectors with weak accession-specific effects. Further screening with a Pst mutant (ΔCEL showed that HaRxLs that allow enhanced Pst-LUX growth usually suppress callose deposition, a hallmark of pathogen-associated molecular pattern (PAMP-triggered immunity (PTI. We found that HaRxLs are rarely strong avirulence determinants. Although some decreased Pst-LUX growth in particular accessions, none activated macroscopic cell death. Fewer HaRxLs conferred enhanced Pst growth on turnip, a non-host for Hpa, while several reduced it, consistent with the idea that turnip's non-host resistance against Hpa could involve a combination of recognized HaRxLs and ineffective HaRxLs. We verified our results by constitutively expressing in Arabidopsis a sub-set of HaRxLs. Several transgenic lines showed increased susceptibility to Hpa and attenuation of Arabidopsis PTI responses, confirming the HaRxLs' role in Hpa virulence. This study shows TTSS screening system provides a useful tool to test whether

  11. Autologous Graft versus Host Disease: An Emerging Complication in Patients with Multiple Myeloma

    Directory of Open Access Journals (Sweden)

    Anu Batra

    2014-01-01

    Full Text Available Autologous graft versus host disease (autoGVHD is a rare transplant complication with significant morbidity and mortality. It has been hypothesized that patients with multiple myeloma might be predisposed to autoGVHD through dysregulation of the immune response resulting from either their disease, the immunomodulatory agents (IMiDs used to treat it, or transplant conditioning regimen. Hematopoietic progenitor cell (HPC products were available from 8 multiple myeloma patients with biopsy-proven autoGVHD, 16 matched multiple myeloma patients who did not develop autoGVHD, and 7 healthy research donors. The data on number of transplants prior to developing autoGVHD, mobilization regimens, exposure to proteasome inhibitors, use of IMiDs, and class I human leukocyte antigen types (HLA A and B were collected. The HPC products were analyzed by flow cytometry for expression of CD3, CD4, CD8, CD25, CD56, and FoxP3. CD3+ cell number was significantly lower in autoGVHD patients compared to unaffected controls (P=0.047. On subset analysis of CD3+ cells, CD8+ cells (but not CD4+ cells were found to be significantly lower in patients with autoGVHD (P=0.038. HLA-B55 expression was significantly associated with development of autoGVHD (P=0.032. Lower percentages of CD3+ and CD8+ T-cells and HLA-B55 expression may be predisposing factors for developing autoGVHD in myeloma.

  12. Mycobacterium tuberculosis Acquires Limited Genetic Diversity in Prolonged Infections, Reactivations and Transmissions Involving Multiple Hosts

    Directory of Open Access Journals (Sweden)

    Marta Herranz

    2018-01-01

    Full Text Available Background:Mycobacterium tuberculosis (MTB has limited ability to acquire variability. Analysis of its microevolution might help us to evaluate the pathways followed to acquire greater infective success. Whole-genome sequencing (WGS in the analysis of the transmission of MTB has elucidated the magnitude of variability in MTB. Analysis of transmission currently depends on the identification of clusters, according to the threshold of variability (<5 SNPs between isolates.Objective: We evaluated whether the acquisition of variability in MTB, was more frequent in situations which could favor it, namely intrapatient, prolonged infections or reactivations and interpatient transmissions involving multiple sequential hosts.Methods: We used WGS to analyze the accumulation of variability in sequential isolates from prolonged infections or translations from latency to reactivation. We then measured microevolution in transmission clusters with prolonged transmission time, high number of involved cases, simultaneous involvement of latency and active transmission.Results: Intrapatient and interpatient acquisition of variability was limited, within the ranges expected according to the thresholds of variability proposed, even though bursts of variability were observed.Conclusions: The thresholds of variability proposed for MTB seem to be valid in most circumstances, including those theoretically favoring acquisition of variability. Our data point to multifactorial modulation of microevolution, although further studies are necessary to elucidate the factors underlying this modulation.

  13. A comparison of the adaptations of strains of Lymantria dispar multiple nucleopolyhedrovirus to hosts from spatially isolated populations

    Science.gov (United States)

    V.V. Martemyanov; J.D. Podgwaite; I.A. Belousova; S.V. Pavlushin; J.M. Slavicek; O.A. Baturina; M.R. Kabilov; A.V. Ilyinykh

    2017-01-01

    The adaptation of pathogens to either their hosts or to environmental conditions is the focus of many current ecological studies. In this work we compared the ability of six spatially-distant Lymantria dispar (gypsy moth) multiple nucleopolyhedrovirus (LdMNPV) strains (three from eastern North America and three from central Asia) to induce acute...

  14. Large-Scale Phylogenomic Analysis Reveals the Complex Evolutionary History of Rabies Virus in Multiple Carnivore Hosts.

    Directory of Open Access Journals (Sweden)

    Cécile Troupin

    2016-12-01

    Full Text Available The natural evolution of rabies virus (RABV provides a potent example of multiple host shifts and an important opportunity to determine the mechanisms that underpin viral emergence. Using 321 genome sequences spanning an unprecedented diversity of RABV, we compared evolutionary rates and selection pressures in viruses sampled from multiple primary host shifts that occurred on various continents. Two major phylogenetic groups, bat-related RABV and dog-related RABV, experiencing markedly different evolutionary dynamics were identified. While no correlation between time and genetic divergence was found in bat-related RABV, the evolution of dog-related RABV followed a generally clock-like structure, although with a relatively low evolutionary rate. Subsequent molecular clock dating indicated that dog-related RABV likely underwent a rapid global spread following the intensification of intercontinental trade starting in the 15th century. Strikingly, although dog RABV has jumped to various wildlife species from the order Carnivora, we found no clear evidence that these host-jumping events involved adaptive evolution, with RABV instead characterized by strong purifying selection, suggesting that ecological processes also play an important role in shaping patterns of emergence. However, specific amino acid changes were associated with the parallel emergence of RABV in ferret-badgers in Asia, and some host shifts were associated with increases in evolutionary rate, particularly in the ferret-badger and mongoose, implying that changes in host species can have important impacts on evolutionary dynamics.

  15. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  16. EcoIP: An Open Source Image Analysis Toolkit to Identify Different Stages of Plant Phenology for Multiple Species with Pan-Tilt-Zoom Cameras

    DEFF Research Database (Denmark)

    Granados, Joel; Bonnet, Philippe

    2013-01-01

    Because of the increased number of cameras employed in environmental sensing and the tremendous image output they produce, we have created a flexible, open-source software solution called EcoIP to help automatically determine different phenophases for different species from digital image sequences....... Onset and ending dates are calculated through an iterative process: (1) training images are chosen and areas of interest identified, (2) separation of foreground and background is accomplished based on a naive Bayesian method, (3) a signal is created based on the separation model and (4) it is then fit...... to a sigmoid that contains the dates of interest. Results using different phenological events of different species indicate that estimated dates fall within a few days of the observed dates for most cases. Our experiments indicate that color separability and scene illumination are contributing factors...

  17. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  18. IP Infrastructure Geolocation

    Science.gov (United States)

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  19. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  20. Simultaneous Determination of Binding Constants for Multiple Carbohydrate Hosts in Complex Mixtures

    DEFF Research Database (Denmark)

    Meier, Sebastian; Beeren, Sophie

    2014-01-01

    We describe a simple method for the simultaneous determination of association constants for a guest binding to seven different hosts in a mixture of more than 20 different oligosaccharides. If the binding parameters are known for one component in the mixture, a single NMR titration suffices...

  1. Tumor necrosis factor in sepsis: mediator of multiple organ failure or essential part of host defense?

    NARCIS (Netherlands)

    van der Poll, T.; Lowry, S. F.

    1995-01-01

    Tumor necrosis factor-alpha (TNF) exerts numerous influences which, in association with severe infection, subserve both detrimental as well as beneficial host responses. The current review addresses recent insights into the structure and function of this pleiotropic cytokine, with a particular

  2. Interleukin-12 induces sustained activation of multiple host inflammatory mediator systems in chimpanzees

    NARCIS (Netherlands)

    Lauw, F. N.; Dekkers, P. E.; te Velde, A. A.; Speelman, P.; Levi, M. [=Marcel M.; Kurimoto, M.; Hack, C. E.; van Deventer, S. J.; van der Poll, T.

    1999-01-01

    To determine in vivo effects of interleukin (IL)-12 on host inflammatory mediator systems, 4 healthy chimpanzees received recombinant human IL-12 (1 microg/kg) by intravenous injection. IL-12 induced increases in plasma concentrations of IL-15, IL-18, and interferon-gamma (IFN-gamma), plus a marked

  3. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  4. Inhibition of host extracellular signal-regulated kinase (ERK) activation decreases new world alphavirus multiplication in infected cells

    Energy Technology Data Exchange (ETDEWEB)

    Voss, Kelsey; Amaya, Moushimi [National Center for Biodefense and Infectious Diseases, School of Systems Biology, George Mason University, 10650 Pyramid Place, Manassas, VA (United States); Mueller, Claudius [Center for Applied Proteomics and Personalized Medicine, George Mason University, 10900 University Boulevard, Manassas, VA (United States); Roberts, Brian [Leidos Health Life Sciences, 5202 Presidents Court, Suite 110, Frederick, MD (United States); Kehn-Hall, Kylene; Bailey, Charles [National Center for Biodefense and Infectious Diseases, School of Systems Biology, George Mason University, 10650 Pyramid Place, Manassas, VA (United States); Petricoin, Emanuel [Center for Applied Proteomics and Personalized Medicine, George Mason University, 10900 University Boulevard, Manassas, VA (United States); Narayanan, Aarthi, E-mail: anaraya1@gmu.edu [National Center for Biodefense and Infectious Diseases, School of Systems Biology, George Mason University, 10650 Pyramid Place, Manassas, VA (United States)

    2014-11-15

    New World alphaviruses belonging to the family Togaviridae are classified as emerging infectious agents and Category B select agents. Our study is focused on the role of the host extracellular signal-regulated kinase (ERK) in the infectious process of New World alphaviruses. Infection of human cells by Venezuelan equine encephalitis virus (VEEV) results in the activation of the ERK-signaling cascade. Inhibition of ERK1/2 by the small molecule inhibitor Ag-126 results in inhibition of viral multiplication. Ag-126-mediated inhibition of VEEV was due to potential effects on early and late stages of the infectious process. While expression of viral proteins was down-regulated in Ag-126 treated cells, we did not observe any influence of Ag-126 on the nuclear distribution of capsid. Finally, Ag-126 exerted a broad-spectrum inhibitory effect on New World alphavirus multiplication, thus indicating that the host kinase, ERK, is a broad-spectrum candidate for development of novel therapeutics against New World alphaviruses. - Highlights: • VEEV infection activated multiple components of the ERK signaling cascade. • Inhibition of ERK activation using Ag-126 inhibited VEEV multiplication. • Activation of ERK by Ceramide C6 increased infectious titers of TC-83. • Ag-126 inhibited virulent strains of all New World alphaviruses. • Ag-126 treatment increased percent survival of infected cells.

  5. Inhibition of host extracellular signal-regulated kinase (ERK) activation decreases new world alphavirus multiplication in infected cells

    International Nuclear Information System (INIS)

    Voss, Kelsey; Amaya, Moushimi; Mueller, Claudius; Roberts, Brian; Kehn-Hall, Kylene; Bailey, Charles; Petricoin, Emanuel; Narayanan, Aarthi

    2014-01-01

    New World alphaviruses belonging to the family Togaviridae are classified as emerging infectious agents and Category B select agents. Our study is focused on the role of the host extracellular signal-regulated kinase (ERK) in the infectious process of New World alphaviruses. Infection of human cells by Venezuelan equine encephalitis virus (VEEV) results in the activation of the ERK-signaling cascade. Inhibition of ERK1/2 by the small molecule inhibitor Ag-126 results in inhibition of viral multiplication. Ag-126-mediated inhibition of VEEV was due to potential effects on early and late stages of the infectious process. While expression of viral proteins was down-regulated in Ag-126 treated cells, we did not observe any influence of Ag-126 on the nuclear distribution of capsid. Finally, Ag-126 exerted a broad-spectrum inhibitory effect on New World alphavirus multiplication, thus indicating that the host kinase, ERK, is a broad-spectrum candidate for development of novel therapeutics against New World alphaviruses. - Highlights: • VEEV infection activated multiple components of the ERK signaling cascade. • Inhibition of ERK activation using Ag-126 inhibited VEEV multiplication. • Activation of ERK by Ceramide C6 increased infectious titers of TC-83. • Ag-126 inhibited virulent strains of all New World alphaviruses. • Ag-126 treatment increased percent survival of infected cells

  6. Cystic fibrosis-niche adaptation of Pseudomonas aeruginosa reduces virulence in multiple infection hosts.

    Directory of Open Access Journals (Sweden)

    Nicola Ivan Lorè

    Full Text Available The opportunistic pathogen Pseudomonas aeruginosa is able to thrive in diverse ecological niches and to cause serious human infection. P. aeruginosa environmental strains are producing various virulence factors that are required for establishing acute infections in several host organisms; however, the P. aeruginosa phenotypic variants favour long-term persistence in the cystic fibrosis (CF airways. Whether P. aeruginosa strains, which have adapted to the CF-niche, have lost their competitive fitness in the other environment remains to be investigated. In this paper, three P. aeruginosa clonal lineages, including early strains isolated at the onset of infection, and late strains, isolated after several years of chronic lung infection from patients with CF, were analysed in multi-host model systems of acute infection. P. aeruginosa early isolates caused lethality in the three non-mammalian hosts, namely Caenorhabditis elegans, Galleria mellonella, and Drosophila melanogaster, while late adapted clonal isolates were attenuated in acute virulence. When two different mouse genetic background strains, namely C57Bl/6NCrl and Balb/cAnNCrl, were used as acute infection models, early P. aeruginosa CF isolates were lethal, while late isolates exhibited reduced or abolished acute virulence. Severe histopathological lesions, including high leukocytes recruitment and bacterial load, were detected in the lungs of mice infected with P. aeruginosa CF early isolates, while late isolates were progressively cleared. In addition, systemic bacterial spread and invasion of epithelial cells, which were detected for P. aeruginosa CF early strains, were not observed with late strains. Our findings indicate that niche-specific selection in P. aeruginosa reduced its ability to cause acute infections across a broad range of hosts while maintaining the capacity for chronic infection in the CF host.

  7. Transcriptome Analysis Reveals Novel Entry Mechanisms and a Central Role of SRC in Host Defense during High Multiplicity Mycobacterial Infection.

    Directory of Open Access Journals (Sweden)

    Jay Zhang

    Full Text Available Mycobacterium tuberculosis (MTB infects an estimated one-third of the global population and is one of the main causes of mortality from an infectious agent. The characteristics of macrophages challenged by MTB with a high multiplicity of infection (MOI, which mimics both clinical disseminated infection and granuloma formation, are distinct from macrophages challenged with a low MOI. To better understand the cross talk between macrophage host cells and mycobacteria, we compared the transcription patterns of mouse macrophages infected with bacille Calmette-Guérin, H37Ra and M. smegmatis. Attention was focused on the changes in the abundance of transcripts related to immune system function. From the results of a transcriptome profiling study with a high mycobacterial MOI, we defined a pathogen-specific host gene expression pattern. The present study suggests that two integrins, ITGA5 and ITGAV, are novel cell surface receptors mediating mycobacterium entry into macrophages challenged with high MOI. Our results indicate that SRC likely plays a central role in regulating multiple unique signaling pathways activated by MTB infection. The integrated results increase our understanding of the molecular networks behind the host innate immune response and identify important targets that might be useful for the development of tuberculosis therapy.

  8. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  9. The Influence of Multiple Host Contacts on the Acquisition and Transmission of Dengue-2 Virus

    Science.gov (United States)

    1993-01-01

    final push, Dr. Scott nudged , prodded and cajoled me into finishing. Dr. Scott also taught me that there’s always time and room for change , even within... change the behavior of their host. Sci. Am. 250: 108-115. Molyneux, D. H. and D. Jefferies. 1986. Feeding behaviour of pathogen-infected vectors...inadequate to account for changes in the incidence of dengue hemorrhagic fever." Since changes in adult female Af. agga. population size and life

  10. MsmK, an ATPase, Contributes to Utilization of Multiple Carbohydrates and Host Colonization of Streptococcus suis.

    Science.gov (United States)

    Tan, Mei-Fang; Gao, Ting; Liu, Wan-Quan; Zhang, Chun-Yan; Yang, Xi; Zhu, Jia-Wen; Teng, Mu-Ye; Li, Lu; Zhou, Rui

    2015-01-01

    Acquisition and metabolism of carbohydrates are essential for host colonization and pathogenesis of bacterial pathogens. Different bacteria can uptake different lines of carbohydrates via ABC transporters, in which ATPase subunits energize the transport though ATP hydrolysis. Some ABC transporters possess their own ATPases, while some share a common ATPase. Here we identified MsmK, an ATPase from Streptococcus suis, an emerging zoonotic bacterium causing dead infections in pigs and humans. Genetic and biochemistry studies revealed that the MsmK was responsible for the utilization of raffinose, melibiose, maltotetraose, glycogen and maltotriose. In infected mice, the msmK-deletion mutant showed significant defects of survival and colonization when compared with its parental and complementary strains. Taken together, MsmK is an ATPase that contributes to multiple carbohydrates utilization and host colonization of S. suis. This study gives new insight into our understanding of the carbohydrates utilization and its relationship to the pathogenesis of this zoonotic pathogen.

  11. Virulence Genotyping of Pasteurella multocida Isolated from Multiple Hosts from India

    Directory of Open Access Journals (Sweden)

    Laxmi Narayan Sarangi

    2014-01-01

    Full Text Available In this study, 108 P. multocida isolates recovered from various host animals such as cattle, buffalo, swine, poultry (chicken, duck, and emu and rabbits were screened for carriage of 8 virulence associated genes. The results revealed some unique information on the prevalence of virulence associated genes among Indian isolates. With the exception of toxA gene, all other virulence associated genes were found to be regularly distributed among host species. Association study between capsule type and virulence genes suggested that pfhA, nanB, and nanH genes were regularly distributed among all serotypes with the exception of CapD, whereas toxA gene was found to be positively associated with CapD and CapA. The frequency of hgbA and nanH genes among swine isolates of Indian origin was found to be less in comparison to its equivalents around the globe. Interestingly, very high prevalence of tbpA gene was observed among poultry, swine, and rabbit isolates. Likewise, very high prevalence of pfhA gene (95.3% was observed among Indian isolates, irrespective of host species origin.

  12. Virulence genotyping of Pasteurella multocida isolated from multiple hosts from India.

    Science.gov (United States)

    Sarangi, Laxmi Narayan; Priyadarshini, Adyasha; Kumar, Santosh; Thomas, Prasad; Gupta, Santosh Kumar; Nagaleekar, Viswas Konasagara; Singh, Vijendra Pal

    2014-01-01

    In this study, 108 P. multocida isolates recovered from various host animals such as cattle, buffalo, swine, poultry (chicken, duck, and emu) and rabbits were screened for carriage of 8 virulence associated genes. The results revealed some unique information on the prevalence of virulence associated genes among Indian isolates. With the exception of toxA gene, all other virulence associated genes were found to be regularly distributed among host species. Association study between capsule type and virulence genes suggested that pfhA, nanB, and nanH genes were regularly distributed among all serotypes with the exception of CapD, whereas toxA gene was found to be positively associated with CapD and CapA. The frequency of hgbA and nanH genes among swine isolates of Indian origin was found to be less in comparison to its equivalents around the globe. Interestingly, very high prevalence of tbpA gene was observed among poultry, swine, and rabbit isolates. Likewise, very high prevalence of pfhA gene (95.3%) was observed among Indian isolates, irrespective of host species origin.

  13. Efficacy of multiple anticancer therapies may depend on host immune response

    Directory of Open Access Journals (Sweden)

    Kritika Karri

    2017-06-01

    Full Text Available The host immune system is a key player in anticancer therapy response and resistance. Although the impact of host immune response in the ‘war against cancer’ has been studied and it has been the basis for immunotherapy, understanding of its role in attenuating the action of conventional anticancer therapies is an area that has not been fully explored. In spite of advances in systemic therapy, the 5-year survival rate for adenocarcinoma is still a mere 13% and the primary reason for treatment failure is believed to be due to acquired resistance to therapy. Hence, there is a need for identifying reliable biomarkers for guided treatment of lung and colon adenocarcinoma and to better predict the outcomes of specific anticancer therapies. In this work, gene expression data were analyzed using public resources and this study shows how host immune competence underscores the efficacy of various anticancer therapies. Additionally, the result provides insight on the regulation of certain biochemical pathways relating to the immune system, and suggests that smart chemotherapeutic intervention strategies could be based on a patient’s immune profile.

  14. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  15. Ade-Ojo, IP

    African Journals Online (AJOL)

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  16. In Silico Pooling of ChIP-seq Control Experiments

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  17. Role of multiple hosts in the cross-species transmission and emergence of a pandemic parvovirus.

    Science.gov (United States)

    Allison, Andrew B; Harbison, Carole E; Pagan, Israel; Stucker, Karla M; Kaelber, Jason T; Brown, Justin D; Ruder, Mark G; Keel, M Kevin; Dubovi, Edward J; Holmes, Edward C; Parrish, Colin R

    2012-01-01

    Understanding the mechanisms of cross-species virus transmission is critical to anticipating emerging infectious diseases. Canine parvovirus type 2 (CPV-2) emerged as a variant of a feline parvovirus when it acquired mutations that allowed binding to the canine transferrin receptor type 1 (TfR). However, CPV-2 was soon replaced by a variant virus (CPV-2a) that differed in antigenicity and receptor binding. Here we show that the emergence of CPV involved an additional host range variant virus that has circulated undetected in raccoons for at least 24 years, with transfers to and from dogs. Raccoon virus capsids showed little binding to the canine TfR, showed little infection of canine cells, and had altered antigenic structures. Remarkably, in capsid protein (VP2) phylogenies, most raccoon viruses fell as evolutionary intermediates between the CPV-2 and CPV-2a strains, suggesting that passage through raccoons assisted in the evolution of CPV-2a. This highlights the potential role of alternative hosts in viral emergence.

  18. Role of Multiple Hosts in the Cross-Species Transmission and Emergence of a Pandemic Parvovirus

    Science.gov (United States)

    Allison, Andrew B.; Harbison, Carole E.; Pagan, Israel; Stucker, Karla M.; Kaelber, Jason T.; Brown, Justin D.; Ruder, Mark G.; Keel, M. Kevin; Dubovi, Edward J.; Holmes, Edward C.

    2012-01-01

    Understanding the mechanisms of cross-species virus transmission is critical to anticipating emerging infectious diseases. Canine parvovirus type 2 (CPV-2) emerged as a variant of a feline parvovirus when it acquired mutations that allowed binding to the canine transferrin receptor type 1 (TfR). However, CPV-2 was soon replaced by a variant virus (CPV-2a) that differed in antigenicity and receptor binding. Here we show that the emergence of CPV involved an additional host range variant virus that has circulated undetected in raccoons for at least 24 years, with transfers to and from dogs. Raccoon virus capsids showed little binding to the canine TfR, showed little infection of canine cells, and had altered antigenic structures. Remarkably, in capsid protein (VP2) phylogenies, most raccoon viruses fell as evolutionary intermediates between the CPV-2 and CPV-2a strains, suggesting that passage through raccoons assisted in the evolution of CPV-2a. This highlights the potential role of alternative hosts in viral emergence. PMID:22072763

  19. Disease spread across multiple scales in a spatial hierarchy: effect of host spatial structure and of inoculum quantity and distribution.

    Science.gov (United States)

    Gosme, Marie; Lucas, Philippe

    2009-07-01

    Spatial patterns of both the host and the disease influence disease spread and crop losses. Therefore, the manipulation of these patterns might help improve control strategies. Considering disease spread across multiple scales in a spatial hierarchy allows one to capture important features of epidemics developing in space without using explicitly spatialized variables. Thus, if the system under study is composed of roots, plants, and planting hills, the effect of host spatial pattern can be studied by varying the number of plants per planting hill. A simulation model based on hierarchy theory was used to simulate the effects of large versus small planting hills, low versus high level of initial infections, and aggregated versus uniform distribution of initial infections. The results showed that aggregating the initially infected plants always resulted in slower epidemics than spreading out the initial infections uniformly. Simulation results also showed that, in most cases, disease epidemics were slower in the case of large host aggregates (100 plants/hill) than with smaller aggregates (25 plants/hill), except when the initially infected plants were both numerous and spread out uniformly. The optimal strategy for disease control depends on several factors, including initial conditions. More importantly, the model offers a framework to account for the interplay between the spatial characteristics of the system, rates of infection, and aggregation of the disease.

  20. The integration of multiple OS-9 stations with a VAX/VMS host via Ethernet

    International Nuclear Information System (INIS)

    Charity, T.

    1989-01-01

    In this paper a method for providing embedded microprocessors with virtual disk storage capacity and remote terminal access from a VAX/VMS host via Ethernet is described. The underlying Ethernet driver permits different network protocols to be co-resident in the microprocessors. The system described is in use in many experiments at CERN and elsewhere, and provides a cheap and effective method for sharing data and programs between microprocessors and VAX/VMS systems. Existing approaches to these problems required sole use of a dedicated intelligent network interface, and were biased towards VMEbus systems. One of the goals of the design was to provide a highly transparent and easy-to-use development environment such that users would appear to be working on dedicated microprocessor workstations, unaware of the underlying network connections

  1. Ground deformation at collapse calderas: influence of host rock lithology and reservoir multiplicity

    Energy Technology Data Exchange (ETDEWEB)

    Geyer, A; Gottsmann, J [Department of Earth Sciences, University of Bristol, Wills Memorial Building, Queen' s Road, BS8 1RJ, Bristol (United Kingdom)], E-mail: A.GeverTraver@bristol.ac.uk

    2008-10-01

    A variety of source mechanisms have been proposed to account for observed caldera deformation. Here we present a systematic set of new results from numerical forward modelling using a Finite Element Method. which provides a link between measured ground deformation and the inaccessible deformation source. We simulate surface displacements due to pressure changes in a shallow oblate reservoir overlain by host rock with variable mechanical properties. We find that the amplitude and wavelength of resultant ground deformation is dependent on the distribution of mechanically stiff and soft lithologies and their relative distribution above a reservoir. In addition, we note an influence of layering on the critical ratio of horizontal over vertical displacements, a criterion employed to discriminate between different finite source geometries.

  2. Noncoding Subgenomic Flavivirus RNA: Multiple Functions in West Nile Virus Pathogenesis and Modulation of Host Responses

    Directory of Open Access Journals (Sweden)

    Justin A. Roby

    2014-01-01

    Full Text Available Flaviviruses are a large group of positive strand RNA viruses transmitted by arthropods that include many human pathogens such as West Nile virus (WNV, Japanese encephalitis virus (JEV, yellow fever virus, dengue virus, and tick-borne encephalitis virus. All members in this genus tested so far are shown to produce a unique subgenomic flavivirus RNA (sfRNA derived from the 3' untranslated region (UTR. sfRNA is a product of incomplete degradation of genomic RNA by the cell 5'–3' exoribonuclease XRN1 which stalls at highly ordered secondary RNA structures at the beginning of the 3'UTR. Generation of sfRNA results in inhibition of XRN1 activity leading to an increase in stability of many cellular mRNAs. Mutant WNV deficient in sfRNA generation was highly attenuated displaying a marked decrease in cytopathicity in cells and pathogenicity in mice. sfRNA has also been shown to inhibit the antiviral activity of IFN-α/β by yet unknown mechanism and of the RNAi pathway by likely serving as a decoy substrate for Dicer. Thus, sfRNA is involved in modulating multiple cellular pathways to facilitate viral pathogenicity; however the overlying mechanism linking all these multiple functions of sfRNA remains to be elucidated.

  3. Nymphal and adult performance of Euschistus heros (Fabr.) (Hemiptera: Pentatomidae), as a potential alternative host for egg parasitoids multiplication

    International Nuclear Information System (INIS)

    Peres, Wilsimar A.A.; Correa-Ferreira, Beatriz S.

    2001-01-01

    This research aimed to evaluate the potential of Euschistus heros (Fabr.) (Hemiptera: Pentatomidae) as host for multiplication of egg parasitoids, by determining the nymphal and adult performance of E. heros from laboratory and the field, comparing with Nezara viridula (L.) (Hemiptera: Pentatomidae), under mass conditions. One hundred eggs of E. heros and N. viridula were placed among the leaves of soybean plants contained in cages (50x50x70 cm) and observation were made until adult emergence. The nymphs fed on soybean pods, dry soybean and peanuts seeds. The number of nymphs that reached adulthood and the development time were calculated. The survivorship and reproduction performance of laboratory and field populations of E. heros and N. viridula were evaluated during 13 weeks in February-May 1999. The number of eggs produced by 100 pairs of stink bugs per cage containing the same diet was recorded. Nymphal development time of E. heros and N. viridula was 33.0 and 34.0 days and 65.0% and 71.3% of nymphs reached adulthood, respectively. Adults of E. heros reared under laboratory conditions produced 2.5 times more eggs (5547.0 eggs/cage) than those collected in the field (2262.7 eggs/cage). The adult field population of E. heros had reduced reproduction and longevity due to parasitism by Hexacladia smithii Ash. (Hymenoptera: Encyrtidae). The N. viridula adults collected in the field produced 1.7 times more eggs (6304.9 eggs/cage) than those reared in the laboratory (3609.2 eggs/cage). E. heros laboratory reared is a promising host for egg parasitoids multiplication when compared with N. viridula collected in the field. (author)

  4. Nymphal and adult performance of Euschistus heros (Fabr.) (Hemiptera: Pentatomidae), as a potential alternative host for egg parasitoids multiplication

    Energy Technology Data Exchange (ETDEWEB)

    Peres, Wilsimar A.A. [Universidade Federal do Parana, Curitiba, PR (Brazil). Dept. de Zoologia; Correa-Ferreira, Beatriz S. [EMBRAPA, Londrina, PR (Brazil). Centro Nacional de Pesquisa de Soja

    2001-12-15

    This research aimed to evaluate the potential of Euschistus heros (Fabr.) (Hemiptera: Pentatomidae) as host for multiplication of egg parasitoids, by determining the nymphal and adult performance of E. heros from laboratory and the field, comparing with Nezara viridula (L.) (Hemiptera: Pentatomidae), under mass conditions. One hundred eggs of E. heros and N. viridula were placed among the leaves of soybean plants contained in cages (50x50x70 cm) and observation were made until adult emergence. The nymphs fed on soybean pods, dry soybean and peanuts seeds. The number of nymphs that reached adulthood and the development time were calculated. The survivorship and reproduction performance of laboratory and field populations of E. heros and N. viridula were evaluated during 13 weeks in February-May 1999. The number of eggs produced by 100 pairs of stink bugs per cage containing the same diet was recorded. Nymphal development time of E. heros and N. viridula was 33.0 and 34.0 days and 65.0% and 71.3% of nymphs reached adulthood, respectively. Adults of E. heros reared under laboratory conditions produced 2.5 times more eggs (5547.0 eggs/cage) than those collected in the field (2262.7 eggs/cage). The adult field population of E. heros had reduced reproduction and longevity due to parasitism by Hexacladia smithii Ash. (Hymenoptera: Encyrtidae). The N. viridula adults collected in the field produced 1.7 times more eggs (6304.9 eggs/cage) than those reared in the laboratory (3609.2 eggs/cage). E. heros laboratory reared is a promising host for egg parasitoids multiplication when compared with N. viridula collected in the field. (author)

  5. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  6. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  7. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  8. Horizontal acquisition of multiple mitochondrial genes from a parasitic plant followed by gene conversion with host mitochondrial genes

    Science.gov (United States)

    2010-01-01

    Background Horizontal gene transfer (HGT) is relatively common in plant mitochondrial genomes but the mechanisms, extent and consequences of transfer remain largely unknown. Previous results indicate that parasitic plants are often involved as either transfer donors or recipients, suggesting that direct contact between parasite and host facilitates genetic transfer among plants. Results In order to uncover the mechanistic details of plant-to-plant HGT, the extent and evolutionary fate of transfer was investigated between two groups: the parasitic genus Cuscuta and a small clade of Plantago species. A broad polymerase chain reaction (PCR) survey of mitochondrial genes revealed that at least three genes (atp1, atp6 and matR) were recently transferred from Cuscuta to Plantago. Quantitative PCR assays show that these three genes have a mitochondrial location in the one species line of Plantago examined. Patterns of sequence evolution suggest that these foreign genes degraded into pseudogenes shortly after transfer and reverse transcription (RT)-PCR analyses demonstrate that none are detectably transcribed. Three cases of gene conversion were detected between native and foreign copies of the atp1 gene. The identical phylogenetic distribution of the three foreign genes within Plantago and the retention of cytidines at ancestral positions of RNA editing indicate that these genes were probably acquired via a single, DNA-mediated transfer event. However, samplings of multiple individuals from two of the three species in the recipient Plantago clade revealed complex and perplexing phylogenetic discrepancies and patterns of sequence divergence for all three of the foreign genes. Conclusions This study reports the best evidence to date that multiple mitochondrial genes can be transferred via a single HGT event and that transfer occurred via a strictly DNA-level intermediate. The discovery of gene conversion between co-resident foreign and native mitochondrial copies suggests

  9. Horizontal acquisition of multiple mitochondrial genes from a parasitic plant followed by gene conversion with host mitochondrial genes

    Directory of Open Access Journals (Sweden)

    Hao Weilong

    2010-12-01

    Full Text Available Abstract Background Horizontal gene transfer (HGT is relatively common in plant mitochondrial genomes but the mechanisms, extent and consequences of transfer remain largely unknown. Previous results indicate that parasitic plants are often involved as either transfer donors or recipients, suggesting that direct contact between parasite and host facilitates genetic transfer among plants. Results In order to uncover the mechanistic details of plant-to-plant HGT, the extent and evolutionary fate of transfer was investigated between two groups: the parasitic genus Cuscuta and a small clade of Plantago species. A broad polymerase chain reaction (PCR survey of mitochondrial genes revealed that at least three genes (atp1, atp6 and matR were recently transferred from Cuscuta to Plantago. Quantitative PCR assays show that these three genes have a mitochondrial location in the one species line of Plantago examined. Patterns of sequence evolution suggest that these foreign genes degraded into pseudogenes shortly after transfer and reverse transcription (RT-PCR analyses demonstrate that none are detectably transcribed. Three cases of gene conversion were detected between native and foreign copies of the atp1 gene. The identical phylogenetic distribution of the three foreign genes within Plantago and the retention of cytidines at ancestral positions of RNA editing indicate that these genes were probably acquired via a single, DNA-mediated transfer event. However, samplings of multiple individuals from two of the three species in the recipient Plantago clade revealed complex and perplexing phylogenetic discrepancies and patterns of sequence divergence for all three of the foreign genes. Conclusions This study reports the best evidence to date that multiple mitochondrial genes can be transferred via a single HGT event and that transfer occurred via a strictly DNA-level intermediate. The discovery of gene conversion between co-resident foreign and native

  10. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  11. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2) Gene of Drosophila and Interacts with IP3R to Affect Wing Development.

