Hofacker Ivo L
Full Text Available Abstract Background The accessibility of RNA binding motifs controls the efficacy of many biological processes. Examples are the binding of miRNA, siRNA or bacterial sRNA to their respective targets. Similarly, the accessibility of the Shine-Dalgarno sequence is essential for translation to start in prokaryotes. Furthermore, many classes of RNA binding proteins require the binding site to be single-stranded. Results We introduce a way to compute the accessibility of all intervals within an RNA sequence in (n3 time. This improves on previous implementations where only intervals of one defined length were computed in the same time. While the algorithm is in the same efficiency class as sampling approaches, the results, especially if the probabilities get small, are much more exact. Conclusions Our algorithm significantly speeds up methods for the prediction of RNA-RNA interactions and other applications that require the accessibility of RNA molecules. The algorithm is already available in the program RNAplfold of the ViennaRNA package.
Zheng, Jun; Ansari, Nirwan
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
Zheng, Jun; Ansari, Nirwan
Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 h2>Backgroundh2> With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access
Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio
Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.
Travençolo, B. A. N.; da F. Costa, L.
This Letter describes a method for the quantification of the diversity of non-linear dynamics in complex networks as a consequence of self-avoiding random walks. The methodology is analyzed in the context of theoretical models and illustrated with respect to the characterization of the accessibility in urban streets.
Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J
The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology.
Full Text Available The optical fibre is the highest quality transmission mediumfor broadband services, and therefore the new access cablenetwork has to be realized to the greatest extent and as closeas possible to the subscriber by means of the optical fibre cables,in accordance with the possibilities of the telecommunicationoperator. The development of digital technology in commutations,supported by the increasingly powerful systems of processorcontrol, development of optical communications andtransport technologies in the framework of SDH concepts, arereflected on the access telecommunication networks of the urbanareas. Urban areas are the most profitable regions in telecommunications.In planning of urban optical networks the fact should betaken as a guideline that only a well-organised urban networkwill allow high quality of service provision of the leased cablesto the end points of business customers.Business customers have greater requirements for the networkreliability, flexibility and maintainability, for the sake ofundisturbed telecommunication traffic.The optical medium based technology- FITL (fiber in theloop, provides almost limitless upgrading of the system regardingthe transmission bandwidths, as well as adaptation to allthe future customers' requirements.Considering the increase in the price of installing the coppercables, the prices of electronics and optical components arecontinuously falling. The application of the optical medium isincreasing and becoming more cost-effective, and due to higherreliability of the optical transmission systems the maintenancecosts are reduced.
Kelley, Jay; Wessels, Denzil
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step
Lazaro, J.A; Polo, V.; Schrenk, B.
Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions in ...
Park, Jaeok; Van Der Schaar, Mihaela
We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that u...
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi
Falch, Morten; Henten, Anders
The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...
Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso
Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect of...
Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang
In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...
National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...
Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.
Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.
Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.
This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this
is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...
di Crescenzo, Giovanni; Lipton, Richard J.
We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.
Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base......, and for the analyzed scenario it can assure synchronization on the nanosecond level, fulfilling mobile network requirements. Furthermore, mechanisms to lower delay and jitter have been identified, namely: source scheduling and preemption. An innovative source scheduling scheme which can minimize jitter has been...
Wagner, Christoph; Eiselt, Michael; Grobe, Klaus
WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...
Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...
Tajbakhsh, Shahriar Etemadi; Coon, Justin P.; Simmons, David E.
In a wide range of complex networks, the links between the nodes are temporal and may sporadically appear and disappear. This temporality is fundamental to analyzing the formation of paths within such networks. Moreover, the presence of the links between the nodes is a random process induced by nature in many real-world networks. In this paper, we study random temporal networks at a microscopic level and formulate the probability of accessibility from a node i to a node j after a certain number of discrete time units T . While solving the original problem is computationally intractable, we provide an upper and two lower bounds on this probability for a very general case with arbitrary time-varying probabilities of the links' existence. Moreover, for a special case where the links have identical probabilities across the network at each time slot, we obtain the exact probability of accessibility between any two nodes. Finally, we discuss scenarios where the information regarding the presence and absence of links is initially available in the form of time duration (of presence or absence intervals) continuous probability distributions rather than discrete probabilities over time slots. We provide a method for transforming such distributions to discrete probabilities, which enables us to apply the given bounds in this paper to a broader range of problem settings.
Full Text Available The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2 encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
Bojanovic, Klara; Long, Katherine
chemicals and has a potential to be used as an efficient cell factory for various products. P. putida KT2240 is a genome-sequenced strain and a well characterized pseudomonad. Our major aim is to identify small RNA molecules (sRNAs) and their regulatory networks. A previous study has identified 37 sRNAs...... in this strain, while in other pseudomonads many more sRNAs have been found so far.P. putida KT2440 has been grown in different conditions which are likely to be encountered in industrial fermentations with the aim of using sRNAs for generation of improved cell factories. For that, cells have been grown in LB...... and harvested in different growth phases, as well as osmotic, membrane and oxidative stress conditions. RNA sequencing data has been analysed with the open source software system Rockhopper, and it has revealed over 180 putative sRNAs. Most of them (86%) seem to be novel and uncharacterized. The majority...
Full Text Available One of the critical issues for broadband accesss is how to test the access network infrastructure and quality of optical signal. The installation and powering up of an optical fiber access networks requires measurement techniques for verifying the link has been configured properly and that its constituent components are functioning correctly. Maintenance functions for a broadband optical access network are classified in two main categories: preventive maintenance and post-fault maintenance. The first one consists of: surveillance (to detect degradation in optical fiber components, or any other anomalous condition not preventing the signal transmission,, testing (to measure and locate any detected degradation or anomalous condition and control (fiber identification and fiber transfer to allow the testing of the link.. In turn second one consisits of: surveillance (to detect alarms or trouble reports and activate a procedure for restoration, testing (to locate the fault and/or verify the carrier performances after the restoration and remedy (fiber identification, fiber repair or fiber transfer to restore the link.
Wong, Elaine; Amaya Fernández, Ferney Orlando; Tafur Monroy, Idelfonso
The merging of access and metro networks has been proposed as a solution to lower the unit cost of customer bandwidth. This paper reviews some of the recent advances and challenges in extended-reach optical access networks....
Wang, Wayne; Zou, Chen; Luo, Wenyi
This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.
Integrating diff erent wireless access technologies to provide users with data service will definitely result in a heterogeneous radio access network. Moving from one wireless domain to another causes traffic being switched from one interface to another. This results in a reestablishment of TCP c....... This paper provides a possible solution architecture and research direction for vertical handover problem by leveraging the concept of software - defined networking together with existing proposals....... connection due to the change of the assigned IP address. Frequent handovers may force users to perform re - logins or application restarts, which undoubtedly jeopardize the quality of experience. This vertical handover problem will not be trivial as mobility is becomin g a dominant factor in communications...
Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.
One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.
Bacîş Vasile, Irina Bristena
The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.
Rossebo, Judith; Ronan, John; Walsh, Kristian
Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user requirements such as QoS, mobility, cost and availability. These issues place requirements on authentication for network access, with a need for mutual authentication of the residential gateway (RG) to the local access point (LAP). The EU-IST project TORRENT is building a testbed providing for multi-service residential access...
Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part
Meng, Yijun; Shao, Chaogang; Chen, Ming
Current achievements in plant microRNA (miRNA) research area are inspiring. Molecular cloning and functional elucidation have greatly advanced our understanding of this small RNA species. As one of the ultimate goals, many research efforts devoted to draw a comprehensive view of miRNA-mediated gene regulatory networks in plants. Numerous bioinformatics tools competent for network analysis have been available. However, the most important point for network construction is to obtain reliable analytical results based on sufficient experimental data. Here, we introduced a general workflow to retrieve and analyze the desired data sets that serve as the cornerstones for network construction. For the upstream analyses of miRNA genes, the sequence feature of miRNA promoters should be characterized. And, regulatory relationships between transcription factors (TFs) and miRNA genes need to be investigated. For the downstream part, we emphasized that the high-throughput degradome sequencing data were especially useful for genuine miRNA-target pair identification. Functional characterization of the miRNA targets is essential to provide deep biological insights into certain miRNA-mediated pathways. For miRNAs themselves, studies on their organ- or tissue-specific expression patterns and the mechanism of self-regulation were discussed. Besides, exhaustive literature mining is required to further support or improve the established networks. It is desired that the introduced framework for miRNA-mediated network construction is timely and useful and could inspire more research efforts in the miRNA research area.
Junge, Alexander; Refsgaard, Jan Christian; Garde, Christian
is challenging due to data heterogeneity. Here, we present a database of ncRNA-RNA and ncRNA-protein interactions and its integration with the STRING database of protein-protein interactions. These ncRNA associations cover four organisms and have been established from curated examples, experimental data...... web interface and all interaction data can be downloaded.......Protein association networks can be inferred from a range of resources including experimental data, literature mining and computational predictions. These types of evidence are emerging for non-coding RNAs (ncRNAs) as well. However, integration of ncRNAs into protein association networks...
validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software-Defined Networking ( SDN ...testing real-world applications. Most importantly, our simulation serves as a template for implementing a unified MAC layer network using SDN . SDN ...is a network program with a programmable, centralized control plane.4 SDN protocols can be used to mediate access between nodes of an HN. The method
The Broadband photonics (BBP) project under the Freeband consortium of projects investigated the design of a dynamically reconfigurable photonic access network. Access networks form a key link in ensuring optimal bandwidth to the end user without which any improvements deeper in the network in the
Full Text Available The article introduces against technical defects of traditional network access control system, detail NAC, NAP, UAC and TNC four kinds of new network security access technology, and this article analyzes and compares them. Security framework for wireless sensor networks SPINS defines the mechanism and algorithm of complete and effective in confidentiality, point-to-point message authentication, integrity, authentication, broadcast authentication.
Mandjes, M.R.H.; Mitra, Debasis; Scheinhardt, Willem R.W.
At the access to networks, in contrast to the core, distances and feedback delays, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty users. The users
M.R.H. Mandjes (Michel); D. Mitra; W.R.W. Scheinhardt (Werner)
htmlabstractAt the access to networks, in contrast to the core, distances and feedback delay s, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty
Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.
The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.
Popovska Avramova, Andrijana; Iversen, Villy Bæk
deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption......Mobile operators are moving towards sharing network capacity in order to reduce capital and operational expenditures, while meeting the increasing demand for mobile broadband data services. Radio access network sharing is a promising technique that leads to reduced number of physical base station...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...
Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted
Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in......, network delay characterization) and specific requirements on mismatch probability, traffic overhead, and access delay. Finally, the analysis is applied to the use-case of context-sensitive service discovery....
Roy, R.; Manhoudt, Gert; van Etten, Wim
We discuss service delivery aspects in a reconfigurable photonic access network. The network is viewed as a stack of logical PONs in which a DWDM overlay is used over TDM PONs operating in their native format. The use of optical routers in the network allows for a dynamic change in the network
Liu, Bing; Li, Jiuyong; Tsykin, Anna; Liu, Lin; Gaur, Arti B; Goodall, Gregory J
microRNAs (miRNAs) regulate target gene expression by controlling their mRNAs post-transcriptionally. Increasing evidence demonstrates that miRNAs play important roles in various biological processes. However, the functions and precise regulatory mechanisms of most miRNAs remain elusive. Current research suggests that miRNA regulatory modules are complicated, including up-, down-, and mix-regulation for different physiological conditions. Previous computational approaches for discovering miRNA-mRNA interactions focus only on down-regulatory modules. In this work, we present a method to capture complex miRNA-mRNA interactions including all regulatory types between miRNAs and mRNAs. We present a method to capture complex miRNA-mRNA interactions using Bayesian network structure learning with splitting-averaging strategy. It is designed to explore all possible miRNA-mRNA interactions by integrating miRNA-targeting information, expression profiles of miRNAs and mRNAs, and sample categories. We also present an analysis of data sets for epithelial and mesenchymal transition (EMT). Our results show that the proposed method identified all possible types of miRNA-mRNA interactions from the data. Many interactions are of tremendous biological significance. Some discoveries have been validated by previous research, for example, the miR-200 family negatively regulates ZEB1 and ZEB2 for EMT. Some are consistent with the literature, such as LOX has wide interactions with the miR-200 family members for EMT. Furthermore, many novel interactions are statistically significant and worthy of validation in the near future. This paper presents a new method to explore the complex miRNA-mRNA interactions for different physiological conditions using Bayesian network structure learning with splitting-averaging strategy. The method makes use of heterogeneous data including miRNA-targeting information, expression profiles of miRNAs and mRNAs, and sample categories. Results on EMT data sets
Full Text Available Abstract Background microRNAs (miRNAs regulate target gene expression by controlling their mRNAs post-transcriptionally. Increasing evidence demonstrates that miRNAs play important roles in various biological processes. However, the functions and precise regulatory mechanisms of most miRNAs remain elusive. Current research suggests that miRNA regulatory modules are complicated, including up-, down-, and mix-regulation for different physiological conditions. Previous computational approaches for discovering miRNA-mRNA interactions focus only on down-regulatory modules. In this work, we present a method to capture complex miRNA-mRNA interactions including all regulatory types between miRNAs and mRNAs. Results We present a method to capture complex miRNA-mRNA interactions using Bayesian network structure learning with splitting-averaging strategy. It is designed to explore all possible miRNA-mRNA interactions by integrating miRNA-targeting information, expression profiles of miRNAs and mRNAs, and sample categories. We also present an analysis of data sets for epithelial and mesenchymal transition (EMT. Our results show that the proposed method identified all possible types of miRNA-mRNA interactions from the data. Many interactions are of tremendous biological significance. Some discoveries have been validated by previous research, for example, the miR-200 family negatively regulates ZEB1 and ZEB2 for EMT. Some are consistent with the literature, such as LOX has wide interactions with the miR-200 family members for EMT. Furthermore, many novel interactions are statistically significant and worthy of validation in the near future. Conclusions This paper presents a new method to explore the complex miRNA-mRNA interactions for different physiological conditions using Bayesian network structure learning with splitting-averaging strategy. The method makes use of heterogeneous data including miRNA-targeting information, expression profiles of miRNAs and
Peternel, Blaž Kos, Andrej
Broadband access network planning strategies with techno-economic calculations are important topics, when optimal broadband network deployments are considered. This paper analyzes optimal deployment combination of digital subscriber line technologies (xDSL) and fiber to the home technologies (FTTx), following different user bandwidth demand scenarios. For this reason, optimal placement of remote digital subscriber line multiplexer (RDSLAM) is examined. Furthermore, the article also discusses the economy of investments, depending on certain investment threshold and the reach of different xDSL technologies. Finally, the difference between broadband network deployment in a characteristic urban and rural area in Republic of Slovenia, in terms of required optical cable dig length per household is shown. A tree structure network model of a traditional copper access network is introduced. A dynamic programming logic, with recursion as a basis of a tree structure examination and evaluation of optimal network elements placement is used. The tree structure network model considers several real network parameters (e. g.: copper cable lengths, user coordinates, node coordinates). The main input for the optimization is a local loop distance between each user and a candidate node for RDSLAM placement. Modelling of copper access networks with a tree structure makes new extensions in planning optimization of broadband access networks. Optimization of network elements placement has direct influence on efficiency and profitability of broadband access telecommunication networks.
Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun
In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...
Chanclou, P.; Belfqih, Z.; Charbonnier, B.; Duong, T.; Frank, F.; Genay, N.; Huchard, M.; Guignard, P.; Guillo, L.; Landousies, B.; Pizzinat, A.; Ramanitra, H.; Saliou, F.; Durel, S.; Urvoas, P.; Ouzzif, M.; Le Masson, J.
This article describes broadband optical access network evolution including high speed interfaces for fixed and mobile services. The impact of network access evolution on network architecture and transmission equipment localization on the metropolitan network is also mentioned. Some technical challenges are also discussed, namely concerning the optical extended budget, as well as the impact of access evolution on the metropolitan network. The access bit rate evolution has also an impact on the home network by the necessity of offering connectivity to customers at 1 Gbit/s, for example, over plastic optical fibre. To cite this article: P. Chanclou et al., C. R. Physique 9 (2008).
Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas
The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.
Lapointe, Christopher P; Preston, Melanie A; Wilinski, Daniel; Saunders, Harriet A J; Campbell, Zachary T; Wickens, Marvin
A single protein can bind and regulate many mRNAs. Multiple proteins with similar specificities often bind and control overlapping sets of mRNAs. Yet little is known about the architecture or dynamics of overlapped networks. We focused on three proteins with similar structures and related RNA-binding specificities-Puf3p, Puf4p, and Puf5p of S. cerevisiae Using RNA Tagging, we identified a "super-network" comprised of four subnetworks: Puf3p, Puf4p, and Puf5p subnetworks, and one controlled by both Puf4p and Puf5p. The architecture of individual subnetworks, and thus the super-network, is determined by competition among particular PUF proteins to bind mRNAs, their affinities for binding elements, and the abundances of the proteins. The super-network responds dramatically: The remaining network can either expand or contract. These strikingly opposite outcomes are determined by an interplay between the relative abundance of the RNAs and proteins, and their affinities for one another. The diverse interplay between overlapping RNA-protein networks provides versatile opportunities for regulation and evolution. © 2017 Lapointe et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Yang, Yuedong; Li, Xiaomei; Zhao, Huiying; Zhan, Jian; Wang, Jihua; Zhou, Yaoqi
As most RNA structures are elusive to structure determination, obtaining solvent accessible surface areas (ASAs) of nucleotides in an RNA structure is an important first step to characterize potential functional sites and core structural regions. Here, we developed RNAsnap, the first machine-learning method trained on protein-bound RNA structures for solvent accessibility prediction. Built on sequence profiles from multiple sequence alignment (RNAsnap-prof), the method provided robust prediction in fivefold cross-validation and an independent test (Pearson correlation coefficients, r, between predicted and actual ASA values are 0.66 and 0.63, respectively). Application of the method to 6178 mRNAs revealed its positive correlation to mRNA accessibility by dimethyl sulphate (DMS) experimentally measured in vivo (r = 0.37) but not in vitro (r = 0.07), despite the lack of training on mRNAs and the fact that DMS accessibility is only an approximation to solvent accessibility. We further found strong association across coding and noncoding regions between predicted solvent accessibility of the mutation site of a single nucleotide variant (SNV) and the frequency of that variant in the population for 2.2 million SNVs obtained in the 1000 Genomes Project. Moreover, mapping solvent accessibility of RNAs to the human genome indicated that introns, 5' cap of 5' and 3' cap of 3' untranslated regions, are more solvent accessible, consistent with their respective functional roles. These results support conformational selections as the mechanism for the formation of RNA-protein complexes and highlight the utility of genome-scale characterization of RNA tertiary structures by RNAsnap. The server and its stand-alone downloadable version are available at http://sparks-lab.org. © 2016 Yang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Basu, Mahashweta; Bhattacharyya, Nitai P.; Mohanty, P. K.
Human micro RNAs (miRNAs) target about 90% of the coding genes and form a complex regulatory network. We study the community structure of the miRNA co-target network considering miRNAs as the nodes which are connected by weighted links. The weight of link that connects a pair of miRNAs denote the total number of common transcripts targeted by that pair. We argue that the network consists of about 74 modules, quite similar to the components (or clusters) obtained earlier [Online J Bioinformatics, 10,280], indicating that the components of the miRNA co-target network are self organized in a way to maximize the modularity.
Full Text Available The evolution and adaptation of molecular populations is constrained by the diversity accessible through mutational processes. RNA is a paradigmatic example of biopolymer where genotype (sequence and phenotype (approximated by the secondary structure fold are identified in a single molecule. The extreme redundancy of the genotype-phenotype map leads to large ensembles of RNA sequences that fold into the same secondary structure and can be connected through single-point mutations. These ensembles define neutral networks of phenotypes in sequence space. Here we analyze the topological properties of neutral networks formed by 12-nucleotides RNA sequences, obtained through the exhaustive folding of sequence space. A total of 4(12 sequences fragments into 645 subnetworks that correspond to 57 different secondary structures. The topological analysis reveals that each subnetwork is far from being random: it has a degree distribution with a well-defined average and a small dispersion, a high clustering coefficient, and an average shortest path between nodes close to its minimum possible value, i.e. the Hamming distance between sequences. RNA neutral networks are assortative due to the correlation in the composition of neighboring sequences, a feature that together with the symmetries inherent to the folding process explains the existence of communities. Several topological relationships can be analytically derived attending to structural restrictions and generic properties of the folding process. The average degree of these phenotypic networks grows logarithmically with their size, such that abundant phenotypes have the additional advantage of being more robust to mutations. This property prevents fragmentation of neutral networks and thus enhances the navigability of sequence space. In summary, RNA neutral networks show unique topological properties, unknown to other networks previously described.
Aguirre, Jacobo; Buldú, Javier M.; Stich, Michael; Manrubia, Susanna C.
The evolution and adaptation of molecular populations is constrained by the diversity accessible through mutational processes. RNA is a paradigmatic example of biopolymer where genotype (sequence) and phenotype (approximated by the secondary structure fold) are identified in a single molecule. The extreme redundancy of the genotype-phenotype map leads to large ensembles of RNA sequences that fold into the same secondary structure and can be connected through single-point mutations. These ensembles define neutral networks of phenotypes in sequence space. Here we analyze the topological properties of neutral networks formed by 12-nucleotides RNA sequences, obtained through the exhaustive folding of sequence space. A total of 412 sequences fragments into 645 subnetworks that correspond to 57 different secondary structures. The topological analysis reveals that each subnetwork is far from being random: it has a degree distribution with a well-defined average and a small dispersion, a high clustering coefficient, and an average shortest path between nodes close to its minimum possible value, i.e. the Hamming distance between sequences. RNA neutral networks are assortative due to the correlation in the composition of neighboring sequences, a feature that together with the symmetries inherent to the folding process explains the existence of communities. Several topological relationships can be analytically derived attending to structural restrictions and generic properties of the folding process. The average degree of these phenotypic networks grows logarithmically with their size, such that abundant phenotypes have the additional advantage of being more robust to mutations. This property prevents fragmentation of neutral networks and thus enhances the navigability of sequence space. In summary, RNA neutral networks show unique topological properties, unknown to other networks previously described. PMID:22028856
Denney, Justin; Race, Nicholas
Content delivery network architectures are initiatives designed to support the effective delivery of continuous and discrete media to end-users. Mobile devices are now capable of exploiting services such as content delivery, but with the protocols governing the content delivery networks designed for wired networked topologies; an assessment of the impact of mobile devices on the network has never been undertaken. Wireless devices access causes significant issues in the ability of the media tr...
Full Text Available In the next generation of heterogeneous wireless networks (HWNs, a large number of different radio access technologies (RATs will be integrated into a common network. In this type of networks, selecting the most optimal and promising access network (AN is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS provisioning. This paper proposes a general scheme to solve the access network selection (ANS problem in the HWN. The proposed scheme has been used to present and design a general multicriteria software assistant (SA that can consider the user, operator, and/or the QoS view points. Combined fuzzy logic (FL and genetic algorithms (GAs have been used to give the proposed scheme the required scalability, flexibility, and simplicity. The simulation results show that the proposed scheme and SA have better and more robust performance over the random-based selection.
Noh, Haneul; Park, Charny; Park, Soojun; Lee, Young Seek; Cho, Soo Young; Seo, Hyemyung
Little is known about the relationship between miRNA and mRNA expression in Alzheimer's disease (AD) at early- or late-symptomatic stages. Sequence-based target prediction algorithms and anti-correlation profiles have been applied to predict miRNA targets using omics data, but this approach often leads to false positive predictions. Here, we applied the joint profiling analysis of mRNA and miRNA expression levels to Tg6799 AD model mice at 4 and 8 months of age using a network topology-based method. We constructed gene regulatory networks and used the PageRank algorithm to predict significant interactions between miRNA and mRNA. In total, 8 cluster modules were predicted by the transcriptome data for co-expression networks of AD pathology. In total, 54 miRNAs were identified as being differentially expressed in AD. Among these, 50 significant miRNA-mRNA interactions were predicted by integrating sequence target prediction, expression analysis, and the PageRank algorithm. We identified a set of miRNA-mRNA interactions that were changed in the hippocampus of Tg6799 AD model mice. We determined the expression levels of several candidate genes and miRNA. For functional validation in primary cultured neurons from Tg6799 mice (MT) and littermate (LM) controls, the overexpression of ARRDC3 enhanced PPP1R3C expression. ARRDC3 overexpression showed the tendency to decrease the expression of miR139-5p and miR3470a in both LM and MT primary cells. Pathological environment created by Aβ treatment increased the gene expression of PPP1R3C and Sfpq but did not significantly alter the expression of miR139-5p or miR3470a. Aβ treatment increased the promoter activity of ARRDC3 gene in LM primary cells but not in MT primary cells. Our results demonstrate AD-specific changes in the miRNA regulatory system as well as the relationship between the expression levels of miRNAs and their targets in the hippocampus of Tg6799 mice. These data help further our understanding of the function
Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip
provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...... without compromising line independency, and it can be implemented stepwise, the first step being based on a simple ring/tree topology. The double ring is used for the distribution network, ensuring 3-connectivity and making it feasible to use for connecting the base stations of the wireless network...
Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup
This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....
Full Text Available Identifying cancer subtypes is an important component of the personalised medicine framework. An increasing number of computational methods have been developed to identify cancer subtypes. However, existing methods rarely use information from gene regulatory networks to facilitate the subtype identification. It is widely accepted that gene regulatory networks play crucial roles in understanding the mechanisms of diseases. Different cancer subtypes are likely caused by different regulatory mechanisms. Therefore, there are great opportunities for developing methods that can utilise network information in identifying cancer subtypes.In this paper, we propose a method, weighted similarity network fusion (WSNF, to utilise the information in the complex miRNA-TF-mRNA regulatory network in identifying cancer subtypes. We firstly build the regulatory network where the nodes represent the features, i.e. the microRNAs (miRNAs, transcription factors (TFs and messenger RNAs (mRNAs and the edges indicate the interactions between the features. The interactions are retrieved from various interatomic databases. We then use the network information and the expression data of the miRNAs, TFs and mRNAs to calculate the weight of the features, representing the level of importance of the features. The feature weight is then integrated into a network fusion approach to cluster the samples (patients and thus to identify cancer subtypes. We applied our method to the TCGA breast invasive carcinoma (BRCA and glioblastoma multiforme (GBM datasets. The experimental results show that WSNF performs better than the other commonly used computational methods, and the information from miRNA-TF-mRNA regulatory network contributes to the performance improvement. The WSNF method successfully identified five breast cancer subtypes and three GBM subtypes which show significantly different survival patterns. We observed that the expression patterns of the features in some miRNA-TF-mRNA
Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda
To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.
Gil, J.; Read, S.
This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as
Wang, Jiayuan; Yan, Ying; Dittmann, Lars
This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...
Vishnubalaji, R; Hamam, R; Abdulla, M-H
Despite recent advances in cancer management, colorectal cancer (CRC) remains the third most common cancer and a major health-care problem worldwide. MicroRNAs have recently emerged as key regulators of cancer development and progression by targeting multiple cancer-related genes; however......, such regulatory networks are not well characterized in CRC. Thus, the aim of this study was to perform global messenger RNA (mRNA) and microRNA expression profiling in the same CRC samples and adjacent normal tissues and to identify potential miRNA-mRNA regulatory networks. Our data revealed 1273 significantly...... in cell proliferation, and migration in vitro. Concordantly, small interfering RNA-mediated knockdown of EZH2 led to similar effects on CRC cell growth in vitro. Therefore, our data have revealed several hundred potential miRNA-mRNA regulatory networks in CRC and suggest targeting relevant networks...
Popovska Avramova, Andrijana; Dittmann, Lars
Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... applications. The analysis is performed on a multipath model developed with OPNET Modeler, which is an advanced research tool that supports modeling and integration of various kinds of built-in networks....
This research examines the impact of accessibility on the growth of employment centers in the : Los Angeles Region between 1980 and 2000. There is extensive empirical documentation of : polycentricity the presence of multiple concentrations of em...
Landwehr, Carl E; Goldschlag, David M
.... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...
Junaid Qadir; Arjuna Sathiaseelan; Umar Bin Farooq; Muhammad Usama; Muhammad Ali Imran; Muhammad Shafique
Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost...
Imperatives and chal- lenges. Ad Hoc Networks, 1(1):13–64, July 2003.  I. Chlamtac and A. Faragó. Making transmission schedules immune to topology changes...P. Karn. MACA - a new channel access method for packet radio. In ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pages 134–140, 1990
Wagner, Christoph; Eiselt, Michael; Grobe, Klaus
Future wavelength division multiplexed (WDM) access networks should be as flexible as possible. One flexibility is port wavelength-agnosticism at the optical network unit (ONU) interface, achieved via tunable laser. At the same time such systems needs to be robust against crosstalk impairments...
Kardaras, Georgios; Soler, José; Dittmann, Lars
. However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...
Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun
In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analyzed and discussed. Certain applications such as home security and telemedicine are likely to require...
Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun
In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analysed and discussed. Certain applications such as home security and telemedicine are likely to require...
Linde, Peter; Wessels, Bridgette; Smallwood, Rod; Price, Lada; Noorman, Merel; Wyatt, Sally; Sondervan, Jeroen
In this report we identify and assess different options for bringing together and mobilizing relevant stakeholders in the open access arena. This builds on previous work done in the RECODE project about the open access stakeholder ecosystem, the barriers and the enablers for open access to research data as well as on the RECODE overarching policy recommendations set out in the RECODE work package 5. We have identified a sample of existing networks and organizations to determine whether they a...
Jangi, Mohini; Boutz, Paul L; Paul, Prakriti; Sharp, Phillip A
The tight regulation of splicing networks is critical for organismal development. To maintain robust splicing patterns, many splicing factors autoregulate their expression through alternative splicing-coupled nonsense-mediated decay (AS-NMD). However, as negative autoregulation results in a self-limiting window of splicing factor expression, it is unknown how variations in steady-state protein levels can arise in different physiological contexts. Here, we demonstrate that Rbfox2 cross-regulates AS-NMD events within RNA-binding proteins to alter their expression. Using individual nucleotide-resolution cross-linking immunoprecipitation coupled to high-throughput sequencing (iCLIP) and mRNA sequencing, we identified >200 AS-NMD splicing events that are bound by Rbfox2 in mouse embryonic stem cells. These "silent" events are characterized by minimal apparent splicing changes but appreciable changes in gene expression upon Rbfox2 knockdown due to degradation of the NMD-inducing isoform. Nearly 70 of these AS-NMD events fall within genes encoding RNA-binding proteins, many of which are autoregulated. As with the coding splicing events that we found to be regulated by Rbfox2, silent splicing events are evolutionarily conserved and frequently contain the Rbfox2 consensus UGCAUG. Our findings uncover an unexpectedly broad and multilayer regulatory network controlled by Rbfox2 and offer an explanation for how autoregulatory splicing networks are tuned.
Jaber, V; Zhao, Y; Lukiw, W J
RNA sequencing, DNA microfluidic array, LED-Northern, Western immunoassay and bioinformatics analysis have uncovered a small family of up-regulated human brain enriched microRNAs (miRNAs) and down-regulated messenger RNAs (mRNAs) in short post-mortem interval (PMI) sporadic Alzheimer's disease (AD) brain. At the mRNA level, a large majority of the expression of human brain genes found to be down-regulated in sporadic AD appears to be a consequence of an up-regulation of a specific group of NF-kB-inducible microRNAs (miRNAs). This group of up-regulated miRNAs - including miRNA-34a and miRNA-146a - has strong, energetically favorable, complimentary RNA sequences in the 3' untranslated regions (3'-UTR) of their target mRNAs which ultimately drive the down-regulation in the expression of certain essential brain genes. Interestingly, just 2 significantly up-regulated miRNAs - miRNA-34a and miRNA-146a - appear to down-regulate mRNA targets involved in synaptogenesis (SHANK3), phagocytosis deficits and tau pathology (TREM2), inflammation (CFH; complement factor H) and amyloidogenesis (TSPAN12), all of which are distinguishing pathological features characteristic of middle-to-late stage AD neuropathology. This paper reports the novel finding of parallel miRNA-34a and miRNA-146a up-regulation in sporadic AD hippocampal CA1 RNA pools and proposes an altered miRNA-mRNA coupled signaling network in AD, much of which is supported by current experimental findings in the recent literature.
Full Text Available The regulation of transcriptome expression level is a complex process involving multiple-level interactions among molecules such as protein coding RNA (mRNA, long noncoding RNA (lncRNA, and microRNA (miRNA, which are essential for the transcriptome stability and maintenance and regulation of body homeostasis. The availability of multilevel expression data enables a comprehensive view of the regulatory network. In this study, we analyzed the coding and noncoding gene expression profiles of 301 patients with uterine corpus endometrial carcinoma (UCEC. A new method was proposed to construct a genome-wide integrative network based on variance inflation factor (VIF regression method. The cross-regulation relations of mRNA, lncRNA, and miRNA were then selected based on clique-searching algorithm from the network, when any two molecules of the three were shown as interacting according to the integrative network. Such relation, which we call the mRNA-lncRNA-miRNA triplet, demonstrated the complexity in transcriptome regulation process. Finally, six UCEC-related triplets were selected in which the mRNA participates in endometrial carcinoma pathway, such as CDH1 and TP53. The multi-type RNAs are proved to be cross-regulated as to each of the six triplets according to literature. All the triplets demonstrated the association with the initiation and progression of UCEC. Our method provides a comprehensive strategy for the investigation of transcriptome regulation mechanism.
Eldridge, John M.; Olsberg, Ronald R.
This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.
Lev-Ari, Shiri; Shao, Zeshu
People learn language from their social environment. As individuals differ in their social networks, they might be exposed to input with different lexical distributions, and these might influence their linguistic representations and lexical choices. In this article we test the relation between linguistic performance and 3 social network properties that should influence input variability, namely, network size, network heterogeneity, and network density. In particular, we examine how these social network properties influence lexical prediction, lexical access, and lexical use. To do so, in Study 1, participants predicted how people of different ages would name pictures, and in Study 2 participants named the pictures themselves. In both studies, we examined how participants' social network properties related to their performance. In Study 3, we ran simulations on norms we collected to see how age variability in one's network influences the distribution of different names in the input. In all studies, network age heterogeneity influenced performance leading to better prediction, faster response times for difficult-to-name items, and less entropy in input distribution. These results suggest that individual differences in social network properties can influence linguistic behavior. Specifically, they show that having a more heterogeneous network is associated with better performance. These results also show that the same factors influence lexical prediction and lexical production, suggesting the two might be related.
The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate that the i......The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...
Travençolo, Bruno Augusto Nassif; Costa, Luciano da Fontoura
The dynamics of transportation through towns and cities is strongly affected by the topology of the connections and routes. The current work describes an approach combining complex networks and self-avoiding random walk dynamics in order to quantify in objective and accurate manner, along a range of spatial scales, the accessibility of places in towns and cities. The transition probabilities are estimated for several lengths of the walks and used to calculate the outward accessibility of each...
Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein
managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...... of this approach for a constraint communication networks of the smart grid and compared three general data access mechanisms, namely, push, pull and event-based....
Htoo Aung Maw
Full Text Available Wireless sensor networks (WSNs have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.
The proposal addresses the wireless optical broadband access networks architecture by deploying mesh network structure, which could be the alternatives to FTTx (home or node, etc) architecture. Instead of fiber used as the transmission medium in the distribution plant, here we suggest to use the free space optic links to construct the optical mesh network. The practical connections are depending on the services provided. For Video-on-Demand (VoD) service, the final connection could use twisted pair by integrated VDSL technology. The distributed bandwidth can reach 25-32 Mbps per end user. In this paper we give some comments for designing a broadband access network using optical mesh network structure. It includes the traffic estimation, transmission network design and access node design suggestions.
Song, Chao; Zhang, Jian; Liu, Yan; Pan, Hao; Qi, Han-Ping; Cao, Yong-Gang; Zhao, Jian-Mei; Li, Shang; Guo, Jing; Sun, Hong-Li; Li, Chun-Quan
Cardiac hypertrophy (CH) could increase cardiac after-load and lead to heart failure. Recent studies have suggested that long non-coding RNA (lncRNA) played a crucial role in the process of the cardiac hypertrophy, such as Mhrt, TERMINATOR. Some studies have further found a new interacting mechanism, competitive endogenous RNA (ceRNA), of which lncRNA could interact with micro-RNAs (miRNA) and indirectly interact with mRNAs through competing interactions. However, the mechanism of ceRNA regulated by lncRNA in the CH remained unclear. In our study, we generated a global triple network containing mRNA, miRNA and lncRNA, and extracted a CH related lncRNA-mRNA network (CHLMN) through integrating the data from starbase, miRanda database and gene expression profile. Based on the ceRNA mechanism, we analyzed the characters of CHLMN and found that 3 lncRNAs (SLC26A4-AS1, RP11-344E13.3 and MAGI1-IT1) were high related to CH. We further performed cluster module analysis and random walk with restart for the CHLMN, finally 14 lncRNAs had been discovered as the potential CH related disease genes. Our results showed that lncRNA played an important role in the CH and could shed new light to the understanding underlying mechanisms of the CH.
This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.
Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.
Imran, Muhammad Ali; Shakir, Muhammad Zeeshan
This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.
Mihovska, Albena D.; Tragos, Elias; Mino, Emilio
This paper defines the requirements for cooperation of heterogeneous radio access networks (RANs) and proposes a novel radio resource management (RRM) framework for support of mobility and quality of service (QoS) in a heterogeneous communication environment comprising IMT-Advanced and legacy...
Goseling, J.; Gastpar, M.C.; Weber, J.H.
Leveraging recent progress in compute-and-forward we propose an approach to random access that is based on physical-layer network coding: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus
Fafoutis, Xenofon; Dragoni, Nicola
ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever...
Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.
In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...
textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger
Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...
This project provides support for the Knowledge Access in Rural Interconnected Areas Network (KariaNet). Phases I and II ran from 2004 to 2013. The goal of Phase III is to mainstream knowledge management and sharing on local food systems to enable rural and agricultural development professionals to improve project ...
Binti Othman, Maisara
Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless amplitudep...... wired-wireless access networks....... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially...... to be utilized for multiple service allocation to different users. MIMO multiplexing techniques with OFDM provides the scalability in increasing spectral efficiency and bit rates for RoF systems. High dimensional CAP and MIMO multiplexing techniques are two promising solutions for supporting wired and hybrid...
Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani
This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...... classical forwarding when both systems implement the improved MAC. However, our measurement results show an even larger gain for network coding, namely, up to 65 % over forwarding, as it copes better with channel losses under high load scenarios....
Wang, Na; Wang, Ruoqing; Wang, Renkai; Tian, Yongsheng; Shao, Changwei; Jia, Xiaodong; Chen, Songlin
pigmentation are identified. And the miRNA-mRNA regulatory network also provides a solid starting point for further elucidation of fish pigmentation deficiency.
Almeroth, Kevin; Zhang, Hangjin
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Syed Asad Hussain
Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.
Channel-access protocols that provide prioritized access to a common channel in a packet switching network are considered. The elements of such protocols are discussed and a specific protocol that integrates two types of packets is proposed. A probabilistic model of the protocol is presented, and its analysis yields the throughput-delay characteristics of the two classes and the interaction between them. The model is analyzed by a method similar to the one used in priority queues; this method allows consideration of each class separately, thus reducing the computational effort substantially.
Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.
Lloret Jaime; Garcia Miguel; Peñalver Lourdes; Lacuesta Raquel
In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc network...
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Full Text Available MicroRNAs (miRNAs are a class of small regulatory genes regulating gene expression by targetingmessenger RNA. Though computational methods for miRNA target prediction are the prevailingmeans to analyze their function, they still miss a large fraction of the targeted genes and additionallypredict a large number of false positives. Here we introduce a novel algorithm called DIANAmicroT-ANN which combines multiple novel target site features through an artificial neural network(ANN and is trained using recently published high-throughput data measuring the change of proteinlevels after miRNA overexpression, providing positive and negative targeting examples. The featurescharacterizing each miRNA recognition element include binding structure, conservation level and aspecific profile of structural accessibility. The ANN is trained to integrate the features of eachrecognition element along the 3’ untranslated region into a targeting score, reproducing the relativerepression fold change of the protein. Tested on two different sets the algorithm outperforms otherwidely used algorithms and also predicts a significant number of unique and reliable targets notpredicted by the other methods. For 542 human miRNAs DIANA-microT-ANN predicts 120,000targets not provided by TargetScan 5.0. The algorithm is freely available athttp://microrna.gr/microT-ANN.
Alexander A. Kist
Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.
CNIC Users Exchange and IT/CS
As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...
This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.
Tahiri, Andliena; Aure, Miriam R; Kristensen, Vessela N
A variety of molecular techniques can be used in order to unravel the molecular composition of cells. In particular, the microarray technology has been used to identify novel biomarkers that may be useful in the diagnosis, prognosis, or treatment of cancer. The microarray technology is ideal for biomarker discovery as it allows for the screening of a large number of molecules at once. In this review, we focus on microRNAs (miRNAs) which are key molecules in cells and regulate gene expression post-transcriptionally. miRNAs are small, single-stranded RNA molecules that bind to complementary mRNAs. Binding of miRNAs to mRNAs leads either to degradation, or translational inhibition of the target mRNA. Roughly one third of all the mRNAs are postulated to be regulated by miRNAs. miRNAs are known to be deregulated in different types of cancer, including breast cancer, and it has been demonstrated that deregulation of several miRNAs can be used as biological markers in cancer. miRNA expression can for example discriminate between normal, benign and malignant breast tissue, and between different breast cancer subtypes.In the post-genomic era, an important task of molecular biology is to understand gene regulation in the context of biological networks. Because miRNAs have such a pronounced role in cells, it is pivotal to understand the mechanisms that underlie their control, and to identify how miRNAs influence cancer development and progression.
Vishnubalaji, R; Hamam, R; Abdulla, M-H
Despite recent advances in cancer management, colorectal cancer (CRC) remains the third most common cancer and a major health-care problem worldwide. MicroRNAs have recently emerged as key regulators of cancer development and progression by targeting multiple cancer-related genes; however......, such regulatory networks are not well characterized in CRC. Thus, the aim of this study was to perform global messenger RNA (mRNA) and microRNA expression profiling in the same CRC samples and adjacent normal tissues and to identify potential miRNA-mRNA regulatory networks. Our data revealed 1273 significantly......-β (using SB-431542) pathways led to dose- and time-dependent inhibition of CRC cell growth. Similarly, our data revealed up- (42) and downregulated (61) microRNAs in the same matched samples. Using target prediction and bioinformatics, ~77% of the upregulated genes were predicted to be targeted by microRNAs...