    Science.gov (United States)

    Dean, Derek M; Maroja, Luana S; Cottrill, Sarah; Bomkamp, Brent E; Westervelt, Kathleen A; Deitcher, David L

    2015-11-27

    Inositol 1,4,5-trisphosphate (IP3) regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs) bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy), a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2), a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80(ts) indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling. Copyright © 2016 Dean et al.

  12. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2 Gene of Drosophila and Interacts with IP3R to Affect Wing Development

    Directory of Open Access Journals (Sweden)

    Derek M. Dean

    2016-02-01

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy, a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2, a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80ts indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling.

  13. A Multiple Decrement Life Table Reveals That Host Plant Resistance and Parasitism Are Major Causes of Mortality for the Wheat Stem Sawfly.

    Science.gov (United States)

    Buteler, Micaela; Peterson, Robert K D; Hofland, Megan L; Weaver, David K

    2015-12-01

    This study investigated the dynamics of parasitism, host plant resistance, pathogens, and predation on the demography of wheat stem sawfly, Cephus cinctus Norton (Hymenoptera: Cephidae), developing in susceptible (hollow stem) and resistant (solid stem) wheat hosts. This study is also the first to investigate the prevalence and impact of cannibalism on wheat stem sawfly mortality. Wheat stem sawflies were sampled in two commercial wheat fields over 4 yr from the egg stage through adult emergence, and multiple decrement life tables were constructed and analyzed. Cannibalism, host plant resistance, or unknown factors were the most prevalent factors causing egg mortality. Summer mortality of prediapause larvae ranged from 28 to 84%, mainly due to parasitism by Bracon cephi (Gahan) and Bracon lissogaster Muesebeck, cannibalism, and host plant resistance. Winter mortality ranged from 6 to 54% of the overwintering larvae, mainly due to unknown factors or pathogens. Cannibalism is a major cause of irreplaceable mortality because it is absolute, with only a single survivor in every multiple infested stem. Subsequent to obligate cannibalism, mortality of feeding larvae due to host plant resistance was lower in hollow stem wheat than in solid stem wheat. Mortality from host plant resistance was largely irreplaceable. Irreplaceable mortality due to parasitoids was greater in hollow stem wheat than in solid stem wheat. Host plant resistance due to stem solidness and parasitism in hollow stems cause substantial mortality in populations of actively feeding larvae responsible for all crop losses. Therefore, enhancing these mortality factors is vital to effective integrated pest management of wheat stem sawfly. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  15. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  16. GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP

    Science.gov (United States)

    Keith, B.

    1994-01-01

    The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number

  17. Fitting and Phenomenology in Type IA Supernova Cosmology: Generalized Likelihood Analyses for Multiple Evolving Populations and Observations of Near-Infrared Lightcurves Including Host Galaxy Properties

    Science.gov (United States)

    Ponder, Kara A.

    In the late 1990s, Type Ia supernovae (SNeIa) led to the discovery that the Universe is expanding at an accelerating rate due to dark energy. Since then, many different tracers of acceleration have been used to characterize dark energy, but the source of cosmic acceleration has remained a mystery. To better understand dark energy, future surveys such as the ground-based Large Synoptic Survey Telescope and the space-based Wide-Field Infrared Survey Telescope will collect thousands of SNeIa to use as a primary dark energy probe. These large surveys will be systematics limited, which makes it imperative for our insight regarding systematics to dramatically increase over the next decade for SNeIa to continue to contribute to precision cosmology. I approach this problem by improving statistical methods in the likelihood analysis and collecting near infrared (NIR) SNeIa with their host galaxies to improve the nearby data set and search for additional systematics. Using more statistically robust methods to account for systematics within the likelihood function can increase accuracy in cosmological parameters with a minimal precision loss. Though a sample of at least 10,000 SNeIa is necessary to confirm multiple populations of SNeIa, the bias in cosmology is ˜ 2 sigma with only 2,500 SNeIa. This work focused on an example systematic (host galaxy correlations), but it can be generalized for any systematic that can be represented by a distribution of multiple Gaussians. The SweetSpot survey gathered 114 low-redshift, NIR SNeIa that will act as a crucial anchor sample for the future high redshift surveys. NIR observations are not as affected by dust contamination, which may lead to increased understanding of systematics seen in optical wavelengths. We obtained spatially resolved spectra for 32 SweetSpot host galaxies to test for local host galaxy correlations. For the first time, we probe global host galaxy correlations with NIR brightnesses from the current literature

  18. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  19. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  20. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  1. A novel Meloidogyne graminicola effector, MgMO237, interacts with multiple host defence-related proteins to manipulate plant basal immunity and promote parasitism.

    Science.gov (United States)

    Chen, Jiansong; Hu, Lili; Sun, Longhua; Lin, Borong; Huang, Kun; Zhuo, Kan; Liao, Jinling

    2018-02-27

    Plant-parasitic nematodes can secrete effector proteins into the host tissue to facilitate their parasitism. In this study, we report a novel effector protein, MgMO237, from Meloidogyne graminicola, which is exclusively expressed within the dorsal oesophageal gland cell and markedly up-regulated in parasitic third-/fourth-stage juveniles of M. graminicola. Transient expression of MgMO237 in protoplasts from rice roots showed that MgMO237 was localized in the cytoplasm and nucleus of the host cells. Rice plants overexpressing MgMO237 showed an increased susceptibility to M. graminicola. In contrast, rice plants expressing RNA interference vectors targeting MgMO237 showed an increased resistance to M. graminicola. In addition, yeast two-hybrid and co-immunoprecipitation assays showed that MgMO237 interacted specifically with three rice endogenous proteins, i.e. 1,3-β-glucan synthase component (OsGSC), cysteine-rich repeat secretory protein 55 (OsCRRSP55) and pathogenesis-related BetvI family protein (OsBetvI), which are all related to host defences. Moreover, MgMO237 can suppress host defence responses, including the expression of host defence-related genes, cell wall callose deposition and the burst of reactive oxygen species. These results demonstrate that the effector MgMO237 probably promotes the parasitism of M. graminicola by interacting with multiple host defence-related proteins and suppressing plant basal immunity in the later parasitic stages of nematodes. © 2018 BSPP AND JOHN WILEY & SONS LTD.

  2. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  3. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  4. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  5. Telemetry and Communication IP Video Player

    Science.gov (United States)

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  6. Blends of Pheromones, With and Without Host Plant Volatiles, Can Attract Multiple Species of Cerambycid Beetles Simultaneously

    Science.gov (United States)

    L.M. Hanks; J.A. Mongold-Diers; T.H. Atkinson; M.K. Fierke; M.D. Ginzel; E.E. Graham; T.M. Poland; A.B. Richards; M.L. Richardson; J.G. Millar

    2018-01-01

    Pheromone components of cerambycid beetles are often conserved, with a given compound serving as a pheromone component for multiple related species, including species native to different continents. Consequently, a single synthesized compound may attract multiple species to a trap simultaneously. Furthermore, our previous research in east-central Illinois had...

  7. Best Host Age of Anastrepha obliqua (Diptera: Tephritidae) for Multiplication of Four Native Parasitoids from the Americas

    Science.gov (United States)

    Poncio, S; Montoya, P; Cancino, J; Nava, D E

    2018-01-01

    Abstract The success of the mass rearing of parasitoids is directly related to host quality, and it requires selecting the best biological host age to ensure the optimal performance of the parasitoids released into the field. The larval development of the parasitoids Utetes anastrephae (Viereck) (Hymenoptera: Braconidae) and Odontosema anastrephae Borgmeier (Hymenoptera: Eucoilidae) and the pupal development of the parasitoids Coptera haywardi (Ogloblin) (Hymenoptera: Diapriidae) and Dirhinus sp. (Hymenoptera: Chalcididae) on the native host Anastrepha obliqua (Macquart) (Diptera: Tephritidae) in different larvae and pupae ages were investigated under laboratory conditions. Not all parasitoid species developed with the same efficiency in immature individuals of A. obliqua; U. anastrephae and C. haywardi showed the higher parasitism rates. The emergence and parasitism of U. anastrephae were equal using larvae from 5 to 8 d, while C. haywardi reared in 1- to 8-d-old pupae showed higher averages of parasitism. These results suggest that native parasitoids can be used to strengthen the implementation of biological control projects against A. obliqua, a pest of economic importance in South America.

  8. Standardization efforts in IP telephony

    Science.gov (United States)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  9. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  10. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  11. Molecular inferences suggest multiple host shifts of rabies viruses from bats to mesocarnivores in Arizona during 2001-2009.

    Directory of Open Access Journals (Sweden)

    Ivan V Kuzmin

    Full Text Available In nature, rabies virus (RABV; genus Lyssavirus, family Rhabdoviridae represents an assemblage of phylogenetic lineages, associated with specific mammalian host species. Although it is generally accepted that RABV evolved originally in bats and further shifted to carnivores, mechanisms of such host shifts are poorly understood, and examples are rarely present in surveillance data. Outbreaks in carnivores caused by a RABV variant, associated with big brown bats, occurred repeatedly during 2001-2009 in the Flagstaff area of Arizona. After each outbreak, extensive control campaigns were undertaken, with no reports of further rabies cases in carnivores for the next several years. However, questions remained whether all outbreaks were caused by a single introduction and further perpetuation of bat RABV in carnivore populations, or each outbreak was caused by an independent introduction of a bat virus. Another question of concern was related to adaptive changes in the RABV genome associated with host shifts. To address these questions, we sequenced and analyzed 66 complete and 20 nearly complete RABV genomes, including those from the Flagstaff area and other similar outbreaks in carnivores, caused by bat RABVs, and representatives of the major RABV lineages circulating in North America and worldwide. Phylogenetic analysis demonstrated that each Flagstaff outbreak was caused by an independent introduction of bat RABV into populations of carnivores. Positive selection analysis confirmed the absence of post-shift changes in RABV genes. In contrast, convergent evolution analysis demonstrated several amino acids in the N, P, G and L proteins, which might be significant for pre-adaptation of bat viruses to cause effective infection in carnivores. The substitution S/T₂₄₂ in the viral glycoprotein is of particular merit, as a similar substitution was suggested for pathogenicity of Nishigahara RABV strain. Roles of the amino acid changes, detected in our

  12. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  13. DNA-binding proteins regulating pIP501 transfer and replication

    Directory of Open Access Journals (Sweden)

    Elisabeth Grohmann

    2016-08-01

    Full Text Available pIP501 is a Gram-positive broad-host-range model plasmid intensively used for studying plasmid replication and conjugative transfer. It is a multiple antibiotic resistance plasmid frequently found in clinical Enterococcus faecalis and Enterococcus faecium isolates. Replication of pIP501 proceeds unidirectionally by a theta mechanism. The minimal replicon of pIP501 is composed of the repR gene encoding the essential rate-limiting replication initiator protein RepR and the origin of replication, oriR, located downstream of repR. RepR is similar to RepE of related streptococcal plasmid pAMβ1, which has been shown to possess RNase activity cleaving free RNA molecules in close proximity of the initiation site of DNA synthesis. Replication of pIP501 is controlled by the concerted action of a small protein, CopR, and an antisense RNA, RNAIII. CopR has a dual role: It acts as transcriptional repressor at the repR promoter and prevents convergent transcription of RNAIII and repR mRNA (RNAII, thereby indirectly increasing RNAIII synthesis. CopR binds asymmetrically as a dimer at two consecutive binding sites upstream of and overlapping with the repR promoter. RNAIII induces transcriptional attenuation within the leader region of the repR mRNA (RNAII. Deletion of either control component causes a 10- to 20-fold increase of plasmid copy number, while simultaneous deletions have no additional effect. Conjugative transfer of pIP501 depends on a type IV secretion system (T4SS encoded in a single operon. Its transfer host-range is considerably broad, as it has been transferred to virtually all Gram-positive bacteria including filamentous streptomycetes and even the Gram-negative Escherichia coli. Expression of the 15 genes encoding the T4SS is tightly controlled by binding of the relaxase TraA, the transfer initiator protein, to the operon promoter, which overlaps with the origin of transfer (oriT. The T4SS operon encodes the DNA-binding proteins TraJ (VirD4

  14. The Multiple Impacts of Tropical Forest Fragmentation on Arthropod Biodiversity and on their Patterns of Interactions with Host Plants

    Science.gov (United States)

    Benítez-Malvido, Julieta; Dáttilo, Wesley; Martínez-Falcón, Ana Paola; Durán-Barrón, César; Valenzuela, Jorge; López, Sara; Lombera, Rafael

    2016-01-01

    Tropical rain forest fragmentation affects biotic interactions in distinct ways. Little is known, however, about how fragmentation affects animal trophic guilds and their patterns of interactions with host plants. In this study, we analyzed changes in biotic interactions in forest fragments by using a multitrophic approach. For this, we classified arthropods associated with Heliconia aurantiaca herbs into broad trophic guilds (omnivores, herbivores and predators) and assessed the topological structure of intrapopulation plant-arthropod networks in fragments and continuous forests. Habitat type influenced arthropod species abundance, diversity and composition with greater abundance in fragments but greater diversity in continuous forest. According to trophic guilds, coleopteran herbivores were more abundant in continuous forest and overall omnivores in fragments. Continuous forest showed a greater diversity of interactions than fragments. Only in fragments, however, did the arthropod community associated with H aurantiaca show a nested structure, suggesting novel and/or opportunistic host-arthropod associations. Plants, omnivores and predators contributed more to nestedness than herbivores. Therefore, Heliconia-arthropod network properties do not appear to be maintained in fragments mainly caused by the decrease of herbivores. Our study contributes to the understanding of the impact of fragmentation on the structure and dynamics of multitrophic arthropod communities associated with a particular plant species of the highly biodiverse tropical forests. Nevertheless, further replication of study sites is needed to strengthen the conclusion that forest fragmentation negatively affects arthropod assemblages. PMID:26731271

  15. The Multiple Impacts of Tropical Forest Fragmentation on Arthropod Biodiversity and on their Patterns of Interactions with Host Plants.

    Science.gov (United States)

    Benítez-Malvido, Julieta; Dáttilo, Wesley; Martínez-Falcón, Ana Paola; Durán-Barrón, César; Valenzuela, Jorge; López, Sara; Lombera, Rafael

    2016-01-01

    Tropical rain forest fragmentation affects biotic interactions in distinct ways. Little is known, however, about how fragmentation affects animal trophic guilds and their patterns of interactions with host plants. In this study, we analyzed changes in biotic interactions in forest fragments by using a multitrophic approach. For this, we classified arthropods associated with Heliconia aurantiaca herbs into broad trophic guilds (omnivores, herbivores and predators) and assessed the topological structure of intrapopulation plant-arthropod networks in fragments and continuous forests. Habitat type influenced arthropod species abundance, diversity and composition with greater abundance in fragments but greater diversity in continuous forest. According to trophic guilds, coleopteran herbivores were more abundant in continuous forest and overall omnivores in fragments. Continuous forest showed a greater diversity of interactions than fragments. Only in fragments, however, did the arthropod community associated with H aurantiaca show a nested structure, suggesting novel and/or opportunistic host-arthropod associations. Plants, omnivores and predators contributed more to nestedness than herbivores. Therefore, Heliconia-arthropod network properties do not appear to be maintained in fragments mainly caused by the decrease of herbivores. Our study contributes to the understanding of the impact of fragmentation on the structure and dynamics of multitrophic arthropod communities associated with a particular plant species of the highly biodiverse tropical forests. Nevertheless, further replication of study sites is needed to strengthen the conclusion that forest fragmentation negatively affects arthropod assemblages.

  16. ß-Phellandrene: Kairomone for Pine Engraver, Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1990-01-01

    The responses of Ips pini (Scolytidae) to multiple-funnel traps baited with the pheromone, ipsdienol, and various monoterpenes were determined in stands of lodgepole pine in southern and central British Columbia. Ips pini was attracted to both ipsdienol and ß-phellandrene, demonstrating that ß-phellandrene is a kairomone for this...

  17. Joint modeling of ChIP-seq data via a Markov random field model

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    Chromatin ImmunoPrecipitation-sequencing (ChIP-seq) experiments have now become routine in biology for the detection of protein-binding sites. In this paper, we present a Markov random field model for the joint analysis of multiple ChIP-seq experiments. The proposed model naturally accounts for

  18. A Reactive and Cycle-True IP Emulator for MPSoC Exploration

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Federico; Sparsø, Jens

    2008-01-01

    The design of MultiProcessor Systems-on-Chip (MPSoC) emphasizes intellectual-property (IP)-based communication-centric approaches. Therefore, for the optimization of the MPSoC interconnect, the designer must develop traffic models that realistically capture the application behavior as executing...... on the IP core. In this paper, we introduce a Reactive IP Emulator (RIPE) that enables an effective emulation of the IP-core behavior in multiple environments, including bit and cycle-true simulation. The RIPE is built as a multithreaded abstract instruction-set processor, and it can generate reactive...

  19. Presence in the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  20. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  1. Host-range expansion of Spodoptera exigua multiple nucleopolyhedrovirus to Agrotis segetum larvae when the midgut is bypassed

    NARCIS (Netherlands)

    Jakubowska, A.K.; Lynn, D.E.; Herrero, S.; Vlak, J.M.; Oers, van M.M.

    2010-01-01

    Given the high similarity in genome content and organization between Spodoptera exigua multiple nucleopolyhedrovirus (SeMNPV) and Agrotis segetum nucleopolyhedrovirus (AgseNPV), as well as the high percentages of similarity found between their 30 core genes, the specificity of these NPVs was

  2. Host-guest chemistry of dendrimer-drug complexes: 7. Formation of stable inclusions between acetylated dendrimers and drugs bearing multiple charges.

    Science.gov (United States)

    Fang, Min; Zhang, Jiahai; Wu, Qinglin; Xu, Tongwen; Cheng, Yiyun

    2012-03-15

    Drug molecules bearing multiple charges usually form precipitates with cationic dendrimers, which presents a challenge during the preparation of dendrimer inclusions for these drugs. In the present study, fully acetylated polyamidoamine (PAMAM) dendrimers were proposed as stable vehicles for drug molecules bearing two negative charges such as Congo red and indocyanine green. NMR techniques including (1)H NMR and (1)H-(1)H NOESY were used to characterize the host-guest chemistry of acetylated dendrimer and these guest molecules. The cationic PAMAM dendrimer was found to form a precipitate with Congo red and indocyanine green, but the acetylated one avoided the formation of cross-linking structures in aqueous solutions. NOESY studies revealed the encapsulation of Congo red and indocyanine green within the interior cavities of PAMAM dendrimers at mild acidic conditions and acetylated dendrimers show much stronger ability to encapsulate the guest molecules than cationic ones. Also, UV-vis-NIR studies suggest that acetylated dendrimers significantly improve the photostability of indocyanine green and prevent the formation of indocyanine green J-aggregates in aqueous solutions. The present study provides a new insight into dendrimer-based host-guest systems, especially for those guest molecules bearing multiple charges. © 2012 American Chemical Society

  3. Staphylococcus aureus host cell invasion and virulence in sepsis is facilitated by the multiple repeats within FnBPA.

    Directory of Open Access Journals (Sweden)

    Andrew M Edwards

    2010-06-01

    Full Text Available Entry of Staphylococcus aureus into the bloodstream can lead to metastatic abscess formation and infective endocarditis. Crucial to the development of both these conditions is the interaction of S. aureus with endothelial cells. In vivo and in vitro studies have shown that the staphylococcal invasin FnBPA triggers bacterial invasion of endothelial cells via a process that involves fibronectin (Fn bridging to alpha(5beta(1 integrins. The Fn-binding region of FnBPA usually contains 11 non-identical repeats (FnBRs with differing affinities for Fn, which facilitate the binding of multiple Fn molecules and may promote integrin clustering. We thus hypothesized that multiple repeats are necessary to trigger the invasion of endothelial cells by S. aureus. To test this we constructed variants of fnbA containing various combinations of FnBRs. In vitro assays revealed that endothelial cell invasion can be facilitated by a single high-affinity, but not low-affinity FnBR. Studies using a nisin-inducible system that controlled surface expression of FnBPA revealed that variants encoding fewer FnBRs required higher levels of surface expression to mediate invasion. High expression levels of FnBPA bearing a single low affinity FnBR bound Fn but did not invade, suggesting that FnBPA affinity for Fn is crucial for triggering internalization. In addition, multiple FnBRs increased the speed of internalization, as did higher expression levels of FnBPA, without altering the uptake mechanism. The relevance of these findings to pathogenesis was demonstrated using a murine sepsis model, which showed that multiple FnBRs were required for virulence. In conclusion, multiple FnBRs within FnBPA facilitate efficient Fn adhesion, trigger rapid bacterial uptake and are required for pathogenesis.

  4. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  5. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  6. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  7. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  8. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  9. Multiplexed ChIP-Seq Using Direct Nucleosome Barcoding: A Tool for High-Throughput Chromatin Analysis.

    Science.gov (United States)

    Chabbert, Christophe D; Adjalley, Sophie H; Steinmetz, Lars M; Pelechano, Vicent

    2018-01-01

    Chromatin immunoprecipitation followed by sequencing (ChIP-Seq) or microarray hybridization (ChIP-on-chip) are standard methods for the study of transcription factor binding sites and histone chemical modifications. However, these approaches only allow profiling of a single factor or protein modification at a time.In this chapter, we present Bar-ChIP, a higher throughput version of ChIP-Seq that relies on the direct ligation of molecular barcodes to chromatin fragments. Bar-ChIP enables the concurrent profiling of multiple DNA-protein interactions and is therefore amenable to experimental scale-up, without the need for any robotic instrumentation.

  10. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  11. Multiple-stage diagenetic alteration and fluid history of Ordovician carbonate-hosted barite mineralization, Southern Quebec Appalachians

    Science.gov (United States)

    Paradis, Suzanne; Lavoie, Denis

    1996-12-01

    Lower Ordovician bioclastic limestone of the Upton Group, southern Quebec Appalachians, hosts stratabound Ba-Zn-Pb mineralization. The Upton Group, a mixed platform carbonate-siliciclastic-volcanic succession, is exposed as windows within the tectonically overlying Cambrian siliciclastics of the Granby Nappe. Mineralization consists mostly of barite and minor amounts of sulfides (sphalerite, pyrite, galena, and chalcopyrite), in addition to calcite, quartz and bitumen cements. It is hosted by a bioclastic limestone which is interbedded with and capped by a black calcareous shale, and underlain by a mudstone-siltstone-volcanic succession and a lower poorly fossiliferous limestone. The lower limestone recorded early extensive dolomitization followed by meteoric alteration (dedolomitization, sulphate dissolution, vadose cements, soil pisoids, etc.), and burial diagenesis (recrystallization, fracturation, and cementation). The vadose gravitational calcite cements yield δ 18O PDB values of -8.4 to -11.0‰ andδ 13C PDB values of +2.4 to +2.8‰. The thin soil profiles with pisoids have a δ 18O PDB value of -8.2‰ and a δ 13C PDB value of +2.0‰. These data suggest an evaporative 18O-enrichment of near-surface trapped soil moisture (vadose water) in a rock-dominated diagenetic system. The recrystallized limestone hasδ 18O PDB values of -11.4 to -15.5‰ and near Early Ordovician marine δ 13C PDB values of -0.2 to +2.5‰. These data suggest a final stabilization of the limestone from high temperature fluids in a rock-dominated diagenetic system. The mineralized bioclastic limestone shows rare evidence of early submarine cementation which is overprinted by significant post-depositional recrystallization and hydrothermal alteration. The latter resulted in the generation of secondary porosity and precipitation of a subhedral barite cement, a bladed barite cement, and fracture-filling barite. Fracture- and void-filling calcite, sulfides, quartz and bitumen

  12. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  13. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  14. A Learning-Based Approach for IP Geolocation

    Science.gov (United States)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  15. A northward colonisation of the Andes by the potato cyst nematode during geological times suggests multiple host-shifts from wild to cultivated potatoes.

    Science.gov (United States)

    Picard, Damien; Sempere, Thierry; Plantard, Olivier

    2007-02-01

    The cyst nematode Globodera pallida is a major pest of potato in South America where this specialist parasite is native. To investigate its phylogeography, we have genotyped individuals from 42 Peruvian populations using mitochondrial and nuclear molecular markers. A clear south-to-north phylogeographical pattern was revealed with five well-supported clades. The clade containing the southern populations is genetically more diverse and forms the most basal branch. The large divergence among cytochrome b haplotypes suggests that they diverged before human domestication of potato. As the nematodes studied have been sampled on cultivated potato, multiple host-shifts from wild to cultivated potatoes must have occurred independently in each clade. We hypothesise that this south-to-north pattern took place during the uplift of the Andes beginning 20 My ago and following the same direction. To our knowledge, this is the first study of a plant parasite sampled on cultivated plants revealing an ancient phylogeographical pattern.

  16. Phytohemagglutinin facilitates the aggregation of blastomere pairs from Day 5 donor embryos with Day 4 host embryos for chimeric bovine embryo multiplication.

    Science.gov (United States)

    Simmet, Kilian; Reichenbach, Myriam; Reichenbach, Horst-Dieter; Wolf, Eckhard

    2015-12-01

    Multiplication of bovine embryos by the production of aggregation chimeras is based on the concept that few blastomeres of a donor embryo form the inner cell mass (ICM) and thus the embryo proper, whereas cells of a host embryo preferentially contribute to the trophectoderm (TE), the progenitor cells of the embryonic part of the placenta. We aggregated two fluorescent blastomeres from enhanced green fluorescent protein (eGFP) transgenic Day 5 morulae with two Day 4 embryos that did not complete their first cleavage until 27 hours after IVF and tested the effect of phytohemagglutinin-L (PHA) on chimeric embryo formation. The resulting blastocysts were characterized by differential staining of cell lineages using the TE-specific factor CDX2 and confocal laser scanning microscopy to facilitate the precise localization of eGFP-positive cells. The proportions of blastocyst development of sandwich aggregates with (n = 99) and without PHA (n = 46) were 85.9% and 54.3% (P chimeric blastocysts analyzed by confocal laser scanning microscopy, nine had eGFP-positive cells (three of them in the ICM, three in the TE, and three in both lineages). When integration in the ICM occurred, the number of eGFP-positive cells in this compartment was 8.3 ± 2.3 (mean ± standard error of the mean). We conclude that PHA is advantageous for the formation of aggregation chimeras, but the approach tested in the present study with only two donor blastomeres and two host embryos did not result in multiplication of genetically valuable donor embryos. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  18. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  19. Increased Transmissibility of Leishmania donovani From the Mammalian Host to Vector Sand Flies After Multiple Exposures to Sand Fly Bites.

    Science.gov (United States)

    Valverde, Joanna G; Paun, Andrea; Inbar, Ehud; Romano, Audrey; Lewis, Michael; Ghosh, Kashinath; Sacks, David

    2017-04-15

    Patients with active visceral leishmaniasis are important reservoirs in the anthroponotic transmission cycle of Leishmania donovani. The role of the blood or skin as a source of infection to sand flies remains unclear, and the possible effect of multiple exposures to fly bites on transmissibility has not been addressed. L. donovani-infected hamsters underwent xenodiagnoses with Lutzomyia longipalpis on the same or different sites on the abdomen on 2 consecutive days or by artificial feeding on the skin or blood. The transmission of L. donovani from sick hamsters to flies was surprisingly low (mean, 24% of fed flies). New flies fed on the same site acquired significantly more infections (mean, 61%; P Leishmania donovani. Using the hamster model of visceral disease, we demonstrate that prior exposure to bites of uninfected sand flies potentiates their ability to transmit infection to the vector. Published by Oxford University Press for the Infectious Diseases Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  20. IP Security für Linux

    OpenAIRE

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  1. Universal Space IP Transparent Proxy, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  2. Solar Type II Radio Bursts and IP Type II Events

    Science.gov (United States)

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  3. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  4. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  5. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  6. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  7. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  8. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    Science.gov (United States)

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  9. Prognostic value of CtIP/RBBP8 expression in breast cancer

    International Nuclear Information System (INIS)

    Soria-Bretones, Isabel; Sáez, Carmen; Ruíz-Borrego, Manuel; Japón, Miguel A; Huertas, Pablo

    2013-01-01

    CtIP/RBBP8 is a multifunctional protein involved in transcription, DNA replication, DNA repair by homologous recombination and the G1 and G2 checkpoints. Its multiple roles are controlled by its interaction with several specific factors, including the tumor suppressor proteins BRCA1 and retinoblastoma. Both its functions and interactors point to a putative oncogenic potential of CtIP/RBBP8 loss. However, CtIP/RBBP8 relevance in breast tumor appearance, development, and prognosis has yet to be established. We performed a retrospective analysis of CtIP/RBBP8 and RB1 levels by immunohistochemistry using 384 paraffin-embedded breast cancer biopsies obtained during tumor removal surgery. We have observed that low or no expression of CtIP/RBBP8 correlates with high-grade breast cancer and with nodal metastasis. Reduction on CtIP/RBBP8 is most common in hormone receptor (HR)-negative, HER2-positive, and basal-like tumors. We observed lower levels of RB1 on those tumors with reduced CtIP/RBBP8 levels. On luminal tumors, decreased but not absence of CtIP/RBBP8 levels correlate with increased disease-free survival when treated with a combination of hormone, radio, and chemo therapies

  10. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  11. Landscape-scale Ips typographus attack dynamics: from monitoring plots to GIS-based disturbance models

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Zajíčková, L.; Cudlín, Pavel; Blaženec, M.; Turčani, M.; Ježík, M.; Střelcová, K.; Lieutier, F.; Schlyter, F.