Dhifallah, Oussama Najeeb
The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).
Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.
Boniface K. Alese; Sylvester O. Olatunji; Oluwatoyin C. Agbonifo; Aderonke F. Thompson
.... Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks...
Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis
As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.
Kovács, I.Z.; Laselva, D.; Michaelsen, P.H.; Wang, Y.; Djapic, R.; Spaey, K.
Carrier-grade Wireless Local Area Network (WLAN) is becoming an important complementary system to cellular networks for Mobile Network Operators (MNOs). Network controlled access network selection between cellular and WLAN is an essential functionality to optimize network performance and user
Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M
Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are
Maria Cecília Gomes
Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.
Li, Zhixin; Peng, Zhiqiang; Gu, Siyu; Zheng, Junfang; Feng, Duiping; Qin, Qiong; He, Junqi
MicroRNAs (miRNAs) have been linked to a number of cancer types including breast cancer. The rate of brain metastases is 10-30% in patients with advanced breast cancer which is associated with poor prognosis. The potential application of miRNAs in the diagnostics and therapeutics of breast cancer with brain metastasis is an area of intense interest. In an initial effort to systematically address the differential expression of miRNAs and mRNAs in primary breast cancer which may provide clues for early detection of brain metastasis, we analyzed the consequent changes in global patterns of gene expression in Gene Expression Omnibus (GEO) data set obtained by microarray from patients with in situ carcinoma and patients with brain metastasis. The miRNA-pathway regulatory network and miRNA-mRNA regulatory network were investigated in breast cancer specimens from patients with brain metastasis to screen for significantly dysregulated miRNAs followed by prediction of their target genes and pathways by Gene Ontology (GO) analysis. Functional coordination of the changes of gene expression can be modulated by individual miRNAs. Two miRNAs, hsa-miR-17-5p and hsa-miR-16-5p, were identified as having the highest associations with targeted mRNAs [such as B-cell lymphoma 2 (BCL2), small body size/mothers against decapentaplegic 3 (SMAD3) and suppressor of cytokine signaling 1 (SOCS1)] and pathways associated with epithelial-mesenchymal transitions and other processes linked with cancer metastasis (including cell cycle, adherence junctions and extracellular matrix-receptor interaction). mRNAs for two genes [HECT, UBA and WWE domain containing 1 (HUWE1) and BCL2] were found to have the highest associations with miRNAs, which were down-regulated in brain metastasis specimens of breast cancer. The change of 11 selected miRNAs was verified in The Cancer Genome Atlas (TCGA) breast cancer dataset. Up-regulation of hsa-miR-17-5p was detected in triple-negative breast cancer tissues in
Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo
Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.
Zhou, Kecheng; Liu, Minxia; Cao, Yi
Tumorigenesis is a multi-step and complex process with multi-factors involved. Deregulated oncogenes and tumor suppressor genes (TSGs) induced by genetic and epigenetic factors are considered as the driving force in the development and progression of cancer. Besides, microRNAs (miRNAs) act vital roles in tumorigenesis through regulating some oncogenes and TSGs. Interestingly, miRNAs are also regulated by oncogenes and TSGs. Considering the entangled regulation, here we propose a new insight into these regulation relationships in cancer: oncogene-miRNA-TSG network, which further emphasizes roles of miRNA, as well as highlights the network regulation among oncogene, miRNA, and TSG during tumorigenesis. The oncogene-miRNA-TSG network demonstrates that oncogenes and TSGs not only show functional synergy, but also there are regulatory relationships among oncogenes and TSGs during tumorigenesis, which could be mediated by miRNAs. In view of the oncogene-miRNA-TSG network involved in many oncogenes, miRNAs, and TSGs, as well as occurring in various tumor types, the anomaly of this network may be a common event in cancers and participates in tumorigenesis. This hypothesis broadens horizons of molecular mechanisms underlying tumorigenesis, and may provide a new promising venue for the prediction, diagnosis, and even therapy of cancer.
Peiris, Sasanthi Chamarika
The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed
Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José
This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction.
Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.
Full Text Available Background/Aims: To analyze the long noncoding (lncRNA-mRNA expression network and potential roles in rat hepatic stellate cells (HSCs during activation. Methods: LncRNA expression was analyzed in quiescent and culture-activated HSCs by RNA sequencing, and differentially expressed lncRNAs verified by quantitative reverse transcription polymerase chain reaction (qRT-PCR were subjected to bioinformatics analysis. In vivo analyses of differential lncRNA-mRNA expression were performed on a rat model of liver fibrosis. Results: We identified upregulation of 12 lncRNAs and 155 mRNAs and downregulation of 12 lncRNAs and 374 mRNAs in activated HSCs. Additionally, we identified the differential expression of upregulated lncRNAs (NONRATT012636.2, NONRATT016788.2, and NONRATT021402.2 and downregulated lncRNAs (NONRATT007863.2, NONRATT019720.2, and NONRATT024061.2 in activated HSCs relative to levels observed in quiescent HSCs, and Gene Ontology and Kyoto Encyclopedia of Genes and Genomes pathway analyses showed that changes in lncRNAs associated with HSC activation revealed 11 significantly enriched pathways according to their predicted targets. Moreover, based on the predicted co-expression network, the relative dynamic levels of NONRATT013819.2 and lysyl oxidase (Lox were compared during HSC activation both in vitro and in vivo. Our results confirmed the upregulation of lncRNA NONRATT013819.2 and Lox mRNA associated with the extracellular matrix (ECM-related signaling pathway in HSCs and fibrotic livers. Conclusion: Our results detailing a dysregulated lncRNA-mRNA network might provide new treatment strategies for hepatic fibrosis based on findings indicating potentially critical roles for NONRATT013819.2 and Lox in ECM remodeling during HSC activation.
1. DESIGN In this dissertation we introduce a new approach to Internet access networks in public spaces, such as Wi-Fi network commonly known as Hotspot, based on Fog Computing (or Edge Computing), Software Defined Networking (SDN) and the deployment of Virtual Machines (VM) and Linux containers, on the edge of the network. In this vision we deploy specialized network elements, called Fog Nodes, on the edge of the network, able to virtualize the physical infrastructure and expose APIs to e...
Hamza, Doha R.
Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without
Roy, R.; van Etten, Wim
This paper investigates the design of protection schemes in an extended access network. The network is modeled as a stack of quasi independent logical passive optical networks(PONs), each operating the IEEE Ethernet passive optical networks (EPON) protocol. The dynamics of the network operation when
Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.
Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service
Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar
In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...
Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.
While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.
Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso
In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...
... elements. 51.311 Section 51.311 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an incumbent...
Zhang, Yiming; Kang, Ran; Liu, Wenrong; Yang, Yalan; Ding, Ruofan; Huang, Qingqing; Meng, Junhua; Xiong, Lili; Guo, Zhiyun
Recent studies have indicated that long non-coding RNAs (lncRNAs) and mRNA function as competing endogenous RNAs (ceRNAs) that compete to bind to shared microRNA (miRNA) recognition elements (MREs) to perform specific biological functions during tumorigenesis. The tumor suppressor p53 is a master regulator of cancer-related biological processes by acting as a transcription factor to regulate target genes including miRNA and lncRNA. However, the mechanism in human hepatocellular carcinoma and whether p53-mediated RNA targets could form ceRNA network remain unclear. Here, we identified a series of differential expressed miRNAs, lncRNA and mRNA which were potentially regulated by p53 using RNA sequencing in HepG2. Genomic characteristics comparative analysis showed significant differences between mRNAs and lncRNAs. By integrating experimentally confirmed Ago2 and p53 binding sites, we constructed a highly reliable p53-mediated ceRNA network using hypergeometric test. The KEGG pathway enrichment analysis showed that the ceRNA network highly enriched in the cancer or p53-associated signaling pathways. Finally, using betweenness centrality analysis, we identified five master miRNAs (hsa-miR-3620-5p, hsa-miR-3613-3p, hsa-miR-6881-3p, hsa-miR-6087 and hsa-miR-18a-3p) that regulated most of the target RNAs, suggesting these miRNAs play central roles in the whole p53-mediated ceRNAs network. Taken together, our results provide a new regulatory mechanism of p53 networks for future studies in cancer therapeutics.
Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.
Full Text Available MicroRNAs represent ~22 nt long endogenous small RNA molecules that have been experimentally shown to regulate gene expression post-transcriptionally. One main interest in miRNA research is the investigation of their functional roles, which can typically be accomplished by identification of mi-/mRNA interactions and functional annotation of target gene sets. We here present a novel method “miRlastic”, which infers miRNA-target interactions using transcriptomic data as well as prior knowledge and performs functional annotation of target genes by exploiting the local structure of the inferred network. For the network inference, we applied linear regression modeling with elastic net regularization on matched microRNA and messenger RNA expression profiling data to perform feature selection on prior knowledge from sequence-based target prediction resources. The novelty of miRlastic inference originates in predicting data-driven intra-transcriptome regulatory relationships through feature selection. With synthetic data, we showed that miRlastic outperformed commonly used methods and was suitable even for low sample sizes. To gain insight into the functional role of miRNAs and to determine joint functional properties of miRNA clusters, we introduced a local enrichment analysis procedure. The principle of this procedure lies in identifying regions of high functional similarity by evaluating the shortest paths between genes in the network. We can finally assign functional roles to the miRNAs by taking their regulatory relationships into account. We thoroughly evaluated miRlastic on a cohort of head and neck cancer (HNSCC patients provided by The Cancer Genome Atlas. We inferred an mi-/mRNA regulatory network for human papilloma virus (HPV-associated miRNAs in HNSCC. The resulting network best enriched for experimentally validated miRNA-target interaction, when compared to common methods. Finally, the local enrichment step identified two functional
Korček, Dušan; Müllerová, Jarmila
Future development of optical access technologies expects increasing traffic and bandwidth. The first candidates to improve Gigabit-capable passive optical networks (GPON) are 10-Gigabit-PON (XG-PON) and wavelength-division multiplexing PON (WDM PON). Another possibility for increasing penetration of current PON branch is to extend number of channels provided on one optical fiber for one PON technology. Coexistence of GPON, XG-PON and WDM-PON in the same infrastructure is a most discussed issue concerning passive optical networks nowadays. Therefore, extensive studies are necessary to design proper and low-cost candidates. International Telecommunication Union (ITU) allocates specific wavelength bands for the present status quo and the future development of access technologies. However, within coexistence, it is necessary to protect signals from various PON technologies from interference. A potential barrier to deploying XG-GPONs and WDM PONs with current GPONs is the usage of broadband light sources and sophisticated optical methods of slicing the light source emission into specific wavelength channels. Protective measures comprise the exact allocation of upstream and downstream signal bands for each technology; the so-called guard bands within the wavelength allocation scheme to protect signals; and optionally the usage of wavelength blocking filters. In this contribution, bandpass thin-film filters are numerically presented for hybrid time division/wavelength division multiplexing TDM/WDM (TWDM) and for simple operation. They have been designed to be tunable and as steep as possible to reject the wavelength bands outside those allocated to TWDM-PON. The TWDM-PON filters are proposed to guarantee steep transmission curves in the vicinity of cut-on/cut-off wavelengths of the specific allocated wavelength bands and facilitate migration from legacy GPON and XG-PON to TWDM-PON. Their deployment protects the allocated wavelength bands from the undesirable interference.
Popenda, Mariusz; Szachniuk, Marta; Blazewicz, Marek; Wasik, Szymon; Burke, Edmund K; Blazewicz, Jacek; Adamiak, Ryszard W
Recent discoveries concerning novel functions of RNA, such as RNA interference, have contributed towards the growing importance of the field. In this respect, a deeper knowledge of complex three-dimensional RNA structures is essential to understand their new biological functions. A number of bioinformatic tools have been proposed to explore two major structural databases (PDB, NDB) in order to analyze various aspects of RNA tertiary structures. One of these tools is RNA FRABASE 1.0, the first web-accessible database with an engine for automatic search of 3D fragments within PDB-derived RNA structures. This search is based upon the user-defined RNA secondary structure pattern. In this paper, we present and discuss RNA FRABASE 2.0. This second version of the system represents a major extension of this tool in terms of providing new data and a wide spectrum of novel functionalities. An intuitionally operated web server platform enables very fast user-tailored search of three-dimensional RNA fragments, their multi-parameter conformational analysis and visualization. RNA FRABASE 2.0 has stored information on 1565 PDB-deposited RNA structures, including all NMR models. The RNA FRABASE 2.0 search engine algorithms operate on the database of the RNA sequences and the new library of RNA secondary structures, coded in the dot-bracket format extended to hold multi-stranded structures and to cover residues whose coordinates are missing in the PDB files. The library of RNA secondary structures (and their graphics) is made available. A high level of efficiency of the 3D search has been achieved by introducing novel tools to formulate advanced searching patterns and to screen highly populated tertiary structure elements. RNA FRABASE 2.0 also stores data and conformational parameters in order to provide "on the spot" structural filters to explore the three-dimensional RNA structures. An instant visualization of the 3D RNA structures is provided. RNA FRABASE 2.0 is freely available
Full Text Available Abstract Background Recent discoveries concerning novel functions of RNA, such as RNA interference, have contributed towards the growing importance of the field. In this respect, a deeper knowledge of complex three-dimensional RNA structures is essential to understand their new biological functions. A number of bioinformatic tools have been proposed to explore two major structural databases (PDB, NDB in order to analyze various aspects of RNA tertiary structures. One of these tools is RNA FRABASE 1.0, the first web-accessible database with an engine for automatic search of 3D fragments within PDB-derived RNA structures. This search is based upon the user-defined RNA secondary structure pattern. In this paper, we present and discuss RNA FRABASE 2.0. This second version of the system represents a major extension of this tool in terms of providing new data and a wide spectrum of novel functionalities. An intuitionally operated web server platform enables very fast user-tailored search of three-dimensional RNA fragments, their multi-parameter conformational analysis and visualization. Description RNA FRABASE 2.0 has stored information on 1565 PDB-deposited RNA structures, including all NMR models. The RNA FRABASE 2.0 search engine algorithms operate on the database of the RNA sequences and the new library of RNA secondary structures, coded in the dot-bracket format extended to hold multi-stranded structures and to cover residues whose coordinates are missing in the PDB files. The library of RNA secondary structures (and their graphics is made available. A high level of efficiency of the 3D search has been achieved by introducing novel tools to formulate advanced searching patterns and to screen highly populated tertiary structure elements. RNA FRABASE 2.0 also stores data and conformational parameters in order to provide "on the spot" structural filters to explore the three-dimensional RNA structures. An instant visualization of the 3D RNA
Full Text Available Associating microRNAs (miRNAs with cancers is an important step of understanding the mechanisms of cancer pathogenesis and finding novel biomarkers for cancer therapies. In this study, we constructed a miRNA-cancer association network (miCancerna based on more than 1,000 miRNA-cancer associations detected from millions of abstracts with the text-mining method, including 226 miRNA families and 20 common cancers. We further prioritized cancer-related miRNAs at the network level with the random-walk algorithm, achieving a relatively higher performance than previous miRNA disease networks. Finally, we examined the top 5 candidate miRNAs for each kind of cancer and found that 71% of them are confirmed experimentally. miCancerna would be an alternative resource for the cancer-related miRNA identification.
Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva
This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion...
Full Text Available MicroRNAs (miRNAs have been shown to be promising biomarkers in predicting cancer prognosis. However, inappropriate or poorly optimized processing and modeling of miRNA expression data can negatively affect prediction performance. Here, we propose a holistic solution for miRNA biomarker selection and prediction model building. This work introduces the use of a neural network cascade, a cascaded constitution of small artificial neural network units, for evaluating miRNA expression and patient outcome. A miRNA microarray dataset of nasopharyngeal carcinoma was retrieved from Gene Expression Omnibus to illustrate the methodology. Results indicated a nonlinear relationship between miRNA expression and patient death risk, implying that direct comparison of expression values is inappropriate. However, this method performs transformation of miRNA expression values into a miRNA score, which linearly measures death risk. Spearman correlation was calculated between miRNA scores and survival status for each miRNA. Finally, a nine-miRNA signature was optimized to predict death risk after nasopharyngeal carcinoma by establishing a neural network cascade consisting of 13 artificial neural network units. Area under the ROC was 0.951 for the internal validation set and had a prediction accuracy of 83% for the external validation set. In particular, the established neural network cascade was found to have strong immunity against noise interference that disturbs miRNA expression values. This study provides an efficient and easy-to-use method that aims to maximize clinical application of miRNAs in prognostic risk assessment of patients with cancer.
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...... and computes power consumption and mismatch probability  in each of these access strategies. Based on our study, we make some recommendations when and where, which access strategy is suitable depending upon the application's requirements and network behavior. It also provides the model implementation...
Popov, Mikhail; Gavler, A.; Sköldström, P.
Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....
Wu, Yunyi; Krueger, Gerhard R F; Wang, Guanyu
Cancer heterogeneity may reflect differential dynamical outcomes of the regulatory network encompassing biomolecules at both transcriptional and post-transcriptional levels. In other words, differential gene-expression profiles may correspond to different stable steady states of a mathematical model for simulation of biomolecular networks. To test this hypothesis, we simplified a regulatory network that is important for soft-tissue sarcoma metastasis and heterogeneity, comprising of transcription factors, micro-RNAs, and signaling components of the NOTCH pathway. We then used a Boolean network model to simulate the dynamics of this network, and particularly investigated the consequences of differential miRNA degradation modes. We found that efficient miRNA degradation is crucial for sustaining a homogenous and healthy phenotype, while defective miRNA degradation may lead to multiple stable steady states and ultimately to carcinogenesis and heterogeneity. Copyright© 2016 International Institute of Anticancer Research (Dr. John G. Delinassios), All rights reserved.
Thomadsen, Tommy; Larsen, Jesper
This paper considers the design of two-layered fully interconnected networks. A two-layered network consists of clusters of nodes, each defining an access network and a backbone network. We consider the integrated problem of determining the access networks and the backbone network simultaneously...... problems. We obtain superior bounds using the column generation approach than with the linear programming relaxation. The column generation method is therefore developed into an exact approach using the Branch-and-Price framework. With this approach we are able to solve problems consisting of up to 25...
Marmur, Oren; Shraga, Eyal
This paper contains a comprehensive review of the various Passive Optical Network (PON) technologies in the marketplace today, namely APON, EPON and GPON, and draws an in-depth comparison between them. Following a review of the history of the various PON flavors, as well as the service requirements set forth by service providers, the emerging Gigabit PON (GPON) technology is examined in detail. System performance between the various protocols is compared using efficiency and scalability factors, and conclusions are drawn as to the overall throughput efficiency of and cost influence on the solution. GPON carries a two-fold promise of both higher bit rates and higher efficiency when carrying multiple services over the PON. It offers a scalable framing structure from 622Mb/s to 2.5Gb/s, as well as support for asymmetric bit rates, exceptionally high bandwidth utilization for any type of service and a variant of standard ITU-T Generic Framing Protocol (GFP) encapsulation of any type of service (both TDM and packet) onto a synchronous transport protocol. It is shown that in the worst-case scenario, based upon the most conservative assumptions regarding traffic distribution, GPON is substantially more efficient, with an overall efficiency of 93% compared to 71% with APON and 49% with EPON. Using a more detailed analysis based upon a traffic model provided by the service providers within the full service access networks (FSAN) consortium, it is shown in quantitative terms that GPON offers exceptionally higher bandwidth for the entire range of applications when compared to both APON and, especially, EPON, resulting in substantially lower cost per bit and a much faster payback period.
Martoccia, Maria [Decision Technology Centre, London (United Kingdom)
The sectors characterised by the use of transmission or transport networks as inputs of production (electricity, gas, telecommunications) have long been considered as natural monopolies. Thanks to the technological innovations which have modified the economics of production (as in electricity generation) or that have driven the development of high value added services (as in telecommunications), the boundaries of the old natural monopolies have been eroded by the presence of operators potentially able to compete in national and international markets. The objective is to delineate, by analysing the more significant theoretical contributions and some of the restructuring experiences of the sector in question, the possible regulatory solutions which, in the perspective of a `European market` for electricity, makes the management and the expansion of the transmission networks adequate for the `open access` of national electricity sectors. The analysis of some mature experiences, such as in Chile, Argentina, the UK and Norway, in the second section, will offer a useful support to this evaluation. The regulatory solution here adopted will be analysed, in particular, with reference to the two main problems outlined above: on the one hand, the problem of providing through prices the necessary information about the opportunities of using the transmission assets; and on the other hand, the problem of defining an efficient incentive mechanism for the behaviour of the monopolist (the owner of the transmission assets). Finally, by considering the limits found in the solutions explored in these models, we will try, in the third section, to delineate the evolution that the regulation of the analysed sectors could follow, in an attempt to make the optimal solution defined in the first section consistent with the imperfections of the real scenarios. (EHS)
In this Data in Brief we detail the contents and quality controls for the gene expression data (available from NCBI Gene Expression Omnibus repository with accession number GSE53091 associated with our study published in Genomics (Olsen et al. 2014. We also provide R code to access the data and reproduce the analysis presented in this article.
Yang, Ken-Chi; Hsu, Chia-Lang; Lin, Chen-Ching; Juan, Hsueh-Fen; Huang, Hsuan-Cheng
Exploring microRNA (miRNA) regulations and protein-protein interactions could reveal the molecular mechanisms responsible for complex biological processes. Mirin is a web-based application suitable for identifying functional modules from protein-protein interaction networks regulated by aberrant miRNAs under user-defined biological conditions such as cancers. The analysis involves combining miRNA regulations, protein-protein interactions between target genes, as well as mRNA and miRNA expression profiles provided by users. Mirin has successfully uncovered oncomirs and their regulatory networks in various cancers, such as gastric and breast cancer. Mirin is freely available at http://mirin.ym.edu.tw/. Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: firstname.lastname@example.org.
Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar
Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...
Choudry, Sophina; Williams, Julian; Black, Laura
The aim of this article is to explore the structure of social capital in peer networks and its relation to the unequal access of educational resources within mathematics classrooms. We hypothesise that learners can gain access to mathematics through friendship networks which provide more or less help from peers that might sustain (or curtail)…
This phase will endeavor to expand the existing network to include two thematic networks on food security and rural enterprise, respectively. A third thematic network - on knowledge management strategies - will play an advisory and support role to the larger network. Project activities will include a call for research proposals ...
This book focuses on various Passive optical networks (PONs) types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.
Fleischer, Paul; Kristensen, Lars Michael
The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...
Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; Center for Quantum Information in Tsinghua University Team
To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.
This study uses social network analysis to describe the social network of college mentors in a college access program. Urban students in the program are paired with college mentors-students, professors, and other institutional agents-to help improve their college going process. The study analyzes the social networks within which the mentors are…
Eisenblätter, A.; Conzalez Rodríguez, B.; Gunnarsson, F.; Kürner, T.; Litjens, R.; Sas, B.; Sayrac, B.; Schmelz, L.C.; Willcock, C.
Future radio access networks will require new self-management solutions to handle the increasing operational complexity caused by multi-technology and multi-layer deployments. Current networks already include stand-alone SON (Self-Organizing Networks) solutions, but these are not sufficient to
Roy, R.; van Etten, Wim
The paper proposes a design for traffic engineering to provide Ethernet services using an extended access network. Ethernet has remained the dominant technology for Local Area and Enterprise Networks, the use of Ethernet in metro networks has seen significant interest of late to provide for end to
Yeates, Jessica A M; Nghe, Philippe; Lehman, Niles
An RNA-directed recombination reaction can result in a network of interacting RNA species. It is now becoming increasingly apparent that such networks could have been an important feature of the RNA world during the nascent evolution of life on the Earth. However, the means by which such small RNA networks assimilate other available genotypes in the environment to grow and evolve into the more complex networks that are thought to have existed in the prebiotic milieu are not known. Here, we used the ability of fragments of the Azoarcus group I intron ribozyme to covalently self-assemble via genotype-selfish and genotype-cooperative interactions into full-length ribozymes to investigate the dynamics of small (three- and four-membered) networks. We focused on the influence of a three-membered core network on the incorporation of additional nodes, and on the degree and direction of connectivity as single new nodes are added to this core. We confirmed experimentally the predictions that additional links to a core should enhance overall network growth rates, but that the directionality of the link (a "giver" or a "receiver") impacts the growth of the core itself. Additionally, we used a simple mathematical model based on the first-order effects of lower-level interactions to predict the growth of more complex networks, and find that such a model can, to a first approximation, predict the ordinal rankings of nodes once a steady-state distribution has been reached. © 2017 Yeates et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.
The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of
Robert J Scarborough
Full Text Available Antisense-based molecules targeting HIV-1 RNA have the potential to be used as part of gene or drug therapy to treat HIV-1 infection. In this study, HIV-1 RNA was screened to identify more conserved and accessible target sites for ribozymes based on the hepatitis delta virus motif. Using a quantitative screen for effects on HIV-1 production, we identified a ribozyme targeting a highly conserved site in the Gag coding sequence with improved inhibitory potential compared to our previously described candidates targeting the overlapping Tat/Rev coding sequence. We also demonstrate that this target site is highly accessible to short hairpin directed RNA interference, suggesting that it may be available for the binding of antisense RNAs with different modes of action. We provide evidence that this target site is structurally conserved in diverse viral strains and that it is sufficiently different from the human transcriptome to limit off-target effects from antisense therapies. We also show that the modified hepatitis delta virus ribozyme is more sensitive to a mismatch in its target site compared to the short hairpin RNA. Overall, our results validate the potential of a new target site in HIV-1 RNA to be used for the development of antisense therapies.
Okamoto, Satoru; Sato, Takehiro; Yamanaka, Naoaki
In this paper, flexible and highly reliable metro and access integrated networks with network virtualization and software defined networking technologies will be presented. Logical optical line terminal (L-OLT) technologies and active optical distribution networks (ODNs) are the key to introduce flexibility and high reliability into the metro and access integrated networks. In the Elastic Lambda Aggregation Network (EλAN) project which was started in 2012, a concept of the programmable optical line terminal (P-OLT) has been proposed. A role of the P-OLT is providing multiple network services that have different protocols and quality of service requirements by single OLT box. Accommodated services will be Internet access, mobile front-haul/back-haul, data-center access, and leased line. L-OLTs are configured within the P-OLT box to support the functions required for each network service. Multiple P-OLTs and programmable optical network units (P-ONUs) are connected by the active ODN. Optical access paths which have flexible capacity are set on the ODN to provide network services from L-OLT to logical ONUs (L-ONUs). The L-OLT to L-ONU path on the active ODN provides a logical connection. Therefore, introducing virtualization technologies becomes possible. One example is moving an L-OLT from one P-OLT to another P-OLT like a virtual machine. This movement is called L-OLT migration. The L-OLT migration provides flexible and reliable network functions such as energy saving by aggregating L-OLTs to a limited number of P-OLTs, and network wide optical access path restoration. Other L-OLT virtualization technologies and experimental results will be also discussed in the paper.
Full Text Available MicroRNAs constitute an important class of noncoding, single-stranded, ~22 nucleotide long RNA molecules encoded by endogenous genes. They play an important role in regulating gene transcription and the regulation of normal development. MicroRNAs can be associated with disease; however, only a few microRNA-disease associations have been confirmed by traditional experimental approaches. We introduce two methods to predict microRNA-disease association. The first method, KATZ, focuses on integrating the social network analysis method with machine learning and is based on networks derived from known microRNA-disease associations, disease-disease associations, and microRNA-microRNA associations. The other method, CATAPULT, is a supervised machine learning method. We applied the two methods to 242 known microRNA-disease associations and evaluated their performance using leave-one-out cross-validation and 3-fold cross-validation. Experiments proved that our methods outperformed the state-of-the-art methods.
Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.
The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.
Pereira, João Paulo Ribeiro
Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario
Trajkovski, Mirko; Lodish, Harvey
Brown adipose tissue (BAT) is specialized for heat generation and energy expenditure as a defense against cold and obesity; in both humans and mice increased amounts of BAT are associated with a lean phenotype and resistance to development of the metabolic syndrome and its complications. Here we summarize recent research showing that several BAT-expressed microRNAs (miRNAs) play important roles in regulating differentiation and metabolism of brown and beige adipocytes; we discuss the key mRNA targets downregulated by these miRNAs and show how these miRNAs affect directly or indirectly transcription factors important for BAT development. We suggest that these miRNAs could be part of novel therapeutics to increase BAT in humans. Copyright © 2013 Elsevier Ltd. All rights reserved.
Jong, Tom de; Tillema, T.
In many developed countries high quality digital transport networks are available for GIS based analysis. Partly this is due to the requirements of route planning software for internet and car navigation systems. Properties of these networks consist among others of road quality attributes,
Zakrzewska, Anna; Iversen, Villy Bæk
This paper analyzes performance of cellular systems with shared resources, where the network with overlapping cells is modeled as a circuit switched network with direct routing. The influence of the degree of sharing, represented by cell overlap percentage, on the call blocking probability is inv...
Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.
We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....
Full Text Available We present a simulation platform for access selection algorithms in heterogeneous wireless networks, called “ABCDecision”. The simulator implements the different parts of an Always Best Connected (ABC system, including Access Technology Selector (ATS, Radio Access Networks (RANs, and users. After describing the architecture of the simulator, we show an overview of the existing decision algorithms for access selection. Then we propose a new selection algorithm in heterogeneous networks and we run a set of simulations to evaluate the performance of the proposed algorithm in comparison with the existing ones. The performance results, in terms of the occupancy rate, show that our algorithm achieves a load balancing distribution between networks by taking into consideration the capacities of the available cells.
Berthe, Abdoulaye; Lecointre, Aubin; Dragomirescu, Daniela; Plana, Robert
This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global ...
Peng, Mugen; Li, Yong; Zhao, Zhongyuan; Wang, Chonggang
Compared with the fourth generation (4G) cellular systems, the fifth generation wireless communication systems (5G) are anticipated to provide spectral and energy efficiency growth by a factor of at least 10, and the area throughput growth by a factor of at least 25. To achieve these goals, a heterogeneous cloud radio access network (H-CRAN) is presented in this article as the advanced wireless access network paradigm, where cloud computing is used to fulfill the centralized large-scale coope...
Harrall, K. K.; Kechris, K. J.; Tabakoff, B.; Hoffman, P.L.; Hines, L. M.; Tsukamoto, H.; Pravenec, Michal; Printz, M.; Saba, L. M.
Roč. 27, 9-10 (2016), s. 469-484 ISSN 0938-8990 R&D Projects: GA ČR(CZ) GAP301/12/0696 Institutional support: RVO:67985823 Keywords : RNA coexpression networks * liver * immunity * rat * recombinant inbred strains Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.509, year: 2016
Stefanovic, Snezana; Bassell, Gary J; Mihailescu, Mihaela Rita
Fragile X syndrome (FXS) is the most common inherited form of intellectual disability caused by the CGG trinucleotide expansion in the 3'-untranslated region of the FMR1 gene on the X chromosome, that silences the expression of the Fragile X mental retardation protein (FMRP). FMRP has been shown to bind to a G-rich region within the PSD-95 mRNA which encodes for the postsynaptic density protein 95 (PSD-95), and together with the microRNA miR-125a, to play an important role in the reversible inhibition of the PSD-95 mRNA translation in neurons. The loss of FMRP in Fmr1 KO mice disables this translation control in the production of the PSD-95 protein. Interestingly, the miR-125a binding site on PSD-95 mRNA is embedded in the G-rich region bound by FMRP and postulated to adopt one or more G quadruplex structures. In this study, we have used different biophysical techniques to validate and characterize the formation of parallel G quadruplex structures and binding of miR-125a to its complementary sequence located within the 3' UTR of PSD-95 mRNA. Our results indicate that the PSD-95 mRNA G-rich region folds into alternate G quadruplex conformations that coexist in equilibrium. miR-125a forms a stable complex with PSD-95 mRNA, as evident by characteristic Watson-Crick base-pairing that coexists with one of the G quadruplex forms, suggesting a novel mechanism for G quadruplex structures to regulate the access of miR-125a to its binding site. © 2014 Stefanovic et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Kardaras, Georgios; Soler, José; Dittmann, Lars
The deployment of 4G networks is spreading rapidly providing mobile broadband services to the public. 4G technologies are designed to overlay existing 3G networks enabling reusability of several network components. In this way, the coexistence of 3G/4G standards is facilitated. This paper describes...... and management plane. Switching between wireless standards becomes easily feasible through firmware upgrading. Finally, real-time configuration of radio functionalities, such as transmit power, receiver gain, carrier frequency, channel bandwidth and others result in a modular software defined radio platform....... © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering....
Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Drumm, John E.; Groom, Frank M.
Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…
Laarhuis, Jan H.; Laarhuis, Jan; Koonen, A.M.J.
A medium access control (MAC) strategy that accounts for the limited tunability of present-day lasers and filters and yet supports a large total number of wavelengths in the network is proposed. Full interconnectivity, contention-free access and a high value of concurrency are achieved by dividing
Wade, Joseph T
Bacterial genomes encode numerous transcription factors, DNA-binding proteins that regulate transcription initiation. Identifying the regulatory targets of transcription factors is a major challenge of systems biology. Here I describe the use of two genome-scale approaches, ChIP-seq and RNA-seq, that are used to map transcription factor regulons. ChIP-seq maps the association of transcription factors with DNA, and RNA-seq determines changes in RNA levels associated with transcription factor perturbation. I discuss the strengths and weaknesses of these and related approaches, and I describe how ChIP-seq and RNA-seq can be combined to map individual transcription factor regulons and entire regulatory networks.
Goseling, Jasper; Gastpar, Michael; Weber, Jos H.
We consider the effect on the transport capacity of wireless networks of different physical layer coding mechanisms. We compare the performance of traditional channel coding techniques, turning the wireless network in reliable point-to-point channels, with multi-access computation coding, in which
Keenan, Thomas P.; Trotter, David Mitchell
Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…
Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.
Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has
Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.
In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with
This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...
Fedorova, Alexandra; Magoutis, Kostas; Addetia, Salimah; Seltzer, Margo
The performance of high-speed network-attached storage applications is often limited by end-system overhead, caused primarily by memory copying and network protocol processing. In this paper, we examine alternative strategies for reducing overhead in such systems. We consider optimizations to remote procedure call (RPC)-based data transfer using either remote direct memory access (RDMA) or network interface support for pre-posting of application receive buffers. We demonstrate that b...
Full Text Available Host-virus interaction via host cellular components has been an important field of research in recent times. RNA interference mediated by short interfering RNAs and microRNAs (miRNA, is a widespread anti-viral defence strategy. Importantly, viruses also encode their own miRNAs. In recent times miRNAs were identified as key players in host-virus interaction. Furthermore, viruses were shown to exploit the host miRNA networks to suite their own need. The complex cross-talk between host and viral miRNAs and their cellular and viral targets forms the environment for viral pathogenesis. Apart from protein-coding mRNAs, non-coding RNAs may also be targeted by host or viral miRNAs in virus infected cells, and viruses can exploit the host miRNA mediated gene regulatory network via the competing endogenous RNA effect. A recent report showed that viral U-rich non-coding RNAs called HSUR, expressed in primate virus herpesvirus saimiri (HVS infected T cells, were able to bind to three host miRNAs, causing significant alteration in cellular level for one of the miRNAs. We have predicted protein coding and non protein-coding targets for viral and human miRNAs in virus infected cells. We identified viral miRNA targets within host non-coding RNA loci from AGO interacting regions in three different virus infected cells. Gene ontology (GO and pathway enrichment analysis of the genes comprising the ceRNA networks in the virus infected cells revealed enrichment of key cellular signalling pathways related to cell fate decisions and gene transcription, like Notch and Wnt signalling pathways, as well as pathways related to viral entry, replication and virulence. We identified a vast number of non-coding transcripts playing as potential ceRNAs to the immune response associated genes; e.g. APOBEC family genes, in some virus infected cells. All these information are compiled in HumanViCe, a comprehensive database that provides the potential ceRNA networks in virus
Full Text Available Objective. The objective of this study was to evaluate the molecular mechanism by which Qianliening capsule (QC treats benign prostatic hyperplasia (BPH. Methods. Benign prostatic hyperplasia epithelial cell line BPH-1 was treated with 0, 1.25, 2.5, and 5 mg/mL QC for 48 h, respectively. Evaluation of cell viability and observation of morphologic changes of BPH-1 cell gene expression and miRNA expression profiles were analyzed. Real-time quantitative PCR was used to confirm changes in miRNA and gene expression. GO and KEGG pathway-based approaches were used to investigate biological functions and signaling pathways affected by differentially expressed mRNAs. Results. QC inhibited BPH-1 cell proliferation. Differential expression of 19 upregulated and 2 downregulated miRNAs was observed in QC-treated BPH-1 cells compared to untreated control cells. 107 upregulated and 71 downregulated genes were identified between the two groups. Significantly enriched signaling pathways based on deregulated mRNAs were mainly involved in regulation of cell proliferation, apoptosis, and so on. Additionally, miRNA-mRNA network analysis integrated these miRNAs and genes by outlining interactions of miRNA and related genes. Conclusion. The study was the first report of differentially expressed miRNA and mRNA in QC-treated BPH-1 cells.
Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo
The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...
Rodríguez Páez, Juan Sebastián; Rommel, Simon; Vegas Olmos, Juan José
In this paper a new type of radio access unit is proposed and demonstrated. This unit is composed only of the reduced amount of components (compared to conventional unit designs) to optically generate wireless signals on the W-band (75–110 GHz) in combination with a switching system. The proposed...... system not only achieves BER values below the FEC limit, but gives an extra level of flexibility to the network by easing the redirection of the signal to different antennas....
Full Text Available Genes and their expression regulation are among the key factors in the comprehension of the genesis and development of complex diseases. In this context, microRNAs (miRNAs are post-transcriptional regulators that play an important role in gene expression since they are frequently deregulated in pathologies like cardiovascular disease and cancer. In vitro validation of miRNA--targets regulation is often too expensive and time consuming to be carried out for every possible alternative. As a result, a tool able to provide some criteria to prioritize trials is becoming a pressing need. Moreover, before planning in vitro experiments, the scientist needs to evaluate the miRNA-target genes interaction network. In this paper we describe the miRable method whose purpose is to identify new potentially relevant genes and their interaction networks associate to a specific pathology. To achieve this goal miRable follows a system biology approach integrating together general-purpose medical knowledge (literature, Protein-Protein Interaction networks, prediction tools and pathology specific data (gene expression data. A case study on Prostate Cancer has shown that miRable is able to: 1 find new potential miRNA-targets pairs, 2 highlight novel genes potentially involved in a disease but never or little studied before, 3 reconstruct all possible regulatory subnetworks starting from the literature to expand the knowledge on the regulation of miRNA regulatory mechanisms.
Full Text Available VANET is a hot spot of intelligent transportation researches. For vehicle users, the file sharing and content distribution through roadside access points (AP as well as the vehicular ad hoc networks (VANET have been an important complement to that cellular network. So the AP deployment is one of the key issues to improve the communication performance of VANET. In this paper, an access point optimization method is proposed based on particle swarm optimization algorithm. The transmission performances of the routing protocol with random linear network coding before and after the access point optimization are analyzed. The simulation results show the optimization model greatly affects the VANET transmission performances based on network coding, and it can enhance the delivery rate by 25% and 14% and reduce the average delay of transmission by 38% and 33%.
Africa is a net importer of intellectual property covered by copyright rules. The African Comparative Copyright Review (ACCR) believes that a stringent copyright climate could limit access to knowledge goods and thereby hinder the emergence of local innovation and learning. This project will allow the ACCR to bring ...
Legislative review : review of IPR Act and regulations : Intellectual Property Rights from Publically Financed Research and Development Act, Act No. 51 of 2008, Republic of South Africa. Download PDF. Journal articles. Copyright and education : lessons on African copyright and access to knowledge. Download PDF ...
Bachmayr-Heyda, Anna; Auer, Katharina; Sukhbaatar, Nyamdelger; Aust, Stefanie; Deycmar, Simon; Reiner, Agnes T; Polterauer, Stephan; Dekan, Sabine; Pils, Dietmar
High grade serous ovarian cancer (HGSOC) is among the most deadly malignancies in women, frequently involving peritoneal tumor spread. Understanding molecular mechanisms of peritoneal metastasis is essential to develop urgently needed targeted therapies. We described two peritoneal tumor spread types in HGSOC apparent during surgery: miliary (numerous millet-sized implants) and non-miliary (few big, bulky implants). The former one is defined by a more epithelial-like tumor cell characteristic with less immune cell reactivity and with significant worse prognosis, even if corrected for typical clinicopathologic factors.23 HGSOC patients were enrolled in this study. Isolated tumor cells from fresh tumor tissues of ovarian and peritoneal origin and from ascites were used for ribosomal RNA depleted RNA and small RNA sequencing. RT-qPCR was used to validate results and an independent cohort of 32 patients to validate the impact on survival. Large and small RNA sequencing data were integrated and a new gene-miRNA set analysis method was developed.Thousands of new small RNAs (miRNAs and piwi-interacting RNAs) were predicted and a 13 small RNA signature was developed to predict spread type from formalin-fixed paraffin-embedded tissues. Furthermore, integrative analyses of RNA sequencing and small RNA sequencing data revealed a global upregulation of the competing endogenous RNA network in tumor tissues of non-miliary compared to miliary spread, i.e. higher expression of circular RNAs and long non-coding RNAs compared to coding RNAs but unchanged abundance of small RNAs. This global deregulated expression pattern could be co-responsible for the spread characteristic, miliary or non-miliary, in ovarian cancer.
McPherson, Kevin M.; Moskowitz, Milton E.
The Principal Investigator Microgravity Services (PIMS) project at NASA's Lewis Research Center has supported microgravity science Principal Investigator's (PIs) by processing, analyzing, and storing the acceleration environment data recorded on the NASA Space Shuttles and the Russian Mir space station. The acceleration data recorded in support of the microgravity science investigated on these platforms has been generated in discrete blocks totaling approximately 48 gigabytes for the Orbiter missions and 50 gigabytes for the Mir increments. Based on the anticipated volume of acceleration data resulting from continuous or nearly continuous operations, the International Space Station (ISS) presents a unique set of challenges regarding the storage of and access to microgravity acceleration environment data. This paper presents potential microgravity environment data storage, access, and analysis concepts for the ISS era.
frequency hopping radio to mitigate the interference caused by other transmitters in a contentious environment such as the unlicensed 2.4 GHz region...Avionics Circle WPAFB, OH 45433 email@example.com 937- 528 -8269 AFRL/RYWE 12. DISTRIBUTION / AVAILABILITY STATEMENT DISTRIBUTION STATEMENT A...unlicensed 2.4 GHz region. Additionally, this work demonstrates how dynamic spectrum access techniques can be used not only to prevent interfering with
Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.