    2011-01-01

    Roč. 4, - (2011), s. 256-261 ISSN 1971-7458 R&D Projects: GA MŠk OC10022 Institutional research plan: CEZ:AV0Z60870520 Keywords : Spruce * Ips typographus * Attack * Drought * Host Subject RIV: GK - Forestry Impact factor: 0.507, year: 2011 http://www.sisef.it/iforest/pdf/?id=ifor0589-004

  12. Volatiles from spruce trap-trees detected by Ips typographus bark beetles: chemical and electrophysiological analyses

    Czech Academy of Sciences Publication Activity Database

    Kalinová, Blanka; Břízová, Radka; Knížek, M.; Turčáni, M.; Hoskovec, Michal

    2014-01-01

    Roč. 8, č. 4 (2014), s. 305-316 ISSN 1872-8855 Institutional support: RVO:61388963 Keywords : Ips typographus * Picea abies * host selection * semiochemicals * GC-EAD * GC9GC/TOFMS Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 1.462, year: 2014

  13. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  14. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  15. China's Indigenous IP Policies -- Here to Stay?

    OpenAIRE

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  16. HPC Access Using KVM over IP

    Science.gov (United States)

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  17. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  18. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  19. Enhanced mutagenesis of UV-irradiated simian virus 40 occurs in mitomycin C-treated host cells only at a low multiplicity of infection

    International Nuclear Information System (INIS)

    Sarasin, A.; Benoit, A.

    1986-01-01

    Treatment of monkey kidney cells with mitomycin C (MMC) 24 h prior to infection with UV-irradiated simian virus 40 (SV40) enhanced both virus survival and virus mutagenesis. The use of SV40 as a biological probe has been taken as an easy method to analyse SOS response of mammalian cells to the stress caused by DNA damage or inhibition of DNA replication. The mutation assay we used was based on the reversion from a temperature-sensitive phenotype (tsA58 mutant) to a wild-type phenotype. The optimal conditions for producing enhanced survival and mutagenesis in the virus progeny were determined with regard to the multiplicity of infection (MOI). Results showed that the level of enhanced mutagenesis observed for UV-irradiated virus grown in MMC-treated cells was an inverse function of the MOI, while enhanced survival was observed at nearly the same level regardless of the MOI. For the unirradiated virus, almost no increase in the mutation of virus progeny issued from MMC-treated cells was observed, while a small amount of enhanced virus survival was obtained. These results show that enhanced virus mutagenesis and enhanced virus survival can be dissociated under some experimental conditions. Enhanced virus mutagenesis, analogous to the error-prone replication of phages in SOS-induced bacteria, was observed, at least for SV40, only when DNA of both virus and host cells was damaged and when infection occurred with a small number of viral particles. We therefore hypothesize that an error-prone replication mode of UV-damaged templates is observed in induced monkey kidney cells

  20. Examples of modelling IP in AEM data: synthetic and real data

    DEFF Research Database (Denmark)

    Viezzoli, Andrea; Kaminskiy, Vladislav; Fiandaca, Gianluca

    There have been multiple evidences in the literature in the past several years of what has been referred to as IP effect in the Time Domain Airborne EM data (TDEM). This phenomenon is known to be responsible for incorrect inversion modelling of electrical resistivity, lower interpreted depth...... of investigation and lost information about chargeability of the subsurface as well as about other valuable parameters. Historically there have been many suggestions to account for the IP effect using the Cole-Cole model. In current paper we are showing the possibility to extract IP information from airborne TDEM...... with both high electrical conductivity and in resistive environments. Furthermore, modelling of IP effects allows corrected resistivity models. The Amakinskaya kimberlite pipe results highlight the relevance of chargeability for kimberlite exploration....

  1. The Worldwide Interplanetary Scintillation (IPS) Stations (WIPSS) Network October 2016 Observing Campaign: Initial WIPSS Data Analyses

    Science.gov (United States)

    Bisi, M. M.; Fallows, R. A.; Jackson, B. V.; Tokumaru, M.; Gonzalez-Esparza, A.; Morgan, J.; Chashei, I. V.; Mejia-Ambriz, J.; Tyul'bashev, S. A.; Manoharan, P. K.; De la Luz, V.; Aguilar-Rodriguez, E.; Yu, H. S.; Barnes, D.; Chang, O.; Odstrcil, D.; Fujiki, K.; Shishov, V.

    2017-12-01

    Interplanetary Scintillation (IPS) allows for the determination of velocity and a proxy for plasma density to be made throughout the corona and inner heliosphere. Where sufficient observations are undertaken, the results can be used as input to the University of California, San Diego (UCSD) three-dimensional (3-D) time-dependent tomography suite to allow for the full 3-D reconstruction of both velocity and density throughout the inner heliosphere. By combining IPS results from multiple observing locations around the planet, we can increase both the temporal and spatial coverage across the whole of the inner heliosphere and hence improve forecast capability. During October 2016, a unique opportunity arose whereby the European-based LOw Frequency ARray (LOFAR) radio telescope was used to make nearly four weeks of continuous observations of IPS as a heliospheric space-weather trial campaign. This was expanded into a global effort to include observations of IPS from the Murchison Widefield Array (MWA) in Western Australia and many more observations from various IPS-dedicated WIPSS Network systems. LOFAR is a next-generation low-frequency radio interferometer capable of observing in the radio frequency range 10-250 MHz, nominally with up to 80 MHz bandwidth at a time. MWA in Western Australia is capable of observing in the 80-300 MHz frequency range nominally using up to 32 MHz of bandwidth. IPS data from LOFAR, ISEE, the MEXican Array Radio Telescope (MEXART), and, where possible, other WIPSS Network systems (such as LPI-BSA and Ooty), will be used in this study and we will present some initial findings for these data sets. We also make a first attempt at the 3-D reconstruction of multiple pertinent WIPSS results in the UCSD tomography. We will also try to highlight some of the potential future tools that make LOFAR a very unique system to be able to test and validate a whole plethora of IPS analysis methods with the same set of IPS data.

  2. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  3. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  4. Validation of DAB2IP methylation and its relative significance in predicting outcome in renal cell carcinoma

    Science.gov (United States)

    Zhao, Liang-Yun; Kapur, Payal; Wu, Kai-Jie; Wang, Bin; Yu, Yan-Hong; Liao, Bing; He, Da-Lin; Chen, Wei; Margulis, Vitaly; Hsieh, Jer-Tsong; Luo, Jun-Hang

    2016-01-01

    We have recently reported tumor suppressive role of DAB2IP in RCC development. In this study, We identified one CpG methylation biomarker (DAB2IP CpG1) located UTSS of DAB2IP that was associated with poor overall survival in a cohort of 318 ccRCC patients from the Cancer Genome Atlas (TCGA). We further validated the prognostic accuracy of DAB2IP CpG methylation by pyrosequencing quantitative methylation assay in 224 ccRCC patients from multiple Chinese centers (MCHC set), and 239 patients from University of Texas Southwestern Medical Center at Dallas (UTSW set) by using FFPE samples. DAB2IP CpG1 can predict the overall survival of patients in TCGA, MCHC, and UTSW sets independent of patient age, Fuhrman grade and TNM stage (all p<0.05). DAB2IP CpG1 successfully categorized patients into high-risk and low-risk groups with significant differences of clinical outcome in respective clinical subsets, regardless of age, sex, grade, stage, or race (HR: 1.63-7.83; all p<0.05). The detection of DAB2IP CpG1 methylation was minimally affected by ITH in ccRCC. DAB2IP mRNA expression was regulated by DNA methylation in vitro. DAB2IP CpG1 methylation is a practical and repeatable biomarker for ccRCC, which can provide prognostic value that complements the current staging system. PMID:27129174

  5. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  6. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    OpenAIRE

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  7. iTAR: a web server for identifying target genes of transcription factors using ChIP-seq or ChIP-chip data.

    Science.gov (United States)

    Yang, Chia-Chun; Andrews, Erik H; Chen, Min-Hsuan; Wang, Wan-Yu; Chen, Jeremy J W; Gerstein, Mark; Liu, Chun-Chi; Cheng, Chao

    2016-08-12

    Chromatin immunoprecipitation followed by massively parallel DNA sequencing (ChIP-seq) or microarray hybridization (ChIP-chip) has been widely used to determine the genomic occupation of transcription factors (TFs). We have previously developed a probabilistic method, called TIP (Target Identification from Profiles), to identify TF target genes using ChIP-seq/ChIP-chip data. To achieve high specificity, TIP applies a conservative method to estimate significance of target genes, with the trade-off being a relatively low sensitivity of target gene identification compared to other methods. Additionally, TIP's output does not render binding-peak locations or intensity, information highly useful for visualization and general experimental biological use, while the variability of ChIP-seq/ChIP-chip file formats has made input into TIP more difficult than desired. To improve upon these facets, here we present are fined TIP with key extensions. First, it implements a Gaussian mixture model for p-value estimation, increasing target gene identification sensitivity and more accurately capturing the shape of TF binding profile distributions. Second, it enables the incorporation of TF binding-peak data by identifying their locations in significant target gene promoter regions and quantifies their strengths. Finally, for full ease of implementation we have incorporated it into a web server ( http://syslab3.nchu.edu.tw/iTAR/ ) that enables flexibility of input file format, can be used across multiple species and genome assembly versions, and is freely available for public use. The web server additionally performs GO enrichment analysis for the identified target genes to reveal the potential function of the corresponding TF. The iTAR web server provides a user-friendly interface and supports target gene identification in seven species, ranging from yeast to human. To facilitate investigating the quality of ChIP-seq/ChIP-chip data, the web server generates the chart of the

  8. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  9. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  10. Bio-EdIP: An automatic approach for in vitro cell confluence images quantification.

    Science.gov (United States)

    Cardona, Andrés; Ariza-Jiménez, Leandro; Uribe, Diego; Arroyave, Johanna C; Galeano, July; Cortés-Mancera, Fabian M

    2017-07-01

    Cell imaging is a widely-employed technique to analyze multiple biological processes. Therefore, simple, accurate and quantitative tools are needed to understand cellular events. For this purpose, Bio-EdIP was developed as a user-friendly tool to quantify confluence levels using cell culture images. The proposed algorithm combines a pre-processing step with subsequent stages that involve local processing techniques and a morphological reconstruction-based segmentation algorithm. Segmentation performance was assessed in three constructed image sets, comparing F-measure scores and AUC values (ROC analysis) for Bio-EdIP, its previous version and TScratch. Furthermore, segmentation results were compared with published algorithms using eight public benchmarks. Bio-EdIP automatically segmented cell-free regions from images of in vitro cell culture. Based on mean F-measure scores and ROC analysis, Bio-EdIP conserved a high performance regardless of image characteristics of the constructed dataset, when compared with its previous version and TScratch. Although acquisition quality of the public dataset affected Bio-EdIP segmentation, performance was better in two out of eight public sets. Bio-EdIP is a user-friendly interface, which is useful for the automatic analysis of confluence levels and cell growth processes using in vitro cell culture images. Here, we also presented new manually annotated data for algorithms evaluation. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Practical guidelines for the comprehensive analysis of ChIP-seq data.

    Directory of Open Access Journals (Sweden)

    Timothy Bailey

    Full Text Available Mapping the chromosomal locations of transcription factors, nucleosomes, histone modifications, chromatin remodeling enzymes, chaperones, and polymerases is one of the key tasks of modern biology, as evidenced by the Encyclopedia of DNA Elements (ENCODE Project. To this end, chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq is the standard methodology. Mapping such protein-DNA interactions in vivo using ChIP-seq presents multiple challenges not only in sample preparation and sequencing but also for computational analysis. Here, we present step-by-step guidelines for the computational analysis of ChIP-seq data. We address all the major steps in the analysis of ChIP-seq data: sequencing depth selection, quality checking, mapping, data normalization, assessment of reproducibility, peak calling, differential binding analysis, controlling the false discovery rate, peak annotation, visualization, and motif analysis. At each step in our guidelines we discuss some of the software tools most frequently used. We also highlight the challenges and problems associated with each step in ChIP-seq data analysis. We present a concise workflow for the analysis of ChIP-seq data in Figure 1 that complements and expands on the recommendations of the ENCODE and modENCODE projects. Each step in the workflow is described in detail in the following sections.

  12. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  13. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  14. Experimental evaluation of the IP multimedia subsystem

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  15. EQuIP-ped for Success

    Science.gov (United States)

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  16. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  17. Spojení s dynamickou IP adresou

    Czech Academy of Sciences Publication Activity Database

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  18. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  19. Operational Space Weather Products at IPS

    Science.gov (United States)

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  20. Searching CLEF-IP by Strategy

    NARCIS (Netherlands)

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  1. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  2. Enhancing the Classification Accuracy of IP Geolocation

    Science.gov (United States)

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  3. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  4. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  5. Multiple sources of selenium in ancient seafloor hydrothermal systems: Compositional and Se, S, and Pb isotopic evidence from volcanic-hosted and volcanic-sediment-hosted massive sulfide deposits of the Finlayson Lake District, Yukon, Canada

    Science.gov (United States)

    Layton-Matthews, Daniel; Leybourne, Matthew I.; Peter, Jan M.; Scott, Steven D.; Cousens, Brian; Eglington, Bruce M.

    2013-09-01

    Volcanic-hosted massive sulfide (VHMS) and volcanic-sediment-hosted massive sulfide (VSHMS; i.e., hosted by both volcanic and sedimentary rocks) deposits in the Finlayson Lake District, Yukon, Canada, provide a unique opportunity to study the influence of seafloor and sub-seafloor hydrothermal processes on the formation of Se-poor (GP4F VHMS deposit; 7 ppm Se average), intermediate (Kudz Ze Kayah—KZK VHMS deposit; 200 ppm Se average), and Se-enriched (Wolverine VSHMS deposit; 1100 ppm Se average) mineralization. All three deposits are hosted by mid-Paleozoic (˜360-346 Ma) felsic volcanic rocks, but only the Wolverine deposit has voluminous coeval carbonaceous argillites (black shales) in the host rock package. Here we report the first application of Se isotope analyses to ancient seafloor mineralization and use these data, in conjunction with Pb and S isotope analyses, to better understand the source(s) and depositional process(es) of Se within VHMS and VSHMS systems. The wide range of δ82Se (-10.2‰ to 1.3‰, relative to NIST 3149), δ34S (+2.0‰ to +12.8‰ CDT), and elevated Se contents (up to 5865 ppm) within the Wolverine deposit contrast with the narrower range of δ82Se (-3.8‰ to -0.5‰), δ34S (9.8‰ to 13.0‰), and lower Se contents (200 ppm average) of the KZK deposit. The Wolverine and KZK deposits have similar sulfide depositional histories (i.e., deposition at the seafloor, with concomitant zone refining). The Se in the KZK deposit is magmatic (leaching or degassing) in origin, whereas the Wolverine deposit requires an additional large isotopically negative Se source (i.e. ˜-15‰ δ82Se). The negative δ82Se values for the Wolverine deposit are at the extreme light end for measured terrestrial samples, and the lightest observed for hypogene sulfide minerals, but are within calculated equilibrium values of δ82Se relative to NIST 3149 (˜30‰ at 25 °C between SeO4 and Se2-). We propose that the most negative Se isotope values at the

  6. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Science.gov (United States)

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  7. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  8. Pancreatic β-Cell-Derived IP-10/CXCL10 Isletokine Mediates Early Loss of Graft Function in Islet Cell Transplantation.

    Science.gov (United States)

    Yoshimatsu, Gumpei; Kunnathodi, Faisal; Saravanan, Prathab Balaji; Shahbazov, Rauf; Chang, Charles; Darden, Carly M; Zurawski, Sandra; Boyuk, Gulbahar; Kanak, Mazhar A; Levy, Marlon F; Naziruddin, Bashoo; Lawrence, Michael C

    2017-11-01

    Pancreatic islets produce and secrete cytokines and chemokines in response to inflammatory and metabolic stress. The physiological role of these "isletokines" in health and disease is largely unknown. We observed that islets release multiple inflammatory mediators in patients undergoing islet transplants within hours of infusion. The proinflammatory cytokine interferon-γ-induced protein 10 (IP-10/CXCL10) was among the highest released, and high levels correlated with poor islet transplant outcomes. Transgenic mouse studies confirmed that donor islet-specific expression of IP-10 contributed to islet inflammation and loss of β-cell function in islet grafts. The effects of islet-derived IP-10 could be blocked by treatment of donor islets and recipient mice with anti-IP-10 neutralizing monoclonal antibody. In vitro studies showed induction of the IP-10 gene was mediated by calcineurin-dependent NFAT signaling in pancreatic β-cells in response to oxidative or inflammatory stress. Sustained association of NFAT and p300 histone acetyltransferase with the IP-10 gene required p38 and c-Jun N-terminal kinase mitogen-activated protein kinase (MAPK) activity, which differentially regulated IP-10 expression and subsequent protein release. Overall, these findings elucidate an NFAT-MAPK signaling paradigm for induction of isletokine expression in β-cells and reveal IP-10 as a primary therapeutic target to prevent β-cell-induced inflammatory loss of graft function after islet cell transplantation. © 2017 by the American Diabetes Association.

  9. Chromatin Immunoprecipitation (ChIP): Revisiting the Efficacy of Sample Preparation, Sonication, Quantification of Sheared DNA, and Analysis via PCR

    Science.gov (United States)

    Schoppee Bortz, Pamela D.; Wamhoff, Brian R.

    2011-01-01

    The “quantitative” ChIP, a tool commonly used to study protein-DNA interactions in cells and tissue, is a difficult assay often plagued with technical error. We present, herein, the process required to merge multiple protocols into a quick, reliable and easy method and an approach to accurately quantify ChIP DNA prior to performing PCR. We demonstrate that high intensity sonication for at least 30 min is required for full cellular disruption and maximum DNA recovery because ChIP lysis buffers fail to lyse formaldehyde-fixed cells. In addition, extracting ChIP DNA with chelex-100 yields samples that are too dilute for evaluation of shearing efficiency or quantification via nanospectrophotometry. However, DNA extracted from the Mock-ChIP supernatant via the phenol-chloroform-isoamyl alcohol (PCIA) method can be used to evaluate DNA shearing efficiency and used as the standard in a fluorescence-based microplate assay. This enabled accurate quantification of DNA in chelex-extracted ChIP samples and normalization to total DNA concentration prior to performing real-time PCR (rtPCR). Thus, a quick ChIP assay that can be completed in nine bench hours over two days has been validated along with a rapid, accurate and repeatable way to quantify ChIP DNA. The resulting rtPCR data more accurately depicts treatment effects on protein-DNA interactions of interest. PMID:22046253

  10. Evaluation of the short term 12 hour toxicity of 3-trifluoromethyl-4-nitrophenol (TFM) to multiple life stages of Venustaconcha ellipsiformis and Epioblasma triquetra and its host fish (Percina caprodes).

    Science.gov (United States)

    Boogaard, Michael A; Newton, Teresa J; Hubert, Terrance D; Kaye, Cheryl A; Barnhart, M Christopher

    2015-07-01

    The present study evaluated the risk of 12-h exposures of the lampricide 3-trifluoromethyl-4-nitrophenol (TFM) to multiple life stages of the federally endangered snuffbox (Epioblasma triquetra) and its primary host fish the common logperch (Percina caprodes) as well as a surrogate to the snuffbox, the ellipse (Venustaconcha ellipsiformis). Life stages examined included free glochidia, 1-wk juveniles, and adults of the ellipse; free glochidia, glochidia on host fish, and 1-wk juveniles of the snuffbox; and adult logperch. Larval sea lampreys were also tested alongside adult ellipse and logperch for direct comparison. Survival exceeded 82% among all life stages in both mussel species at levels up to 1.8 times what would be applied during treatments, suggesting that routine sea lamprey control operations would not adversely affect mussels. However, substantial mortality of adult logperch was observed at TFM concentrations typically applied to streams, and loss of host fish could adversely affect snuffbox reproduction. In addition, TFM had no significant effect on the number of glochidia that metamorphosed on adult logperch. Although the snuffbox is not likely to be acutely affected from sea lamprey control operations, mitigation efforts to minimize impacts to the host fish should be considered. © 2015 SETAC.

  11. The Use of Monoterpenes as Kairomones by Ips latidens (LeConte) (Coleoptera: Scolytidae)

    Science.gov (United States)

    D.R. Miller; J.H. Borden

    1990-01-01

    The responses of Ips lutidens (LeConte) to multiple-funnel traps baited with various monoterpenes were determined in stands of lodgepole pine in British Columbia. ß-Phellandrene was attractive to I. lutidens in the absence of the pheromone ipsenol ß-Phellandrene increased the attraction of I. lutidens to...

  12. Bayesian Modeling of ChIP-chip Data Through a High-Order Ising Model

    KAUST Repository

    Mo, Qianxing; Liang, Faming

    2010-01-01

    approach to ChIP-chip data through an Ising model with high-order interactions. The proposed method naturally takes into account the intrinsic spatial structure of the data and can be used to analyze data from multiple platforms with different genomic

  13. Variation in enantiospecific attraction of Ips avulsus (Coleoptera: Curculionidae) to the pheromone ipsdienol in Georgia.

    Science.gov (United States)

    Daniel Miller; Jeremy Allison

    2011-01-01

    In 2006, we tested the responses of the small southern pine engraver, Ips avulsus (Eichhoff) (Coleoptera: Curculionidae), to multiple-funnel traps baited with (+)-, (-)-, and (+/-)- ipsdienol. Three experiments were conducted in Georgia with all traps co-baited with one of the following lure combinations, respectively: experiment 1, ipsenol; experiment 2, lanierone and...

  14. Characterization of IP Flows Eligible for Lambda-Connections in Optical Networks

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2008-01-01

    The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and optical levels). With such capability, big IP flows can be moved from the network level and switched completely at the optical level

  15. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  16. E-Myrcenol: A New Pheromone for the Pine Engraver, Ips Pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    D.R. Miller; G. Gries; J.H. Borden

    1990-01-01

    E-Myrcenol reduced catches of the pine engraver, Ips pini (Say), to ipsdienol-baited, multiple-funnel traps in a dose-dependent fashion. The sex ratio was unaffected by E-myrcenol treatments. Lures containing E-myrcenol in ethanol solution failed to protect freshly cut logs of lodgepole pine from attack by

  17. Adjusting the IP $\\beta$ Functions in RHIC

    CERN Document Server

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  18. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  19. Controlled light emission from white organic light-emitting devices with a single blue-emitting host and multiple fluorescent dopants

    International Nuclear Information System (INIS)

    Chin, Byung Doo; Kim, Jai Kyeong; Park, O Ok

    2007-01-01

    In this work, we fabricated white organic light-emitting devices (WOLEDs) containing a layered light-emitting region composed of a single blue-emitting host and different fluorescent dopant materials. The effects of varying the dye-doping ratio and emitting layer thickness on the efficiency, lifetime, spectral voltage-dependence and white balance were investigated for devices with a blue/orange stacked layer structure. Addition of a blue host layer doped with a green-emitting dopant, to give a blue/green/orange emitter, resulted in a broadband white spectrum without the need for a charge-blocking interlayer. The composition of blue, green and orange dopants in the host and the thickness of each emitting layer were optimized, resulting in a device efficiency of 9-11 cd A -1 even at a high brightness of 10 000 cd m -2 (achieved at a bias voltage of less than 9 V) with an emission spectrum suitable for lighting applications

  20. IP Telephony Applicability in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Francisco Palacios

    2018-02-01

    Full Text Available This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX; and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users.

  1. Reliability of IP Tunnels in Military Networks

    Directory of Open Access Journals (Sweden)

    Pólkowski Marcin

    2016-10-01

    Full Text Available The military networks, contrary to commercial ones, require standards which provide the highest level of security and reliability. The process to assuring redundancy of the main connections through applying various protocols and transmission media causes problem with time needed to re-establish virtual tunnels between different locations in case of damaged link. This article compares reliability of different IP (Internet Protocol tunnels, which were implemented on military network devices.

  2. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  3. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  4. A fast neutron detector with IP by track measurement

    International Nuclear Information System (INIS)

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  5. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  6. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  7. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  8. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  9. Combining ChIP-chip and expression profiling to model the MoCRZ1 mediated circuit for Ca/calcineurin signaling in the rice blast fungus.

    Directory of Open Access Journals (Sweden)

    Soonok Kim

    2010-05-01

    Full Text Available Significant progress has been made in defining the central signaling networks in many organisms, but collectively we know little about the downstream targets of these networks and the genes they regulate. To reconstruct the regulatory circuit of calcineurin signal transduction via MoCRZ1, a Magnaporthe oryzae C2H2 transcription factor activated by calcineurin dephosphorylation, we used a combined approach of chromatin immunoprecipitation - chip (ChIP-chip, coupled with microarray expression studies. One hundred forty genes were identified as being both a direct target of MoCRZ1 and having expression concurrently differentially regulated in a calcium/calcineurin/MoCRZ1 dependent manner. Highly represented were genes involved in calcium signaling, small molecule transport, ion homeostasis, cell wall synthesis/maintenance, and fungal virulence. Of particular note, genes involved in vesicle mediated secretion necessary for establishing host associations, were also found. MoCRZ1 itself was a target, suggesting a previously unreported autoregulation control point. The data also implicated a previously unreported feedback regulation mechanism of calcineurin activity. We propose that calcium/calcineurin regulated signal transduction circuits controlling development and pathogenicity manifest through multiple layers of regulation. We present results from the ChIP-chip and expression analysis along with a refined model of calcium/calcineurin signaling in this important plant pathogen.

  10. Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2010-06-01

    Full Text Available 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

  11. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  12. Research on an IP disaster recovery storage system

    Science.gov (United States)

    Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng

    2008-12-01

    According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.

  13. Pipeline for the Analysis of ChIP-seq Data and New Motif Ranking Procedure

    KAUST Repository

    Ashoor, Haitham

    2011-06-01

    This thesis presents a computational methodology for ab-initio identification of transcription factor binding sites based on ChIP-seq data. This method consists of three main steps, namely ChIP-seq data processing, motif discovery and models selection. A novel method for ranking the models of motifs identified in this process is proposed. This method combines multiple factors in order to rank the provided candidate motifs. It combines the model coverage of the ChIP-seq fragments that contain motifs from which that model is built, the suitable background data made up of shuffled ChIP-seq fragments, and the p-value that resulted from evaluating the model on actual and background data. Two ChIP-seq datasets retrieved from ENCODE project are used to evaluate and demonstrate the ability of the method to predict correct TFBSs with high precision. The first dataset relates to neuron-restrictive silencer factor, NRSF, while the second one corresponds to growth-associated binding protein, GABP. The pipeline system shows high precision prediction for both datasets, as in both cases the top ranked motif closely resembles the known motifs for the respective transcription factors.

  14. Proteolytic processing of the cilium adhesin MHJ_0194 (P123J ) in Mycoplasma hyopneumoniae generates a functionally diverse array of cleavage fragments that bind multiple host molecules.

    Science.gov (United States)

    Raymond, Benjamin B A; Jenkins, Cheryl; Seymour, Lisa M; Tacchi, Jessica L; Widjaja, Michael; Jarocki, Veronica M; Deutscher, Ania T; Turnbull, Lynne; Whitchurch, Cynthia B; Padula, Matthew P; Djordjevic, Steven P

    2015-03-01

    Mycoplasma hyopneumoniae, the aetiological agent of porcine enzootic pneumonia, regulates the presentation of proteins on its cell surface via endoproteolysis, including those of the cilial adhesin P123 (MHJ_0194). These proteolytic cleavage events create functional adhesins that bind to proteoglycans and glycoproteins on the surface of ciliated and non-ciliated epithelial cells and to the circulatory host molecule plasminogen. Two dominant cleavage events of the P123 preprotein have been previously characterized; however, immunoblotting studies suggest that more complex processing events occur. These extensive processing events are characterized here. The functional significance of the P97 cleavage fragments is also poorly understood. Affinity chromatography using heparin, fibronectin and plasminogen as bait and peptide arrays were used to expand our knowledge of the adhesive capabilities of P123 cleavage fragments and characterize a novel binding motif in the C-terminus of P123. Further, we use immunohistochemistry to examine in vivo, the biological significance of interactions between M. hyopneumoniae and fibronectin and show that M. hyopneumoniae induces fibronectin deposition at the site of infection on the ciliated epithelium. Our data supports the hypothesis that M. hyopneumoniae possesses the molecular machinery to influence key molecular communication pathways in host cells. © 2014 John Wiley & Sons Ltd.

  15. Cell-type specificity of ChIP-predicted transcription factor binding sites

    Directory of Open Access Journals (Sweden)

    Håndstad Tony

    2012-08-01

    Full Text Available Abstract Background Context-dependent transcription factor (TF binding is one reason for differences in gene expression patterns between different cellular states. Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq identifies genome-wide TF binding sites for one particular context—the cells used in the experiment. But can such ChIP-seq data predict TF binding in other cellular contexts and is it possible to distinguish context-dependent from ubiquitous TF binding? Results We compared ChIP-seq data on TF binding for multiple TFs in two different cell types and found that on average only a third of ChIP-seq peak regions are common to both cell types. Expectedly, common peaks occur more frequently in certain genomic contexts, such as CpG-rich promoters, whereas chromatin differences characterize cell-type specific TF binding. We also find, however, that genotype differences between the cell types can explain differences in binding. Moreover, ChIP-seq signal intensity and peak clustering are the strongest predictors of common peaks. Compared with strong peaks located in regions containing peaks for multiple transcription factors, weak and isolated peaks are less common between the cell types and are less associated with data that indicate regulatory activity. Conclusions Together, the results suggest that experimental noise is prevalent among weak peaks, whereas strong and clustered peaks represent high-confidence binding events that often occur in other cellular contexts. Nevertheless, 30-40% of the strongest and most clustered peaks show context-dependent regulation. We show that by combining signal intensity with additional data—ranging from context independent information such as binding site conservation and position weight matrix scores to context dependent chromatin structure—we can predict whether a ChIP-seq peak is likely to be present in other cellular contexts.

  16. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  17. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  18. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  19. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  20. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  1. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    International Nuclear Information System (INIS)

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  2. Applied Multiprotocol Routing in IP Telephony

    Directory of Open Access Journals (Sweden)

    Miroslav Voznak

    2010-01-01

    Full Text Available The aim of the project was to create a multi-protocol system using SIP, H.323 and MGCP standards, which would ensure routing to various types of VoIP networks. The priority was to provide multi-protocol support to SIP and H.323 signalling and the support of the routing using the ENUM standard which has recently passed from the trial phase into full operation in the Czech Republic. The document describes the system's architecture and the components used. It also briefly describes ENUM.

  3. An integrative genomic approach reveals coordinated expression of intronic miR-335, miR-342, and miR-561 with deregulated host genes in multiple myeloma

    Directory of Open Access Journals (Sweden)

    Agnelli Luca

    2008-08-01

    Full Text Available Abstract Background The role of microRNAs (miRNAs in multiple myeloma (MM has yet to be fully elucidated. To identify miRNAs that are potentially deregulated in MM, we investigated those mapping within transcription units, based on evidence that intronic miRNAs are frequently coexpressed with their host genes. To this end, we monitored host transcript expression values in a panel of 20 human MM cell lines (HMCLs and focused on transcripts whose expression varied significantly across the dataset. Methods miRNA expression was quantified by Quantitative Real-Time PCR. Gene expression and genome profiling data were generated on Affymetrix oligonucleotide microarrays. Significant Analysis of Microarrays algorithm was used to investigate differentially expressed transcripts. Conventional statistics were used to test correlations for significance. Public libraries were queried to predict putative miRNA targets. Results We identified transcripts specific to six miRNA host genes (CCPG1, GULP1, EVL, TACSTD1, MEST, and TNIK whose average changes in expression varied at least 2-fold from the mean of the examined dataset. We evaluated the expression levels of the corresponding intronic miRNAs and identified a significant correlation between the expression levels of MEST, EVL, and GULP1 and those of the corresponding miRNAs miR-335, miR-342-3p, and miR-561, respectively. Genome-wide profiling of the 20 HMCLs indicated that the increased expression of the three host genes and their corresponding intronic miRNAs was not correlated with local copy number variations. Notably, miRNAs and their host genes were overexpressed in a fraction of primary tumors with respect to normal plasma cells; however, this finding was not correlated with known molecular myeloma groups. The predicted putative miRNA targets and the transcriptional profiles associated with the primary tumors suggest that MEST/miR-335 and EVL/miR-342-3p may play a role in plasma cell homing and

  4. A survey of motif finding Web tools for detecting binding site motifs in ChIP-Seq data.

    Science.gov (United States)

    Tran, Ngoc Tam L; Huang, Chun-Hsi

    2014-02-20

    ChIP-Seq (chromatin immunoprecipitation sequencing) has provided the advantage for finding motifs as ChIP-Seq experiments narrow down the motif finding to binding site locations. Recent motif finding tools facilitate the motif detection by providing user-friendly Web interface. In this work, we reviewed nine motif finding Web tools that are capable for detecting binding site motifs in ChIP-Seq data. We showed each motif finding Web tool has its own advantages for detecting motifs that other tools may not discover. We recommended the users to use multiple motif finding Web tools that implement different algorithms for obtaining significant motifs, overlapping resemble motifs, and non-overlapping motifs. Finally, we provided our suggestions for future development of motif finding Web tool that better assists researchers for finding motifs in ChIP-Seq data.