Full Text Available microRNAs (miRNAs are small noncoding RNAs that are important post-transcriptional regulators of gene expression. miRNAs can induce thresholds in protein synthesis. Such thresholds in protein output can be also achieved by oligomerization of transcription factors (TF for the control of gene expression. First, we propose a minimal model for protein expression regulated by miRNA and by oligomerization of TF. We show that miRNA and oligomerization of TF generate a buffer, which increases the robustness of protein output towards molecular noise as well as towards random variation of kinetics parameters. Next, we extend the model by considering that the same miRNA can bind to multiple messenger RNAs, which accounts for the dynamics of a minimal competing endogenous RNAs (ceRNAs network. The model shows that, through common miRNA regulation, TF can control the expression of all proteins formed by the ceRNA network, even if it drives the expression of only one gene in the network. The model further suggests that the threshold in protein synthesis mediated by the oligomerization of TF can be propagated to the other genes, which can increase the robustness of the expression of all genes in such ceRNA network. Furthermore, we show that a miRNA could increase the time delay of a "Goodwin-like" oscillator model, which may favor the occurrence of oscillations of large amplitude. This result predicts important roles of miRNAs in the control of the molecular mechanisms leading to the emergence of biological rhythms. Moreover, a model for the latter oscillator embedded in a ceRNA network indicates that the oscillatory behavior can be propagated, via the shared miRNA, to all proteins formed by such ceRNA network. Thus, by means of computational models, we show that miRNAs could act as vectors allowing the propagation of robustness in protein synthesis as well as oscillatory behaviors within ceRNA networks.
Soederholm, Patrik; Waarell, Linda [Luleaa University of Technology, Department of Business Administration and Social Sciences, Economics Unit, SE-971 87 Luleaa (Sweden)
The purpose of this paper is to analyse the possible effects of introducing TPA in district heating networks by identifying and scrutinizing a number of possible scenarios for increased competition. The analysis builds on a theoretical discussion of economic efficiency in district heating operations, and the possible impacts on consumer prices of a market opening. An important conclusion is that regulated TPA may have small positive effects on competition, and at the same time it can have a negative impact on the possibility to run the integrated district heating operations in a cost-effective manner. This conclusion stems in part from the observation that most district heating networks are local in scope. Moreover, district heating operations are highly interdependent in, for instance, that the level of the return temperature of the water will affect the efficiency of combined heat and power plants. For these reasons, the introduction of the so-called single-buyer model or, perhaps even more preferable, an extended and more transparent producer market could represent more efficient market designs. Moreover, in networks with clear natural monopoly characteristics an ex ante price regulation must be considered. (author)
Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio
This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.
Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.
The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.
Full Text Available MicroRNAs, which are small endogenous RNA regulators, have been associated with various types of cancer. Breast cancer is a major health threat for women worldwide. Many miRNAs were reported to be associated with the progression and carcinogenesis of breast cancer. In this study, we aimed to discover novel breast cancer-related miRNAs and to elucidate their functions. First, we identified confident miRNA-target pairs by combining data from miRNA target prediction databases and expression profiles of miRNA and mRNA. Then, miRNA-regulated protein interaction networks (PINs were constructed with confident pairs and known interaction data in the human protein reference database (HPRD. Finally, the functions of miRNA-regulated PINs were elucidated by functional enrichment analysis. From the results, we identified some previously reported breast cancer-related miRNAs and functions of the PINs, e.g., miR-125b, miR-125a, miR-21, and miR-497. Some novel miRNAs without known association to breast cancer were also found, and the putative functions of their PINs were also elucidated. These include miR-139 and miR-383. Furthermore, we validated our results by receiver operating characteristic (ROC curve analysis using our miRNA expression profile data, gene expression-based outcome for breast cancer online (GOBO survival analysis, and a literature search. Our results may provide new insights for research in breast cancer-associated miRNAs.
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
set of requirements. Lastly, the paper suggests a mechanism by which the information access or acquisition can be adapted as per the requirements of the application. The main parameters focused in this paper are mismatch probability  and power dissipation with respect to sampling rate....... specific WSN considering its resource constraints, neglecting the return-of-investment and usefulness of the system. In this paper, we bring out the WSN scenario which supports multiple applications and study the challenges that would pose in implementation as each specific application has its own specific...
Maly, Kurt J.; Zhang, L.; Game, David
Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.
Hong, Dan; Shen, Vincent Y.
The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.
RNA Futile Cycling in Model Persisters Derived from MazF Accumulation Wendy W. K. Mok,a Junyoung O. Park,a,b Joshua D. Rabinowitz,b,c Mark P...are consistent with a MazF-catalyzed RNA futile cycle , where the energy derived from catabolism is dissipated through continuous transcription and MazF...of transcription. Thus, in MazF model persisters, futile cycles of RNA synthesis and degradation result in both significant metabolic demands and
Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.
Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.
Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...
Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.
Chan, Jia Jia; Kwok, Zhi Hao; Chew, Xiao Hong; Zhang, Bin; Liu, Chao; Soong, Tuck Wah; Yang, Henry; Tay, Yvonne
Non-coding RNAs play a vital role in diverse cellular processes. Pseudogenes, which are non-coding homologs of protein-coding genes, were once considered non-functional evolutional relics. However, recent studies have shown that pseudogene transcripts can regulate their parental transcripts by sequestering shared microRNAs (miRNAs), thus acting as competing endogenous RNAs (ceRNAs). In this study, we utilize an unbiased screen to identify the ferritin heavy chain 1 (FTH1) transcript and multiple FTH1 pseudogenes as targets of several oncogenic miRNAs in prostate cancer (PCa). We characterize the critical role of this FTH1 gene:pseudogene:miRNA network in regulating tumorigenesis in PCa, whereby oncogenic miRNAs downregulate the expression of FTH1 and its pseudogenes to drive oncogenesis. We further show that impairing miRNA binding and subsequent ceRNA crosstalk completely rescues the slow growth phenotype in vitro and in vivo. Our results also demonstrate the reciprocal regulation between the pseudogenes and intracellular iron levels, which are crucial for multiple physiological and pathophysiological processes. In summary, we describe an extensive gene:pseudogene network comprising multiple miRNAs and multiple pseudogenes derived from a single parental gene. The network could be regulated through multiple mechanisms to modulate iron storage in various signaling pathways, the deregulation of which results in PCa development and progression. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.
Li, Jie; Wu, Zengrui; Cheng, Feixiong; Li, Weihua; Liu, Guixia; Tang, Yun
MicroRNAs (miRNAs) play important roles in multiple biological processes and have attracted much scientific attention recently. Their expression can be altered by environmental factors (EFs), which are associated with many diseases. Identification of the phenotype-genotype relationships among miRNAs, EFs, and diseases at the network level will help us to better understand toxicology mechanisms and disease etiologies. In this study, we developed a computational systems toxicology framework to predict new associations among EFs, miRNAs and diseases by integrating EF structure similarity and disease phenotypic similarity. Specifically, three comprehensive bipartite networks: EF-miRNA, EF-disease and miRNA-disease associations, were constructed to build predictive models. The areas under the receiver operating characteristic curves using 10-fold cross validation ranged from 0.686 to 0.910. Furthermore, we successfully inferred novel EF-miRNA-disease networks in two case studies for breast cancer and cigarette smoke. Collectively, our methods provide a reliable and useful tool for the study of chemical risk assessment and disease etiology involving miRNAs.
Bian, Kaigui; Gao, Bo
This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing. From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources. Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems. • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...
Puche, William S.; Sierra, Javier E.
This article analyzes the current state of green technologies in optical telecommunications networks, analyzing in detail the basic structure of a hybrid network (Optical-Wireless), taking into account energy consumption by proposing a mathematical model is presented to establish the optimum number of ONUs in a network.
Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette
time thresholds. The method is used successfully to create a multimodal travel-time network model of the Capital Region of Denmark comprising bus, train, light rail, metro, and ferry as well as integrating walking or cycling to stops. Here, the individual accessibility is defined as accessibility areas......The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... to integrate transit schedules into multimodal networks and measure space–time-based accessibility. This has caused authors to either simplify travel time elements or develop tools to overcome these challenges. In this paper we aim to describe and implement a method that enables integrating time-table data...
Full Text Available Reducing the energy consumption and carbon footprint emissions to improve the global climate change has become the global concern. However, CO2 generated from the current mobile devices and infrastructure has increased. Many researchers intended to develop the communication systems with low energy-consumption technologies, called the green communication. This paper proposes a framework of the load balanced green access network supporting the GSM femtocell service. By using the USRP software-defined radio device, we can build a GSM femtocell base station by software configuration. Besides, the proposed network can also extend the coverage of base stations by integrating with radio over fiber technology. With the load balancer, the proposed green access network can accomplish low power consumption, high energy efficiency, and easy to maintain. The experimental results showed that it can effectively save 24% energy consumption for the overall network and meet the quality-of-service of user when the proposed framework is applied.
Full Text Available The next fifth generation (5G of wireless communication networks comes with a set of new features to satisfy the demand of data-intensive applications: millimeter-wave frequencies, massive antenna arrays, beamforming, dense cells, and so forth. In this paper, we investigate the use of beamforming techniques through various architectures and evaluate the performance of 5G wireless access networks, using a capacity-based network deployment tool. This tool is proposed and applied to a realistic area in Ghent, Belgium, to simulate realistic 5G networks that respond to the instantaneous bit rate required by the active users. The results show that, with beamforming, 5G networks require almost 15% more base stations and 4 times less power to provide more capacity to the users and the same coverage performances, in comparison with the 4G reference network. Moreover, they are 3 times more energy efficient than the 4G network and the hybrid beamforming architecture appears to be a suitable architecture for beamforming to be considered when designing a 5G cellular network.
Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun
The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...
Full Text Available In signal field reconstruction applications of sensor network, the locations where the measurements are retrieved from affect the reconstruction performance. In this paper, we consider the design of medium access control (MAC protocols in sensor networks with mobile access for the desirable information retrieval pattern to minimize the reconstruction distortion. Taking both performance and implementation complexity into consideration, besides the optimal centralized scheduler, we propose three decentralized MAC protocols, namely, decentralized scheduling through carrier sensing, Aloha scheduling, and adaptive Aloha scheduling. Design parameters for the proposed protocols are optimized. Finally, performance comparison among these protocols is provided via simulations.
Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng
Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.
Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.
Full Text Available Alcohol consumption is known to lead to gene expression changes in the brain. After performing weighted gene co-expression network analyses (WGCNA on genome-wide mRNA and microRNA (miRNA expression in Nucleus Accumbens (NAc of subjects with alcohol dependence (AD; N = 18 and of matched controls (N = 18, six mRNA and three miRNA modules significantly correlated with AD were identified (Bonferoni-adj. p≤ 0.05. Cell-type-specific transcriptome analyses revealed two of the mRNA modules to be enriched for neuronal specific marker genes and downregulated in AD, whereas the remaining four mRNA modules were enriched for astrocyte and microglial specific marker genes and upregulated in AD. Gene set enrichment analysis demonstrated that neuronal specific modules were enriched for genes involved in oxidative phosphorylation, mitochondrial dysfunction and MAPK signaling. Glial-specific modules were predominantly enriched for genes involved in processes related to immune functions, i.e. cytokine signaling (all adj. p≤ 0.05. In mRNA and miRNA modules, 461 and 25 candidate hub genes were identified, respectively. In contrast to the expected biological functions of miRNAs, correlation analyses between mRNA and miRNA hub genes revealed a higher number of positive than negative correlations (χ2 test p≤ 0.0001. Integration of hub gene expression with genome-wide genotypic data resulted in 591 mRNA cis-eQTLs and 62 miRNA cis-eQTLs. mRNA cis-eQTLs were significantly enriched for AD diagnosis and AD symptom counts (adj. p = 0.014 and p = 0.024, respectively in AD GWAS signals in a large, independent genetic sample from the Collaborative Study on Genetics of Alcohol (COGA. In conclusion, our study identified putative gene network hubs coordinating mRNA and miRNA co-expression changes in the NAc of AD subjects, and our genetic (cis-eQTL analysis provides novel insights into the etiological mechanisms of AD.
This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and UDP (User Datagram Protocol) traffic flows show that the algorithm increases the throughput of TCP, improves the fairness between the two protocols, and solves the congestion problem at the SNI.
One of the major challenges that mobile operators are facing is the increasing power consumption costs as a consequence of the network densication experienced in current and future mobile access networks. This power increase causes both financial and environmental concerns to operators, since both the operational expenses and the CO2 emissions are affected. This Master Thesis investigates and analyses various deployment architectures in urban and suburban areas, considering both the radio acc...
This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.
Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet
The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep.
Full Text Available MicroRNAs (miRNAs are potent effectors in gene regulatory networks where aberrant miRNA expression can contribute to human diseases such as cancer. For a better understanding of the regulatory role of miRNAs in coordinating gene expression, we here present a systems biology approach combining data-driven modeling and model-driven experiments. Such an approach is characterized by an iterative process, including biological data acquisition and integration, network construction, mathematical modeling and experimental validation. To demonstrate the application of this approach, we adopt it to investigate mechanisms of collective repression on p21 by multiple miRNAs. We first construct a p21 regulatory network based on data from the literature and further expand it using algorithms that predict molecular interactions. Based on the network structure, a detailed mechanistic model is established and its parameter values are determined using data. Finally, the calibrated model is used to study the effect of different miRNA expression profiles and cooperative target regulation on p21 expression levels in different biological contexts.
Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang
Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.
Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.
Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the
Bertoni, Natália; Pereira, Lied M S; Severino, Fábio E; Moura, Regina; Yoshida, Winston B; Reis, Patricia P
Hemangioma is a common benign tumor in the childhood; however our knowledge about the molecular mechanisms of hemangioma development and progression are still limited. Currently, microRNAs (miRNAs) have been shown as gene expression regulators with an important role in disease pathogenesis. Our goals were to identify miRNA-mRNA expression networks associated with infantile hemangioma. We performed a meta-analysis of previously published gene expression datasets including 98 hemangioma samples. Deregulated genes were further used to identify microRNAs as potential regulators of gene expression in infantile hemangioma. Data were integrated using bioinformatics methods, and genes were mapped in proteins, which were then used to construct protein-protein interaction networks. Deregulated genes play roles in cell growth and differentiation, cell signaling, angiogenesis and vasculogenesis. Regulatory networks identified included microRNAs miR-9, miR-939 and let-7 family; these microRNAs showed the most number of interactions with deregulated genes in infantile hemangioma, suggesting that they may have an important role in the molecular mechanisms of disease. Additionally, results were used to identify drug-gene interactions and druggable gene categories using Drug-Gene Interaction Database. We show that microRNAs and microRNA-target genes may be useful biomarkers for the development of novel therapeutic strategies for patients with infantile hemangioma. microRNA-regulated pathways may play a role in infantile hemangioma development and progression and may be potentially useful for future development of novel therapeutic strategies for patients with infantile hemangioma.
Strijkers, R.J.; Norp, A.H.J.
The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway
Full Text Available Abstract Background We have recently identified a number of Quantitative Trait Loci (QTL contributing to the 2-fold muscle weight difference between the LG/J and SM/J mouse strains and refined their confidence intervals. To facilitate nomination of the candidate genes responsible for these differences we examined the transcriptome of the tibialis anterior (TA muscle of each strain by RNA-Seq. Results 13,726 genes were expressed in mouse skeletal muscle. Intersection of a set of 1061 differentially expressed transcripts with a mouse muscle Bayesian Network identified a coherent set of differentially expressed genes that we term the LG/J and SM/J Regulatory Network (LSRN. The integration of the QTL, transcriptome and the network analyses identified eight key drivers of the LSRN (Kdr, Plbd1, Mgp, Fah, Prss23, 2310014F06Rik, Grtp1, Stk10 residing within five QTL regions, which were either polymorphic or differentially expressed between the two strains and are strong candidates for quantitative trait genes (QTGs underlying muscle mass. The insight gained from network analysis including the ability to make testable predictions is illustrated by annotating the LSRN with knowledge-based signatures and showing that the SM/J state of the network corresponds to a more oxidative state. We validated this prediction by NADH tetrazolium reductase staining in the TA muscle revealing higher oxidative potential of the SM/J compared to the LG/J strain (p Conclusion Thus, integration of fine resolution QTL mapping, RNA-Seq transcriptome information and mouse muscle Bayesian Network analysis provides a novel and unbiased strategy for nomination of muscle QTGs.
Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars
In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...... of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell...
Delamater Paul L
Full Text Available Abstract Background Inequalities in geographic access to health care result from the configuration of facilities, population distribution, and the transportation infrastructure. In recent accessibility studies, the traditional distance measure (Euclidean has been replaced with more plausible measures such as travel distance or time. Both network and raster-based methods are often utilized for estimating travel time in a Geographic Information System. Therefore, exploring the differences in the underlying data models and associated methods and their impact on geographic accessibility estimates is warranted. Methods We examine the assumptions present in population-based travel time models. Conceptual and practical differences between raster and network data models are reviewed, along with methodological implications for service area estimates. Our case study investigates Limited Access Areas defined by Michigan’s Certificate of Need (CON Program. Geographic accessibility is calculated by identifying the number of people residing more than 30 minutes from an acute care hospital. Both network and raster-based methods are implemented and their results are compared. We also examine sensitivity to changes in travel speed settings and population assignment. Results In both methods, the areas identified as having limited accessibility were similar in their location, configuration, and shape. However, the number of people identified as having limited accessibility varied substantially between methods. Over all permutations, the raster-based method identified more area and people with limited accessibility. The raster-based method was more sensitive to travel speed settings, while the network-based method was more sensitive to the specific population assignment method employed in Michigan. Conclusions Differences between the underlying data models help to explain the variation in results between raster and network-based methods. Considering that the
Bussemaker Harmen J
Full Text Available Abstract Background Functional genomics studies are yielding information about regulatory processes in the cell at an unprecedented scale. In the yeast S. cerevisiae, DNA microarrays have not only been used to measure the mRNA abundance for all genes under a variety of conditions but also to determine the occupancy of all promoter regions by a large number of transcription factors. The challenge is to extract useful information about the global regulatory network from these data. Results We present MA-Networker, an algorithm that combines microarray data for mRNA expression and transcription factor occupancy to define the regulatory network of the cell. Multivariate regression analysis is used to infer the activity of each transcription factor, and the correlation across different conditions between this activity and the mRNA expression of a gene is interpreted as regulatory coupling strength. Applying our method to S. cerevisiae, we find that, on average, 58% of the genes whose promoter region is bound by a transcription factor are true regulatory targets. These results are validated by an analysis of enrichment for functional annotation, response for transcription factor deletion, and over-representation of cis-regulatory motifs. We are able to assign directionality to transcription factors that control divergently transcribed genes sharing the same promoter region. Finally, we identify an intrinsic limitation of transcription factor deletion experiments related to the combinatorial nature of transcriptional control, to which our approach provides an alternative. Conclusion Our reliable classification of ChIP positives into functional and non-functional TF targets based on their expression pattern across a wide range of conditions provides a starting point for identifying the unknown sequence features in non-coding DNA that directly or indirectly determine the context dependence of transcription factor action. Complete analysis results are
Valles, A.; Martens, G.J.; Weerd, P. de; Poelmans, G.J.V.; Aschrafi, A.
BACKGROUND: Schizophrenia is a highly heritable neurodevelopmental disorder. A genetic variant of microRNA-137 (miR-137) has yielded significant genome-wide association with schizophrenia, suggesting that this miRNA plays a key role in its etiology. Therefore, a molecular network of interacting
Xin Wang; Jari Nurmi
Two network-on-chip (NoC) designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA) connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS) scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, ...
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.
Mariane Gonçalves Ferreira
Full Text Available ABSTRACT Germplasm classification by species requires specific knowledge on/of the culture of interest. Therefore, efforts aimed at automation of this process are necessary for the efficient management of collections. Automation of germplasm classification through artificial neural networks may be a viable and less laborious strategy. The aims of this study were to verify the classification potential of Capsicum accessions regarding/ the species based on morphological descriptors and artificial neural networks, and to establish the most important descriptors and the best network architecture for this purpose. Five hundred and sixty-four plants from 47 Brazilian Capsicum accessions were evaluated. Neural networks of multilayer perceptron type were used in order to automate the species identification through 17 morphological descriptors. Six network architectures were evaluated, and the number of neurons in the hidden layer ranged from 1 to 6. The relative importance of morphological descriptors in the classification process was established by Garson's method. Corolla color, corolla spot color, calyx annular constriction, fruit shape at pedicel attachment, and fruit color at mature stage were the most important descriptors. The network architecture with 6 neurons in the hidden layer is the most appropriate in this study. The possibility of classifying Capsicum plants regarding/ the species through artificial neural networks with 100 % accuracy was verified.
Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.
Samad, Abdul F. A.; Sajad, Muhammad; Nazaruddin, Nazaruddin; Fauzi, Izzat A.; Murad, Abdul M. A.; Zainal, Zamri; Ismail, Ismanizan
Recent achievements in plant microRNA (miRNA), a large class of small and non-coding RNAs, are very exciting. A wide array of techniques involving forward genetic, molecular cloning, bioinformatic analysis, and the latest technology, deep sequencing have greatly advanced miRNA discovery. A tiny miRNA sequence has the ability to target single/multiple mRNA targets. Most of the miRNA targets are transcription factors (TFs) which have paramount importance in regulating the plant growth and development. Various families of TFs, which have regulated a range of regulatory networks, may assist plants to grow under normal and stress environmental conditions. This present review focuses on the regulatory relationships between miRNAs and different families of TFs like; NF-Y, MYB, AP2, TCP, WRKY, NAC, GRF, and SPL. For instance NF-Y play important role during drought tolerance and flower development, MYB are involved in signal transduction and biosynthesis of secondary metabolites, AP2 regulate the floral development and nodule formation, TCP direct leaf development and growth hormones signaling. WRKY have known roles in multiple stress tolerances, NAC regulate lateral root formation, GRF are involved in root growth, flower, and seed development, and SPL regulate plant transition from juvenile to adult. We also studied the relation between miRNAs and TFs by consolidating the research findings from different plant species which will help plant scientists in understanding the mechanism of action and interaction between these regulators in the plant growth and development under normal and stress environmental conditions. PMID:28446918
van Hoesel, L.F.W.; Havinga, Paul J.M.; Chatterjea, Supriyo
In this paper we present a novel TDMA-based medium access control (MAC) protocol for wireless sensor networks. Unlike conventional MAC protocols which function independently of the application, we introduce an Adaptive, Information-centric and Lightweight MAC(AI-LMAC) protocol that adapts its
Linnenbank, G.R.J.; Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Mullender, Sape J.; Smulders, P.; van den Meerendonk, H.
This paper describes a cellular multiple-access scheme based on TDMA for multimedia communication networks. The scheme proposes an admission control of two different multimedia application stream types: real-time and non-real-time. We do not consider interference between cells. The proposed
Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars
In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....
Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro
In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.
Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso
In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we c...
van Berchum, M.; Kraaikamp, Emilie
Data Archiving and Networked Services (DANS) promotes sustained access to digital research data. For this purpose, DANS encourages researchers to archive and reuse data in a sustained form. In the online archiving system EASY research data is stored in a permanent and sustainable manner, according
Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso
A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...
Nielsen, Anne Møller; Folke, Fredrik; Lippert, Freddy Knudsen
BACKGROUND: Automated External Defibrillators (AEDs) are known to increase survival after out-of-hospital cardiac arrest (OHCA). The aim of this study was to examine the use and benefit of public-access defibrillation (PAD) in a nation-wide network. We primarily sought to assess survival at 1 month...
Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.
Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...
Singh, Puja; Prakash, Shashi
Hybrid wireless-optical broadband access network (WOBAN) or Fiber-Wireless (FiWi) is the integration of wireless access network and optical network. This hybrid multi-domain network adopts the advantages of wireless and optical domains and serves the demand of technology savvy users. FiWi exhibits the properties of cost effectiveness, robustness, flexibility, high capacity, reliability and is self organized. Optical Network Unit (ONU) placement problem in FiWi contributes in simplifying the network design and enhances the performance in terms of cost efficiency and increased throughput. Several individual-based algorithms, such as Simulated Annealing (SA), Tabu Search, etc. have been suggested for ONU placement, but these algorithms suffer from premature convergence (trapping in a local optima). The present research work undertakes the deployment of FiWi and proposes a novel nature-inspired heuristic paradigm called Moth-Flame optimization (MFO) algorithm for multiple optical network units' placement. MFO is a population based algorithm. Population-based algorithms are better in handling local optima avoidance. The simulation results are compared with the existing Greedy and Simulated Annealing algorithms to optimize the position of ONUs. To the best of our knowledge, MFO algorithm has been used for the first time in this domain, moreover it has been able to provide very promising and competitive results. The performance of MFO algorithm has been analyzed by varying the 'b' parameter. MFO algorithm results in faster convergence than the existing strategies of Greedy and SA and returns a lower value of overall cost function. The results exhibit the dependence of the objective function on the distribution of wireless users also.
Full Text Available MicroRNAs, a new class of key regulators of gene expression, have been shown to be involved in diverse biological processes and linked to many human diseases. To elucidate miRNA function from a global perspective, we constructed a conserved miRNA co-expression network by integrating multiple human and mouse miRNA expression data. We found that these conserved co-expressed miRNA pairs tend to reside in close genomic proximity, belong to common families, share common transcription factors, and regulate common biological processes by targeting common components of those processes based on miRNA targets and miRNA knockout/transfection expression data, suggesting their strong functional associations. We also identified several co-expressed miRNA sub-networks. Our analysis reveals that many miRNAs in the same sub-network are associated with the same diseases. By mapping known disease miRNAs to the network, we identified three cancer-related miRNA sub-networks. Functional analyses based on targets and miRNA knockout/transfection data consistently show that these sub-networks are significantly involved in cancer-related biological processes, such as apoptosis and cell cycle. Our results imply that multiple co-expressed miRNAs can cooperatively regulate a given biological process by targeting common components of that process, and the pathogenesis of disease may be associated with the abnormality of multiple functionally cooperative miRNAs rather than individual miRNAs. In addition, many of these co-expression relationships provide strong evidence for the involvement of new miRNAs in important biological processes, such as apoptosis, differentiation and cell cycle, indicating their potential disease links.
Full Text Available Researchers benefit from an increasing array of tools to enhance direct communication and the dissemination of their research findings. These include Open Access repositories, Open Access journals, or hybrid publishing. For some years, researchers have been using new ways to communicate and share their work by using academic social networks.In an attempt to foster the development of Open Access in France, the French consortium COUPERIN (Unified Consortium of Higher Education and Research Organizations for Access to Numerical Publications proposed that academic social networks could be used to convince researchers of becoming more involved in Open Access. To test this hypothesis, a nationwide survey was launched in 2014 to explore whether and how these academic social networks are used to share content, but also how they compare to other Open Access classic tools. Within a month (20 May to 20 June, 1,898 researchers answered this 28-question survey. It was fully completed by 1,698 of them. This provides COUPERIN with considerable data for analysis. The respondents roughly reflect the composition of the French academic community in terms of gender and research fields, with a slight overrepresentation of young researchers/ PhD candidates.This survey does not, however, cover the in-depth opinions of researchers on Open Access and academic social networks. It therefore only presents general tendencies. Nonetheless, the survey gives many indications as to how researchers apply Open Access. In addition, it shows how they feel about the usefulness of these networks compared to repositories when efficiently disseminating their work. This survey also takes the differences between disciplines into account and characterizes behaviour and opinions according to the different disciplinary communities and their research practices.Finally, this survey allows us to define the main characteristics of a tool which could meet French researchers’ needs for
Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.
Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk
a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less......In this paper we propose the one4all cooperative access strategy to introduce a more efficient media access strategy for wireless networks. The one4all scheme is designed for the infrastructure based distributed wireless network architecture. The basic idea is that mobile devices can form...... energy consumption. Based on an analytical model, the proposed strategy is compared with the two existing strategies RTS/CTS (request to send/ clear to send) and packet aggregation. The results show that the proposed cooperative scheme has similar throughput performance as packet aggregation and it has...
Full Text Available Co-expression networks have long been used as a tool for investigating the molecular circuitry governing biological systems. However, most algorithms for constructing co-expression networks were developed in the microarray era, before high-throughput sequencing-with its unique statistical properties-became the norm for expression measurement. Here we develop Bayesian Relevance Networks, an algorithm that uses Bayesian reasoning about expression levels to account for the differing levels of uncertainty in expression measurements between highly- and lowly-expressed entities, and between samples with different sequencing depths. It combines data from groups of samples (e.g., replicates to estimate group expression levels and confidence ranges. It then computes uncertainty-moderated estimates of cross-group correlations between entities, and uses permutation testing to assess their statistical significance. Using large scale miRNA data from The Cancer Genome Atlas, we show that our Bayesian update of the classical Relevance Networks algorithm provides improved reproducibility in co-expression estimates and lower false discovery rates in the resulting co-expression networks. Software is available at www.perkinslab.ca.
Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.
Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.
Barany, Ernest; Krupa, Maciej
A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.
Yang, Shuang; Ning, Qianqian; Zhang, Guobin; Sun, Hong; Wang, Zhen; Li, Yixue
Increasing evidence has indicated that lncRNAs acting as competing endogenous RNAs (ceRNAs) play crucial roles in tumorigenesis, metastasis and diagnosis of cancer. However, the function of lncRNAs as ceRNAs involved in esophageal squamous cell carcinoma (ESCC) is still largely unknown. In this study, clinical implications of two intrinsic subtypes of ESCC were identified based on expression profiles of lncRNA and mRNA. ESCC subtype-specific differential co-expression networks between mRNAs and lncRNAs were constructed to reveal dynamic changes of their crosstalks mediated by miRNAs during tumorigenesis. Several well-known cancer-associated lncRNAs as the hubs of the two networks were firstly proposed in ESCC. Based on the ceRNA mechanism, we illustrated that the"loss" of miR-186-mediated PVT1-mRNA and miR-26b-mediated LINC00240-mRNA crosstalks were related to the two ESCC subtypes respectively. In addition, crosstalks between LINC00152 and EGFR, LINC00240 and LOX gene family were identified, which were associated with the function of "response to wounding" and "extracellular matrix-receptor interaction". Furthermore, functional cooperation of multiple lncRNAs was discovered in the two differential mRNA-lncRNA crosstalk networks. These together systematically uncovered the roles of lncRNAs as ceRNAs implicated in ESCC.
Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders
This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...
Dassi, Erik; Zuccotti, Paola; Leo, Sara; Provenzani, Alessandro; Assfalg, Michael; D'Onofrio, Mariapina; Riva, Paola; Quattrone, Alessandro
Little is known regarding the post-transcriptional networks that control gene expression in eukaryotes. Additionally, we still need to understand how these networks evolve, and the relative role played in them by their sequence-dependent regulatory factors, non-coding RNAs (ncRNAs) and RNA-binding proteins (RBPs). Here, we used an approach that relied on both phylogenetic sequence sharing and conservation in the whole mapped 3'-untranslated regions (3'-UTRs) of vertebrate species to gain knowledge on core post-transcriptional networks. The identified human hyper conserved elements (HCEs) were predicted to be preferred binding sites for RBPs and not for ncRNAs, namely microRNAs and long ncRNAs. We found that the HCE map identified a well-known network that post-transcriptionally regulates histone mRNAs. We were then able to discover and experimentally confirm a translational network composed of RNA Recognition Motif (RRM)-type RBP mRNAs that are positively controlled by HuR, another RRM-type RBP. HuR shows a preference for these RBP mRNAs bound in stem-loop motifs, confirming its role as a 'regulator of regulators'. Analysis of the transcriptome-wide HCE distribution revealed a profile of prevalently small clusters separated by unconserved intercluster RNA stretches, which predicts the formation of discrete small ribonucleoprotein complexes in the 3'-UTRs.
Matis, S.; Shah, M.; Mural, R.; Uberbacher, E.
One of the most difficult problems in the analysis of eucaryotic genes is the detection of RNA polymerase II promoter regions. Although promoter regions vary in the primary DNA sequence, a basic group of core promoter elements has been suggested in the literature. Many human promoter sequences contain a TATAA sequence element at approximately 30 bases upstream of the cap site (transcription start site). Other elements are the GC box which binds SPA and upregulates transcription, the CAAT box, and the ATG initiator codon. To characterize promoters, we constructed frequency matrices for each element using experimentally mapped human promoter regions. Additionally, we constructed histograms for the distances separating the various elements. We then used a neural network to combine these informational elements. The output of the neural network is then processed using a set of expert rules which depend on GRAIL`s ability to find exons in anonymous DNA. This improves the selectivity of promoter detection and reduces the false positive rate.
McSweeney, K Melodi; Gussow, Ayal B; Bradrick, Shelton S; Dugger, Sarah A; Gelfman, Sahar; Wang, Quanli; Petrovski, Slavé; Frankel, Wayne N; Boland, Michael J; Goldstein, David B
Cultured neuronal networks monitored with microelectrode arrays (MEAs) have been used widely to evaluate pharmaceutical compounds for potential neurotoxic effects. A newer application of MEAs has been in the development of in vitro models of neurological disease. Here, we directly evaluated the utility of MEAs to recapitulate in vivo phenotypes of mature microRNA-128 (miR-128) deficiency, which causes fatal seizures in mice. We show that inhibition of miR-128 results in significantly increased neuronal activity in cultured neuronal networks derived from primary mouse cortical neurons. These results support the utility of MEAs in developing in vitro models of neuroexcitability disorders, such as epilepsy, and further suggest that MEAs provide an effective tool for the rapid identification of microRNAs that promote seizures when dysregulated. © 2016 McSweeney et al.; Published by Cold Spring Harbor Laboratory Press.
Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level
Vera, Julio; Lai, Xin; Schmitz, Ulf; Wolkenhauer, Olaf
MicroRNAs (miRNAs) are involved in many regulatory pathways some of which are complex networks enriched in regulatory motifs like positive or negative feedback loops or coherent and incoherent feedforward loops. Their complexity makes the understanding of their regulation difficult and the interpretation of experimental data cumbersome. In this book chapter we claim that systems biology is the appropriate approach to investigate the regulation of these miRNA-regulated networks. Systems biology is an interdisciplinary approach by which biomedical questions on biochemical networks are addressed by integrating experiments with mathematical modelling and simulation. We here introduce the foundations of the systems biology approach, the basic theoretical and computational tools used to perform model-based analyses of miRNA-regulated networks and review the scientific literature in systems biology of miRNA regulation, with a focus on cancer.
Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun
Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.
Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.
Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.
The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.
Radaydeh, Redha Mahmoud Mesleh
Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Antonio F. Gomez Skarmeta
Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Full Text Available Recent research data reveal complex, network-based interactions between mobile elements and regulatory systems of eukaryotic cells. In this article, we focus on regulatory interactions between Alu elements and micro RNAs (miRNAs. Our results show that the majority of the Alu sequences inserted in 3’UTRs of analyzed human genes carry strong potential target sites for at least 53 different miRNAs. Thus, 3’UTR-locared Alu elements may play the role of mobile regulatory modules that supply binding sites for miRNA regulation. Their abundance and ability to distribute a set of certain miRNA target sites may have important role in establishment, extension, network-like organization, and, as we suppose – in the regulation and environment-dependent activation/inactivation of some elements of the miRNA regulatory system, as well as for a larger scale RNA-based regulatory interactions. The Alu-miRNA connection may be crucial especially for the primate/human evolution.
Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus
measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results......Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...
In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.
Minh T N Le
Full Text Available MicroRNAs regulate networks of genes to orchestrate cellular functions. MiR-125b, the vertebrate homologue of the Caenorhabditis elegans microRNA lin-4, has been implicated in the regulation of neural and hematopoietic stem cell homeostasis, analogous to how lin-4 regulates stem cells in C. elegans. Depending on the cell context, miR-125b has been proposed to regulate both apoptosis and proliferation. Because the p53 network is a central regulator of both apoptosis and proliferation, the dual roles of miR-125b raise the question of what genes in the p53 network might be regulated by miR-125b. By using a gain- and loss-of-function screen for miR-125b targets in humans, mice, and zebrafish and by validating these targets with the luciferase assay and a novel miRNA pull-down assay, we demonstrate that miR-125b directly represses 20 novel targets in the p53 network. These targets include both apoptosis regulators like Bak1, Igfbp3, Itch, Puma, Prkra, Tp53inp1, Tp53, Zac1, and also cell-cycle regulators like cyclin C, Cdc25c, Cdkn2c, Edn1, Ppp1ca, Sel1l, in the p53 network. We found that, although each miRNA-target pair was seldom conserved, miR-125b regulation of the p53 pathway is conserved at the network level. Our results lead us to propose that miR-125b buffers and fine-tunes p53 network activity by regulating the dose of both proliferative and apoptotic regulators, with implications for tissue stem cell homeostasis and oncogenesis.
The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks
Chow, C W; Lin, Y H
To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.
Saad, Walid; Zheng, Rong; Hjørungnes, Are; Başar, Tamer; Poor, H Vincent
Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and spectrum access. Although each SU has an incentive to sense the primary user (PU) channels for locating spectrum holes, this exploration of the spectrum can come at the expense of a shorter transmission time, and, hence, a possibly smaller capacity for data transmission. This paper investigates the impact of this tradeoff on the cooperative strategies of a network of SUs that seek to cooperate in order to improve their view of the spectrum (sensing), reduce the possibility of interference among each other, and improve their transmission capacity (access). The problem is modeled as a coalitional game in partition form and an algorithm for coalition formation is proposed. Using the proposed algorithm, the SUs can make individual distributed decisions to join or leave a coalition while maximizing their utilities which capture the average time spent for sensing as well as the capacity achi...
Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.
Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted
Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...... of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element...
Lee, Brian; Vanickis, Roman; Rogelio, Franklin; Jacob, Paul
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy. Such security models incorporate risk arising from dynamic and situational factors, such as device location and security risk level risk, into the access control decision. Researchers have developed...
Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova
In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...... with respect to the communication network delays. These measurements are done in regards to packet loss and communication delays, and the simulations are rerun using either the traces from the measurements or scenarios constructed from the delay parameters....
Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei
Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.
Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.
Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.
Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.
Nie, Ting; Li, Manchun; Jiang, Zhixin; Huang, Kang
Accessibility is an important indicator of regional land-use, social justice and quality of life. It means the convenience from one place to another in a specified kind of transportation system. Wide-region based, most of the present domestic accessibility research took the high-grade highway such as highway and railway as entirely open road, without considering the service that high-grade highway provides based on intersection and railway station. This study extended to put forward arithmetic to deal with this problem in a micro-regional study area. Taking New District, Wuxi City, Jiangsu Province as a study case, this study researched the assessment of micro-regional internal accessibility based on road network including closed road. This study provides a tool to regional economical and social decision, and introduces a new view for studying relationship between people and land-use in micro-district.
Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander
The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure. In this ......The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure...... radio-over-fiber (RoF) systems; this is a promising solution to implement broadband seamless wireless -wireline access networks. This project successfully concluded in autumn 2013, and is being follow up by another Marie Curie project entitled “flexible edge nodes for dynamic optical interconnection...
Li, Hantao; Liu, Kai; Zhang, Jun
Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.
The advent of smartphones and tablets over the past several years has resulted in a drastic increase of global carbon footprint, due to the explosive growth of data traffic. Improving energy efficiency (EE) becomes, therefore, a crucial design metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network. This paper considers a C-RAN system formed by several clusters of remote radio heads (RRHs), each serving a predetermined set of mobile users (MUs), and assumes imperfect channel state information (CSI). The network performance becomes therefore a function of the intra-cluster and inter-cluster interference, as well as the channel estimation error. The paper optimizes the transmit power of each RRH in order to maximize the network global EE subject to MU service rate requirements and RRHs maximum power constraints. The paper proposes solving the optimization problem using a heuristic algorithm based on techniques from optimization theory via a two-stage iterative solution. Simulation results show that the proposed power allocation algorithm provides an appreciable performance improvement as compared to the conventional systems with maximum power transmission strategy. They further highlight the convergence of the proposed algorithm for different networks scenarios.
Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva
As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.
Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.
Cristina Marques de Almeida Holanda
Full Text Available This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses and people outside the family (friends and neighbors. However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.
Dhifallah, Oussama Najeeb
Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several base-stations (BS) through limited-capacity wireline backhaul links. The set of BSs connected to each cloud, called cluster, serves a set of pre-known mobile users (MUs). The performance of the system becomes therefore a function of both inter-cloud and intra-cloud interference, as well as the compression schemes of the limited capacity backhaul links. The paper assumes independent compression scheme and imperfect channel state information (CSI) where the CSI errors belong to an ellipsoidal bounded region. The problem of interest becomes the one of minimizing the network total transmit power subject to BS power and quality of service constraints, as well as backhaul capacity and CSI error constraints. The paper suggests solving the problem using the alternating direction method of multipliers (ADMM). One of the highlight of the paper is that the proposed ADMM-based algorithm can be implemented in a distributed fashion across the multi-cloud network by allowing a limited amount of information exchange between the coupled clouds. Simulation results show that the proposed distributed algorithm provides a similar performance to the centralized algorithm in a reasonable number of iterations.
Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva
This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.
Fatemeh. Dehghani; Shahram. Darooei
Network on chip has emerged as a long-term and effective method in Multiprocessor System-on-Chip communications in order to overcome the bottleneck in bus based communication architectures. Efficiency and performance of network on chip is so dependent on the architecture and structure of the network. In this paper a new structure and architecture for adaptive traffic control in network on chip using Code Division Multiple Access technique is presented. To solve the problem of synchronous acce...
Tonelli, Oscar; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão
activities with the Autonomous Component Carrier Selection (ACCS) algorithm, a distributed solution for interference management among small neighboring cells. A preliminary evaluation of the algorithm performance is provided considering its live execution on a software defined radio network testbed......Next generation wireless networks aim at a significant improvement of the spectral efficiency in order to meet the dramatic increase in data service demand. In local area scenarios user-deployed base stations are expected to take place, thus making the centralized planning of frequency resources...... among the cells, a non-viable solution. Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) are the research paradigms which are expected to provide the network nodes the capabilities for an autonomous and efficient selection of the spectrum resources. In this paper we present the first experimental...
da Costa, Fernando; Gaspary, Luciano; Barbosa, Jorge; Cavalheiro, Gerson; Pfitscher, Luciano; Ramos, José Dirceu G.
Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.
In this paper, we derive a statistical model of the co-tier interference in closed access two tier heterogeneous wireless cellular networks with femtocell deployments. The derived model captures the impact of bounded path loss model, wall penetration loss, user distributions, random locations, and density of the femtocells. Firstly, we derive the analytical expressions for the probability density function (PDF) and moment generating function (MGF) of the co-tier interference considering a single femtocell interferer by exploiting the random disc line picking theory from geometric probability. We then derive the MGF of the cumulative interference from all femtocell interferers considering full spectral reuse in each femtocell. Orthogonal spectrum partitioning is assumed between the macrocell and femtocell networks to avoid any cross-tier interference. Finally, the accuracy of the derived expressions is validated through Monte-Carlo simulations and the expressions are shown to be useful in quantifying important network performance metrics such as ergodic capacity. © 2013 IEEE.
Franco Mazzenga; Romeo Giuliano; Francesco Vatalaro
One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes) at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core net...
Prabahar, Archana; Natarajan, Jeyakumar
Autoimmune diseases (AIDs) are incurable but suppressible diseases whose molecular mechanisms are yet to be elucidated. In this work, we selected five systemic autoimmune diseases such as Rheumatoid Arthritis (RA), Type 1 Diabetes (T1D), Inflammatory Bowel Disease (IBD), Autoimmune Thyroid Disease (ATD) and Systemic Lupus Erythematosus (SLE). Heterogeneous data such as miRNA, transcription factor (TF), target genes and protein-protein interactions involved in these AIDs were integrated to understand their roles at different functional levels of miRNA such as transcription initiation, gene regulatory network formation and post transcriptional regulation. To understand the functional characteristics of these complex biological networks, they can be simplified as network motifs (sub networks) and motif-motif interacting pairs (MMIs). The network motif patterns and motif-motif interacting pairs that occur for the selected five diseases were identified. To further understand the functional association between AIDs, functions and pathways were determined using gene set enrichment analysis and five selected immune signaling pathways (ISPs). The crosstalk within AIDs and between the immune signaling pathways (ISPs) could provide novel insights in deciphering disease mechanisms. This study represents the first investigation of miRNA-TF regulatory network for AIDs and its association with ISPs using sub-network motifs. Copyright © 2016 Elsevier B.V. All rights reserved.
Moraes, Leonardo N; Fernandez, Geysson J; Vechetti-Júnior, Ivan J
Cardiac cachexia (CC) is a common complication of heart failure (HF) associated with muscle wasting and poor patient prognosis. Although different mechanisms have been proposed to explain muscle wasting during CC, its pathogenesis is still not understood. Here, we described an integrative analysis...... between miRNA and mRNA expression profiles of muscle wasting during CC. Global gene expression profiling identified 1,281 genes and 19 miRNAs differentially expressed in muscle wasting during CC. Several of these deregulated genes are known or putative targets of the altered miRNAs, including miR-29a-3p......, miR-29b-3p, miR-210-5p, miR-214, and miR-489. Gene ontology analysis on integrative mRNA/miRNA expression profiling data revealed miRNA interactions affecting genes that regulate extra-cellular matrix (ECM) organization, proteasome protein degradation, citric acid cycle and respiratory electron...
Zhang, Junwen; Yu, Jianjun; Chi, Nan
Digital signal processing (DSP) has been proved to be a successful technology recently in high speed and high spectrum-efficiency optical short-haul and access network, which enables high performances based on digital equalizations and compensations. In this paper, we investigate advanced DSP at the transmitter and receiver side for signal pre-equalization and post-equalization in an optical access network. A novel DSP-based digital and optical pre-equalization scheme has been proposed for bandwidth-limited high speed short-distance communication system, which is based on the feedback of receiver-side adaptive equalizers, such as least-mean-squares (LMS) algorithm and constant or multi-modulus algorithms (CMA, MMA). Based on this scheme, we experimentally demonstrate 400GE on a single optical carrier based on the highest ETDM 120-GBaud PDM-PAM-4 signal, using one external modulator and coherent detection. A line rate of 480-Gb/s is achieved, which enables 20% forward-error correction (FEC) overhead to keep the 400-Gb/s net information rate. The performance after fiber transmission shows large margin for both short range and metro/regional networks. We also extend the advanced DSP for short haul optical access networks by using high order QAMs. We propose and demonstrate a high speed multi-band CAP-WDM-PON system on intensity modulation, direct detection and digital equalizations. A hybrid modified cascaded MMA post-equalization schemes are used to equalize the multi-band CAP-mQAM signals. Using this scheme, we successfully demonstrates 550Gb/s high capacity WDMPON system with 11 WDM channels, 55 sub-bands, and 10-Gb/s per user in the downstream over 40-km SMF.
Kelley, David R; Snoek, Jasper; Rinn, John L
The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance-deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome. © 2016 Kelley et al.; Published by Cold Spring Harbor Laboratory Press.
Full Text Available Grapevine berry development is a complex and genetically controlled process, with many morphological, biochemical and physiological changes occurring during the maturation process. Research carried out on grapevine berry development has been mainly concerned with wine grape, while barely focusing on table grape. 'Fujiminori' is an important table grapevine cultivar, which is cultivated in most provinces of China. In order to uncover the dynamic networks involved in anthocyanin biosynthesis, cell wall development, lipid metabolism and starch-sugar metabolism in 'Fujiminori' fruit, we employed RNA-sequencing (RNA-seq and analyzed the whole transcriptome of grape berry during development at the expanding period (40 days after full bloom, 40DAF, véraison period (65DAF, and mature period (90DAF. The sequencing depth in each sample was greater than 12×, and the expression level of nearly half of the expressed genes were greater than 1. Moreover, greater than 64% of the clean reads were aligned to the Vitis vinifera reference genome, and 5,620, 3,381, and 5,196 differentially expressed genes (DEGs were identified between different fruit stages, respectively. Results of the analysis of DEGs showed that the most significant changes in various processes occurred from the expanding stage to the véraison stage. The expression patterns of F3'H and F3'5'H were crucial in determining red or blue color of the fruit skin. The dynamic networks of cell wall development, lipid metabolism and starch-sugar metabolism were also constructed. A total of 4,934 SSR loci were also identified from 4,337 grapevine genes, which may be helpful for the development of phylogenetic analysis in grapevine and other fruit trees. Our work provides the foundation for developmental research of grapevine fruit as well as other non-climacteric fruits.
Shangguan, Lingfei; Mu, Qian; Fang, Xiang; Zhang, Kekun; Jia, Haifeng; Li, Xiaoying; Bao, Yiqun; Fang, Jinggui
Grapevine berry development is a complex and genetically controlled process, with many morphological, biochemical and physiological changes occurring during the maturation process. Research carried out on grapevine berry development has been mainly concerned with wine grape, while barely focusing on table grape. 'Fujiminori' is an important table grapevine cultivar, which is cultivated in most provinces of China. In order to uncover the dynamic networks involved in anthocyanin biosynthesis, cell wall development, lipid metabolism and starch-sugar metabolism in 'Fujiminori' fruit, we employed RNA-sequencing (RNA-seq) and analyzed the whole transcriptome of grape berry during development at the expanding period (40 days after full bloom, 40DAF), véraison period (65DAF), and mature period (90DAF). The sequencing depth in each sample was greater than 12×, and the expression level of nearly half of the expressed genes were greater than 1. Moreover, greater than 64% of the clean reads were aligned to the Vitis vinifera reference genome, and 5,620, 3,381, and 5,196 differentially expressed genes (DEGs) were identified between different fruit stages, respectively. Results of the analysis of DEGs showed that the most significant changes in various processes occurred from the expanding stage to the véraison stage. The expression patterns of F3'H and F3'5'H were crucial in determining red or blue color of the fruit skin. The dynamic networks of cell wall development, lipid metabolism and starch-sugar metabolism were also constructed. A total of 4,934 SSR loci were also identified from 4,337 grapevine genes, which may be helpful for the development of phylogenetic analysis in grapevine and other fruit trees. Our work provides the foundation for developmental research of grapevine fruit as well as other non-climacteric fruits.
Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook
Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.
Dhifallah, Oussama Najeeb
Recent studies on cloud-radio access networks (CRANs) assume the availability of a single processor (cloud) capable of managing the entire network performance; inter-cloud interference is treated as background noise. This paper considers the more practical scenario of the downlink of a CRAN formed by multiple clouds, where each cloud is connected to a cluster of multiple-antenna base stations (BSs) via high-capacity wireline backhaul links. The network is composed of several disjoint BSs\\' clusters, each serving a pre-known set of single-antenna users. To account for both inter- cloud and intra-cloud interference, the paper considers the problem of minimizing the total network power consumption subject to quality of service constraints, by jointly determining the set of active BSs connected to each cloud and the beamforming vectors of every user across the network. The paper solves the problem using Lagrangian duality theory through a dual decomposition approach, which decouples the problem into multiple and independent subproblems, the solution of which depends on the dual optimization problem. The solution then proceeds in updating the dual variables and the active set of BSs at each cloud iteratively. The proposed approach leads to a distributed implementation across the multiple clouds through a reasonable exchange of information between adjacent clouds. The paper further proposes a centralized solution to the problem. Simulation results suggest that the proposed algorithms significantly outperform the conventional per-cloud update solution, especially at high signal-to-interference-plus- noise ratio (SINR) target.
Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.
Iannello, Fabio; Spagnolini, Umberto
The design of Medium Access Control (MAC) protocols for wireless sensor networks (WSNs) has been conventionally tackled by assuming battery-powered devices and by adopting the network lifetime as the main performance criterion. While WSNs operated by energy-harvesting (EH) devices are not limited by network lifetime, they pose new design challenges due to the uncertain amount of harvestable energy. Novel design criteria are thus required to capture the trade-offs between the potentially infinite network lifetime and the uncertain energy availability. This paper addresses the analysis and design of WSNs with EH devices by focusing on conventional MAC protocols, namely TDMA, Framed-ALOHA (FA) and Dynamic-FA (DFA), and by accounting for the performance trade-offs and design issues arising due to EH. A novel metric, referred to as delivery probability, is introduced to measure the capability of a MAC protocol to deliver the measure of any sensor in the network to the intended destination (or fusion center, FC). T...
Yi, Meng; Chen, Qingkui; Xiong, Neal N
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Spolitis, S.; Vegas Olmos, Juan José; Bobrovs, V.
We present the spectrum slicing and stitching concept for high-capacity low optics complexity optical access networks. Spectrum slicing and stitching of a 56 Gbit/s NRZ electrical signal is experimentally demonstrated for the first time....
Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.
Servetto Sergio D
Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.
Abdel Nabi, Amr A
This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.
Carminati, Barbara; Ferrari, Elena; Perego, Andrea
The original purpose of Web metadata was to protect end-users from possible harmful content and to simplify search and retrieval. However they can also be also exploited in more enhanced applications, such as Web access personalization on the basis of end-users’ preferences. In order to achieve this, it is however necessary to address several issues. One of the most relevant is how to assess the trustworthiness of Web metadata. In this paper, we discuss how such issue can be addressed through the use of collaborative and Semantic Web technologies. The system we propose is based on a Web-based Social Network, where members are able not only to specify labels, but also to rate existing labels. Both labels and ratings are then used to assess the trustworthiness of resources’ descriptions and to enforce Web access personalization.
Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.
This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.
Mathur, Rinku; Adlakha, Neeru
Phylogenetic trees give the information about the vertical relationships of ancestors and descendants but phylogenetic networks are used to visualize the horizontal relationships among the different organisms. In order to predict reticulate events there is a need to construct phylogenetic networks. Here, a Linear Programming (LP) model has been developed for the construction of phylogenetic network. The model is validated by using data sets of chloroplast of 16S rRNA sequences of photosynthetic organisms and Influenza A/H5N1 viruses. Results obtained are in agreement with those obtained by earlier researchers.
Huang, Jing; Liu, Deming; Wu, Guangsheng
In order to provide a high speed scheme for the access of the "last 100 meters", a composite access scheme of EPON and MoCA is proposed in this paper. At the terminal node of FTTX in EPON system, MoCA technique is used to implement broadband data access by distributing network entering household through Coax. A terminal equipment is designed in this scheme, which can receive the optical signal from the OLT of EPON and transform it into RF signal. The end users will receive the RF signal either from the coaxial cable or a RF antenna. This scheme is particularly applicable for FTTB application.There are many advantages in this system, it can provide a reliable room to room, peer to peer full mesh connectivity of digital content among MoCA devices using existing in-home coaxial cables. Plug and play at the majority of serviceable coax outlets in homes with no need to access or change splitters, or run new cables. What's more, it has higher bandwidth and better management. Two group of tests for the EPON+MoCA system were carried out, one for the coaxial cable and one for wireless. The experimental results showed that the average throughput of the system could reach to approximate 100 Mbps which approach to the theoretical throughput of MoCA 1.0 standard. And the transmission throughput had no remarkable change when the RF antenna replaced the coaxial cable.
Sathyamangla V Naga Prasad
Full Text Available It is well established that the gene expression patterns are substantially altered in cardiac hypertrophy and heart failure, however, less is known about the reasons behind such global differences. MicroRNAs (miRNAs are short non-coding RNAs that can target multiple molecules to regulate wide array of proteins in diverse pathways. The goal of the study was to profile alterations in miRNA expression using end-stage human heart failure samples with an aim to build signaling network pathways using predicted targets for the altered miRNA and to determine nodal molecules regulating individual networks. Profiling of miRNAs using custom designed microarray and validation with an independent set of samples identified eight miRNAs that are altered in human heart failure including one novel miRNA yet to be implicated in cardiac pathology. To gain an unbiased perspective on global regulation by top eight altered miRNAs, functional relationship of predicted targets for these eight miRNAs were examined by network analysis. Ingenuity Pathways Analysis network algorithm was used to build global signaling networks based on the targets of altered miRNAs which allowed us to identify participating networks and nodal molecules that could contribute to cardiac pathophysiology. Majority of the nodal molecules identified in our analysis are targets of altered miRNAs and known regulators of cardiovascular signaling. Cardio-genomics heart failure gene expression public data base was used to analyze trends in expression pattern for target nodal molecules and indeed changes in expression of nodal molecules inversely correlated to miRNA alterations. We have used NF kappa B network as an example to show that targeting other molecules in the network could alter the nodal NF kappa B despite not being a miRNA target suggesting an integrated network response. Thus, using network analysis we show that altering key functional target proteins may regulate expression of the myriad
Sumit J. Darak
Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.
Han, Zhu; Poor, Vincent H
In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness.
Ueda, Hiromi; Hamasaki, Keita; Kuriyama, Takashi; Tsuboi, Toshinori; Kasai, Hiroyuki
To realize economical optical burst signal receivers for the Optical Network Unit (ONU) of the Ethernet Optical Switched Access Network (E-OSAN), we previously implemented optical burst receivers with AC-coupling and DC-coupling using off-the-shelf components, and showed that the former offers better performance. This paper proposes a new optical burst signal receiver that uses the transfer function, Gn(s) =1-Hn(s), where Hn(s) denotes a Bessel filter transfer function of order n. We also present a method for designing the proposed receiver and clarify that it has better performance than the conventional AC-coupling one. We then present an LCR circuit synthesis of Gn(s), which is necessary to actually implement a burst receiver based on the proposal.
Full Text Available The recent influx of electronic medical records in the health care field, coupled with the need of providing continuous care to patients in the critical care environment, has driven the need for interoperability of medical devices. Open standards are needed to support flexible processes and interoperability of medical devices, especially in intensive care units. In this paper, we present an interoperable networking and access architecture based on the CAN protocol. Predictability of the delay of medical data reports is a desirable attribute that can be realized using a tightly-coupled system architecture. Our simulations on network architecture demonstrate that a bounded delay for event reports offers predictability. In addition, we address security issues related to the storage of electronic medical records. We present a set of open source tools and tests to identify the security breaches, and appropriate measures that can be implemented to be compliant with the HIPAA rules.
Saldaña Cercos, Silvia; Wagner, Christoph; Vegas Olmos, Juan José
also for implementing full signal path symmetry in real-time oscilloscopes to provide performance and signal fidelity (i.e. lower noise and jitter). In this paper the key digital signal processing (DSP) subsystems required to achieve signal slicing are surveyed. It also presents, for the first time......Methods to upgrade the network infrastructure to cope with current traffic demands has attracted increasing research efforts. A promising alternative is signal slicing. Signal slicing aims at re-using low bandwidth equipment to satisfy high bandwidth traffic demands. This technique has been used...... penalty is reported for 10 Gbps. Power savings of the order of hundreds of Watts can be obtained when using signal slicing as an alternative to 10 Gbps implemented access networks....
Full Text Available Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC protocols, based on random linear network coding (RLNC, are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels.
Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso
Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfully...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....
Takatori, Y.; Fitzek, Frank; Tsunekawa, K.
MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both...
Deruyck, Margot; Joseph, Wout; Tanghe, Emmeric; Martens, Luc
As both the bit rate required by applications on mobile devices and the number of those mobile devices are steadily growing, wireless access networks need to be expanded. As wireless networks also consume a lot of energy, it is important to develop energy-efficient wireless access networks in the near future. In this study, a capacity-based deployment tool for the design of energy-efficient wireless access networks is proposed. Capacity-based means that the network responds to the instantaneous bit rate requirements of the users active in the selected area. To the best of our knowledge, such a deployment tool for energy-efficient wireless access networks has never been presented before. This deployment tool is applied to a realistic case in Ghent, Belgium, to investigate three main functionalities incorporated in LTE-Advanced: carrier aggregation, heterogeneous deployments, and Multiple-Input Multiple-Output (MIMO). The results show that it is recommended to introduce femtocell base stations, supporting both MIMO and carrier aggregation, into the network (heterogeneous deployment) to reduce the network's power consumption. For the selected area and the assumptions made, this results in a power consumption reduction up to 70%. Introducing femtocell base stations without MIMO and carrier aggregation can already result in a significant power consumption reduction of 38%.
Bianchi, Alessandro [RIE Srl, Bologna (Italy)
In the UK the Network Code, regulating the access and use of the British gas network and stating gas transportation companies` rights and duties, has fully come into effect since September 1996: in practice, it comprises all rules applying to BG TransCo, the proper British Gas unit transporting and storing gas on third parties` account.
Nooren, P.; Deventer, M.O. van; Gamelas, A.; Elizondo, A.J.; Vimel, R.; Eriksson, A.E.
Next-generation networks are composed of different types of access, aggregation and core networks and they are expected to offer a wide range of services. Based on an analysis of the requirements that this heterogeneity introduces for QoS control, this paper concludes that a single QoS solution can
Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.
Douik, Ahmed S.
This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected base-stations (BS). The transmitted frame of every BS consists of several time/frequency blocks, called power-zones (PZ), maintained at fixed transmit power. The paper considers the problem of scheduling users to PZs and BSs in a coordinated fashion across the network, by maximizing a network-wide utility under the practical constraint that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the scheduling graph in which each vertex represents an association of users, PZs and BSs. The problem is formulated as a maximum weight clique, in which the weight of each vertex is the benefit of the association represented by that vertex. The paper further presents heuristic algorithms with low computational complexity. Simulation results show the performance of the proposed algorithms and suggest that the heuristics perform near optimal in low shadowing environments. © 2015 IEEE.
Ray, Robin A; Street, Annette F
This article introduces the concept of socio-connective trust, the synapse between the social structures and processes that underpin relationships in supportive care networks. Data from an ethnographic case study of 18 informal caregivers providing in-home care for people with life-limiting illness were analysed drawing on theoretical concepts from the work of Giddens and writings on social capital, as well as the construction of trust in the caregiving literature. While conceptions of trust were found to contribute to understanding supportive care relationships, they did not account for the dynamic nature of the availability and use of support networks. Instead, informal caregivers undertook ongoing reflexive negotiation of relationship boundaries in response to their own conception of the current situation and their perception of trust in their relationships with the various members of the support network. The concept of socio-connective trust describes the movement and flow of the flexible bonds that influence relationships among care networks and determine the type and range of support accessed by informal caregivers. Understanding the complexities of socio-connective trust in caregiving relationships will assist health and social care workers to mobilize relevant resources to support informal caregivers.
Narang, Pankaj; Khan, Shawez; Hemrom, Anmol Jaywant; Lynn, Andrew Michael
Metabolic reactions have been extensively studied and compiled over the last century. These have provided a theoretical base to implement models, simulations of which are used to identify drug targets and optimize metabolic throughput at a systemic level. While tools for the perturbation of metabolic networks are available, their applications are limited and restricted as they require varied dependencies and often a commercial platform for full functionality. We have developed MetaNET, an open source user-friendly platform-independent and web-accessible resource consisting of several pre-defined workflows for metabolic network analysis. MetaNET is a web-accessible platform that incorporates a range of functions which can be combined to produce different simulations related to metabolic networks. These include (i) optimization of an objective function for wild type strain, gene/catalyst/reaction knock-out/knock-down analysis using flux balance analysis. (ii) flux variability analysis (iii) chemical species participation (iv) cycles and extreme paths identification and (v) choke point reaction analysis to facilitate identification of potential drug targets. The platform is built using custom scripts along with the open-source Galaxy workflow and Systems Biology Research Tool as components. Pre-defined workflows are available for common processes, and an exhaustive list of over 50 functions are provided for user defined workflows. MetaNET, available at http://metanet.osdd.net , provides a user-friendly rich interface allowing the analysis of genome-scale metabolic networks under various genetic and environmental conditions. The framework permits the storage of previous results, the ability to repeat analysis and share results with other users over the internet as well as run different tools simultaneously using pre-defined workflows, and user-created custom workflows.