  5. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Science.gov (United States)

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  6. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  7. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  8. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  9. Host responses to interspecific brood parasitism: a by-product of adaptations to conspecific parasitism?

    Science.gov (United States)

    Samas, Peter; Hauber, Mark E; Cassey, Phillip; Grim, Tomas

    2014-01-01

    Why have birds evolved the ability to reject eggs? Typically, foreign egg discrimination is interpreted as evidence that interspecific brood parasitism (IP) has selected for the host's ability to recognize and eliminate foreign eggs. Fewer studies explore the alternative hypothesis that rejection of interspecific eggs is a by-product of host defenses, evolved against conspecific parasitism (CP). We performed a large scale study with replication across taxa (two congeneric Turdus thrushes), space (populations), time (breeding seasons), and treatments (three types of experimental eggs), using a consistent design of egg rejection experiments (n = 1057 nests; including controls), in areas with potential IP either present (Europe; native populations) or absent (New Zealand; introduced populations). These comparisons benefited from the known length of allopatry (one and a half centuries), with no gene flow between native and introduced populations, which is rarely available in host-parasite systems. Hosts rejected CP at unusually high rates for passerines (up to 60%). CP rejection rates were higher in populations with higher conspecific breeding densities and no risks of IP, supporting the CP hypothesis. IP rejection rates did not covary geographically with IP risk, contradicting the IP hypothesis. High egg rejection rates were maintained in the relatively long-term isolation from IP despite non-trivial rejection costs and errors. These egg rejection patterns, combined with recent findings that these thrushes are currently unsuitable hosts of the obligate parasitic common cuckoo (Cuculus canorus), are in agreement with the hypothesis that the rejection of IP is a by-product of fine-tuned egg discrimination evolved due to CP. Our study highlights the importance of considering both IP and CP simultaneously as potential drivers in the evolution of egg discrimination, and illustrates how populations introduced to novel ecological contexts can provide critical insights

  10. Taking multiple infections of cells and recombination into account leads to small within-host effective-population-size estimates of HIV-1.

    Directory of Open Access Journals (Sweden)

    Rajesh Balagam

    2011-01-01

    Full Text Available Whether HIV-1 evolution in infected individuals is dominated by deterministic or stochastic effects remains unclear because current estimates of the effective population size of HIV-1 in vivo, N(e, are widely varying. Models assuming HIV-1 evolution to be neutral estimate N(e~10²-10⁴, smaller than the inverse mutation rate of HIV-1 (~10⁵, implying the predominance of stochastic forces. In contrast, a model that includes selection estimates N(e>10⁵, suggesting that deterministic forces would hold sway. The consequent uncertainty in the nature of HIV-1 evolution compromises our ability to describe disease progression and outcomes of therapy. We perform detailed bit-string simulations of viral evolution that consider large genome lengths and incorporate the key evolutionary processes underlying the genomic diversification of HIV-1 in infected individuals, namely, mutation, multiple infections of cells, recombination, selection, and epistatic interactions between multiple loci. Our simulations describe quantitatively the evolution of HIV-1 diversity and divergence in patients. From comparisons of our simulations with patient data, we estimate N(e~10³-10⁴, implying predominantly stochastic evolution. Interestingly, we find that N(e and the viral generation time are correlated with the disease progression time, presenting a route to a priori prediction of disease progression in patients. Further, we show that the previous estimate of N(e>10⁵ reduces as the frequencies of multiple infections of cells and recombination assumed increase. Our simulations with N(e~10³-10⁴ may be employed to estimate markers of disease progression and outcomes of therapy that depend on the evolution of viral diversity and divergence.

  11. Is the IP response related to geology or contaminants in a leachate plume at the Grindsted Landfill, Denmark?

    DEFF Research Database (Denmark)

    Møller, Ingelise; Maurya, Pradip Kumar; Balbarini, Nicola

    Contaminants in leachate plumes from landfills and other contaminated sites are a threat to the environment. Efficient site characterization methods are needed. The perspectives of the IP method are investigated in combination with geological sampling and chemical analyses of water samples. Along...... a leachate plume from a landfill hosting both household and chemical waste, borehole IP data, geological samples, grain size, and contaminant concentrations in water samples are examined for correlations related to geology and concentrations of contaminants. Results relating the Cole-Cole parameters...... with sediment types and pore water resistivity representing the concentrations of the contaminants show that the formation resistivity primarily is controlled by the contaminant concentrations while the IP parameters primarily are related to the clay content and grain size distribution of sandy sediments...

  12. Is the IP response related to geology or contaminants in a leachate plume at the Grindsted Landfill, Denmark?

    DEFF Research Database (Denmark)

    Møller, Ingelise; Maurya, Pradip Kumar; Balbarini, Nicola

    a leachate plume from a landfill hosting both household and chemical waste, borehole IP data, geological samples, grain size, and contaminant concentrations in water samples are examined for correlations related to geology and concentrations of contaminants. Results relating the Cole-Cole parameters...... with sediment types and pore water resistivity representing the concentrations of the contaminants show that the formation resistivity primarily is controlled by the contaminant concentrations while the IP parameters primarily are related to the clay content and grain size distribution of sandy sediments......Contaminants in leachate plumes from landfills and other contaminated sites are a threat to the environment. Efficient site characterization methods are needed. The perspectives of the IP method are investigated in combination with geological sampling and chemical analyses of water samples. Along...

  13. IPS Empress: a standard of excellence.

    Science.gov (United States)

    Hornbrook, D S; Roberts, M

    1998-01-01

    For 10 years, clinicians have been able to provide patients with a proven aesthetic and functional restoration that exhibits wear-compatibility, durability, and marginal integrity. This leucite-reinforced, pressed ceramic (IPS Empress, Ivoclar Williams, Amherst, NY) presents to patients and dentists the option of a metal-free alternative which retains the functional advantages of a porcelain-fused-to-metal restoration. This article illustrates the importance of sound laboratory communication in the utilization of this restorative material, focusing upon three aspects: midline and incisal edge inclination, elimination of open gingival embrasures, and incisal edge translucency. Techniques are also presented in order to efficiently communicate details of each case presented to the laboratory.

  14. Machinability of IPS Empress 2 framework ceramic.

    Science.gov (United States)

    Schmidt, C; Weigl, P

    2000-01-01

    Using ceramic materials for an automatic production of ceramic dentures by CAD/CAM is a challenge, because many technological, medical, and optical demands must be considered. The IPS Empress 2 framework ceramic meets most of them. This study shows the possibilities for machining this ceramic with economical parameters. The long life-time requirement for ceramic dentures requires a ductile machined surface to avoid the well-known subsurface damages of brittle materials caused by machining. Slow and rapid damage propagation begins at break outs and cracks, and limits life-time significantly. Therefore, ductile machined surfaces are an important demand for machine dental ceramics. The machining tests were performed with various parameters such as tool grain size and feed speed. Denture ceramics were machined by jig grinding on a 5-axis CNC milling machine (Maho HGF 500) with a high-speed spindle up to 120,000 rpm. The results of the wear test indicate low tool wear. With one tool, you can machine eight occlusal surfaces including roughing and finishing. One occlusal surface takes about 60 min machining time. Recommended parameters for roughing are middle diamond grain size (D107), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 1000 mm/min, depth of cut a(e) = 0.06 mm, width of contact a(p) = 0.8 mm, and for finishing ultra fine diamond grain size (D46), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 100 mm/min, depth of cut a(e) = 0.02 mm, width of contact a(p) = 0.8 mm. The results of the machining tests give a reference for using IPS Empress(R) 2 framework ceramic in CAD/CAM systems. Copyright 2000 John Wiley & Sons, Inc.

  15. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  16. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  17. Voice over IP in the Local Exchange: A Case Study

    OpenAIRE

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  18. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  19. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  20. Analysis of ChIP-seq Data in R/Bioconductor.

    Science.gov (United States)

    de Santiago, Ines; Carroll, Thomas

    2018-01-01

    The development of novel high-throughput sequencing methods for ChIP (chromatin immunoprecipitation) has provided a very powerful tool to study gene regulation in multiple conditions at unprecedented resolution and scale. Proactive quality-control and appropriate data analysis techniques are of critical importance to extract the most meaningful results from the data. Over the last years, an array of R/Bioconductor tools has been developed allowing researchers to process and analyze ChIP-seq data. This chapter provides an overview of the methods available to analyze ChIP-seq data based primarily on software packages from the open-source Bioconductor project. Protocols described in this chapter cover basic steps including data alignment, peak calling, quality control and data visualization, as well as more complex methods such as the identification of differentially bound regions and functional analyses to annotate regulatory regions. The steps in the data analysis process were demonstrated on publicly available data sets and will serve as a demonstration of the computational procedures routinely used for the analysis of ChIP-seq data in R/Bioconductor, from which readers can construct their own analysis pipelines.

  1. Bayesian Modeling of ChIP-chip Data Through a High-Order Ising Model

    KAUST Repository

    Mo, Qianxing

    2010-01-29

    ChIP-chip experiments are procedures that combine chromatin immunoprecipitation (ChIP) and DNA microarray (chip) technology to study a variety of biological problems, including protein-DNA interaction, histone modification, and DNA methylation. The most important feature of ChIP-chip data is that the intensity measurements of probes are spatially correlated because the DNA fragments are hybridized to neighboring probes in the experiments. We propose a simple, but powerful Bayesian hierarchical approach to ChIP-chip data through an Ising model with high-order interactions. The proposed method naturally takes into account the intrinsic spatial structure of the data and can be used to analyze data from multiple platforms with different genomic resolutions. The model parameters are estimated using the Gibbs sampler. The proposed method is illustrated using two publicly available data sets from Affymetrix and Agilent platforms, and compared with three alternative Bayesian methods, namely, Bayesian hierarchical model, hierarchical gamma mixture model, and Tilemap hidden Markov model. The numerical results indicate that the proposed method performs as well as the other three methods for the data from Affymetrix tiling arrays, but significantly outperforms the other three methods for the data from Agilent promoter arrays. In addition, we find that the proposed method has better operating characteristics in terms of sensitivities and false discovery rates under various scenarios. © 2010, The International Biometric Society.

  2. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    OpenAIRE

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  3. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  4. Astrocyte IP3R2-dependent Ca2+ signaling is not a major modulator of neuronal pathways governing behavior.

    Directory of Open Access Journals (Sweden)

    Jeremy ePetravicz

    2014-11-01

    Full Text Available Calcium-dependent release of gliotransmitters by astrocytes is reported to play a critical role in synaptic transmission and be necessary for long-term potentiation (LTP, long-term depression (LTD and other forms of synaptic modulation that are correlates of learning and memory . Further, physiological processes reported to be dependent on Ca2+ fluxes in astrocytes include functional hyperemia, sleep, and regulation of breathing. The preponderance of findings indicate that most, if not all, receptor dependent Ca2+ fluxes within astrocytes are due to release of Ca2+ through IP3 receptor/channels in the endoplasmic reticulum. Findings from several laboratories indicate that astrocytes only express IP3 receptor type 2 (IP3R2 and that a knockout of IP3R2 obliterates the GPCR-dependent astrocytic Ca2+ responses. Assuming that astrocytic Ca2+ fluxes play a critical role in synaptic physiology, it would be predicted that eliminating of astrocytic Ca2+ fluxes would lead to marked changes in behavioral tests. Here, we tested this hypothesis by conducting a broad series of behavioral tests that recruited multiple brain regions, on an IP3R2 conditional knockout mouse model. We present the novel finding that behavioral processes are unaffected by lack of astrocyte IP3R-mediated Ca2+ signals. IP3R2 cKO animals display no change in anxiety or depressive behaviors, and no alteration to motor and sensory function. Morris water maze testing, a behavioral correlate of learning and memory, was unaffected by lack of astrocyte IP3R2-mediated Ca2+-signaling. Therefore, in contrast to the prevailing literature, we find that neither receptor-driven astrocyte Ca2+ fluxes nor, by extension, gliotransmission is likely to be a major modulating force on the physiological processes underlying behavior.

  5. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Directory of Open Access Journals (Sweden)

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  6. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  7. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  8. VoIP under the EU regulatory framework : preventing foreclosure?

    NARCIS (Netherlands)

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  9. The nucleolar SUMO-specific protease SMT3IP1/SENP3 attenuates Mdm2-mediated p53 ubiquitination and degradation

    Energy Technology Data Exchange (ETDEWEB)

    Nishida, Tamotsu, E-mail: nishida@gene.mie-u.ac.jp [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan); Yamada, Yoshiji [Department of Human Functional Genomics, Life Science Research Center, Mie University, 1577 Kurima-machiya, Tsu 514-8507 (Japan)

    2011-03-11

    Research highlights: {yields} SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. {yields} SMT3IP1 competes with p53 for binding to the central acidic domain of Mdm2. {yields} SMT3IP1 binding to Mdm2 inhibits Mdm2-mediated p53 ubiquitination and degradation. {yields} We postulate that SMT3IP1 acts as a new regulator of the p53-Mdm2 pathway. -- Abstract: SUMO (small ubiquitin-like modifier) modification plays multiple roles in several cellular processes. Sumoylation is reversibly regulated by SUMO-specific proteases. SUMO-specific proteases have recently been implicated in cell proliferation and early embryogenesis, but the underlying mechanisms remain unknown. Here, we show that a nucleolar SUMO-specific protease, SMT3IP1/SENP3, controls the p53-Mdm2 pathway. We found that SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. Overexpression of SMT3IP1 in cells resulted in the accumulation of Mdm2 in the nucleolus and increased stability of the p53 protein. In addition, SMT3IP1 bound to the acidic domain of Mdm2, which also mediates the p53 interaction, and competed with p53 for binding. Increasing expression of SMT3IP1 suppressed Mdm2-mediated p53 ubiquitination and subsequent proteasomal degradation. Interestingly, the desumoylation activity of SMT3IP1 was not necessary for p53 stabilization. These results suggest that SMT3IP1 is a new regulator of the p53-Mdm2 pathway.

  10. The nucleolar SUMO-specific protease SMT3IP1/SENP3 attenuates Mdm2-mediated p53 ubiquitination and degradation

    International Nuclear Information System (INIS)

    Nishida, Tamotsu; Yamada, Yoshiji

    2011-01-01

    Research highlights: → SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. → SMT3IP1 competes with p53 for binding to the central acidic domain of Mdm2. → SMT3IP1 binding to Mdm2 inhibits Mdm2-mediated p53 ubiquitination and degradation. → We postulate that SMT3IP1 acts as a new regulator of the p53-Mdm2 pathway. -- Abstract: SUMO (small ubiquitin-like modifier) modification plays multiple roles in several cellular processes. Sumoylation is reversibly regulated by SUMO-specific proteases. SUMO-specific proteases have recently been implicated in cell proliferation and early embryogenesis, but the underlying mechanisms remain unknown. Here, we show that a nucleolar SUMO-specific protease, SMT3IP1/SENP3, controls the p53-Mdm2 pathway. We found that SMT3IP1 interacts with p53 and Mdm2, and desumoylates both proteins. Overexpression of SMT3IP1 in cells resulted in the accumulation of Mdm2 in the nucleolus and increased stability of the p53 protein. In addition, SMT3IP1 bound to the acidic domain of Mdm2, which also mediates the p53 interaction, and competed with p53 for binding. Increasing expression of SMT3IP1 suppressed Mdm2-mediated p53 ubiquitination and subsequent proteasomal degradation. Interestingly, the desumoylation activity of SMT3IP1 was not necessary for p53 stabilization. These results suggest that SMT3IP1 is a new regulator of the p53-Mdm2 pathway.

  11. Collaboration in Science and Innovation: IP Considerations

    International Nuclear Information System (INIS)

    Belenkaya, N.

    2016-01-01

    Full text: In today’s highly competitive market, organizations gain competitive advantage by collaborating on innovations. However, in general, before a successful partnership can start, organizations will have to negotiate ownership and access to the intellectual property produced as a result of the joint effort. While some collaborative projects are not created to pursue commercial gains, outputs of collaboration may have commercial application. Experience shows that the framework for the collaboration should be determined through an agreement that describes the project and the future ownership, management and exploitation of the intellectual property. The attractiveness of a collaborative project is increased if such framework can be negotiated timely. It is important that the partners agree on the allocation of ownership, transfer, and access to intellectual property before the project starts. This is done to reduce uncertainties and to protect the rights of the partners. Partners should agree not only on the owners of the future intellectual property but also on the ways for subsequent commercial exploitation of the results of the collaboration. A timely negotiated and successfully finalized framework for IP ownership and management plays a key role in protecting partner investments and ensuring the successful exploitation of the results of the collaboration. (author

  12. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  13. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  14. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  15. TRAF3IP2 mediates atherosclerotic plaque development and vulnerability in ApoE−/− mice

    Science.gov (United States)

    Prasad, Sakamuri Siva Sankara Vara; Higashi, Yusuke; Sukhanov, Sergiy; Siddesha, Jalahalli M; Delafontaine, Patrice; Siebenlist, Ulrich; Chandrasekar, Bysani

    2016-01-01

    expression of multiple proinflammatory mediators. TRAF3IP2 could be a potential therapeutic target in atherosclerotic vascular diseases. PMID:27237075

  16. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    International Nuclear Information System (INIS)

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  17. IP-10-mediated T cell homing promotes cerebral inflammation over splenic immunity to malaria infection.

    Directory of Open Access Journals (Sweden)

    Catherine Q Nie

    2009-04-01

    Full Text Available Plasmodium falciparum malaria causes 660 million clinical cases with over 2 million deaths each year. Acquired host immunity limits the clinical impact of malaria infection and provides protection against parasite replication. Experimental evidence indicates that cell-mediated immune responses also result in detrimental inflammation and contribute to severe disease induction. In both humans and mice, the spleen is a crucial organ involved in blood stage malaria clearance, while organ-specific disease appears to be associated with sequestration of parasitized erythrocytes in vascular beds and subsequent recruitment of inflammatory leukocytes. Using a rodent model of cerebral malaria, we have previously found that the majority of T lymphocytes in intravascular infiltrates of cerebral malaria-affected mice express the chemokine receptor CXCR3. Here we investigated the effect of IP-10 blockade in the development of experimental cerebral malaria and the induction of splenic anti-parasite immunity. We found that specific neutralization of IP-10 over the course of infection and genetic deletion of this chemokine in knockout mice reduces cerebral intravascular inflammation and is sufficient to protect P. berghei ANKA-infected mice from fatality. Furthermore, our results demonstrate that lack of IP-10 during infection significantly reduces peripheral parasitemia. The increased resistance to infection observed in the absence of IP-10-mediated cell trafficking was associated with retention and subsequent expansion of parasite-specific T cells in spleens of infected animals, which appears to be advantageous for the control of parasite burden. Thus, our results demonstrate that modulating homing of cellular immune responses to malaria is critical for reaching a balance between protective immunity and immunopathogenesis.

  18. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  19. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  20. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  1. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  2. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  3. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  4. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Science.gov (United States)

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  5. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  6. Analysis of Mobile WSNs over IP

    NARCIS (Netherlands)

    Dimitrova, D.C.; Bijwaard, D.; Havinga, Paul J.M.; Blom, K.C.H.; Meratnia, Nirvana; Eertink, Henk

    2011-01-01

    Movement of wireless sensor and actuator networks and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple applications, remote configuration and actuation is still a big challenge. The purpose of this paper is to analyse and describe which

  7. Relating genes to function: identifying enriched transcription factors using the ENCODE ChIP-Seq significance tool.

    Science.gov (United States)

    Auerbach, Raymond K; Chen, Bin; Butte, Atul J

    2013-08-01

    Biological analysis has shifted from identifying genes and transcripts to mapping these genes and transcripts to biological functions. The ENCODE Project has generated hundreds of ChIP-Seq experiments spanning multiple transcription factors and cell lines for public use, but tools for a biomedical scientist to analyze these data are either non-existent or tailored to narrow biological questions. We present the ENCODE ChIP-Seq Significance Tool, a flexible web application leveraging public ENCODE data to identify enriched transcription factors in a gene or transcript list for comparative analyses. The ENCODE ChIP-Seq Significance Tool is written in JavaScript on the client side and has been tested on Google Chrome, Apple Safari and Mozilla Firefox browsers. Server-side scripts are written in PHP and leverage R and a MySQL database. The tool is available at http://encodeqt.stanford.edu. abutte@stanford.edu Supplementary material is available at Bioinformatics online.

  8. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  9. Engineering of radioimmunoassay (RIA) IP10.1

    International Nuclear Information System (INIS)

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  10. IP and resistivity survey at the INEL cold test pit

    International Nuclear Information System (INIS)

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  11. The psisub(IPS)-LAS relation for extragalactic radio sources

    International Nuclear Information System (INIS)

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  12. Quantitative analysis of macro-ARG using IP system

    International Nuclear Information System (INIS)

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  13. IP EUROTRANS: from MYRRHA towards XT-ADS

    International Nuclear Information System (INIS)

    Debruyn, D.

    2006-01-01

    The integrated project (IP) EUROTRANS (EUROpean Research Programme for the TRANSmutation of High-Level Nuclear Waste in an Accelerator Driven System) has been launched in the Euratom Sixth Framework Programme (FP6) and has officially started in April 2005 for a duration of four years. This project is the logical continuation of several activities worked out within the previous Framework Programme (FP5), namely the ADOPT network, the FUETRA, BASTRA and TESTRA clusters and the PDS-XADS project. The project is divided into five main sub-projects or domains (DMs). SCK-CEN coordinates the DM1 DESIGN described hereafter. The aim of DM2 ECATS is to provide validated experimental input from relevant coupling experiments of an accelerator, a spallation target and a sub-critical blanket, while the development and demonstration of the associated technologies is devoted to the remaining DMs, DM3 AFTRA (fuels), DM4 DEMETRA (heavy liquid metal technologies) and DM5 NUDATRA (nuclear data). The objective of the DM1 DESIGN of IP EUROTRANS is to proceed by a significant jump towards the demonstration of the industrial transmutation through the ADS route. The strategy of European Transmutation Demonstration (ETD) is carried out with two interconnected activities: (1) the first activity is to develop an advanced design file leading to a short-term (i.e. realisation within the next 10 years) experimental demonstration of the technical feasibility of Transmutation (at 50 to 100 MWth) in an Accelerator Driven System (XT-ADS). Liquid lead-bismuth eutectic (LBE) is used as primary coolant and material for the spallation target and the core is designed with standard MOX fuel; (2) the second activity is to carry out in parallel a reference conceptual design for a modular EFIT (European Facility for Industrial Transmutation) machine with a power of up to several 100 MWth, as a basis for a cost estimate and safety studies for an ADS-based transmutation system. For the EFIT, liquid lead is used

  14. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  15. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    International Nuclear Information System (INIS)

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  16. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    OpenAIRE

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  17. New-generation security network with synergistic IP sensors

    Science.gov (United States)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  18. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Science.gov (United States)

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  19. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Science.gov (United States)

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  20. Carp erythrodermatitis : host defense-pathogen interaction

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the

  1. IP-10 and MIG are compartmentalized at the site of disease during pleural and meningeal tuberculosis and are decreased after antituberculosis treatment.

    Science.gov (United States)

    Yang, Qianting; Cai, Yi; Zhao, Wei; Wu, Fan; Zhang, Mingxia; Luo, Kai; Zhang, Yan; Liu, Haiying; Zhou, Boping; Kornfeld, Hardy; Chen, Xinchun

    2014-12-01

    The diagnosis of active tuberculosis (TB) disease remains a challenge, especially in high-burden settings. Cytokines and chemokines are important in the pathogenesis of TB. Here we investigate the usefulness of circulating and compartmentalized cytokines/chemokines for diagnosis of TB. The levels of multiple cytokines/chemokines in plasma, pleural fluid (PF), and cerebrospinal fluid (CSF) were determined by Luminex liquid array-based multiplexed immunoassays. Three of 26 cytokines/chemokines in plasma were significantly different between TB and latent tuberculosis infection (LTBI). Among them, IP-10 and MIG had the highest diagnostic values, with an area under the receiver operating characteristic curve (ROC AUC) of 0.92 for IP-10 and 0.86 for MIG for distinguishing TB from LTBI. However, IP-10 and MIG levels in plasma were not different between TB and non-TB lung disease. In contrast, compartmentalized IP-10 and MIG in the PF and CSF showed promising diagnostic values in discriminating TB and non-TB pleural effusion (AUC = 0.87 for IP-10 and 0.93 for MIG), as well as TB meningitis and non-TB meningitis (AUC = 0.9 for IP-10 and 0.95 for MIG). A longitudinal study showed that the plasma levels of IP-10, MIG, granulocyte colony-stimulating factor (G-CSF), and gamma interferon (IFN-γ) decreased, while the levels of MCP-1/CCL2 and eotaxin-1/CCL11 increased, after successful treatment of TB. Our findings provide a practical methodology for discriminating active TB from LTBI by sequential IFN-γ release assays (IGRAs) and plasma IP-10 testing, while increased IP-10 and MIG at the site of infection (PF or CSF) can be used as a marker for distinguishing pleural effusion and meningitis caused by TB from those of non-TB origins. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  2. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  3. An ethernet/IP security review with intrusion detection applications

    International Nuclear Information System (INIS)

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  4. Massive stars dying alone: Extremely remote environments of SN2009ip and SN2010jp

    Science.gov (United States)

    Smith, Nathan

    2014-10-01

    We propose an imaging study of the astonishingly remote environments of two recent supernovae (SNe): SN2009ip and SN2010jp. Both were unusual Type IIn explosions that crashed into dense circumstellar material (CSM) ejected by the star shortly before explosion. The favored progenitors of these SNe are very massive luminous blue variable (LBV) stars. In fact, SN2009ip presents an extraordinay case where the LBV-like progenitor was actually detected directly in archival HST data, and where we obtained spectra and photometry for numerous pre-SN eruptions. No other SN has this treasure trove of detailed information about the progenitor (not even SN1987A). SN2010jp represents a possible collapsar-powered event, since it showed evidence of a fast bipolar jet in spectra and a low 56Ni mass; this would be an analog of the black-hole forming explosions that cause gamma ray bursts, but where the relativistic jet is damped by a residual H envelope on the star. In both cases, the only viable models for these SNe involve extremely massive (initial masses of 40-100 Msun) progenitor stars. This seems at odds with their extremely remote environments in the far outskirts of their host galaxies, with no detected evidence for an underlying massive star population in ground-based data (nor in the single shallow WFPC2/F606W image of SN2009ip). Here we propose deep UV HST images to search for any mid/late O-type stars nearby, deep red images to detect any red supergiants, and an H-alpha image to search for any evidence of ongoing star formation in the vicinity. These observations will place important and demanding constraints on the initial masses and ages of these progenitors.

  5. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  6. A TCP/IP framework for ethernet-based measurement, control and experiment data distribution

    Science.gov (United States)

    Ocaya, R. O.; Minny, J.

    2010-11-01

    A complete modular but scalable TCP/IP based scientific instrument control and data distribution system has been designed and realized. The system features an IEEE 802.3 compliant 10 Mbps Medium Access Controller (MAC) and Physical Layer Device that is suitable for the full-duplex monitoring and control of various physically widespread measurement transducers in the presence of a local network infrastructure. The cumbersomeness of exchanging and synchronizing data between the various transducer units using physical storage media led to the choice of TCP/IP as a logical alternative. The system and methods developed are scalable for broader usage over the Internet. The system comprises a PIC18f2620 and ENC28j60 based hardware and a software component written in C, Java/Javascript and Visual Basic.NET programming languages for event-level monitoring and browser user-interfaces respectively. The system exchanges data with the host network through IPv4 packets requested and received on a HTTP page. It also responds to ICMP echo, UDP and ARP requests through a user selectable integrated DHCP and static IPv4 address allocation scheme. The round-trip time, throughput and polling frequency are estimated and reported. A typical application to temperature monitoring and logging is also presented.

  7. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  8. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  9. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  10. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  11. The Application of an Online Data Visualization Tool, Ptplot, in the World Data Center (WDC for Solar-Terrestrial Science (STS in IPS Radio and Space Services, Australia

    Directory of Open Access Journals (Sweden)

    K Wang

    2013-02-01

    Full Text Available Ptplot is a set of two dimensional signal plotters components written in Java with multiple properties, such as being embeddable in applets or applications, utilizing automatic or manual tick marks, logarithmic axes, infinite zooming, and much more. The World Data Centre of IPS applies Ptplot as a multiple function online data plot tool by converting various text format data files into Ptplot recognizable XML files with the AWK language. At present, Ptplot has allowed eight archived solar-terrestrial science data sets to be easily plotted, viewed, and downloaded from the IPS web site.

  12. Which IP Strategies Do Young Highly Innovative Firms Choose

    DEFF Research Database (Denmark)

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  13. Transition in complex calcium bursting induced by IP3 degradation

    International Nuclear Information System (INIS)

    Zhang Feng; Lu Qishao; Su Jianzhong

    2009-01-01

    Complex intracellular Ca 2+ oscillations are systematically investigated in a mathematical model based on the mechanism of Ca 2+ -induced Ca 2+ release (CICR), taking account of the Ca 2+ -stimulated degradation of inositol 1,4,5-trisphosphate (IP 3 ) by a 3-kinase. Periodic, quasi-periodic and chaotic bursting oscillations exist in a wide range of parameter values and occur alternatively as the parameters change slightly. The transition among them can be observed by the evidence in their interspike interval and the Lyapunov exponent. These results reveal the role of agonist-stimulated of IP 3 degradation as a possible source for complex patterns in Ca 2+ signaling.

  14. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  15. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  16. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    Science.gov (United States)

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  17. An improved ChIP-seq peak detection system for simultaneously identifying post-translational modified transcription factors by combinatorial fusion, using SUMOylation as an example.

    Science.gov (United States)

    Cheng, Chia-Yang; Chu, Chia-Han; Hsu, Hung-Wei; Hsu, Fang-Rong; Tang, Chung Yi; Wang, Wen-Ching; Kung, Hsing-Jien; Chang, Pei-Ching

    2014-01-01

    Post-translational modification (PTM) of transcriptional factors and chromatin remodelling proteins is recognized as a major mechanism by which transcriptional regulation occurs. Chromatin immunoprecipitation (ChIP) in combination with high-throughput sequencing (ChIP-seq) is being applied as a gold standard when studying the genome-wide binding sites of transcription factor (TFs). This has greatly improved our understanding of protein-DNA interactions on a genomic-wide scale. However, current ChIP-seq peak calling tools are not sufficiently sensitive and are unable to simultaneously identify post-translational modified TFs based on ChIP-seq analysis; this is largely due to the wide-spread presence of multiple modified TFs. Using SUMO-1 modification as an example; we describe here an improved approach that allows the simultaneous identification of the particular genomic binding regions of all TFs with SUMO-1 modification. Traditional peak calling methods are inadequate when identifying multiple TF binding sites that involve long genomic regions and therefore we designed a ChIP-seq processing pipeline for the detection of peaks via a combinatorial fusion method. Then, we annotate the peaks with known transcription factor binding sites (TFBS) using the Transfac Matrix Database (v7.0), which predicts potential SUMOylated TFs. Next, the peak calling result was further analyzed based on the promoter proximity, TFBS annotation, a literature review, and was validated by ChIP-real-time quantitative PCR (qPCR) and ChIP-reChIP real-time qPCR. The results show clearly that SUMOylated TFs are able to be pinpointed using our pipeline. A methodology is presented that analyzes SUMO-1 ChIP-seq patterns and predicts related TFs. Our analysis uses three peak calling tools. The fusion of these different tools increases the precision of the peak calling results. TFBS annotation method is able to predict potential SUMOylated TFs. Here, we offer a new approach that enhances ChIP

  18. Characterization of joining sites of a viral histone H4 on host insect chromosomes.

    Directory of Open Access Journals (Sweden)

    Sunil Kumar

    Full Text Available A viral histone H4 (CpBV-H4 is encoded in a polydnavirus, Cotesia plutellae bracovirus (CpBV. It plays a crucial role in parasitism of an endoparasitoid wasp, C. plutellae, against diamondback moth, Plutella xylostella, by altering host gene expression in an epigenetic mode by its N-terminal tail after joining host nucleosomes. Comparative transcriptomic analysis between parasitized and nonparasitized P. xylostella by RNA-Seq indicated that 1,858 genes were altered at more than two folds in expression levels at late parasitic stage, including 877 up-regulated genes and 981 down-regulated genes. Among parasitic factors altering host gene expression, CpBV-H4 alone explained 16.3% of these expressional changes. To characterize the joining sites of CpBV-H4 on host chromosomes, ChIP-Seq (chromatin immunoprecipitation followed by deep sequencing was applied to chromatins extracted from parasitized larvae. It identified specific 538 ChIP targets. Joining sites were rich (60.2% in AT sequence. Almost 40% of ChIP targets included short nucleotide repeat sequences presumably recognizable by transcriptional factors and chromatin remodeling factors. To further validate these CpBV-H4 targets, CpBV-H4 was transiently expressed in nonparasitized host at late larval stage and subjected to ChIP-Seq. Two kinds of ChIP-Seqs shared 51 core joining sites. Common targets were close (within 1 kb to genes regulated at expression levels by CpBV-H4. However, other host genes not close to CpBV-H4 joining sites were also regulated by CpBV-H4. These results indicate that CpBV-H4 joins specific chromatin regions of P. xylostella and controls about one sixth of the total host genes that were regulated by C. plutellae parasitism in an epigenetic mode.

  19. Programmable genetic algorithm IP core for sensing and surveillance applications

    Science.gov (United States)

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  20. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  1. Construction of a nuclear data server using TCP/IP

    Energy Technology Data Exchange (ETDEWEB)

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  2. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  3. Lessons Learned from resolving massive IPS database change for SPADES+

    International Nuclear Information System (INIS)

    Kim, Jin-Soo

    2016-01-01

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT_ID is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT_IDs, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT_IDs are in IPS database. Changing POINT_IDs could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database

  4. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  5. Photometric studies of δ Scuti stars. I. IP Virginis

    Science.gov (United States)

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  6. Sister broods in the spruce bark beetle, Ips typographus (L.)

    Czech Academy of Sciences Publication Activity Database

    Davídková, Markéta; Doležal, Petr

    2017-01-01

    Roč. 405, DEC 01 (2017), s. 13-21 ISSN 0378-1127 Grant - others:Lesy ČR(CZ) 08/2009-2015 Institutional support: RVO:60077344 Keywords : re-emergence * sister broods * Ips typographus Subject RIV: EH - Ecology, Behaviour OBOR OECD: Zoology Impact factor: 3.064, year: 2016 http://www.sciencedirect.com/science/article/pii/S0378112717309507

  7. Design & Implementation of IP-PBX for Small Business Organization

    OpenAIRE

    Mr. Sandeep R. Sonaskar; Dr. M. M. Khanapurkar

    2012-01-01

    Most of the small business organization uses old Electronics Private Branch Exchange (EPBX) System for the telephony communication. This EPBX is now could be replaced by Internet protocol telephony PBX called IP-PBX which uses Intranet as a backbone as each organization has pre installed local area network. The network architecture for the IPPBX system is easy to design

  8. The mites associated with Ips typographus in Sweden

    Science.gov (United States)

    John C. Moser; Hubertus H. Eidmann; Jan R. Regnander

    1989-01-01

    Twenty-four species of mites were found associated with Ips typographus (Linnaeus) collected from pherommone traps in Sweden, bringing to 38 the total recorded for this scolytid. Because three of the species are parasites, it may be possible to use them in biological control of I. typographus. Couplets from an earlier key to these...

  9. Harmonising and Matching IPR Holders at IP Australia

    OpenAIRE

    T’Mir D. Julius; Gaétan de Rassenfosse

    2014-01-01

    This document describes the methodology developed by the Melbourne Institute to: (i) harmonise holders of intellectual property rights (IPRs) at IP Australia (applications for patent, designs, trademarks and plant breeder’s rights); (ii) match Australian IPRs holders to the Australian business register; (iii) identify the ultimate owners within Australia; and (iv) identify which holders are small and medium size enterprises.

  10. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  11. Empirical assessment of VoIP overload detection tests

    NARCIS (Netherlands)

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  12. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  13. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  14. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  15. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  16. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... will be posted without alteration at http://www.regulations.gov , including any personal information... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...

  17. (S)-(+)-Ipsdienol: Interspecific Inhibition of Ips latidens (LeConte) by Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1992-01-01

    In south-central British Columbia, the attraction of Ips latidens (LeConte) to its pheromone, ipsenol, was inhibited by (S)-(+)-ipsdienol, a pheromone for I. pini (Say). (R)-(-)-Ipsdienol had no effect on I. latidens. (S)-(+)-lpsdienol probably plays a role in interspecific communication between the two species...

  18. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  19. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  20. Bayesian modeling of ChIP-chip data using latent variables.

    KAUST Repository

    Wu, Mingqi

    2009-10-26

    BACKGROUND: The ChIP-chip technology has been used in a wide range of biomedical studies, such as identification of human transcription factor binding sites, investigation of DNA methylation, and investigation of histone modifications in animals and plants. Various methods have been proposed in the literature for analyzing the ChIP-chip data, such as the sliding window methods, the hidden Markov model-based methods, and Bayesian methods. Although, due to the integrated consideration of uncertainty of the models and model parameters, Bayesian methods can potentially work better than the other two classes of methods, the existing Bayesian methods do not perform satisfactorily. They usually require multiple replicates or some extra experimental information to parametrize the model, and long CPU time due to involving of MCMC simulations. RESULTS: In this paper, we propose a Bayesian latent model for the ChIP-chip data. The new model mainly differs from the existing Bayesian models, such as the joint deconvolution model, the hierarchical gamma mixture model, and the Bayesian hierarchical model, in two respects. Firstly, it works on the difference between the averaged treatment and control samples. This enables the use of a simple model for the data, which avoids the probe-specific effect and the sample (control/treatment) effect. As a consequence, this enables an efficient MCMC simulation of the posterior distribution of the model, and also makes the model more robust to the outliers. Secondly, it models the neighboring dependence of probes by introducing a latent indicator vector. A truncated Poisson prior distribution is assumed for the latent indicator variable, with the rationale being justified at length. CONCLUSION: The Bayesian latent method is successfully applied to real and ten simulated datasets, with comparisons with some of the existing Bayesian methods, hidden Markov model methods, and sliding window methods. The numerical results indicate that the

  1. The bonding effectiveness of five luting resin cements to the IPS Empress 2 all ceramic system.

    Science.gov (United States)

    Bookhan, V; Essop, A R M; Du Preez, I C

    2005-04-01

    Variolink II is the only resin cement used for bonding IPS (Ivoclar Porcelain System) Empress 2 ceramic restorations. Alternative luting resin cements need to be investigated for their bonding effectiveness with the IPS Empress 2 ceramic. To determine the shear bond strength (SBS) and the effect of thermocycling, on the bonding effectiveness, of five resin cements to IPS Empress 2 ceramic. The projecting surfaces of one hundred ceramic discs were ground wet on silicone carbide paper. The specimens were divided into 5 groups of 20. The resin cements were bonded to the prepared ceramic surfaces, in the form of a stub. The specimens were stored under distilled water at 37 degrees C in an oven for 24 hours. Ten specimens in each group were thermocycled for 300 cycles between 5 degrees C and 55 degrees C. All the specimens were stressed to failure in an Instron Materials Testing Machine. The results were subjected to a one-way analysis of variance (ANOVA). Statistically similar mean SBS values were grouped using the Bonferroni (Dunn) multiple comparison test. The means for the non-thermocycled group were: 26.21, 19.41, 17.69, 17.43, and 15.76. The means for the thermocycled group were: 22.90, 15.72, 14.34, 13.96 and 13.45. The differences between the means were highly significant (p Empress 2 ceramic was effective. Thermocycling had a significant effect on the mean SBS values of Calibra. Thermocycling had no significant effect on the mean SBS values of the other resin cements.

  2. The FEROL40, a microTCA card interfacing custom point-to-point links and standard TCP/IP

    CERN Document Server

    Gigi, Dominique; Behrens, Ulf; Branson, James; Chaze, Olivier; Cittolin, Sergio; Contescu, Cristian; da Silva Gomes, Diego; Darlea, Georgiana-Lavinia; Deldicque, Christian; Demiragli, Zeynep; Dobson, Marc; Doualot, Nicolas; Erhan, Samim; Fulcher, Jonathan Richard; Gladki, Maciej; Glege, Frank; Gomez-Ceballos, Guillelmo; Hegeman, Jeroen; Holzner, Andre; Janulis, Mindaugas; Lettrich, Michael; Meijers, Frans; Meschi, Emilio; Mommsen, Remigius K; Morovic, Srecko; O'Dell, Vivian; Orn, Samuel Johan; Orsini, Luciano; Papakrivopoulos, Ioannis; Paus, Christoph; Petrova, Petia; Petrucci, Andrea; Pieri, Marco; Rabady, Dinyar; Racz, Attila; Reis, Thomas; Sakulin, Hannes; Schwick, Christoph; Simelevicius, Dainius; Vazquez Velez, Cristina; Vougioukas, Michail; Zejdl, Petr

    2017-01-01

    In order to accommodate new back-end electronics of upgraded CMS sub-detectors, a new FEROL40 card in the microTCA standard has been developed. The main function of the FEROL40 is to acquire event data over multiple point-to-point serial optical links, provide buffering, perform protocol conversion, and transmit multiple TCP/IP streams (4x10Gbps) to the Ethernet network of the aggregation layer of the CMS DAQ (data acquisition) event builder. This contribution discusses the design of the FEROL40 and experience from operation.

  3. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...... experiencing the most growth. These trends in applications are less evident when we study which applications are actually granted. For example, the shift in IP activity toward middle-income countries and Asia is less pronounced, and the most developed countries still lead globally. Moreover, there seems...

  5. The development of ISO freight containers as IP-2 packagings

    International Nuclear Information System (INIS)

    Janicki, M.C.; Vaughan, R.A.

    1993-01-01

    Design specifications were developed for ISO freight containers to meet the requirements of the transport regulations in the 1985 Edition of IAEA SS6, and to maximize the technical and commercial benefits offered to consignors by this type of container for the transport and handling of bulk LSA/SCO materials. A range of IP-2 ISO freight containers have been designed and built to these specifications and are in use in the UK. This paper discusses the regulatory considerations which had to be reviewed and interpreted in developing freight containers as Industrial Package Type 2 (IP-2) packagings and the development of performance standards to meet the regulatory requirements. Outline details of the packages developed are indicated together with examples of handling equipment developed to facilitate loading and unloading. (J.P.N.)

  6. Pulse to pulse beam trajectory determination at the IP

    International Nuclear Information System (INIS)

    Koska, W.; Wagner, S.

    1988-01-01

    It has long been known that a precise measurement of the SLC beam trajectory through the IP region is vital both from a machine and a detector point of view. One of the primary techniques used to maximize luminosity is the measurement of the deflection angle of one beam produced by the electromagnetic interaction with the other beam. In order to implement this procedure a pair of precision Beam Position Monitors (BPMs) were installed within the Final Triplet of quadrapoles on each side of the IP. Before the IP BPMs could be used to measure beam-beam deflection, a series of measurements were made of the coefficients which relate the setting of an orbit correction magnet to the position of the beam at a particular BPM (R 12 s). The purpose was to expose any problems such as misconnected cables, etc., by comparing the measured R 12 s with theoretical predictions from the model of the Final Focus region. A technique developed that uses position measurements in the long BPMs to determine a three parameter fit to the beam trajectory at the IP. The three parameters in the fit are the beam position, the incoming angle and the deflection angle. The result was very successful and allows the observation of beam-beam deflection even under marginal conditions. The purpose of this memo is to clear up the technical points and to demonstrate that the simplicity of the fit should allow the implementation of this procedure at the micro level, where it could provide trajectory information in real time which would go a long way toward making it useful as a fast feedback tool and in addition allow easy real time access to beam position data by the Mark II

  7. Normalization and experimental design for ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Alekseyenko Artyom A

    2007-06-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been widely used to investigate the DNA binding sites for a variety of proteins on a genome-wide scale. However, several issues in the processing and analysis of ChIP-chip data have not been resolved fully, including the effect of background (mock control subtraction and normalization within and across arrays. Results The binding profiles of Drosophila male-specific lethal (MSL complex on a tiling array provide a unique opportunity for investigating these topics, as it is known to bind on the X chromosome but not on the autosomes. These large bound and control regions on the same array allow clear evaluation of analytical methods. We introduce a novel normalization scheme specifically designed for ChIP-chip data from dual-channel arrays and demonstrate that this step is critical for correcting systematic dye-bias that may exist in the data. Subtraction of the mock (non-specific antibody or no antibody control data is generally needed to eliminate the bias, but appropriate normalization obviates the need for mock experiments and increases the correlation among replicates. The idea underlying the normalization can be used subsequently to estimate the background noise level in each array for normalization across arrays. We demonstrate the effectiveness of the methods with the MSL complex binding data and other publicly available data. Conclusion Proper normalization is essential for ChIP-chip experiments. The proposed normalization technique can correct systematic errors and compensate for the lack of mock control data, thus reducing the experimental cost and producing more accurate results.

  8. The Incredibly Long-Lived SN 2005ip

    Science.gov (United States)

    Fox, Ori

    2016-10-01

    Type IIn supernovae (SNe IIn) are defined by their relatively narrow spectral line features associated with a dense circumstellar medium (CSM) formed by the progenitor star. The nature of the progenitor and mass loss remains relatively unknown. Shock interaction with the dense CSM can often result in significant UV emission for several years post-explosion, thereby probing the CSM characteristics, progenitor mass loss history and, ultimately, the progenitor itself. The Type IIn SN 2005ip proves to be one of the most interesting and well-studied targets within this subclass. Compared to all other supernovae, SN 2005ip is the most luminous for its age. Now more than 11 years post-explosion, the SN has released >10^51 erg throughout its lifetime as the forward shock continues to collide with a dense CSM. Here we propose HST/STIS-MAMA UV observations of SN 2005ip to investigate the massive CSM. When accounting for the shock travel time, these observations will probe material lost from the progenitor more than 1000 years prior to the explosion. We already have a single HST/STIS spectrum of SN 2005ip from 2014, which was obtained while the shock was still within a higher mass regime. With just 5 orbits, a second spectrum will allow us to directly trace the evolution of the CSM and produce new constraints on the pre-SN mass-loss history. Coinciding with Cycle 24's UV Initiative, this program offers new insight regarding both the progenitor and explosion characteristics of the SN IIn subclass.

  9. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  10. Objective assessment of IP video calls with Asterisk

    OpenAIRE

    Kapičák, Lukáš; Nevlud, Pavel; Mikulec, Martin; Zdrálek, Jaroslav

    2012-01-01

    The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video re...

  11. IP-Based TV Technologies, Services and Multidisciplinary Applications

    OpenAIRE

    Bonastre, O.M.; Montpetit, M.J.; Cesar Garcia, Pablo Santiago

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its disruptive role as television is now associated with both a personal and social experience using an ecosystem of devices. The unidirectional flow of content from an operator to a device has thus morphed ...

  12. Automated allocation and configuration of dual stack IP networks

    OpenAIRE

    Daniels, Wilfried; Vanbrabant, Bart; Hughes, Danny; Joosen, Wouter

    2013-01-01

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an automatic configuration tool for dual stack IP networks that addresses these issues by using high level abstractions to model the netwo...

  13. Lessons Learned from resolving massive IPS database change for SPADES+

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin-Soo [KEPCO Engineering and Construction Co., Deajeon (Korea, Republic of)

    2016-10-15

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT{sub I}D is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT{sub I}Ds, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT{sub I}Ds are in IPS database. Changing POINT{sub I}Ds could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database.

  14. Multi-layer service function chaining scheduling based on auxiliary graph in IP over optical network

    Science.gov (United States)

    Li, Yixuan; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Software Defined Optical Network (SDON) can be considered as extension of Software Defined Network (SDN) in optical networks. SDON offers a unified control plane and makes optical network an intelligent transport network with dynamic flexibility and service adaptability. For this reason, a comprehensive optical transmission service, able to achieve service differentiation all the way down to the optical transport layer, can be provided to service function chaining (SFC). IP over optical network, as a promising networking architecture to interconnect data centers, is the most widely used scenarios of SFC. In this paper, we offer a flexible and dynamic resource allocation method for diverse SFC service requests in the IP over optical network. To do so, we firstly propose the concept of optical service function (OSF) and a multi-layer SFC model. OSF represents the comprehensive optical transmission service (e.g., multicast, low latency, quality of service, etc.), which can be achieved in multi-layer SFC model. OSF can also be considered as a special SF. Secondly, we design a resource allocation algorithm, which we call OSF-oriented optical service scheduling algorithm. It is able to address multi-layer SFC optical service scheduling and provide comprehensive optical transmission service, while meeting multiple optical transmission requirements (e.g., bandwidth, latency, availability). Moreover, the algorithm exploits the concept of Auxiliary Graph. Finally, we compare our algorithm with the Baseline algorithm in simulation. And simulation results show that our algorithm achieves superior performance than Baseline algorithm in low traffic load condition.

  15. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  16. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  17. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  18. In-Pile Section(IPS) Inner Assembly Manufacturing Report

    International Nuclear Information System (INIS)

    Lee, Jong Min; Shim, Bong Sik; Lee, Chung Yong

    2009-12-01

    The objective of this report is to present the manufacturing, assembling and testing process of IPS Inner Assembly used in Fuel Test Loop(FTL) pre-operation test. The majority of the manufactured components are test fuels, inner assembly structures and subsidiary tools that is needed during the assembly process. In addition, Mock-up test for the welding and brazing is included at this stage. Lower structure, such as test fuels, fuel carrier legs are assembled and following structures, such as fuel carrier stem in the middle structure, top flange in the top structure are assembled together each other. To Verify the Reactor Coolant Pressure Boundary(RCPB) function in IPS Inner Assembly helium leak test and hydraulic test is performed with its acceptance criteria. According to the ASME III code Authorized Nuclear Inspector(ANI) is required during the hydraulic test. As-built measurement and insulation resistance test are performed to the structures and instrumentations after the test process. All requirements are satisfied and the IPS Inner Assembly was loaded in HANARO IR-1 hole in September 25, 2009

  19. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  20. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  1. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned...- 2235075, or email [email protected] . SUPPLEMENTARY INFORMATION: This document announces that, on...

  2. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    International Nuclear Information System (INIS)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F.

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32 P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen

  3. GMI-IPS: Python Processing Software for Aircraft Campaigns

    Science.gov (United States)

    Damon, M. R.; Strode, S. A.; Steenrod, S. D.; Prather, M. J.

    2018-01-01

    NASA's Atmospheric Tomography Mission (ATom) seeks to understand the impact of anthropogenic air pollution on gases in the Earth's atmosphere. Four flight campaigns are being deployed on a seasonal basis to establish a continuous global-scale data set intended to improve the representation of chemically reactive gases in global atmospheric chemistry models. The Global Modeling Initiative (GMI), is creating chemical transport simulations on a global scale for each of the ATom flight campaigns. To meet the computational demands required to translate the GMI simulation data to grids associated with the flights from the ATom campaigns, the GMI ICARTT Processing Software (GMI-IPS) has been developed and is providing key functionality for data processing and analysis in this ongoing effort. The GMI-IPS is written in Python and provides computational kernels for data interpolation and visualization tasks on GMI simulation data. A key feature of the GMI-IPS, is its ability to read ICARTT files, a text-based file format for airborne instrument data, and extract the required flight information that defines regional and temporal grid parameters associated with an ATom flight. Perhaps most importantly, the GMI-IPS creates ICARTT files containing GMI simulated data, which are used in collaboration with ATom instrument teams and other modeling groups. The initial main task of the GMI-IPS is to interpolate GMI model data to the finer temporal resolution (1-10 seconds) of a given flight. The model data includes basic fields such as temperature and pressure, but the main focus of this effort is to provide species concentrations of chemical gases for ATom flights. The software, which uses parallel computation techniques for data intensive tasks, linearly interpolates each of the model fields to the time resolution of the flight. The temporally interpolated data is then saved to disk, and is used to create additional derived quantities. In order to translate the GMI model data to the

  4. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  5. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... including notification in the Federal Register. (2) VRS and IP Relay provider. Any entity desiring to...

  6. IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem

    Directory of Open Access Journals (Sweden)

    Y. Bhavani

    2015-06-01

    Full Text Available Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets. In this approach, these marked packets contain partial information regarding the routers of the attack path. At receiver, to get the complete information of every router, it requires more number of marked packets and hence more combinations and more false positives. To overcome this drawback we have presented a novel idea in finding the exact IP address of the routers in the attack path by applying Chinese Remainder Theorem. The result of our implementation reveals that our idea requires less number of marked packets and takes no time in constructing the attack path. The same idea is true even in the case of multiple attackers.

  7. Quantitative Visualization of ChIP-chip Data by Using Linked Views

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Min-Yu; Weber, Gunther; Li, Xiao-Yong; Biggin, Mark; Hamann, Bernd

    2010-11-05

    Most analyses of ChIP-chip in vivo DNA binding have focused on qualitative descriptions of whether genomic regions are bound or not. There is increasing evidence, however, that factors bind in a highly overlapping manner to the same genomic regions and that it is quantitative differences in occupancy on these commonly bound regions that are the critical determinants of the different biological specificity of factors. As a result, it is critical to have a tool to facilitate the quantitative visualization of differences between transcription factors and the genomic regions they bind to understand each factor's unique roles in the network. We have developed a framework which combines several visualizations via brushing-and-linking to allow the user to interactively analyze and explore in vivo DNA binding data of multiple transcription factors. We describe these visualization types and also provide a discussion of biological examples in this paper.

  8. miR-19, a component of the oncogenic miR-17∼92 cluster, targets the DNA-end resection factor CtIP

    DEFF Research Database (Denmark)

    Hühn, D; Kousholt, A N; Sørensen, Claus Storgaard

    2014-01-01

    MicroRNA-19 (miR-19) was recently identified as the key oncogenic component of the polycistronic miR-17∼92 cluster, also known as oncomiR-1, which is frequently upregulated or amplified in multiple tumor types. However, the gene targets and the pathways underlying the tumor-promoting activity of mi......R-19 still remain largely elusive. CtIP/RBBP8 promotes DNA-end resection, a critical step in the repair of DNA double-strand breaks (DSBs) by homologous recombination (HR), and is considered to function as a tumor suppressor. In this study, we show that miR-19 downregulates CtIP expression by binding...... to two highly conserved sequences located in the 3'-untranslated region of CtIP mRNA. We further demonstrate that CtIP expression is repressed by miR-19 during continuous genotoxic stress in a p53-dependent manner. Finally, we report that miR-19 impairs CtIP-mediated DNA-end resection, which results...

  9. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  10. IP-10 can be measured in dried plasma spots in patients with chronic hepatitis C infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Andersen, Ellen Sloth; Christensen, Peer Brehm

    2012-01-01

    The chemokine IP-10 (CXCL10) is a candidate marker for hepatitis C virus (HCV) fibrosis monitoring. The aim of this proof-of-concept study is to assess if IP-10 measurements from dried plasma spots (DPS) are accurate in HCV-infected patients with either minimal or significant fibrosis. We measured...... IP-10 levels in plasma and DPS of 21 HCV-infected patients with cirrhosis and 19 patients with no/little fibrosis (determined with FibroScan). Cirrhotic patients had significantly higher levels of IP-10 compared to patients with minimal fibrosis. DPS and plasma measurements of IP-10 are comparable...

  11. ChIP-PIT: Enhancing the Analysis of ChIP-Seq Data Using Convex-Relaxed Pair-Wise Interaction Tensor Decomposition.

    Science.gov (United States)

    Zhu, Lin; Guo, Wei-Li; Deng, Su-Ping; Huang, De-Shuang

    2016-01-01

    In recent years, thanks to the efforts of individual scientists and research consortiums, a huge amount of chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) experimental data have been accumulated. Instead of investigating them independently, several recent studies have convincingly demonstrated that a wealth of scientific insights can be gained by integrative analysis of these ChIP-seq data. However, when used for the purpose of integrative analysis, a serious drawback of current ChIP-seq technique is that it is still expensive and time-consuming to generate ChIP-seq datasets of high standard. Most researchers are therefore unable to obtain complete ChIP-seq data for several TFs in a wide variety of cell lines, which considerably limits the understanding of transcriptional regulation pattern. In this paper, we propose a novel method called ChIP-PIT to overcome the aforementioned limitation. In ChIP-PIT, ChIP-seq data corresponding to a diverse collection of cell types, TFs and genes are fused together using the three-mode pair-wise interaction tensor (PIT) model, and the prediction of unperformed ChIP-seq experimental results is formulated as a tensor completion problem. Computationally, we propose efficient first-order method based on extensions of coordinate descent method to learn the optimal solution of ChIP-PIT, which makes it particularly suitable for the analysis of massive scale ChIP-seq data. Experimental evaluation the ENCODE data illustrate the usefulness of the proposed model.

  12. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  13. IP-10, p53, and Foxp3 Expression in Hepatocytes of Chronic Hepatitis B Patients with Cirrhosis and Hepatocellular Carcinoma.

    Science.gov (United States)

    Shahera, Umme; Munshi, Saifullah; Jahan, Munira; Nessa, Afzalun; Alam, Shahinul; Tabassum, Shahina

    2016-01-01

    Elucidating differences in gene expression may be useful in understanding the molecular pathogenesis and for developing specific markers for the outcome of hepatitis B virus (HBV) infection. In the present study, expressions of host gene interferon gamma-inducible protein (IP-10), p53, and Foxp3 were studied in hepatocytes of patients with chronic HBV infection to determine a possible link between selected host gene expression and the outcome of HBV infection. The study was conducted in 60 patients with chronic HBV infection and they were divided into four groups: HBV-positive cirrhosis (n = 15), HBV-negative cirrhosis (n = 15), HBV-positive hepatocellular carcinoma (HCC) (n = 15) and HBV-negative HCC (n = 15). Total messenger ribonucleic acid (mRNA) extraction was done followed by complementary deoxyribonucleic acid (cDNA) synthesis, and finally gene expression was performed using real-time polymerase chain reaction (PCR) technique. IP-10 and p53 gene expressions were lower in HBV-positive cirrhosis, and Foxp3 gene expression was upregulated in HBV-positive cirrhosis in comparison to HBV-negative cirrhosis. The expressions of all the three genes were upregulated among HBV-positive HCC in comparison to HBV-negative HCC. The expression of IP-10, p53, and Foxp3 genes was upregulated in HBV-positive HCC in comparison to HBV-positive cirrhosis. This study indicates that there are variations in the expression of the selected genes among cirrhosis and HCC patients with or without HBV. All the three selected genes were more or less upregulated in HBV-positive HCC patients, but only Foxp3 expression was upregulated in HBV-positive cirrhosis. These three particular genes may have a role in the molecular pathogenesis and clinical outcome of HBV-positive cirrhosis and HCC patients. These aspects need further evaluation by studies with larger numbers of cirrhosis and HCC patients. Shahera U, Munshi S, Jahan M, Nessa A, Alam S, Tabassum S. IP-10, p53, and Foxp3 Expression in

  14. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  15. Maqueta VoIP con media gateway controllers

    OpenAIRE

    Goicoechea Bozal, Ignacio Javier

    2010-01-01

    El presente proyecto fin de carrera tiene como objeto estudiar y comprobar el funcionamiento de un protocolo VoIP basado en una arquitectura softswitch. La tecnología softswitch nace con el fin de facilitar la interconexión entre la red telefónica pública conmutada y redes basadas en paquetes. Por esta razón, las grandes compañías telefónicas son las principales usuarias de este tipo de arquitectura. Se han evaluado 3 posibles protocolos para controlar la maqueta que se desea diseñar: SGC...

  16. The MIM web gateway to IP multicast e-meetings

    Science.gov (United States)

    Parviainen, Roland; Parnes, Peter

    2003-12-01

    As video conferencing and e-meeting systems are used more and more on the Internet and in businesses it becomes increasingly important to be able to participate from any computer at any location. Often this is impossible, since these systems requires often special software that are not available everywhere or impossible to install for administrative reasons. Many locations also lack the necessary network infrastructure such as IP multicast. This paper presents a WWW gateway system that enables users to participate using only a standard web browser. The design and architecture of the system are described and performance tests that show the scalability of the system are also presented.

  17. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  18. Host and parasite morphology influence congruence between host and parasite phylogenies.

    Science.gov (United States)

    Sweet, Andrew D; Bush, Sarah E; Gustafsson, Daniel R; Allen, Julie M; DiBlasi, Emily; Skeen, Heather R; Weckstein, Jason D; Johnson, Kevin P

    2018-03-23

    Comparisons of host and parasite phylogenies often show varying degrees of phylogenetic congruence. However, few studies have rigorously explored the factors driving this variation. Multiple factors such as host or parasite morphology may govern the degree of phylogenetic congruence. An ideal analysis for understanding the factors correlated with congruence would focus on a diverse host-parasite system for increased variation and statistical power. In this study, we focused on the Brueelia-complex, a diverse and widespread group of feather lice that primarily parasitise songbirds. We generated a molecular phylogeny of the lice and compared this tree with a phylogeny of their avian hosts. We also tested for the contribution of each host-parasite association to the overall congruence. The two trees overall were significantly congruent, but the contribution of individual associations to this congruence varied. To understand this variation, we developed a novel approach to test whether host, parasite or biogeographic factors were statistically associated with patterns of congruence. Both host plumage dimorphism and parasite ecomorphology were associated with patterns of congruence, whereas host body size, other plumage traits and biogeography were not. Our results lay the framework for future studies to further elucidate how these factors influence the process of host-parasite coevolution. Copyright © 2018 Australian Society for Parasitology. Published by Elsevier Ltd. All rights reserved.

  19. Hologenomics: Systems-Level Host Biology.

    Science.gov (United States)

    Theis, Kevin R

    2018-01-01

    The hologenome concept of evolution is a hypothesis explaining host evolution in the context of the host microbiomes. As a hypothesis, it needs to be evaluated, especially with respect to the extent of fidelity of transgenerational coassociation of host and microbial lineages and the relative fitness consequences of repeated associations within natural holobiont populations. Behavioral ecologists are in a prime position to test these predictions because they typically focus on animal phenotypes that are quantifiable, conduct studies over multiple generations within natural animal populations, and collect metadata on genetic relatedness and relative reproductive success within these populations. Regardless of the conclusion on the hologenome concept as an evolutionary hypothesis, a hologenomic perspective has applied value as a systems-level framework for host biology, including in medicine. Specifically, it emphasizes investigating the multivarious and dynamic interactions between patient genomes and the genomes of their diverse microbiota when attempting to elucidate etiologies of complex, noninfectious diseases.

  20. Mechanisms of host seeking by parasitic nematodes.

    Science.gov (United States)

    Gang, Spencer S; Hallem, Elissa A

    2016-07-01

    The phylum Nematoda comprises a diverse group of roundworms that includes parasites of vertebrates, invertebrates, and plants. Human-parasitic nematodes infect more than one billion people worldwide and cause some of the most common neglected tropical diseases, particularly in low-resource countries [1]. Parasitic nematodes of livestock and crops result in billions of dollars in losses each year [1]. Many nematode infections are treatable with low-cost anthelmintic drugs, but repeated infections are common in endemic areas and drug resistance is a growing concern with increasing therapeutic and agricultural administration [1]. Many parasitic nematodes have an environmental infective larval stage that engages in host seeking, a process whereby the infective larvae use sensory cues to search for hosts. Host seeking is a complex behavior that involves multiple sensory modalities, including olfaction, gustation, thermosensation, and humidity sensation. As the initial step of the parasite-host interaction, host seeking could be a powerful target for preventative intervention. However, host-seeking behavior remains poorly understood. Here we review what is currently known about the host-seeking behaviors of different parasitic nematodes, including insect-parasitic nematodes, mammalian-parasitic nematodes, and plant-parasitic nematodes. We also discuss the neural bases of these behaviors. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Fish the ChIPs: a pipeline for automated genomic annotation of ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Minucci Saverio

    2011-10-01

    Full Text Available Abstract Background High-throughput sequencing is generating massive amounts of data at a pace that largely exceeds the throughput of data analysis routines. Here we introduce Fish the ChIPs (FC, a computational pipeline aimed at a broad public of users and designed to perform complete ChIP-Seq data analysis of an unlimited number of samples, thus increasing throughput, reproducibility and saving time. Results Starting from short read sequences, FC performs the following steps: 1 quality controls, 2 alignment to a reference genome, 3 peak calling, 4 genomic annotation, 5 generation of raw signal tracks for visualization on the UCSC and IGV genome browsers. FC exploits some of the fastest and most effective tools today available. Installation on a Mac platform requires very basic computational skills while configuration and usage are supported by a user-friendly graphic user interface. Alternatively, FC can be compiled from the source code on any Unix machine and then run with the possibility of customizing each single parameter through a simple configuration text file that can be generated using a dedicated user-friendly web-form. Considering the execution time, FC can be run on a desktop machine, even though the use of a computer cluster is recommended for analyses of large batches of data. FC is perfectly suited to work with data coming from Illumina Solexa Genome Analyzers or ABI SOLiD and its usage can potentially be extended to any sequencing platform. Conclusions Compared to existing tools, FC has two main advantages that make it suitable for a broad range of users. First of all, it can be installed and run by wet biologists on a Mac machine. Besides it can handle an unlimited number of samples, being convenient for large analyses. In this context, computational biologists can increase reproducibility of their ChIP-Seq data analyses while saving time for downstream analyses. Reviewers This article was reviewed by Gavin Huttley, George

  2. Comparative evaluation of shear bond strength, between IPS-Empress2 ceramics and three dual-cured resin cements

    Directory of Open Access Journals (Sweden)

    Hajimiragha H

    2006-06-01

    Full Text Available Background and Aim: Cementation is one of the most critical steps of the porcelain restoration technique. However, limited information is available concerning the bond strength of current ceramic bonding systems. The aim of this study was to evaluate the shear bond strength of three dual-cure resin cements to IPS-Empress2 ceramics. Materials and Methods: In this experimental study, 30 pairs of IPS-Empress 2 ceramic discs were fabricated with 10 and 8 mm diameters and 2.5 mm thickness. After sandblasting and ultrasonic cleaning, the surfaces of all specimens were etched with 9% hydrofluoric acid for 60 seconds. Then, the three groups of 10 bonded specimens were prepared ceramic bonding resin systems including Panavia F2, Variolink II and Rely X ARC. After storage in 37±1c water for 24 hours and thermocycling in 5c and 55c water for 500 cycles with 1-minute dwell time, the shear bond strengths were determined using Instron machine at speed of 0.5mm/min. Data were analyzed by One Way ANOVA test. For multiple paired comparisons, the Tukey HSD method was used. The mode of failure was evaluated by scanning electro microscope (SEM. P<0.05 was considered as the limit of significance. Result: Significant differences were found between different cement types (P<0.05. Variolink II provided the highest bonding values with IPS-Empress2. A combination of different modes of failure was observed. Conclusion: Based on the results of this study, according to the highest mode of cohesive failure, Variolink II seems to have the strongest bond with IPS-Empress2 ceramics.

  3. Enhanced service zone architecture for multiservices over IP

    Science.gov (United States)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  4. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  5. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  6. An Early Fire Detection Algorithm Using IP Cameras

    Directory of Open Access Journals (Sweden)

    Hector Perez-Meana

    2012-05-01

    Full Text Available The presence of smoke is the first symptom of fire; therefore to achieve early fire detection, accurate and quick estimation of the presence of smoke is very important. In this paper we propose an algorithm to detect the presence of smoke using video sequences captured by Internet Protocol (IP cameras, in which important features of smoke, such as color, motion and growth properties are employed. For an efficient smoke detection in the IP camera platform, a detection algorithm must operate directly in the Discrete Cosine Transform (DCT domain to reduce computational cost, avoiding a complete decoding process required for algorithms that operate in spatial domain. In the proposed algorithm the DCT Inter-transformation technique is used to increase the detection accuracy without inverse DCT operation. In the proposed scheme, firstly the candidate smoke regions are estimated using motion and color smoke properties; next using morphological operations the noise is reduced. Finally the growth properties of the candidate smoke regions are furthermore analyzed through time using the connected component labeling technique. Evaluation results show that a feasible smoke detection method with false negative and false positive error rates approximately equal to 4% and 2%, respectively, is obtained.

  7. Software-Defined Congestion Control Algorithm for IP Networks

    Directory of Open Access Journals (Sweden)

    Yao Hu

    2017-01-01

    Full Text Available The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.

  8. Performance Evaluation of IP Based Multimedia Services in UMTS

    Directory of Open Access Journals (Sweden)

    Riri Fitri SARI

    2008-01-01

    Full Text Available This paper presents our work in the performance evaluation of UMTS network based on simulation. Enhanced UMTS Radio Access Network Extensions for NS-2 (EURANE developed by SEACORN has brought us to the higher phase of UMTS simulation in third generation wireless telecommunication system. Wireless 3G is designed to be able to deliver various kind of multimedia package through an IP network for the purpose of easier interconnection with fixed network with various existing multimedia services. Multimedia services with their bandwidth consumption characteristics are able to be sent through a UMTS network with the existence of High Speed Data Packet Access (HSPDA in Release 5. Quality of Service (QoS is a major concern in multimedia services. This paper shows the performance analysis of a number of multimedia services and their QoS using HSDPA in UMTS. The experiments were based on EURANE extension for NS-2. From the simulation conducted, we found that Unacknowledged Mode (UM in Radio Link Control (RLC will perform better for QoS class number 1 (VoIP and 2 (Video Streaming, while Acknowledged Mode (AM mode are more suitable for QoS class number 3 (web server and 4 (FTP.

  9. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Science.gov (United States)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    EMSO (European Multidisciplinary Seafloor and water-column Observatory, http://www.emso-eu.org) and EPOS (European Plate Observing System, https://www.epos-ip.org) are pan-European Research Infrastructures (RIs) in the ESFRI 2016 Roadmap. EMSO has recently become an ERIC (European Research Infrastructure Consortium), whilst EPOS application is in progress. Both ERICs will be hosted in Italy and the "Representing Entity" is INGV. EMSO consists of oceanic environment observation systems spanning from the Arctic through the Atlantic and Mediterranean, to the Black Sea for long-term, high-resolution, real-time monitoring of natural and man-induced processes such as hazards, climate, and marine ecosystems changes to study their evolution and interconnections. EPOS aims at creating a pan-European infrastructure for solid Earth science to support a safe and sustainable society. EPOS will enable innovative multidisciplinary research for a better understanding of Earth's physical and chemical processes controlling earthquakes, volcanic eruptions, ground instability, tsunami, and all those processes driving tectonics and Earth's surface dynamics. Following the conclusion of their Preparatory Phases the two RIs are now in their Implementation Phase still supported by the EC through the EMSODEV and EPOS-IP projects, both run by dedicated Project Management Offices at INGV with sound experience in EU projects. EMSODEV (H2020 project, 2015-2018) involves 11 partners and 9 associate partners and aims at improving the harmonization among the EMSO ERIC observation systems through the realization of EMSO Generic Instrument Modules (EGIMs), and a Data Management Platform (DMP) to implement interoperability and standardization. The DMP will provide access to data from all EMSO nodes, providing a unified, homogeneous, infrastructure-scale and user-oriented platform integrated with the increased measurement capabilities and functions provided by the EGIMs. EPOS IP (H2020 project, 2015

  10. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    Science.gov (United States)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated

  11. HH-MIP: An Enhancement of Mobile IP by Home Agent Handover

    Directory of Open Access Journals (Sweden)

    Yang Chun-Chuan

    2010-01-01

    Full Text Available We propose an enhancement of Mobile IP (MIP called MIP with Home Agent Handover (HH-MIP to enjoy most of the advantages of Route Optimization MIP (ROMIP but with only a small increase of signaling overhead. In HH-MIP, the concept of Temporary HA (THA is proposed and the mobile host (MH registers the new CoA with its THA rather than its original HA. Since the THA of an MH is selected to be close to the current location of MH, HH-MIP reduces the handoff latency and shortens the signaling path of registration as well. Moreover, HH-MIP adopts an aggressive approach in selecting THA for an MH, that is, whenever an MH is moving away from its HA or previous THA, the MH triggers the handover of THA. Theoretical analysis demonstrates that the proposed scheme enjoys small handoff latency as well as routing efficiency, and the signaling cost of the proposed scheme is significantly less than that in ROMIP.

  12. Development of 99mTc imaging method using multiple imaging plates for reduction of patient's dose

    International Nuclear Information System (INIS)

    Ito, Shigeki; Nishizawa, Kunihide; Ariga, Eiji; Saze, Takuya

    2008-01-01

    A system for taking static thyroid 99m Tc images was devised by using multiple imaging plates (IPs) and a low energy high resolution collimator. Sensitivity was represented by using lower detection limits (LDL). The sensitivity and resolution of IP systems using a collimator and 9 IPs were determined by using a 20 ml thyroid phantom, and compared with the sensitivity of gamma cameras. The sensitivity of the IP systems increased in proportion to the number of IPs. The sensitivity and resolution of a probe using 9 IPs and a high resolution collimator were equivalent to or superior to the gamma camera for taking static thyroid 99m Tc images. IP systems can be applied clinically as static nuclear imaging devices as same as a gamma camera. (author)

  13. An On-Chip interconnect and protocol stack for multiple communication paradigms and programming models

    NARCIS (Netherlands)

    Hansson, A.; Goossens, Kees

    2009-01-01

    A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The diverse requirements, coupled with the IPs being developed by unrelated design teams, lead to multiple communication

  14. An on-chip interconnect and protocol stack for multiple communication paradigms and programming models

    NARCIS (Netherlands)

    Hansson, M.A.; Goossens, K.G.W.

    2009-01-01

    A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The diverse requirements, coupled with the IPs being developed by unrelated design teams, lead to multiple communication

  15. Pengaruh Pembelajaran IPS Berbasis Proyek Terhadap Persepsi Konsumsi Berkarakter Mahasiswa S1 Pendidikan IPS Universitas Negeri Malang

    Directory of Open Access Journals (Sweden)

    Khofifatu Rohmah Adi

    2017-10-01

    Full Text Available This study aims to determine the effect of the project-based learning social studies consumer perceptions of student character. Consumer perception of the character of this research is focused on the consumption of environmentally sound because it was found that the students are less concerned about the environment, especially the cleanliness class. This type of research including quasi experimental, aimed at assessing the effect of an action learning on students' perceptions before and after treatment. Subjects were students of 2015 batch S1 IPS which follows the introductory economics course. The instrument used to measure the consumption of environmentally sound perception using a questionnaire with Likert scale. Based on the homogeneity test the cognitive abilities of students conclusion has a homogeneous character and definitive experimental group and the control is done randomly. This study analyzed SPSS 22.0 for Windows using independent sample T-test. Results of the analysis showed that there were significant differences between the control and experimental class class. Therefore, it can be concluded that the application of project-based learning IPS effect on consumer perceptions of character. In project-based learning allows students trying to construct their own knowledge and actively involved in seeking information so it is expected that students are able to connect theory gained with the existing reality in the environment. Keywords: Project Based Learning, Perception Character consumption   http://dx.doi.org/10.17977/um022v1i12016p065

  16. XX ovarian dysgenesis is caused by a PSMC3IP/HOP2 mutation that abolishes coactivation of estrogen-driven transcription.

    Science.gov (United States)

    Zangen, David; Kaufman, Yotam; Zeligson, Sharon; Perlberg, Shira; Fridman, Hila; Kanaan, Moein; Abdulhadi-Atwan, Maha; Abu Libdeh, Abdulsalam; Gussow, Ayal; Kisslov, Irit; Carmel, Liran; Renbaum, Paul; Levy-Lahad, Ephrat

    2011-10-07

    XX female gonadal dysgenesis (XX-GD) is a rare, genetically heterogeneous disorder characterized by lack of spontaneous pubertal development, primary amenorrhea, uterine hypoplasia, and hypergonadotropic hypogonadism as a result of streak gonads. Most cases are unexplained but thought to be autosomal recessive. We elucidated the genetic basis of XX-GD in a highly consanguineous Palestinian family by using homozygosity mapping and candidate-gene and whole-exome sequencing. Affected females were homozygous for a 3 bp deletion (NM_016556.2, c.600_602del) in the PSMC3IP gene, leading to deletion of a glutamic acid residue (p.Glu201del) in the highly conserved C-terminal acidic domain. Proteasome 26S subunit, ATPase, 3-Interacting Protein (PSMC3IP)/Tat Binding Protein Interacting Protein (TBPIP) is a nuclear, tissue-specific protein with multiple functions. It is critical for meiotic recombination as indicated by the known role of its yeast ortholog, Hop2. Through the C terminus (not present in yeast), PSMC3IP also coactivates ligand-driven transcription mediated by estrogen, androgen, glucocorticoid, progesterone, and thyroid nuclear receptors. In cell lines, the p.Glu201del mutation abolished PSMC3IP activation of estrogen-driven transcription. Impaired estrogenic signaling can lead to ovarian dysgenesis both by affecting the size of the follicular pool created during fetal development and by failing to counteract follicular atresia during puberty. PSMC3IP joins previous genes known to be mutated in XX-GD, the FSH receptor, and BMP15, highlighting the importance of hormonal signaling in ovarian development and maintenance and suggesting a common pathway perturbed in isolated XX-GD. By analogy to other XX-GD genes, PSMC3IP is also a candidate gene for premature ovarian failure, and its role in folliculogenesis should be further investigated. Copyright © 2011 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  17. Discovering transcription factor binding sites in highly repetitive regions of genomes with multi-read analysis of ChIP-Seq data.

    Science.gov (United States)

    Chung, Dongjun; Kuan, Pei Fen; Li, Bo; Sanalkumar, Rajendran; Liang, Kun; Bresnick, Emery H; Dewey, Colin; Keleş, Sündüz

    2011-07-01

    Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) is rapidly replacing chromatin immunoprecipitation combined with genome-wide tiling array analysis (ChIP-chip) as the preferred approach for mapping transcription-factor binding sites and chromatin modifications. The state of the art for analyzing ChIP-seq data relies on using only reads that map uniquely to a relevant reference genome (uni-reads). This can lead to the omission of up to 30% of alignable reads. We describe a general approach for utilizing reads that map to multiple locations on the reference genome (multi-reads). Our approach is based on allocating multi-reads as fractional counts using a weighted alignment scheme. Using human STAT1 and mouse GATA1 ChIP-seq datasets, we illustrate that incorporation of multi-reads significantly increases sequencing depths, leads to detection of novel peaks that are not otherwise identifiable with uni-reads, and improves detection of peaks in mappable regions. We investigate various genome-wide characteristics of peaks detected only by utilization of multi-reads via computational experiments. Overall, peaks from multi-read analysis have similar characteristics to peaks that are identified by uni-reads except that the majority of them reside in segmental duplications. We further validate a number of GATA1 multi-read only peaks by independent quantitative real-time ChIP analysis and identify novel target genes of GATA1. These computational and experimental results establish that multi-reads can be of critical importance for studying transcription factor binding in highly repetitive regions of genomes with ChIP-seq experiments.

  18. Discovering transcription factor binding sites in highly repetitive regions of genomes with multi-read analysis of ChIP-Seq data.

    Directory of Open Access Journals (Sweden)

    Dongjun Chung

    2011-07-01

    Full Text Available Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq is rapidly replacing chromatin immunoprecipitation combined with genome-wide tiling array analysis (ChIP-chip as the preferred approach for mapping transcription-factor binding sites and chromatin modifications. The state of the art for analyzing ChIP-seq data relies on using only reads that map uniquely to a relevant reference genome (uni-reads. This can lead to the omission of up to 30% of alignable reads. We describe a general approach for utilizing reads that map to multiple locations on the reference genome (multi-reads. Our approach is based on allocating multi-reads as fractional counts using a weighted alignment scheme. Using human STAT1 and mouse GATA1 ChIP-seq datasets, we illustrate that incorporation of multi-reads significantly increases sequencing depths, leads to detection of novel peaks that are not otherwise identifiable with uni-reads, and improves detection of peaks in mappable regions. We investigate various genome-wide characteristics of peaks detected only by utilization of multi-reads via computational experiments. Overall, peaks from multi-read analysis have similar characteristics to peaks that are identified by uni-reads except that the majority of them reside in segmental duplications. We further validate a number of GATA1 multi-read only peaks by independent quantitative real-time ChIP analysis and identify novel target genes of GATA1. These computational and experimental results establish that multi-reads can be of critical importance for studying transcription factor binding in highly repetitive regions of genomes with ChIP-seq experiments.

  19. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS TERPADU BERBASIS OUTDOOR LEARNING

    Directory of Open Access Journals (Sweden)

    Nugraheni Rachmawati

    2013-03-01

    Full Text Available AbstrakPelaksanaan kegiatan pembelajaran tematik di SD kota Semarang belum optimal. Sebagian besar guru belum menyusun dan menggunakan perangkat pembelaja- ran IPS Terpadu berbasis outdoor learning. Tujuan penelitian ini mengembangkan, mengkaji keefektifan dan kepraktisan perangkat pembelajaran. Penelitian ini meru- pakan penelitian pengembangan yang dimodifikasi dari penelitian Borg and Gall. Subjek penelitian adalah siswa kelas 3 SD N Jatingaleh 01-02 Kota Semarang ta- hun pelajaran 2012/2013. Spesifikasi produk yang dikembangkan adalah perangkat pembelajaran IPS terpadu berbasis outdoor learning berupa silabus, RPP, media CD Interaktif, LKS dan alat evaluasi meliputi test kognitif, lembar observasi aktivi- tas serta angket respons siswa dan guru. Data dianalisis secara deskriptif dan Pretest- Posttest Control Group Design. Hasil penelitian menunjukkan bahwa pengembangan perangkat pembelajaran tergolong valid. Keefektifan perangkat dilihat dari aktivitas dan hasil belajar siswa. Aktivitas siswa tergolong sangat tinggi. Hasil belajar kog- nitif siswa setelah mengikuti pembelajaran IPS Terpadu berbasis Outdoor Learning mengalami peningkatan yang signifikan serta mencapai ketuntasan belajar. Rata- rata hasil belajar kognitif siswa secara signifikan lebih besar daripada kelompok siswa yang mengikuti pembelajaran in door. Saran, hendaknya dapat dikembangkan lagi keefektifanya sehingga dapat lebih menggali kemampuan siswa, tidak hanya dalam segi kognitif dan afektif tetapi juga psikomotor. AbstractImplementation of thematic learning activities in elementary school of Semarang is not opti- mal. Most of the teachers do not prepare and use integrated social science learning tools based on outdoor learning. This research is aimed to develop the tools and to review the effectiveness and practicality of integrated social science learning based on outdoor learning. This is a research and development study modified from the research developed by Borg and

  20. Numerical study of IP3-induced Ca2+ spiral pattern evolution

    International Nuclear Information System (INIS)

    Tang Jun; Ma Jun; Yi Ming; Jia Ya

    2008-01-01

    The effect of change in concentration of messenger molecule inositol 1,4,5-trisphosphate (IP 3 ) on intracellular Ca 2+ spiral pattern evolution is studied numerically. The results indicate that when the IP 3 concentration decreases from 0.27 μM, a physiologically reasonable value, to different values, the spiral centre drifts to the edge of the medium and disappears for a small enough IP 3 concentration. The instability of spiral pattern can be understood in terms of excitability-change controlled by the IP 3 concentration. On the other hand, when the IP 3 concentration increases from 0.27 μM, a homogeneous area with a high Ca 2+ concentration emerges and competes with the spiral pattern. A high enough IP 3 concentration can lead the homogeneous area to occupy the whole medium. The instability of spiral pattern is ascribed to the change in stability of a stationary state with a high Ca 2+ concentration. (general)

  1. Study of transmitting electric power utility communications in IP network. Transmission of existing electric power utility communications in best effort type IP network under delay constraint; Denryokuyo tsushin kaisen no IP mo eno shuyo kento. Chien jikan seiyakuka ni okeru best effort gata IP mo eno kison denryokuyo tsushin kaisen no shuyo

    Energy Technology Data Exchange (ETDEWEB)

    Miyake, H.

    2000-07-01

    Since IP network does best effort behavior fundamentally, it always generates delay time and delay variation. For this reason, IP network has been unsuitable to transmit real time data such as a voice. However, in recent years, the technologies which transmit real time data in IP network, e.g. VoIP, have spread. If it is possible to transmit the existing electric power utility communications in IP network using these technologies, total network cost can be reduced by the reduction of required bandwidth and the simplification of communication network systems. In this report, it is examined quantitatively whether end-end delay time of the existing electric power utility communications, e.g. on-line, telephone, carrier relay, CDT (cyclic digital transmission equipment), video conference, ITV(industrial television), is within their permission delay time when they are transmitted in the best effort type IP network. (author)

  2. Optimal design of an IP/MPLS over DWDM network

    Directory of Open Access Journals (Sweden)

    Eduardo Canale

    2014-04-01

    Full Text Available Different approaches for deploying resilient optical networks of low cost constitute a traditional group of NP-Hard problems that have been widely studied. Most of them are based on the construction of low cost networks that fulfill connectivity constraints. However, recent trends to virtualize optical networks over the legacy fiber infrastructure, modified the nature of network design problems and turned inappropriate many of these models and algorithms. In this paper we study a design problem arising from the deployment of an IP/MPLS network over an existing DWDM infrastructure. Besides cost and resiliency, this problem integrates traffic and capacity constraints. We present: an integer programming formulation for the problem, theoretical results, and describe how several metaheuristics were applied in order to find good quality solutions, for a real application case of a telecommunications company.

  3. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP)

    International Nuclear Information System (INIS)

    1994-04-01

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors

  4. IPS Empress crown system: three-year clinical trial results.

    Science.gov (United States)

    Sorensen, J A; Choi, C; Fanuscu, M I; Mito, W T

    1998-02-01

    The IPS Empress system is a highly esthetic hot pressed glass ceramic material for fabrication of single crowns. Adhesive cementation of the system not only contributes to the esthetics but is necessary for increased strength of the crown. The purpose of this prospective clinical trials was to evaluate the longevity of 75 adhesively cemented Empress full crowns. An additional aim was to assess the adhesive cementation methodology and potential side effects. At the three-year point, one molar crown fractured for a 1.3 percent failure rate. The resin cementation technique that was employed exhibited a low incidence of microleakage with few clinical side effects. There was a 5.6 percent incidence of post-cementation sensitivity, with all symptoms subsiding by eight weeks. None of the crowns in the study required endodontic therapy.

  5. ChIP-seq Identification of Weakly Conserved Heart Enhancers

    Energy Technology Data Exchange (ETDEWEB)

    Blow, Matthew J.; McCulley, David J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Bristow, James; Ren, Bing; Black, Brian L.; Rubin, Edward M.; Visel, Axel; Pennacchio, Len A.

    2010-07-01

    Accurate control of tissue-specific gene expression plays a pivotal role in heart development, but few cardiac transcriptional enhancers have thus far been identified. Extreme non-coding sequence conservation successfully predicts enhancers active in many tissues, but fails to identify substantial numbers of heart enhancers. Here we used ChIP-seq with the enhancer-associated protein p300 from mouse embryonic day 11.5 heart tissue to identify over three thousand candidate heart enhancers genome-wide. Compared to other tissues studied at this time-point, most candidate heart enhancers are less deeply conserved in vertebrate evolution. Nevertheless, the testing of 130 candidate regions in a transgenic mouse assay revealed that most of them reproducibly function as enhancers active in the heart, irrespective of their degree of evolutionary constraint. These results provide evidence for a large population of poorly conserved heart enhancers and suggest that the evolutionary constraint of embryonic enhancers can vary depending on tissue type.

  6. Spectroscopy of the red star in IP Peg

    International Nuclear Information System (INIS)

    Martin, J.S.; Jones, D.H.P.; Friend, M.T.; Smith, R.C.

    1989-01-01

    CCD spectroscopy of the cataclysmic variable IP Pegasi during decline from outburst shows narrow chromospheric emission lines from the irradiated face of the red star. The He I (7065 A) emission line is used to produce a partial radial velocity curve, with K He =293.2±3.3 km s -1 . A reanalysis of previous Na I doublet (8190 A) absorption line data produces a considerably larger semi-amplitude, K abs , than previously published. However, this is larger than the true semi-amplitude, K 2 , because irradiation from the disc ionizes the NaI on the inner face of the red star and decreases the strength of the NaI doublet on that face. A computer simulation of the secondary radial velocity curve, including this ionization effect, is used to estimate the true semi-amplitude of the secondary motion. This gives K 2 =298±8 km s -1 . (author)

  7. The Case for GEO Hosted SSA Payloads

    Science.gov (United States)

    Welsch, C.; Armand, B.; Repp, M.; Robinson, A.

    2014-09-01

    Space situational awareness (SSA) in the geosynchronous earth orbit (GEO) belt presents unique challenges, and given the national importance and high value of GEO satellites, is increasingly critical as space becomes more congested and contested. Space situational awareness capabilities can serve as an effective deterrent against potential adversaries if they provide accurate, timely, and persistent information and are resilient to the threat environment. This paper will demonstrate how simple optical SSA payloads hosted on GEO commercial and government satellites can complement the SSA mission and data provided by Space-Based Space Surveillance (SBSS) and the Geosynchronous Space Situational Awareness Program (GSSAP). GSSAP is built by Orbital Sciences Corporation and launched on July 28, 2014. Analysis performed for this paper will show how GEO hosted SSA payloads, working in combination with SBSS and GSSAP, can increase persistence and timely coverage of high value assets in the GEO belt. The potential to further increase GEO object identification and tracking accuracy by integrating SSA data from multiple sources across different viewing angles including GEO hosted SSA sources will be addressed. Hosting SSA payloads on GEO platforms also increases SSA mission architecture resiliency as the sensors are by distributed across multiple platforms including commercial platforms. This distributed architecture presents a challenging target for an adversary to attempt to degrade or disable. We will present a viable concept of operations to show how data from hosted SSA sensors could be integrated with SBSS and GSSAP data to present a comprehensive and more accurate data set to users. Lastly, we will present an acquisition approach using commercial practices and building on lessons learned from the Commercially Hosted Infra Red Payload CHIRP to demonstrate the affordability of GEO hosted SSA payloads.

  8. Comparison of H.323 and SIP for IP telephony signaling

    Science.gov (United States)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  9. Linking international trademark databases to inform IP research and policy

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, P.

    2016-07-01

    Researchers and policy makers are concerned with many international issues regarding trademarks, such as trademark squatting, cluttering, and dilution. Trademark application data can provide an evidence base to inform government policy regarding these issues, and can also produce quantitative insights into economic trends and brand dynamics. Currently, national trademark databases can provide insight into economic and brand dynamics at the national level, but gaining such insight at an international level is more difficult due to a lack of internationally linked trademark data. We are in the process of building a harmonised international trademark database (the “Patstat of trademarks”), in which equivalent trademarks have been identified across national offices. We have developed a pilot database that incorporates 6.4 million U.S., 1.3 million Australian, and 0.5 million New Zealand trademark applications, spanning over 100 years. The database will be extended to incorporate trademark data from other participating intellectual property (IP) offices as they join the project. Confirmed partners include the United Kingdom, WIPO, and OHIM. We will continue to expand the scope of the project, and intend to include many more IP offices from around the world. In addition to building the pilot database, we have developed a linking algorithm that identifies equivalent trademarks (TMs) across the three jurisdictions. The algorithm can currently be applied to all applications that contain TM text; i.e. around 96% of all applications. In its current state, the algorithm successfully identifies ~ 97% of equivalent TMs that are known to be linked a priori, as they have shared international registration number through the Madrid protocol. When complete, the internationally linked trademark database will be a valuable resource for researchers and policy-makers in fields such as econometrics, intellectual property rights, and brand policy. (Author)

  10. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  11. [Two years clinical observation of a kind of castable ceramic--IPS Empress].

    Science.gov (United States)

    Liu, Y; Li, Y; Nie, Y

    1999-03-01

    We used this material in clinic since 1995. Discussion on the prosthetic effects of the above-mentioned material to spreat it clinically. Through half to two years clinical observations to evaluate the effect of IPS Empress crowns in anterior teeth and inlays in posteriors. and Prosthesis made of this kind of material IPS Empress is one kind of excellent all-ceramic prosthetic material. IPS Empress also could be used in post crowns and the clinical effect was satisfactory.

  12. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  13. Salmonella Pathogenicity and Host Adaptation in Chicken-Associated Serovars

    Science.gov (United States)

    Johnson, Timothy J.; Ricke, Steven C.; Nayak, Rajesh; Danzeisen, Jessica

    2013-01-01

    SUMMARY Enteric pathogens such as Salmonella enterica cause significant morbidity and mortality. S. enterica serovars are a diverse group of pathogens that have evolved to survive in a wide range of environments and across multiple hosts. S. enterica serovars such as S. Typhi, S. Dublin, and S. Gallinarum have a restricted host range, in which they are typically associated with one or a few host species, while S. Enteritidis and S. Typhimurium have broad host ranges. This review examines how S. enterica has evolved through adaptation to different host environments, especially as related to the chicken host, and continues to be an important human pathogen. Several factors impact host range, and these include the acquisition of genes via horizontal gene transfer with plasmids, transposons, and phages, which can potentially expand host range, and the loss of genes or their function, which would reduce the range of hosts that the organism can infect. S. Gallinarum, with a limited host range, has a large number of pseudogenes in its genome compared to broader-host-range serovars. S. enterica serovars such as S. Kentucky and S. Heidelberg also often have plasmids that may help them colonize poultry more efficiently. The ability to colonize different hosts also involves interactions with the host's immune system and commensal organisms that are present. Thus, the factors that impact the ability of Salmonella to colonize a particular host species, such as chickens, are complex and multifactorial, involving the host, the pathogen, and extrinsic pressures. It is the interplay of these factors which leads to the differences in host ranges that we observe today. PMID:24296573

  14. Host switching in a generalist parasitoid: contrasting transient and transgenerational costs associated with novel and original host species.

    Science.gov (United States)

    Jones, Thomas S; Bilton, Adam R; Mak, Lorraine; Sait, Steven M

    2015-01-01

    Parasitoids face challenges by switching between host species that influence survival and fitness, determine their role in structuring communities, influence species invasions, and affect their importance as biocontrol agents. In the generalist parasitoid, Venturia canescens (Gravenhorst) (Hymenoptera: Ichneumonidae), we investigated the costs in encapsulation, survival, and body size on juveniles when adult parasitoids switched from their original host, Plodia interpunctella (Hübner) (Lepidotera, Pyralidae) to a novel host, Ephestia kuehniella (Zeller) (Lepidoptera, Pyralidae), over multiple generations. Switching had an initial survival cost for juvenile parasitoids in the novel host, but increased survival occurred within two generations. Conversely, mortality in the original host increased. Body size, a proxy for fecundity, also increased with the number of generations in the novel host species, reflecting adaptation or maternal effects due to the larger size of the novel host, and therefore greater resources available to the developing parasitoid. Switching to a novel host appears to have initial costs for a parasitoid, even when the novel host may be better quality, but the costs rapidly diminish. We predict that the net cost of switching to a novel host for parasitoids will be complex and will depend on the initial reduction in fitness from parasitizing a novel host versus local adaptations against parasitoids in the original host.

  15. Impact of time-domain IP pulse length on measured data and inverted models

    DEFF Research Database (Denmark)

    Olsson, P. I.; Fiandaca, G.; Dahlin, T.

    2015-01-01

    The duration of time domain (TD) induced polarization (IP) current injections has significant impact on the acquired IP data as well as on the inversion models, if the standard evaluation procedure is followed. However, it is still possible to retrieve similar inversion models if the waveform...... of the injected current and the IP response waveform are included in the inversion. The on-time also generally affects the signal-tonoise ratio (SNR) where an increased on-time gives higher SNR for the IP data....

  16. Split degenerate states and stable p+ip phases from holography

    Energy Technology Data Exchange (ETDEWEB)

    Nie, Zhang-Yu; Zeng, Hui [Kunming University of Science and Technology, Kunming (China); Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing (China); Pan, Qiyuan [Hunan Normal Univ., Key Lab. of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Synergetic Innovation Center for Quantum Effects and Applications, Dept. of Physics, Changsha (China); Zeng, Hua-Bi [Yangzhou University, College of Physics Science and Technology, Yangzhou, Jiangsu (China); National Central University, Department of Physics, Chungli (China)

    2017-02-15

    In this paper, we investigate the p+ip superfluid phases in the complex vector field holographic p-wave model. We find that in the probe limit, the p+ip phase and the p-wave phase are equally stable, hence the p and ip orders can be mixed with an arbitrary ratio to form more general p+λip phases, which are also equally stable with the p-wave and p+ip phases. As a result, the system possesses a degenerate thermal state in the superfluid region. We further study the case on considering the back-reaction on the metric, and we find that the degenerate ground states will be separated into p-wave and p+ip phases, and the p-wave phase is more stable. Finally, due to the different critical temperature of the zeroth order phase transitions from p-wave and p+ip phases to the normal phase, there is a temperature region where the p+ip phase exists but the p-wave phase does not. In this region we find the stable holographic p+ip phase for the first time. (orig.)

  17. Proposta de metodologia para avaliação de redes de voz sobre IP

    OpenAIRE

    Vandersilvio da Silva

    2006-01-01

    A redução de custo com telefonia através do uso de voz sobre IP tem disparado a busca de soluções que transformem redes IP originalmente dedicadas a transporte de dados em redes para transporte de voz. Esta dissertação tem por objetivo apresentar uma metodologia para sistematizar a avaliação de redes para o tráfego de voz sobre IP de acordo com as possibilidades disponíveis no cenário a ser avaliado. Inicialmente é dada uma visão geral de voz sobre IP, apresentando os protocolos utilizados, o...

  18. Implantación de switching y ToIP sobre una red WAN

    OpenAIRE

    Pique Palacin, Ivan

    2013-01-01

    Este proyecto tiene como objeto el diseño y la implementación de servicios de comunicaciones de LAN (Switching) y Telefonía IP (ToIP), todos ellos integrados sobre una red WAN nacional ya existente y funcionando, gestionada por un ISP. Aquest projecte té com a objecte el disseny i la implementació de serveis de comunicacions de LAN (Switching) i telefonia IP (ToIP), tots ells integrats sobre una xarxa WAN nacional ja existent i funcionant, gestionada per un ISP. Bachelor thesis for the ...

  19. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  20. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...... as a biomarker that predicts severity of various diseases and can be used in the immunodiagnostics of Mycobacterium tuberculosis and cytomegalovirus infection. Here, we describe an ELISA-based method to detect IP-10 from dried blood and plasma spot samples....

  1. The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia

    OpenAIRE

    Md Khaled Shukran

    2011-01-01

    IP telephony is a transmission of voice and data over Packet Switched IP Networks and it has become a key issue in the telecommunication industry worldwide because of its higher efficiency and cheapest call rate. Hence, most of the countries in the world set up their telecommunication platform on IP based network as a fast revenue generating sources. Though Malaysia is on the way forward on IP based platform but the growth is not reached at satisfactory level due to the absence of effective r...

  2. Proteolysis of MDA5 and IPS-1 is not required for inhibition of the type I IFN response by poliovirus.

    Science.gov (United States)

    Kotla, Swathi; Gustin, Kurt E

    2015-10-06

    The type I interferon (IFN) response is a critical component of the innate immune response to infection by RNA viruses and is initiated via recognition of viral nucleic acids by RIG-like receptors (RLR). Engagement of these receptors in the cytoplasm initiates a signal transduction pathway leading to activation of the transcription factors NF-κB, ATF-2 and IRF-3 that coordinately upregulate transcription of type I IFN genes, such as that encoding IFN-β. In this study the impact of poliovirus infection on the type I interferon response has been examined. The type I IFN response was assessed by measuring IFN-β mRNA levels using qRT-PCR and normalizing to levels of β-actin mRNA. The status of host factors involved in activation of the type I IFN response was examined by immunoblot, immunofluorescence microcopy and qRT-PCR. The results show that poliovirus infection results in induction of very low levels of IFN-β mRNA despite clear activation of NF-κB and ATF-2. In contrast, analysis of IRF-3 revealed no transcriptional induction of an IRF-3-responsive promoter or homodimerization of IRF-3 indicating it is not activated in poliovirus-infected cells. Exposure of poliovirus-infected cells to poly(I:C) results in lower levels of IFN-β mRNA synthesis and IRF-3 activation compared to mock-infected cells. Analysis of MDA-5 and IPS-1 revealed that these components of the RLR pathway were largely intact at times when the type I IFN response was suppressed. Collectively, these results demonstrate that poliovirus infection actively suppresses the host type I interferon response by blocking activation of IRF-3 and suggests that this is not mediated by cleavage of MDA-5 or IPS-1.

  3. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  4. Controlling applied to information processing: quality management applied to IP projects and IP services; Informationsverarbeitungs-Controlling: Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service

    Energy Technology Data Exchange (ETDEWEB)

    Becker, B. [Vereinigung Deutscher Elektrizitaetswerke e.V. (VDEW), Frankfurt am Main (Germany); Beckers, F. [Isar-Amperwerke AG, Muenchen (Germany); Dewald, N. [Bayernwerk AG, Muenchen (Germany); Hauffe, P. [Pfalzwerke AG, Ludwigshafen am Rhein (Germany); Hein, F. [EVS AG Stuttgart (Germany); Hoederath, M. [Vereinigte Elektrizitaetswerke Westfalen AG (VEW), Dortmund (Germany); Seyen, R. [Staedtische Werke Nuernberg GmbH (Germany)

    1998-01-12

    The working group on information processing (IP) basics (in German: `IV-Grundlagen`) has prepared this contribution dealing with controlling applied to information processing. This new report, on the one hand, takes into consideration the role of the organizational IP unit as one offering its services to all sections of a company. On the other hand, information processing as an operational infrastructure influencing all business processes becomes increasingly important with respect to the competitiveness of the EVU. Therefore, quality management applied to IP projects and IP services must support this development. (orig./RHM) [Deutsch] Der VDEW Arbeitskreis `IV-Grundlagen` hat einen Beitrag zum Controlling fuer die Informationsverarbeitung erstellt. Hier geht zum einen die Rolle der Organisationseinheit IV als Dienstleister fuer alle Unternehmensbereiche ein. Zum anderen gewinnt die Informationsverarbeitung als betriebliche Infrastruktur fuer alle Geschaeftsprozesse zunehmende Bedeutung fuer die Wettbewerbsfaehigkeit der EVU. Das Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service muss dies unterstuetzen. (orig./RHM)

  5. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  6. Host age modulates within-host parasite competition.

    Science.gov (United States)

    Izhar, Rony; Routtu, Jarkko; Ben-Ami, Frida

    2015-05-01

    In many host populations, one of the most striking differences among hosts is their age. While parasite prevalence differences in relation to host age are well known, little is known on how host age impacts ecological and evolutionary dynamics of diseases. Using two clones of the water flea Daphnia magna and two clones of its bacterial parasite Pasteuria ramosa, we examined how host age at exposure influences within-host parasite competition and virulence. We found that multiply-exposed hosts were more susceptible to infection and suffered higher mortality than singly-exposed hosts. Hosts oldest at exposure were least often infected and vice versa. Furthermore, we found that in young multiply-exposed hosts competition was weak, allowing coexistence and transmission of both parasite clones, whereas in older multiply-exposed hosts competitive exclusion was observed. Thus, age-dependent parasite exposure and host demography (age structure) could together play an important role in mediating parasite evolution. At the individual level, our results demonstrate a previously unnoticed interaction of the host's immune system with host age, suggesting that the specificity of immune function changes as hosts mature. Therefore, evolutionary models of parasite virulence might benefit from incorporating age-dependent epidemiological parameters. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  7. KChIP2 genotype dependence of transient outward current (Ito) properties in cardiomyocytes isolated from male and female mice.

    Science.gov (United States)

    Waldschmidt, Lara; Junkereit, Vera; Bähring, Robert

    2017-01-01

    The transient outward current (Ito) in cardiomyocytes is largely mediated by Kv4 channels associated with Kv Channel Interacting Protein 2 (KChIP2). A knockout model has documented the critical role of KChIP2 in Ito expression. The present study was conducted to characterize in both sexes the dependence of Ito properties, including current magnitude, inactivation kinetics, recovery from inactivation and voltage dependence of inactivation, on the number of functional KChIP2 alleles. For this purpose we performed whole-cell patch-clamp experiments on isolated left ventricular cardiomyocytes from male and female mice which had different KChIP2 genotypes; i.e., wild-type (KChIP2+/+), heterozygous knockout (KChIP2+/-) or complete knockout of KChIP2 (KChIP2-/-). We found in both sexes a KChIP2 gene dosage effect (i.e., a proportionality between number of alleles and phenotype) on Ito magnitude, however, concerning other Ito properties, KChIP2+/- resembled KChIP2+/+. Only in the total absence of KChIP2 (KChIP2-/-) we observed a slowing of Ito kinetics, a slowing of recovery from inactivation and a negative shift of a portion of the voltage dependence of inactivation. In a minor fraction of KChIP2-/- myocytes Ito was completely lost. The distinct KChIP2 genotype dependences of Ito magnitude and inactivation kinetics, respectively, seen in cardiomyocytes were reproduced with two-electrode voltage-clamp experiments on Xenopus oocytes expressing Kv4.2 and different amounts of KChIP2. Our results corroborate the critical role of KChIP2 in controlling Ito properties. They demonstrate that the Kv4.2/KChIP2 interaction in cardiomyocytes is highly dynamic, with a clear KChIP2 gene dosage effect on Kv4 channel surface expression but not on inactivation gating.

  8. Host social behavior and parasitic infection: A multifactorial approach

    Science.gov (United States)

    Ezenwa, V.O.

    2004-01-01

    I examined associations between several components of host social organization, including group size and gregariousness, group stability, territoriality and social class, and gastrointestinal parasite load in African bovids. At an intraspecific level, group size was positively correlated with parasite prevalence, but only when the parasite was relatively host specific and only among host species living in stable groups. Social class was also an important predictor of infection rates. Among gazelles, territorial males had higher parasite intensities than did either bachelor males or females and juveniles, suggesting that highly territorial individuals may be either more exposed or more susceptible to parasites. Associations among territoriality, grouping, and parasitism were also found across taxa. Territorial host genera were more likely to be infected with strongyle nematodes than were nonterritorial hosts, and gregarious hosts were more infected than were solitary hosts. Analyses also revealed that gregariousness and territoriality had an interactive effect on individual parasite richness, whereby hosts with both traits harbored significantly more parasite groups than did hosts with only one or neither trait. Overall, study results indicate that multiple features of host social behavior influence infection risk and suggest that synergism between traits also has important effects on host parasite load.

  9. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  10. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    Science.gov (United States)

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  11. Effective Domain Partitioning for Multi-Clock Domain IP Core Wrapper Design under Power Constraints

    Science.gov (United States)

    Yu, Thomas Edison; Yoneda, Tomokazu; Zhao, Danella; Fujiwara, Hideo

    The rapid advancement of VLSI technology has made it possible for chip designers and manufacturers to embed the components of a whole system onto a single chip, called System-on-Chip or SoC. SoCs make use of pre-designed modules, called IP-cores, which provide faster design time and quicker time-to-market. Furthermore, SoCs that operate at multiple clock domains and very low power requirements are being utilized in the latest communications, networking and signal processing devices. As a result, the testing of SoCs and multi-clock domain embedded cores under power constraints has been rapidly gaining importance. In this research, a novel method for designing power-aware test wrappers for embedded cores with multiple clock domains is presented. By effectively partitioning the various clock domains, we are able to increase the solution space of possible test schedules for the core. Since previous methods were limited to concurrently testing all the clock domains, we effectively remove this limitation by making use of bandwidth conversion, multiple shift frequencies and properly gating the clock signals to control the shift activity of various core logic elements. The combination of the above techniques gains us greater flexibility when determining an optimal test schedule under very tight power constraints. Furthermore, since it is computationally intensive to search the entire expanded solution space for the possible test schedules, we propose a heuristic 3-D bin packing algorithm to determine the optimal wrapper architecture and test schedule while minimizing the test time under power and bandwidth constraints.

  12. Host phylogeny determines viral persistence and replication in novel hosts.

    Directory of Open Access Journals (Sweden)

    Ben Longdon

    2011-09-01

    Full Text Available Pathogens switching to new hosts can result in the emergence of new infectious diseases, and determining which species are likely to be sources of such host shifts is essential to understanding disease threats to both humans and wildlife. However, the factors that determine whether a pathogen can infect a novel host are poorly understood. We have examined the ability of three host-specific RNA-viruses (Drosophila sigma viruses from the family Rhabdoviridae to persist and replicate in 51 different species of Drosophilidae. Using a novel analytical approach we found that the host phylogeny could explain most of the variation in viral replication and persistence between different host species. This effect is partly driven by viruses reaching a higher titre in those novel hosts most closely related to the original host. However, there is also a strong effect of host phylogeny that is independent of the distance from the original host, with viral titres being similar in groups of related hosts. Most of this effect could be explained by variation in general susceptibility to all three sigma viruses, as there is a strong phylogenetic correlation in the titres of the three viruses. These results suggest that the source of new emerging diseases may often be predictable from the host phylogeny, but that the effect may be more complex than simply causing most host shifts to occur between closely related hosts.

  13. Host Phylogeny Determines Viral Persistence and Replication in Novel Hosts

    Science.gov (United States)

    Longdon, Ben; Hadfield, Jarrod D.; Webster, Claire L.

    2011-01-01

    Pathogens switching to new hosts can result in the emergence of new infectious diseases, and determining which species are likely to be sources of such host shifts is essential to understanding disease threats to both humans and wildlife. However, the factors that determine whether a pathogen can infect a novel host are poorly understood. We have examined the ability of three host-specific RNA-viruses (Drosophila sigma viruses from the family Rhabdoviridae) to persist and replicate in 51 different species of Drosophilidae. Using a novel analytical approach we found that the host phylogeny could explain most of the variation in viral replication and persistence between different host species. This effect is partly driven by viruses reaching a higher titre in those novel hosts most closely related to the original host. However, there is also a strong effect of host phylogeny that is independent of the distance from the original host, with viral titres being similar in groups of related hosts. Most of this effect could be explained by variation in general susceptibility to all three sigma viruses, as there is a strong phylogenetic correlation in the titres of the three viruses. These results suggest that the source of new emerging diseases may often be predictable from the host phylogeny, but that the effect may be more complex than simply causing most host shifts to occur between closely related hosts. PMID:21966271

  14. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  15. A comparison of interferon-γ and IP-10 for the diagnosis of tuberculosis

    DEFF Research Database (Denmark)

    Holm, Line Lindebo; Rose, Michala Vaaben; Kimaro, Godfather

    2014-01-01

    OBJECTIVE: Interferon-γ and IP-10 release assays are diagnostic tests for tuberculosis infection. We have compared the accuracy of IP-10 and QuantiFERON-TB Gold In-tube [QFT-IT] in Tanzanian children suspected of having active tuberculosis (TB). METHODS: Hospitalized Tanzanian children...

  16. A simple method to quantitate IP-10 in dried blood and plasma spots

    DEFF Research Database (Denmark)

    Aabye, Martine G; Eugen-Olsen, Jesper; Werlinrud, Anne Marie

    2012-01-01

    Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn...

  17. Real-time resource availability signaling in IP multimedia subsystem networks

    NARCIS (Netherlands)

    Ozcelebi, T.; Radovanovic, I.; Sengupta, D.

    2008-01-01

    IP Multimedia Subsystem (IMS) allows the use of unlicensed, non-dedicated and nondeterministic access networks for delivering IP multimedia services. Providing end-to-end Quality-of-Service (QoS) for resource demanding real-time services (e.g. real-time multimedia) over such networks is a

  18. High intercontinental migration rates and population admixture in the sapstain fungus Ophiostoma ips

    Science.gov (United States)

    Xudong Zhou; Treena I. Burgess; Z. Wilhelm De Beer; Francois Lieutier; Annie Yart; Kier Klepzig; Angus Carnegie; Julio Mena Portales; Brenda D. Wingfield; Michael J. Wingfield

    2006-01-01

    Ophiostoma ips is a common fungal associate of various conifer-infesting bark beetles in their native ranges and has been introduced into non-native pine plantations in the Southern Hemisphere. In this study, we used 10 microsatellite markers to investigate the population biology of O. ips in native (Cuba, France, Morocco and USA) and non-native (...

  19. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  20. Myricetin stimulates the absorption of the pro-carcinogen PhIP

    NARCIS (Netherlands)

    Schutte, M.E.; Sandt, J.J.M. van de; Alink, G.M.; Groten, J.P.; Rietjens, I.M.C.M.

    2006-01-01

    The effect of the flavonoid myricetin on the transport of the pro-carcinogen 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) through differentiated Caco-2 monolayers, a model for the intestinal epithelium, is described. Myricetin causes an increase of the transport of PhIP from the apical to

  1. 77 FR 48549 - Eastman Kodak Company, IPS-Dayton Location, Dayton, OH; Notice of Affirmative Determination...

    Science.gov (United States)

    2012-08-14

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-81,387] Eastman Kodak Company, IPS--Dayton Location, Dayton, OH; Notice of Affirmative Determination Regarding Application for...) applicable to workers and former workers of Eastman Kodak Company, IPS- Dayton Location, Dayton, Ohio...

  2. The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?

    NARCIS (Netherlands)

    Maathuis, Ivo; Smit, Willem A.; Egyedi, T.M.; Krechmer, K.; Jakobs, K.

    2003-01-01

    Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the

  3. ChIP-exo interrogation of Crp, DNA, and RNAP holoenzyme interactions

    DEFF Research Database (Denmark)

    Latif, Haythem; Federowicz, Stephen; Ebrahim, Ali

    2018-01-01

    Numerous in vitro studies have yielded a refined picture of the structural and molecular associations between Cyclic-AMP receptor protein (Crp), the DNA motif, and RNA polymerase (RNAP) holoenzyme. In this study, high-resolution ChIP-exonuclease (ChIP-exo) was applied to study Crp binding in vivo...

  4. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  5. Accounting for immunoprecipitation efficiencies in the statistical analysis of ChIP-seq data

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    2013-01-01

    Background: ImmunoPrecipitation (IP) efficiencies may vary largely between different antibodies and between repeated experiments with the same antibody. These differences have a large impact on the quality of ChIP-seq data: a more efficient experiment will necessarily lead to a higher signal to

  6. Optimal use of tandem biotin and V5 tags in ChIP assays

    NARCIS (Netherlands)

    K.E. Kolodziej (Katarzyna); F. Pourfarzad, F. (Farzin); E. de Boer (Ernie); S. Krpic (Sanja); F.G. Grosveld (Frank); J. Strouboulis (John)

    2009-01-01

    textabstractBackground: Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the

  7. Automated Integration of Dedicated Hardwired IP Cores in Heterogeneous MPSoCs Designed with ESPAM

    Directory of Open Access Journals (Sweden)

    Ed Deprettere

    2008-06-01

    Full Text Available This paper presents a methodology and techniques for automated integration of dedicated hardwired (HW IP cores into heterogeneous multiprocessor systems. We propose an IP core integration approach based on an HW module generation that consists of a wrapper around a predefined IP core. This approach has been implemented in a tool called ESPAM for automated multiprocessor system design, programming, and implementation. In order to keep high performance of the integrated IP cores, the structure of the IP core wrapper is devised in a way that adequately represents and efficiently implements the main characteristics of the formal model of computation, namely, Kahn process networks, we use as an underlying programming model in ESPAM. We present details about the structure of the HW module, the supported types of IP cores, and the minimum interfaces these IP cores have to provide in order to allow automated integration in heterogeneous multiprocessor systems generated by ESPAM. The ESPAM design flow, the multiprocessor platforms we consider, and the underlying programming (KPN model are introduced as well. Furthermore, we present the efficiency of our approach by applying our methodology and ESPAM tool to automatically generate, implement, and program heterogeneous multiprocessor systems that integrate dedicated IP cores and execute real-life applications.

  8. HMCan: A method for detecting chromatin modifications in cancer samples using ChIP-seq data

    KAUST Repository

    Ashoor, Haitham; Hé rault, Auré lie; Kamoun, Auré lie; Radvanyi, Franç ois; Bajic, Vladimir B.; Barillot, Emmanuel; Boeva, Valentina

    2013-01-01

    genes. Though several tools have been created to enable detection of histone marks in ChIP-seq data from normal samples, it is unclear whether these tools can be efficiently applied to ChIP-seq data generated from cancer samples. Indeed, cancer genomes

  9. Internetiside VoIP sobib ka ettevõtteile / Valdur Laid

    Index Scriptorium Estoniae

    Laid, Valdur, 1969-

    2005-01-01

    Ilmunud ka: Delovõje Vedomosti 8. juuni lk. 19. Kommunikatsiooni liikumisest internetti ehk IP-võrku ning selle võimalustest ettevõtjaile. Vt. samas: Väikefirmade IP-lahendus jõuab aasta lõpus massturule

  10. IPS observation system for the Miyun 50 m radio telescope and its commissioning observation

    International Nuclear Information System (INIS)

    Zhu Xinying; Zhang Xizhen; Zhang Hongbo; Kong Deqing; Qu Huipeng

    2012-01-01

    Ground-based observation of Interplanetary Scintillation (IPS) is an important approach for monitoring solar wind. A ground-based IPS observation system has been newly implemented on a 50 m radio telescope at Miyun station, managed by the National Astronomical Observatories, Chinese Academy of Sciences. This observation system has been constructed for the purpose of observing solar wind speed and the associated scintillation index by using the normalized cross-spectrum of a simultaneous dual-frequency IPS measurement. The system consists of a universal dual-frequency front-end and a dual-channel multi-function back-end specially designed for IPS. After careful calibration and testing, IPS observations on source 3C 273B and 3C 279 have been successfully carried out. The preliminary observation results show that this newly-developed observation system is capable of performing IPS observation. The system's sensitivity for IPS observation can reach over 0.3 Jy in terms of an IPS polarization correlator with 4 MHz bandwidth and 2 s integration time. (research papers)

  11. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  12. SpaceWire: IP, Components, Development Support and Test Equipment

    Science.gov (United States)

    Parkes, S.; McClements, C.; Mills, S.; Martin, I.

    SpaceWire is a communications network for use onboard spacecraft. It is designed to connect high data-rate sensors, large solid-state memories, processing units and the downlink telemetry subsystem providing an integrated data-handling network. SpaceWire links are serial, high-speed (2 Mbits/sec to 400 Mbits/sec), bi-directional, full-duplex, pointto- point data links which connect together SpaceWire equipment. Application information is sent along a SpaceWire link in discrete packets. Control and time information can also be sent along SpaceWire links. SpaceWire is defined in the ECSS-E50-12A standard [1]. With the adoption of SpaceWire on many space missions the ready availability of intellectual property (IP) cores, components, software drivers, development support, and test equipment becomes a major issue for those developing satellites and their electronic subsystems. This paper describes the work being done at the University of Dundee and STAR-Dundee Ltd with ESA, BNSC and internal funding to make these essential items available. STAR-Dundee is a spin-out company of the University of Dundee set up specifically to support users of SpaceWire.

  13. MD#1182: Calibration of diamond particle detectors in IP6

    CERN Document Server

    Valette, Matthieu; Lindstrom, Bjorn Hans Filip; Wiesner, Christoph

    2017-01-01

    In case of an asynchronous beam dump with a fully filled LHC machine it is expected that all standard ionisation chamber Beam Loss Monitors (IC BLM) around the LHC dumping region in IP6 will be saturated. Diamond Beam Loss Monitors (dBLM) were therefore installed next to the movable dump protection absorber (TCDQ) downstream of the extraction kickers. These detectors allow resolving losses at a nanosecond timescale and with an dynamic range of several orders of magnitude; thus, allowing to know the number of nominal bunches impacting the TCDQ. After a first series of calibrations using asynchronous beam dump tests, an experiment was conducted during MD#1182 to demonstrate the possibility of resolving a nominal bunch hitting the TCDQ. The impact parameter of the bunches on the TCDQ was first scanned using probe bunches with lower intensity then tests were done with nominal bunches (1.1e11 p/bunch) at injection energy. High energy calibration of the losses was also attempted unsuccessfully. Due to different beh...

  14. Review Report on the Design of In-Pile Test Section(IPS)

    International Nuclear Information System (INIS)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-01

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins

  15. Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching

    DEFF Research Database (Denmark)

    Jha, Vikas; Kalia, Kartik; Chowdhary, Bhawani Shankar

    2016-01-01

    With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone....... With the humongous popularity of Internet the overall traffic on Internet has the same story. Focusing on transmission of IP traffic in an optical network with signals remaining in their optical nature generated at particular wavelength, proposed is the switching of optically generated IP packets through optical...... cross connects based on translation of wavelength when an IP packet is crossing the optical cross connect. Adding the concepts of layer 3 routing protocols along with the wavelength translation scheme, will help in spanning the overall optical network for a larger area....

  16. The extended TRIP supporting VoIP routing reservation with distributed QoS

    Science.gov (United States)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  17. Review Report on the Design of In-Pile Test Section(IPS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-15

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins.

  18. All-IP-Ethernet architecture for real-time sensor-fusion processing

    Science.gov (United States)

    Hiraki, Kei; Inaba, Mary; Tezuka, Hiroshi; Tomari, Hisanobu; Koizumi, Kenichi; Kondo, Shuya

    2016-03-01

    Serendipter is a device that distinguishes and selects very rare particles and cells from huge amount of population. We are currently designing and constructing information processing system for a Serendipter. The information processing system for Serendipter is a kind of sensor-fusion system but with much more difficulties: To fulfill these requirements, we adopt All IP based architecture: All IP-Ethernet based data processing system consists of (1) sensor/detector directly output data as IP-Ethernet packet stream, (2) single Ethernet/TCP/IP streams by a L2 100Gbps Ethernet switch, (3) An FPGA board with 100Gbps Ethernet I/F connected to the switch and a Xeon based server. Circuits in the FPGA include 100Gbps Ethernet MAC, buffers and preprocessing, and real-time Deep learning circuits using multi-layer neural networks. Proposed All-IP architecture solves existing problem to construct large-scale sensor-fusion systems.

  19. Emancipating Intellectual Property from Proprietarianism: Drahos, Foucault, and a Quasi-Genealogy of IP

    Directory of Open Access Journals (Sweden)

    Wendyl Luna

    2018-01-01

    Full Text Available This paper argues that Peter Drahos undertakes a partial Foucauldian genealogy by emancipating intellectual property (IP from proprietarianism. He demonstrates the dominance of proprietarianism in IP by drawing sample practices from trademark, copyright, and patent laws, and then seeks to displace the proprietarian dominance with instrumentalism, which reconstitutes IP as a “liberty-intruding privilege.” Ironically, despite doing a genealogy, Drahos does not eradicate sovereignty altogether as Michel Foucault insists, but instead determines IP as a “sovereignty mechanism” that has a “sovereignty effect.” After explaining what Foucauldian genealogy is, the paper will explain how Drahos undertakes a genealogy of IP, while highlighting the limitations of Drahos’ analysis from a Foucauldian perspective.

  20. Synthesis and evaluation of p-iodo-phentermine (IP) as a brain perfusion imaging agent

    International Nuclear Information System (INIS)

    Kizuka, H.; Elmaleh, D.R.; Brownell, G.L.; Strauss, H.W.

    1985-01-01

    rho-( 123 I and 131 I) iodo α,α-dimethylphenethylamine (rho-iodophentermine, IP) as the α-methylated analogue of iodoamphetamine has been prepared. It is hoped that this methyl substitution will increase the lipophilicity of the agent, enhance resistance to metabolism by monoamine oxidase, and will result in increased initial uptake and slower washout from the brain as compared to N-isopropyl-rho-( 123 I) iodoamphetamine. IP was prepared by diazotization of rho-aminophentermine followed by decomposition of the diazonium salt with KI. Radioiodinated IP was prepared either by the solid-phase isotopic exchange reaction or by decomposition of the piperidinotriazene derivative with a radiochemical yield of 40-60%. Biodistribution of 131 I-IP in rats showed brain uptake in the range of 1.7% dose g -1 at 5, 30 and 60 min. Imaging studies with 123 I-IP in dogs showed high brain extraction and slow washout of activity. (author)

  1. Conservação de sementes de ipê Conservation of "ipê" seeds

    Directory of Open Access Journals (Sweden)

    Jocely Andreuccetti Maeda

    1984-01-01

    Full Text Available Sementes de algumas espécies de ipê foram submetidas a diferentes temperaturas de armazenamento, determinando-se a sua porcentagem de germinação a cada quarenta dias, por um período de trinta meses. Nas condições fornecidas de 10 ºC, 29 ºC e 30 ºC em embalagem hermeticamente fechada, e em saco de papel, a condições ambienteis foram avaliadas as seguintes espécies: Tabebuia avellanedae var. paulensis Tol., Tabebuia chrysotricha (Mart. ex-DC. Standley, Tabebuia impetiginosa (Mart. Standley, Tabebuia rosea (Bertol. DC. e Tabebuia heptaphylla (Vell. Tol. Dentre as condições de armazenamento, o tratamento a 10ºC em vidro hermético foi o que manteve a viabilidade da semente por maior tempo, sendo 20 °C também em vidro hermético o segundo melhor resultado. A germinação das sementes armazenadas em saco de papel a temperatura ambiente foi melhor do que a das que foram armazenadas em vidro hermético a 30 °C, sendo esta a pior condição de armazenagem. A comparação entre as espécies mostrou que Tabebuia heptaphylla, apresenta, além de sementes de maior longevidade, maior resistência às condições adversas de armazenamento.Seeds of some species of "ipê" were stored at different temperatures and the germination percentage was determined at forty-day intervals during thirty months. Seeds were subjected to the following conditions: storage in sealed flasks at 10ºC, 20ºC and 30ºC, and in paper bags at room temperature. The following species were evaluated: Tabebuia avellanedae var. paulensis Tol., Tabebuia chrysotricha (Mart. ex DC. Standley, Tabebuia impetiginosa (Mart. Standley, Tabebuia rosea (Bertol. DC. e Tabebuia heptaphylla (Vell. Tol. Among the treatments studied, storing seeds in sealed flasks at 10°C maintained seed viability for the longest period of time. The second best result was obtained when seeds were kept in sealed flasks at 20ºC. The germination of seeds stored in paper bags at room temperature was higher

  2. Potassium Channel Interacting Protein 2 (KChIP2) is not a transcriptional regulator of cardiac electrical remodeling

    DEFF Research Database (Denmark)

    Winther, Sine V; Tuomainen, Tomi; Borup, Rehannah

    2016-01-01

    The heart-failure relevant Potassium Channel Interacting Protein 2 (KChIP2) augments CaV1.2 and KV4.3. KChIP3 represses CaV1.2 transcription in cardiomyocytes via interaction with regulatory DNA elements. Hence, we tested nuclear presence of KChIP2 and if KChIP2 translocates into the nucleus...... intracellular Ca(2+) concentration. Neither increasing nor decreasing intracellular Ca(2+) concentrations caused translocation of KChIP2. Microarray analysis did not identify relief of transcriptional repression in murine KChIP2(-/-) heart samples. We conclude that although there is a baseline presence of KCh...

  3. The role of calsenilin/DREAM/KChIP3 in contextual fear conditioning.

    Science.gov (United States)

    Alexander, Jon C; McDermott, Carmel M; Tunur, Tumay; Rands, Vicky; Stelly, Claire; Karhson, Debra; Bowlby, Mark R; An, W Frank; Sweatt, J David; Schrader, Laura A

    2009-03-01

    Potassium channel interacting proteins (KChIPs) are members of a family of calcium binding proteins that interact with Kv4 potassium (K(+)) channel primary subunits and also act as transcription factors. The Kv4 subunit is a primary K(+) channel pore-forming subunit, which contributes to the somatic and dendritic A-type currents throughout the nervous system. These A-type currents play a key role in the regulation of neuronal excitability and dendritic processing of incoming synaptic information. KChIP3 is also known as calsenilin and as the transcription factor, downstream regulatory element antagonist modulator (DREAM), which regulates a number of genes including prodynorphin. KChIP3 and Kv4 primary channel subunits are highly expressed in hippocampus, an area of the brain important for learning and memory. Through its various functions, KChIP3 may play a role in the regulation of synaptic plasticity and learning and memory. We evaluated the role of KChIP3 in a hippocampus-dependent memory task, contextual fear conditioning. Male KChIP3 knockout (KO) mice showed significantly enhanced memory 24 hours after training as measured by percent freezing. In addition, we found that membrane association and interaction with Kv4.2 of KChIP3 protein was significantly decreased and nuclear KChIP3 expression was increased six hours after the fear conditioning training paradigm with no significant change in KChIP3 mRNA. In addition, prodynorphin mRNA expression was significantly decreased six hours after fear conditioning training in wild-type (WT) but not in KO animals. These data suggest a role for regulation of gene expression by KChIP3/DREAM/calsenilin in consolidation of contextual fear conditioning memories.

  4. Inhibition by salmeterol and cilomilast of fluticasone-enhanced IP-10 release in airway epithelial cells.

    Science.gov (United States)

    Reddy, P J; Aksoy, Mark O; Yang, Yi; Li, Xiu Xia; Ji, Rong; Kelsen, Steven G

    2008-02-01

    The CXC chemokines, IP-10/CXCL10 and IL-8/CXCL8, play a role in obstructive lung disease by attracting Th1/Tc1 lymphocytes and neutrophils, respectively. Inhaled corticosteroids (ICS) and long acting beta 2-agonists (LABA) are widely used. However, their effect(s) on the release of IP-10 and IL-8 by airway epithelial cells are poorly understood. This study examined the effects of fluticasone, salmeterol, and agents which raise intracellular cAMP (cilomilast and db-cAMP) on the expression of IP-10 and IL-8 protein and mRNA. Studies were performed in cultured human airway epithelial cells during cytokine-stimulated IP-10 and IL-8 release. Cytokine treatment (TNF-alpha, IL-1beta and IFN-gamma) increased IP-10 and IL-8 protein and mRNA levels. Fluticasone (0.1 nM to 1 microM) increased IP-10 but reduced IL-8 protein release without changing IP-10 mRNA levels assessed by real time RT-PCR. The combination of salmeterol (1 micro M) and cilomilast (1-10 mu M) reduced IP-10 but had no effect on IL-8 protein. Salmeterol alone (1 micro M) and db-cAMP alone (1 mM) antagonised the effects of fluticasone on IP-10 but not IL-8 protein. In human airway epithelial cells, inhibition by salmeterol of fluticasone-enhanced IP-10 release may be an important therapeutic effect of the LABA/ICS combination not present when the two drugs are used separately.

  5. Gráficos de control multivariables aplicados a la estimación de la calidad percibida de la voz sobre ip

    Directory of Open Access Journals (Sweden)

    Leonardo Francisco Panes Martínez

    2007-07-01

    Full Text Available Con el desarrollo del protocolo de red IP se ha generado un crecimiento explosivo de Internet en los últimos diez o quince años, que ha llevado a la proliferación de múltiples servicios de comunicación, dada la naturaleza de este protocolo se hace necesario implementar mecanismos que permitan asegurar la calidad  de servicio a los usuarios finales. El presente artículo presenta un sistema de evaluación en línea efectiva en la vigilancia y medición de la calidad percibida de la voz sobre IP consistente en el tiempo. El modelo presentado combina el control estadístico de procesos y los métodos objetivos de estimación de la calidad percibida de voz. Para esto se ha implementado el grafico de control multivariable T_ de Hotteling y el método objetivo no intrusivo de estimación de la calidad percibida de voz “Modelo-E”. The development of the Internet Protocol ( IP it´s  generating an explosive growth of Internet and that have taken the proliferation of multiples services of communication. But  this protocol needs to implement mechanisms that allow to assure the quality of service to the end users. The present article presents a system of effective on-line evaluation in the surveillance and measurements  of the perceived quality of the voice on IP consistent in the time. The presented model combines the statistical control of processes and the objective methods of estimate of the perceived quality of voice. For this it has been implemented Multivariable Control Chart T_ de Hotteling and the perceived method for voice quality prediction to voice over IP.

  6. Weed hosts of cotton mealybug, Phenacoccus solenopsis Tinsley (Hemiptera: Pseudococcidae).

    Science.gov (United States)

    Vennila, S; Prasad, Y G; Prabhakar, M; Agarwal, Meenu; Sreedevi, G; Bambawale, O M

    2013-03-01

    The exotic cotton mealybug, Phenacoccus solenopsis Tinsley (Hemiptera: Pseudococcidae) invaded India during 2006, and caused widespread infestation across all nine cotton growing states. P. solenopsis also infested weeds that aided its faster spread and increased severity across cotton fields. Two year survey carried out to document host plants of P. solenopsis between 2008 and 2010 revealed 27, 83, 59 and 108 weeds belonging to 8, 18, 10 and 32 families serving as alternate hosts at North, Central, South and All India cotton growing zones, respectively. Plant species of four families viz., Asteraceae, Amaranthaceae, Malvaceae and Lamiaceae constituted almost 50% of the weed hosts. While 39 weed species supported P. solenopsis multiplication during the cotton season, 37 were hosts during off season. Higher number of weeds as off season hosts (17) outnumbering cotton season (13) at Central over other zones indicated the strong carryover of the pest aided by weeds between two cotton seasons. Six, two and seven weed hosts had the extreme severity of Grade 4 during cotton, off and cotton + off seasons, respectively. Higher number of weed hosts of P. solenopsis were located at roadside: South (12) > Central (8) > North (3) zones. Commonality of weed hosts was higher between C+S zones, while no weed host was common between N+S zones. Paper furnishes the wide range of weed hosts of P. solenopsis, discusses their significance, and formulated general and specific cultural management strategies for nationwide implementation to prevent its outbreaks.

  7. Variants near DMRT1, TERT and ATF7IP are associated with testicular germ cell cancer

    Science.gov (United States)

    Turnbull, Clare; Rapley, Elizabeth A.; Seal, Sheila; Pernet, David; Renwick, Anthony; Hughes, Deborah; Ricketts, Michelle; Linger, Rachel; Nsengimana, Jeremie; Deloukas, Panagiotis; Huddart, Robert A.; Bishop, D Timothy; Easton, Douglas F.; Stratton, Michael R.; Rahman, Nazneen

    2013-01-01

    We conducted a genome-wide association study for testicular germ cell tumor genotyping 298,782 SNPs in 979 cases and 4,947 controls from the UK and replicating associations in a further 664 cases and 3,456 controls. We identified three novel susceptibility loci, two of which include genes that are involved in telomere regulation. We identified two independent signals within the TERT-CLPTM1L locus on chromosome 5 which has been associated with multiple other cancers (rs4635969, OR=1.54 (95%CI 1.33-1.79), P=1.14×10−23 and rs2736100, OR 1.33 (1.18-1.50) P=7.55 ×10−15). We also identified a locus on chromosome 12 (rs2900333, OR=1.27 (95%CI 1.12-1.44), P=6.16×10−10) that contains ATF7IP, a regulator of TERT expression. Finally we identified a locus on chromosome 9 (rs755383, OR=1.37 (95%CI 1.21-1.55), P=1.12×10−23) containing the sex determination gene DMRT1, which has been linked with teratoma susceptibility in mice. PMID:20543847

  8. Fatty acid-producing hosts

    Science.gov (United States)

    Pfleger, Brian F; Lennen, Rebecca M

    2013-12-31

    Described are hosts for overproducing a fatty acid product such as a fatty acid. The hosts include an exogenous nucleic acid encoding a thioesterase and, optionally, an exogenous nucleic acid encoding an acetyl-CoA carboxylase, wherein an acyl-CoA synthetase in the hosts are functionally delected. The hosts prefereably include the nucleic acid encoding the thioesterase at an intermediate copy number. The hosts are preferably recominantly stable and growth-competent at 37.degree. C. Methods of producing a fatty acid product comprising culturing such hosts at 37.degree. C. are also described.

  9. Novel characteristics of CtIP at damage-induced foci following the initiation of DNA end resection

    International Nuclear Information System (INIS)

    Fujisawa, Hiroshi; Fujimori, Akira; Okayasu, Ryuichi; Uesaka, Mitsuru; Yajima, Hirohiko

    2015-01-01

    Highlights: • CtIP becomes hyperphosphorylated and forms foci following cell irradiation. • CtIP accumulates in foci subsequent to the peak of hyperphosphorylation. • CtIP is maintained in a hypophosphorylated state at later times. • CtIP is continuously recruited to DNA double strand breaks downstream of resection. • CtIP presumably have a distinct role following the initiation of resection. - Abstract: Homologous recombination (HR) is a major repair pathway for DNA double strand breaks (DSBs), and end resection, which generates a 3′-single strand DNA tail at the DSB, is an early step in the process. Resection is initiated by the Mre11 nuclease together with CtIP. Here, we describe novel characteristics of CtIP at DSBs. At early times following exposure of human cells to ionizing radiation, CtIP localized to the DSB, became hyperphosphorylated and formed foci in an ATM-dependent manner. At later times, when the initiation of resection had occurred, CtIP foci persist but CtIP is maintained in a hypophosphorylated state, which is dependent on ATM and ATR. Exposure to cycloheximide revealed that CtIP turns over at DSB sites downstream of resection. Our findings provide strong evidence that CtIP is continuously recruited to DSBs downstream of both the initiation and extension step of resection, strongly suggesting that CtIP has functions in addition to promoting the initiation of resection during HR

  10. iPS cells to model CDKL5-related disorders.

    Science.gov (United States)

    Amenduni, Mariangela; De Filippis, Roberta; Cheung, Aaron Y L; Disciglio, Vittoria; Epistolato, Maria Carmela; Ariani, Francesca; Mari, Francesca; Mencarelli, Maria Antonietta; Hayek, Youssef; Renieri, Alessandra; Ellis, James; Meloni, Ilaria

    2011-12-01

    Rett syndrome (RTT) is a progressive neurologic disorder representing one of the most common causes of mental retardation in females. To date mutations in three genes have been associated with this condition. Classic RTT is caused by mutations in the MECP2 gene, whereas variants can be due to mutations in either MECP2 or FOXG1 or CDKL5. Mutations in CDKL5 have been identified both in females with the early onset seizure variant of RTT and in males with X-linked epileptic encephalopathy. CDKL5 is a kinase protein highly expressed in neurons, but its exact function inside the cell is unknown. To address this issue we established a human cellular model for CDKL5-related disease using the recently developed technology of induced pluripotent stem cells (iPSCs). iPSCs can be expanded indefinitely and differentiated in vitro into many different cell types, including neurons. These features make them the ideal tool to study disease mechanisms directly on the primarily affected neuronal cells. We derived iPSCs from fibroblasts of one female with p.Q347X and one male with p.T288I mutation, affected by early onset seizure variant and X-linked epileptic encephalopathy, respectively. We demonstrated that female CDKL5-mutated iPSCs maintain X-chromosome inactivation and clones express either the mutant CDKL5 allele or the wild-type allele that serve as an ideal experimental control. Array CGH indicates normal isogenic molecular karyotypes without detection of de novo CNVs in the CDKL5-mutated iPSCs. Furthermore, the iPS cells can be differentiated into neurons and are thus suitable to model disease pathogenesis in vitro.

  11. Host adaptation of bovine Staphylococcus aureus seems associated with bacteriological cure after lactational antimicrobial treatment

    NARCIS (Netherlands)

    Borne, van den B.H.P.; Nielen, M.; Schaik, van G.; Melchior, M.B.; Lam, T.J.G.M.; Zadoks, R.N.

    2010-01-01

    Staphylococcus aureus causes a wide range of diseases in multiple species. Some sequence types (ST) are observed in a variety of hosts, whereas other strains are mainly associated with bovine mastitis, suggesting host adaptation. We propose that host adaptation of Staph. aureus may influence

  12. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  13. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  14. Validation of the Spanish version of the Irrational Procrastination Scale (IPS.

    Directory of Open Access Journals (Sweden)

    Georgina Guilera

    Full Text Available The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS. The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64. Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  15. CMT: a constrained multi-level thresholding approach for ChIP-Seq data analysis.

    Directory of Open Access Journals (Sweden)

    Iman Rezaeian

    Full Text Available Genome-wide profiling of DNA-binding proteins using ChIP-Seq has emerged as an alternative to ChIP-chip methods. ChIP-Seq technology offers many advantages over ChIP-chip arrays, including but not limited to less noise, higher resolution, and more coverage. Several algorithms have been developed to take advantage of these abilities and find enriched regions by analyzing ChIP-Seq data. However, the complexity of analyzing various patterns of ChIP-Seq signals still needs the development of new algorithms. Most current algorithms use various heuristics to detect regions accurately. However, despite how many formulations are available, it is still difficult to accurately determine individual peaks corresponding to each binding event. We developed Constrained Multi-level Thresholding (CMT, an algorithm used to detect enriched regions on ChIP-Seq data. CMT employs a constraint-based module that can target regions within a specific range. We show that CMT has higher accuracy in detecting enriched regions (peaks by objectively assessing its performance relative to other previously proposed peak finders. This is shown by testing three algorithms on the well-known FoxA1 Data set, four transcription factors (with a total of six antibodies for Drosophila melanogaster and the H3K4ac antibody dataset.

  16. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  17. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  18. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  19. Validation of the Spanish version of the Irrational Procrastination Scale (IPS)

    Science.gov (United States)

    Guilera, Georgina; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18–77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population. PMID:29304119

  20. Validation of the Spanish version of the Irrational Procrastination Scale (IPS).

    Science.gov (United States)

    Guilera, Georgina; Barrios, Maite; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  1. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    Energy Technology Data Exchange (ETDEWEB)

    Junqing, Guo; Liu, Chen; Hongwu, Ai; Jiannian, Jing; Jiyong, Zhou; Chuyu, Zhang; Shangyou, You

    2004-07-23

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-{gamma} inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V{sub H} region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo.

  2. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    International Nuclear Information System (INIS)

    Guo Junqing; Chen Liu; Ai Hongwu; Jing Jiannian; Zhou Jiyong; Zhang Chuyu; You Shangyou

    2004-01-01

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-γ inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V H region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo

  3. Benefit-Cost Analysis of Integrated Paratransit Systems : Volume 4. Issues in Community Acceptance and IP Implementation.

    Science.gov (United States)

    1979-09-01

    The report describes various factors which influence community acceptance of integrated paratransit (IP) systems. In order to fully explore past events in those communities which have already accepted IP, a case study approach has been used. Seven we...

  4. Limitations and possibilities of low cell number ChIP-seq

    Directory of Open Access Journals (Sweden)

    Gilfillan Gregor D

    2012-11-01

    Full Text Available Abstract Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP, we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells, and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance.

  5. Optimal use of tandem biotin and V5 tags in ChIP assays

    Directory of Open Access Journals (Sweden)

    Krpic Sanja

    2009-02-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP assays coupled to genome arrays (Chip-on-chip or massive parallel sequencing (ChIP-seq lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes.

  6. Optimal use of tandem biotin and V5 tags in ChIP assays

    Science.gov (United States)

    Kolodziej, Katarzyna E; Pourfarzad, Farzin; de Boer, Ernie; Krpic, Sanja; Grosveld, Frank; Strouboulis, John

    2009-01-01

    Background Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes. PMID:19196479

  7. Guidelines for Hosted Payload Integration

    Science.gov (United States)

    2014-06-06

    reduces risk. Need to consider mass simulator to protect host launch window. Average Payload Power Both BOL and EOL . Host must consider orbit...acceptance testing. Peak Payload Power Both BOL and EOL . Host must consider orbit constraints. Typically driven by Payload operations but must...post-retirement failure might cause damage to the Spacecraft Host or its payloads. Safe conditions at EOL should consider thermal and radiation

  8. Managing the PSTN transformation a blueprint for a successful migration to IP-based networks

    CERN Document Server

    Dornheim, Sandra

    2015-01-01

    While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the boo

  9. Msd1/SSX2IP-dependent microtubule anchorage ensures spindle orientation and primary cilia formation

    OpenAIRE

    Hori, Akiko; Ikebe, Chiho; Tada, Masazumi; Toda, Takashi

    2014-01-01

    Anchoring microtubules to the centrosome is critical for cell geometry and polarity, yet the molecular mechanism remains unknown. Here we show that the conserved human Msd1/SSX2IP is required for microtubule anchoring. hMsd1/SSX2IP is delivered to the centrosome in a centriolar satellite-dependent manner and binds the microtubule-nucleator ?-tubulin complex. hMsd1/SSX2IP depletion leads to disorganised interphase microtubules and misoriented mitotic spindles with reduced length and intensity....

  10. Thermostability of IFN-γ and IP-10 release assays for latent infection with Mycobacterium tuberculosis

    DEFF Research Database (Denmark)

    Blauenfeldt, Thomas; Wagner, Dirk; Aabye, Martine Grosos

    2016-01-01

    accuracy of IP-10 release assay and IGRAs. RESULTS: We included 65 patients with confirmed pulmonary tuberculosis and 160 healthy controls from 6 European centres collaborating in the TBnet. In patients, IP-10 responses increased 1.07 (IQR 0.90-1.36) fold and IFN-γ responses decreased 0.88 (IQR 0......INTRODUCTION: Interferon-γ (IFN-γ) inducible protein 10kD (IP-10) and IFN-γ release assays (IGRAs) are immunodiagnostic tests aiming to identify the presence of specific cellular immune responses, interpreted as markers for latent infection with Mycobacterium tuberculosis. Incubation at higher...

  11. Triazolophostins: a library of novel and potent agonists of IP3 receptors

    OpenAIRE

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin William; Sureshan, Kana M

    2015-01-01

    IP3 receptors are channels that mediate the release of Ca2+ from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of sy...

  12. HostPhinder: A Phage Host Prediction Tool

    Directory of Open Access Journals (Sweden)

    Julia Villarroel

    2016-05-01

    Full Text Available The current dramatic increase of antibiotic resistant bacteria has revitalised the interest in bacteriophages as alternative antibacterial treatment. Meanwhile, the development of bioinformatics methods for analysing genomic data places high-throughput approaches for phage characterization within reach. Here, we present HostPhinder, a tool aimed at predicting the bacterial host of phages by examining the phage genome sequence. Using a reference database of 2196 phages with known hosts, HostPhinder predicts the host species of a query phage as the host of the most genomically similar reference phages. As a measure of genomic similarity the number of co-occurring k-mers (DNA sequences of length k is used. Using an independent evaluation set, HostPhinder was able to correctly predict host genus and species for 81% and 74% of the phages respectively, giving predictions for more phages than BLAST and significantly outperforming BLAST on phages for which both had predictions. HostPhinder predictions on phage draft genomes from the INTESTI phage cocktail corresponded well with the advertised targets of the cocktail. Our study indicates that for most phages genomic similarity correlates well with related bacterial hosts. HostPhinder is available as an interactive web service [1] and as a stand alone download from the Docker registry [2].

  13. Comparison of Integer Programming (IP) Solvers for Automated Test Assembly (ATA). Research Report. ETS RR-15-05

    Science.gov (United States)

    Donoghue, John R.

    2015-01-01

    At the heart of van der Linden's approach to automated test assembly (ATA) is a linear programming/integer programming (LP/IP) problem. A variety of IP solvers are available, ranging in cost from free to hundreds of thousands of dollars. In this paper, I compare several approaches to solving the underlying IP problem. These approaches range from…

  14. Blockade of IP[subscript 3]-Mediated SK Channel Signaling in the Rat Medial Prefrontal Cortex Improves Spatial Working Memory

    Science.gov (United States)

    Brennan, Avis R.; Dolinsky, Beth; Vu, Mai-Anh T.; Stanley, Marion; Yeckel, Mark F.; Arnsten, Amy F. T.

    2008-01-01

    Planning and directing thought and behavior require the working memory (WM) functions of prefrontal cortex. WM is compromised by stress, which activates phosphatidylinositol (PI)-mediated IP[subscript 3]-PKC intracellular signaling. PKC overactivation impairs WM operations and in vitro studies indicate that IP[subscript 3] receptor (IP[subscript…

  15. Functional role of EF-hands 3 and 4 in membrane-binding of KChIP1

    Indian Academy of Sciences (India)

    Prakash

    type KChIP1, truncated KChIP1 exhibited lower lipid-binding capability. Compared with wild-type KChIP1, increasing membrane permeability by the use of digitonin caused a marked .... with sonication, the supernatant (soluble protein fractions).

  16. Crowdsourcing Disease Biomarker Discovery Research: The IP4IC Study.

    Science.gov (United States)

    Chancellor, Michael B; Bartolone, Sarah N; Veerecke, Andrew; Lamb, Laura E

    2018-05-01

    Biomarker discovery is limited by readily assessable, cost efficient human samples available in large numbers that represent the entire heterogeneity of the disease. We developed a novel, active participation crowdsourcing method to determine BP-RS (Bladder Permeability Defect Risk Score). It is based on noninvasive urinary cytokines to discriminate patients with interstitial cystitis/bladder pain syndrome who had Hunner lesions from controls and patients with interstitial cystitis/bladder pain syndrome but without Hunner lesions. We performed a national crowdsourcing study in cooperation with the Interstitial Cystitis Association. Patients answered demographic, symptom severity and urinary frequency questionnaires on a HIPAA (Health Insurance Portability and Accountability Act) compliant website. Urine samples were collected at home, stabilized with a preservative and sent to Beaumont Hospital for analysis. The expression of 3 urinary cytokines was used in a machine learning algorithm to develop BP-RS. The IP4IC study collected a total of 448 urine samples, representing 153 patients (147 females and 6 males) with interstitial cystitis/bladder pain syndrome, of whom 54 (50 females and 4 males) had Hunner lesions. A total of 159 female and 136 male controls also participated, who were age matched. A defined BP-RS was calculated to predict interstitial cystitis/bladder pain syndrome with Hunner lesions or a bladder permeability defect etiology with 89% validity. In this novel participation crowdsourcing study we obtained a large number of urine samples from 46 states, which were collected at home, shipped and stored at room temperature. Using a machine learning algorithm we developed BP-RS to quantify the risk of interstitial cystitis/bladder pain syndrome with Hunner lesions, which is indicative of a bladder permeability defect etiology. To our knowledge BP-RS is the first validated urine biomarker assay for interstitial cystitis/bladder pain syndrome and one of the

  17. Acceptance probability of IP-MCMC-PF: revisited

    NARCIS (Netherlands)

    Iglesias Garcia, Fernando; Bocquel, Melanie; Mandal, Pranab K.; Driessen, Hans

    2015-01-01

    Tracking of multiple objects via particle filtering faces the difficulty of dealing effectively with high dimensional state spaces. One efficient solution consists of integrating Markov chain Monte Carlo (MCMC) sampling at the core of the particle filter. To accomplish such integration, a few

  18. Analysis of Mobility and Sharing of WSNs By IP Applications

    NARCIS (Netherlands)

    Bijwaard, D.; Havinga, Paul J.M.; Eertink, E.H.; Eertink, Henk

    2011-01-01

    Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe

  19. The perfect host: a mouse host embryo facilitating more efficient germ line transmission of genetically modified embryonic stem cells.

    Directory of Open Access Journals (Sweden)

    Robert A Taft

    Full Text Available There is a continual need to improve efficiency in creating precise genetic modifications in mice using embryonic stem cells (ESCs. We describe a novel approach resulting in 100% germline transmission from competent injected ESCs. We developed an F1 mouse host embryo (Perfect Host, PH that selectively ablates its own germ cells via tissue-specific induction of diphtheria toxin. This approach allows competent microinjected ESCs to fully dominate the germline, eliminating competition for this critical niche in the developing and adult animal. This is in contrast to conventional methods, where competition from host germ cells results in offspring derived from host cells and ESCs, necessitating extensive breeding of chimeras and genotyping to identify germline. The germline transmission process is also complicated by variability in the actual number of ESCs that colonize the germline niche and the proportion that are germline competent. To validate the PH approach we used ESC lines derived from 129 F1, BALB/cByJ, and BTBR backgrounds as well as an iPS line. Resulting chimeric males produced 194 offspring, all paternally derived from the introduced stem cells, with no offspring being derived from the host genome. We further tested this approach using eleven genetically modified C57BL/6N ESC lines (International Knockout Mouse Consortium. ESC germline transmission was observed in 9/11 (82% lines using PH blastocysts, compared to 6/11 (55% when conventional host blastocysts were used. Furthermore, less than 35% (83/240 of mice born in the first litters from conventional chimeras were confirmed to be of ESC-origin. By comparison, 100% (137/137 of the first litter offspring of PH chimeras were confirmed as ESC-derived. Together, these data demonstrate that the PH approach increases the probability of germline transmission and speeds the generation of ESC derived animals from chimeras. Collectively, this approach reduces the time and costs inherent in the

  20. Natal Host Plants Can Alter Herbivore Competition.

    Science.gov (United States)

    Pan, Huipeng; Preisser, Evan L; Su, Qi; Jiao, Xiaoguo; Xie, Wen; Wang, Shaoli; Wu, Qingjun; Zhang, Youjun

    2016-01-01

    Interspecific competition between herbivores is widely recognized as an important determinant of community structure. Although researchers have identified a number of factors capable of altering competitive interactions, few studies have addressed the influence of neighboring plant species. If adaptation to/ epigenetic effects of an herbivore's natal host plant alter its performance on other host plants, then interspecific herbivore interactions may play out differently in heterogeneous and homogenous plant communities. We tested wether the natal host plant of a whitefly population affected interactions between the Middle-east Asia Minor 1 (MEAM1) and Mediterranean (MED) cryptic species of the whitefly Bemisia tabaci by rearing the offspring of a cabbage-derived MEAM1 population and a poinsettia-derived MED population together on three different host plants: cotton, poinsettia, and cabbage. We found that MED dominated on poinsettia and that MEAM1 dominated on cabbage, results consistent with previous research. MED also dominated when reared with MEAM1 on cotton, however, a result at odds with multiple otherwise-similar studies that reared both species on the same natal plant. Our work provides evidence that natal plants affect competitive interactions on another plant species, and highlights the potential importance of neighboring plant species on herbivore community composition in agricultral systems.

  1. The Drosophila melanogaster host model

    Science.gov (United States)

    Igboin, Christina O.; Griffen, Ann L.; Leys, Eugene J.

    2012-01-01

    The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen–host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial–host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis–host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed. PMID:22368770

  2. The Drosophila melanogaster host model

    Directory of Open Access Journals (Sweden)

    Christina O. Igboin

    2012-02-01

    Full Text Available The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen–host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial–host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis–host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed.

  3. The Drosophila melanogaster host model.

    Science.gov (United States)

    Igboin, Christina O; Griffen, Ann L; Leys, Eugene J

    2012-01-01

    The deleterious and sometimes fatal outcomes of bacterial infectious diseases are the net result of the interactions between the pathogen and the host, and the genetically tractable fruit fly, Drosophila melanogaster, has emerged as a valuable tool for modeling the pathogen-host interactions of a wide variety of bacteria. These studies have revealed that there is a remarkable conservation of bacterial pathogenesis and host defence mechanisms between higher host organisms and Drosophila. This review presents an in-depth discussion of the Drosophila immune response, the Drosophila killing model, and the use of the model to examine bacterial-host interactions. The recent introduction of the Drosophila model into the oral microbiology field is discussed, specifically the use of the model to examine Porphyromonas gingivalis-host interactions, and finally the potential uses of this powerful model system to further elucidate oral bacterial-host interactions are addressed.

  4. Host genetics affect microbial ecosystems via host immunity.

    Science.gov (United States)

    El Kafsi, Hela; Gorochov, Guy; Larsen, Martin

    2016-10-01

    Genetic evolution of multicellular organisms has occurred in response to environmental challenges, including competition for nutrients, climate change, physical and chemical stressors, and pathogens. However, fitness of an organism is dependent not only on defense efficacy, but also on the ability to take advantage of symbiotic organisms. Indeed, microbes not only encompass pathogenicity, but also enable efficient nutrient uptake from diets nondegradable by the host itself. Moreover, microbes play important roles in the development of host immunity. Here we review associations between specific host genes and variance in microbiota composition and compare with interactions between microbes and host immunity. Recent genome-wide association studies reveal that symbiosis between host and microbiota is the exquisite result of genetic coevolution. Moreover, a subset of microbes from human and mouse microbiota have been identified to interact with humoral and cellular immunity. Interestingly, microbes associated with both host genetics and host immunity are taxonomically related. Most involved are Bifidobacterium, Lactobacillus, and Akkermansia, which are dually associated with both host immunity and host genetics. We conclude that future therapeutics targeting microbiota in the context of chronic inflammatory diseases need to consider both immune and genetic host features associated with microbiota homeostasis.

  5. Input and Tracking of Continued Education Units and Qualification Data for the Information Professional (IP) Community

    National Research Council Canada - National Science Library

    Beard, LaShandra

    2004-01-01

    .... This research includes the training needs of all personnel within the IP community, from users to supervisors to executive-level managers extending to include designated sponsors/mentors and external...

  6. Computational Methods for ChIP-seq Data Analysis and Applications

    KAUST Repository

    Ashoor, Haitham

    2017-01-01

    four main challenges. First, I address the problem of detecting histone modifications from ChIP-seq cancer samples. The presence of copy number variations (CNVs) in cancer samples results in statistical biases that lead to inaccurate predictions when

  7. Research on TCP/IP network communication based on Node.js

    Science.gov (United States)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  8. Analysis of Voice Quality Problems of Voice Over Internet Protocol (VoIP)

    National Research Council Canada - National Science Library

    Tasyumruk, Lutfullah

    2003-01-01

    .... Additionally, the emergence of 3rd Generation (3G) cellular technology which offers high bandwidth will result in the convergence of the Internet and the cellular networks which will further stimulate the growth of VoIP...

  9. Feasibility Study of VoIP Integration into the MYSEA Environment

    National Research Council Canada - National Science Library

    Tse, Lily

    2005-01-01

    .... VoIP is widely implemented with H.323 and Session Initiation Protocol (SIP) standards. However, both protocols are poorly designed for networks with common security solutions such as firewalls and Network Address Translation...

  10. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  11. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  12. Sate-of-the-art IP switching router architecture using SFQ technology

    International Nuclear Information System (INIS)

    Miyaho, N.; Miyahara, K.; Yamazaki, A.

    2006-01-01

    Taking the recent trend of rapid IP traffic increasing and QoS in the Internet into account, we propose an innovative IP router architecture from the viewpoint of minimum switching delay, switching capacity, QoS assurance for the next generation Internet services. We examined the IP router performance using superconductivity device simulator (WinS) assuming the future-generation Nb junction process and confirmed more than 300 GHz clock operation. For the evaluation of a novel IP switch architecture, we effectively apply the SFQ circuits using Josephson junctions to an extremely restricted function block in the switching node and a conventional semiconductor technology is also applied for the rest parts of the other function blocks inside it

  13. New approach in subjective and objective speech transmission quality measurement in TCP/IP networks

    International Nuclear Information System (INIS)

    Souček, Pavel; Slavata, Oldřich; Holub, Jan

    2015-01-01

    This paper deals with problems of speech transmission quality measurement in modern telecommunication networks. It focuses on problems caused by specific types of distortions and errors caused present in transmissions using TCP/IP networks

  14. [Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University].

    Science.gov (United States)

    Karpishchenko, S A

    This article is designed to report the results of the analysis ofacademic, scientific, and clinical activities of the Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University.

  15. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie R. Watzlaf

    2012-06-01

    Full Text Available Consumer-based, free Voice and video over the Internet Protocol (VoIP software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 

  16. [Microstructure and mechanical property of a new IPS-Empress 2 dental glass-ceramic].

    Science.gov (United States)

    Luo, Xiao-ping; Watts, D C; Wilson, N H F; Silsons, N; Cheng, Ya-qin

    2005-03-01

    To investigate the microstructure and mechanical properties of a new IPS-Empress 2 dental glass-ceramic. AFM, SEM and XRD were used to analyze the microstructure and crystal phase of IPS-Empress 2 glass-ceramic. The flexural strength and fracture toughness were tested using 3-point bending method and indentation method respectively. IPS-Empress 2 glass-ceramic mainly consisted of lithium disilicate crystal, lithium phosphate and glass matrix, which formed a continuous interlocking structure. The crystal phases were not changed before and after hot-pressed treatment. AFM showed nucleating agent particles of different sizes distributed on the highly polished ceramic surface. The strength and fracture toughness were 300 MPa and 3.1 MPam(1/2). The high strength and fracture toughness of IPS-Empress 2 glass ceramic are attributed to the fine lithium disilicate crystalline, interlocking microstructure and crack deflection.

  17. Applying the systems engineering approach to video over IP projects : workshop.

    Science.gov (United States)

    2011-12-01

    In 2009, the Texas Transportation Institute produced for the Texas Department of Transportation a document : called Video over IP Design Guidebook. This report summarizes an implementation of that project in the : form of a workshop. The workshop was...

  18. Determination of alpha particle detection efficiency of an imaging plate (IP) detector

    International Nuclear Information System (INIS)

    Rahman, N.M; Iida, Takao; Yamazawa, Hiromi; Moriizumi, Jun

    2006-01-01

    In order to determine the detection efficiency of the imaging plate (IP) detector, the true radioactivity of the alpha particles, which sampled in the collection media, should be known. The true radioactivity could be accurately predicted with the help of the reference alpha spectrometer measurement. The detection efficiency calculated for the IP was estimated with the theoretical curve and the experimental data. It is assumed that the air sample contained the decay products of both 222 Rn and 220 Rn series, the most significant sources of alpha particles. The present study estimated the detection efficiency of the IP as 39.3% with an uncertainty of 2.9 that is well enough to confirm the future use of the IP as a radiation detector. Experimental materials and methods are described. (S.Y.)

  19. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  20. VoIP Quality Measurements in a Multilevel Secure (MLS) Environment

    National Research Council Canada - National Science Library

    Adams, Jr, Coy M

    2008-01-01

    Voice over Internet Protocol (VoIP) is growing in popularity in the civilian and military communities due to its low cost and the management advantages it offers over traditional Public Switched Telephone Networks (PSTN) phone systems...