Full Text Available Multiple system atrophy (MSA is a fatal rapidly progressive α-synucleinopathy, characterized by α-synuclein accumulation in oligodendrocytes. It is accepted that the pathological α-synuclein accumulation in the brain of MSA patients plays a leading role in the disease process, but little is known about the events in the early stages of the disease. In this study we aimed to define potential roles of the miRNA-mRNA regulatory network in the early pre-motor stages of the disease, i.e., downstream of α-synuclein accumulation in oligodendroglia, as assessed in a transgenic mouse model of MSA. We investigated the expression patterns of miRNAs and their mRNA targets in substantia nigra (SN and striatum, two brain regions that undergo neurodegeneration at a later stage in the MSA model, by microarray and RNA-seq analysis, respectively. Analysis was performed at a time point when α-synuclein accumulation was already present in oligodendrocytes at neuropathological examination, but no neuronal loss nor deficits of motor function had yet occurred. Our data provide a first evidence for the leading role of gene dysregulation associated with deficits in immune and inflammatory responses in the very early, non-symptomatic disease stages of MSA. While dysfunctional homeostasis and oxidative stress were prominent in SN in the early stages of MSA, in striatum differential gene expression in the non-symptomatic phase was linked to oligodendroglial dysfunction, disturbed protein handling, lipid metabolism, transmembrane transport and altered cell death control, respectively. A large number of putative miRNA-mRNAs interaction partners were identified in relation to the control of these processes in the MSA model. Our results support the role of early changes in the miRNA-mRNA regulatory network in the pathogenesis of MSA preceding the clinical onset of the disease. The findings thus contribute to understanding the disease process and are likely to pave the way
Benenson, I.; Martens, C.J.C.M.; Rofé, Y.
Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,
Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Full Text Available Abstract Background In metazoans, the hematopoietic system plays a key role both in normal development and in defense of the organism. In Drosophila, the cellular immune response involves three types of blood cells: plasmatocytes, crystal cells and lamellocytes. This last cell type is barely present in healthy larvae, but its production is strongly induced upon wasp parasitization or in mutant contexts affecting larval blood cell homeostasis. Notably, several zygotic mutations leading to melanotic mass (or "tumor" formation in larvae have been associated to the deregulated differentiation of lamellocytes. To gain further insights into the gene regulatory network and the mechanisms controlling larval blood cell homeostasis, we conducted a tissue-specific loss of function screen using hemocyte-specific Gal4 drivers and UAS-dsRNA transgenic lines. Results By targeting around 10% of the Drosophila genes, this in vivo RNA interference screen allowed us to recover 59 melanotic tumor suppressor genes. In line with previous studies, we show that melanotic tumor formation is associated with the precocious differentiation of stem-cell like blood progenitors in the larval hematopoietic organ (the lymph gland and the spurious differentiation of lamellocytes. We also find that melanotic tumor formation can be elicited by defects either in the fat body, the embryo-derived hemocytes or the lymph gland. In addition, we provide a definitive confirmation that lymph gland is not the only source of lamellocytes as embryo-derived plasmatocytes can differentiate into lamellocytes either upon wasp infection or upon loss of function of the Friend of GATA cofactor U-shaped. Conclusions In this study, we identify 55 genes whose function had not been linked to blood cell development or function before in Drosophila. Moreover our analyses reveal an unanticipated plasticity of embryo-derived plasmatocytes, thereby shedding new light on blood cell lineage relationship, and
Full Text Available After describing the beginnings and state of the art of integrated fiber-wireless (FiWi broadband access networks in great detail, we briefly review recent progress and point to various ongoing research activities, including the design of energy-efficient “green” FiWi access networks, advanced survivability techniques, and integration of wireless and fiber optic sensors, towards realizing adaptable, dependable, and ecoconscious future-proof broadband access networks based on both wireless and shared passive fiber media. Furthermore, we discuss service, application, business, and operation related aspects, which motivate access technology to move into a substantially different direction in the long run than continued capacity provisioning. Given that most 4G cellular mobile network researches so far have been focusing on the achievable performance gains in the wireless front-end only without looking into the details of backhaul implementations and possible backhaul bottlenecks, we identify open key research challenges for FiWi broadband access networks. We explore ways of how they can be deployed across relevant economic sectors other than telecommunications per se, taking major paradigm shifts such as the Third Industrial Revolution, Energy Internet, smart grid, and explosion of mobile data traffic in today’s cellular networks into account.
Zagorski, Marcin; Burda, Zdzislaw; Waclaw, Bartlomiej
Evolutionary pathways describe trajectories of biological evolution in the space of different variants of organisms (genotypes). The probability of existence and the number of evolutionary pathways that lead from a given genotype to a better-adapted genotype are important measures of accessibility of local fitness optima and the reproducibility of evolution. Both quantities have been studied in simple mathematical models where genotypes are represented as binary sequences of two types of basic units, and the network of permitted mutations between the genotypes is a hypercube graph. However, it is unclear how these results translate to the biologically relevant case in which genotypes are represented by sequences of more than two units, for example four nucleotides (DNA) or 20 amino acids (proteins), and the mutational graph is not the hypercube. Here we investigate accessibility of the best-adapted genotype in the general case of K > 2 units. Using computer generated and experimental fitness landscapes we show that accessibility of the global fitness maximum increases with K and can be much higher than for binary sequences. The increase in accessibility comes from the increase in the number of indirect trajectories exploited by evolution for higher K. As one of the consequences, the fraction of genotypes that are accessible increases by three orders of magnitude when the number of units K increases from 2 to 16 for landscapes of size N ∼ 106 genotypes. This suggests that evolution can follow many different trajectories on such landscapes and the reconstruction of evolutionary pathways from experimental data might be an extremely difficult task. PMID:27935934
Radaydeh, Redha M.
© 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.
Full Text Available Presented as an innovative paradigm incorporating the cloud computing into radio access network, Cloud radio access networks (C-RANs have been shown advantageous in curtailing the capital and operating expenditures as well as providing better services to the customers. However, heavy burden on the non-ideal fronthaul limits performances of CRANs. Here we focus on the alleviation of burden on the fronthaul via the edge devices’ caches and propose a fog computing based RAN (F-RAN architecture with three candidate transmission modes: device to device, local distributed coordination, and global C-RAN. Followed by the proposed simple mode selection scheme, the average energy efficiency (EE of systems optimization problem considering congestion control is presented. Under the Lyapunov framework, the problem is reformulated as a joint mode selection and resource allocation problem, which can be solved by block coordinate descent method. The mathematical analysis and simulation results validate the benefits of F-RAN and an EE-delay tradeoff can be achieved by the proposed algorithm.
Jain, Vivek; Byonanebye, Dathan M; Liegler, Teri; Kwarisiima, Dalsone; Chamie, Gabriel; Kabami, Jane; Petersen, Maya L; Balzer, Laura B; Clark, Tamara D; Black, Douglas; Thirumurthy, Harsha; Geng, Elvin H; Charlebois, Edwin D; Amanyire, Gideon; Kamya, Moses R; Havlir, Diane V
In a rural Ugandan community scaling up antiretroviral therapy (ART), we sought to determine if population-based HIV RNA levels [population viral load (VL)] decreased from 2011 to 2012. Serial cross-sectional analyses (May 2011 and May 2012) of a defined study community of 6300 persons in a district with HIV prevalence of 8%. We measured HIV-1 RNA (VL) levels on all individuals testing positive for HIV during a 5-day high-throughput multidisease community health campaign in May 2012 that recruited two-thirds of the population. We aggregated individual-level VL results into population VL metrics including the proportion of individuals with an undetectable VL and compared these VL metrics to those we previously reported for this geographic region in 2011. In 2012, 223 of 2179 adults were HIV-seropositive adults (10%). Overall, among 208 of 223 HIV-seropositive adults in whom VL was tested, 53% had an undetectable VL [95% confidence interval (CI): 46 to 60], up from 37% (95% CI: 30 to 45; P = 0.02) in 2011. Seven (3%) individuals had a VL of >100,000 copies/mL in 2012, down from 21 (13%) in 2011 (P = 0.0007). Mean log (VL) (geometric mean) was 3.18 log (95% CI: 3.06 to 3.29 log) in 2012, down from 3.62 log (95% CI: 3.46 to 3.78 log) in 2011 (P ART scale-up may reflect a population-level effectiveness of expanding ART access.
Background Highly adapted plant species are able to alter their root architecture to improve nutrient uptake and thrive in environments with limited nutrient supply. Cluster roots (CRs) are specialised structures of dense lateral roots formed by several plant species for the effective mining of nutrient rich soil patches through a combination of increased surface area and exudation of carboxylates. White lupin is becoming a model-species allowing for the discovery of gene networks involved in CR development. A greater understanding of the underlying molecular mechanisms driving these developmental processes is important for the generation of smarter plants for a world with diminishing resources to improve food security. Results RNA-seq analyses for three developmental stages of the CR formed under phosphorus-limited conditions and two of non-cluster roots have been performed for white lupin. In total 133,045,174 high-quality paired-end reads were used for a de novo assembly of the root transcriptome and merged with LAGI01 (Lupinus albus gene index) to generate an improved LAGI02 with 65,097 functionally annotated contigs. This was followed by comparative gene expression analysis. We show marked differences in the transcriptional response across the various cluster root stages to adjust to phosphate limitation by increasing uptake capacity and adjusting metabolic pathways. Several transcription factors such as PLT, SCR, PHB, PHV or AUX/IAA with a known role in the control of meristem activity and developmental processes show an increased expression in the tip of the CR. Genes involved in hormonal responses (PIN, LAX, YUC) and cell cycle control (CYCA/B, CDK) are also differentially expressed. In addition, we identify primary transcripts of miRNAs with established function in the root meristem. Conclusions Our gene expression analysis shows an intricate network of transcription factors and plant hormones controlling CR initiation and formation. In addition
Secco, David; Shou, Huixia; Whelan, James; Berkowitz, Oliver
Highly adapted plant species are able to alter their root architecture to improve nutrient uptake and thrive in environments with limited nutrient supply. Cluster roots (CRs) are specialised structures of dense lateral roots formed by several plant species for the effective mining of nutrient rich soil patches through a combination of increased surface area and exudation of carboxylates. White lupin is becoming a model-species allowing for the discovery of gene networks involved in CR development. A greater understanding of the underlying molecular mechanisms driving these developmental processes is important for the generation of smarter plants for a world with diminishing resources to improve food security. RNA-seq analyses for three developmental stages of the CR formed under phosphorus-limited conditions and two of non-cluster roots have been performed for white lupin. In total 133,045,174 high-quality paired-end reads were used for a de novo assembly of the root transcriptome and merged with LAGI01 (Lupinus albus gene index) to generate an improved LAGI02 with 65,097 functionally annotated contigs. This was followed by comparative gene expression analysis. We show marked differences in the transcriptional response across the various cluster root stages to adjust to phosphate limitation by increasing uptake capacity and adjusting metabolic pathways. Several transcription factors such as PLT, SCR, PHB, PHV or AUX/IAA with a known role in the control of meristem activity and developmental processes show an increased expression in the tip of the CR. Genes involved in hormonal responses (PIN, LAX, YUC) and cell cycle control (CYCA/B, CDK) are also differentially expressed. In addition, we identify primary transcripts of miRNAs with established function in the root meristem. Our gene expression analysis shows an intricate network of transcription factors and plant hormones controlling CR initiation and formation. In addition, functional differences between the
Full Text Available Blood-based microRNA (miRNA signatures as biomarkers have been reported for various pathologies, including cancer, neurological disorders, cardiovascular diseases, and also infections. The regulatory mechanism behind respective miRNA patterns is only partially understood. Moreover, “preserved” miRNAs, i.e., miRNAs that are not dysregulated in any disease, and their biological impact have been explored to a very limited extent. We set out to systematically determine their role in regulatory networks by defining groups of highly-dysregulated miRNAs that contribute to a disease signature as opposed to preserved housekeeping miRNAs. We further determined preferential targets and pathways of both dysregulated and preserved miRNAs by computing multi-layer networks, which were compared between housekeeping and dysregulated miRNAs. Of 848 miRNAs examined across 1049 blood samples, 8 potential housekeepers showed very limited expression variations, while 20 miRNAs showed highly-dysregulated expression throughout the investigated blood samples. Our approach provides important insights into miRNAs and their role in regulatory networks. The methodology can be applied to systematically investigate the differences in target genes and pathways of arbitrary miRNA sets.
Chelgren, Nathan D; Dunham, Jason B
Barriers to passage of aquatic organisms at stream road crossings are a major cause of habitat fragmentation in stream networks. Accordingly, large investments have been made to restore passage at these crossings, but often without estimation of population-level benefits. Here, we describe a broad-scale approach to quantifying the effectiveness of passage restoration in terms interpretable at population levels, namely numbers of fish and length of stream gained through restoration, by sampling abundance in a study design that accounts for variable biogeographic species pools, variable stream and barrier configurations, and variable probabilities of capture and detectability for multiple species. We modified an existing zero-inflated negative-binomial model to estimate the probability of site access, abundance conditional on access, and capture probability of individual fish. Therein, we modeled probability of access as a function of gradient, stream road-crossing type, and downstream access by fish simultaneously with a predictive model for abundance at sites accessible to fish. Results indicated that replacement of barriers with new crossing designs intended to allow for greater movement was associated with dramatically higher probability of access for all fishes, including migratory Pacific salmon, trout, sculpin, and lamprey. Conversely, existing non-replaced crossings negatively impacted fish distributions. Assuming no downstream constraints on access, we estimated the potential length of stream restored by the program ranged between 7.33 (lamprey) and 15.28 km (small coastal cutthroat and rainbow trout). These contributions represented a fraction of the total length available upstream (187 km) of replaced crossings. When limited ranges of species were considered, the estimated contributions of culvert replacement were reduced (1.65-km range, for longnose dace to 12.31 km for small coastal cutthroat and rainbow trout). Numbers of fish contributed ranged from
Full Text Available Potato virus Y is the most economically important potato viral pathogen. We aimed at unraveling the roles of small RNAs (sRNAs in the complex immune signaling network controlling the establishment of tolerant response of potato cv. Désirée to the virus. We constructed a sRNA regulatory network connecting sRNAs and their targets to link sRNA level responses to physiological processes. We discovered an interesting novel sRNAs-gibberellin regulatory circuit being activated as early as 3 days post inoculation (dpi before viral multiplication can be detected. Two endogenous sRNAs, miR167 and phasiRNA931 were predicted to regulate gibberellin biosynthesis genes GA20-oxidase and GA3-oxidase. The increased expression of phasiRNA931 was also reflected in decreased levels of GA3-oxidase transcripts. Moreover, decreased concentration of gibberellin confirmed this regulation. The functional relation between lower activity of gibberellin signaling and reduced disease severity was previously confirmed in Arabidopsis-virus interaction using knockout mutants. We further showed that this regulation is salicylic acid-dependent as the response of sRNA network was attenuated in salicylic acid-depleted transgenic counterpart NahG-Désirée expressing severe disease symptoms. Besides downregulation of gibberellin signaling, regulation of immune receptor transcripts by miR6022 as well as upregulation of miR164, miR167, miR169, miR171, miR319, miR390, and miR393 in tolerant Désirée, revealed striking similarities to responses observed in mutualistic symbiotic interactions. The intertwining of different regulatory networks revealed, shows how developmental signaling, disease symptom development, and stress signaling can be balanced.
5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.
Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K
Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.
Full Text Available The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT and Machine-to-Machine (M2M services, which involve communication between Machine-Type Devices (MTDs in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.
Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee
Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.
Drnasin, Ivan; Grgić, Mislav; Gogić, Goran
Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka
Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643
Full Text Available The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS, by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.
Ali, Konpal S.
Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.
Kim, Eui-Jik; Shon, Taeshik; Park, James Jong Hyuk; Jeong, Young-Sik
Nowadays, with wireless sensor networks (WSNs) being widely applied to diverse applications, heterogeneous sensor networks (HSNs), which can simultaneously support multiple sensing tasks in a common sensor field, are being considered as the general form of WSN system deployment. In HSNs, each application generates data packets with a different size, thereby resulting in fairness issues in terms of the network performance. In this paper, we present the design and performance evaluation of a differentiated channel access scheme (abbreviated to DiffCA) to resolve the fairness problem in HSNs. DiffCA achieves fair performance among the application groups by providing each node with an additional backoff counter, whose value varies according to the size of the packets. A mathematical model based on the discrete time Markov chain is presented and is analyzed to measure the performance of DiffCA. The numerical results show that the performance degradation of disadvantaged application groups can be effectively compensated for by DiffCA. Simulation results are given to verify the accuracy of the numerical model.
Full Text Available We aimed to identify risk pathways for postmenopausal osteoporosis (PMOP via establishing an microRNAs- (miRNA- regulated pathway network (MRPN. Firstly, we identified differential pathways through calculating gene- and pathway-level statistics based on the accumulated normal samples using the individual pathway aberrance score (iPAS. Significant pathways based on differentially expressed genes (DEGs using DAVID were extracted, followed by identifying the common pathways between iPAS and DAVID methods. Next, miRNAs prediction was implemented via calculating TargetScore values with precomputed input (log fold change (FC, TargetScan context score (TSCS, and probabilities of conserved targeting (PCT. An MRPN construction was constructed using the common genes in the common pathways and the predicted miRNAs. Using false discovery rate (FDR < 0.05, 279 differential pathways were identified. Using the criteria of FDR < 0.05 and logFC≥2, 39 DEGs were retrieved, and these DEGs were enriched in 64 significant pathways identified by DAVID. Overall, 27 pathways were the common ones between two methods. Importantly, MAPK signaling pathway and PI3K-Akt signaling pathway were the first and second significantly enriched ones, respectively. These 27 common pathways separated PMOP from controls with the accuracy of 0.912. MAPK signaling pathway and PI3K/Akt signaling pathway might play crucial roles in PMOP.
Full Text Available Abiotic stress is one of the major factors responsible for huge yield loss in crop plants. MicroRNAs play a key role in adaptive responses of plants under abiotic stress conditions through post-transcriptional gene regulations. In present study, 95 potential miRNAs were predicted in Brassica juncea using comparative genomics approach. It was noted that these miRNAs, target several transcription factors (TFs, transporter family proteins, signaling related genes, and protease encoding genes. Nineteen distinct miRNA-target regulatory networks were observed with significant involvement in regulation of transcription, response to stimulus, hormone and auxin mediated signaling pathway related gene ontology (GO term. The sucrose-starch metabolism and pentose-gluconate interconversion pathways were found significantly enriched for these target genes. Molecular markers such as Simple Sequence Repeats (SSR and Single Nucleotide Polymorphism (SNPs were identified on miRNAs (miR-SSRs and miR-SNPs and their target genes in B. juncea. Notably, one of the miR-SNP (C/T was found at the 5th position on mature region of miR2926. This C/T transition led to the distorted and unstable hairpin structure of miR2926, consequently complete loss of target function. Hence, findings from this study will lay a foundation for marker assisted breeding for abiotic stress tolerant varieties of B. juncea.
Zhang, Yao-Zhong; Yamaguchi, Rui; Imoto, Seiya; Miyano, Satoru
The recent success of deep learning techniques in machine learning and artificial intelligence has stimulated a great deal of interest among bioinformaticians, who now wish to bring the power of deep learning to bare on a host of bioinformatical problems. Deep learning is ideally suited for biological problems that require automatic or hierarchical feature representation for biological data when prior knowledge is limited. In this work, we address the sequence-specific bias correction problem for RNA-seq data redusing Recurrent Neural Networks (RNNs) to model nucleotide sequences without pre-determining sequence structures. The sequence-specific bias of a read is then calculated based on the sequence probabilities estimated by RNNs, and used in the estimation of gene abundance. We explore the application of two popular RNN recurrent units for this task and demonstrate that RNN-based approaches provide a flexible way to model nucleotide sequences without knowledge of predetermined sequence structures. Our experiments show that training a RNN-based nucleotide sequence model is efficient and RNN-based bias correction methods compare well with the-state-of-the-art sequence-specific bias correction method on the commonly used MAQC-III data set. RNNs provides an alternative and flexible way to calculate sequence-specific bias without explicitly pre-determining sequence structures.
Chen, Min; Lu, Xingguo; Liao, Bo; Li, Zejun; Cai, Lijun; Gu, Changlong
... and Engineering, Hunan University, Changsha, ChinaAbstract Identification of miRNA-disease association is a fundamental challenge in human health clinic. However, the known miRNA-disease associat...
Razaque, Abdul; Elleithy, Khaled M
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to
Huang, Zhuojie; Wu, Xiao; Garcia, Andres J.; Fik, Timothy J.; Tatem, Andrew J.
The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data. PMID:23691194
Thielens, Arno; Vermeeren, Günter; Caytan, Olivier; Torfs, Guy; Demeester, Piet; Bauwelinck, Johan; Rogier, Hendrik; Martens, Luc; Joseph, Wout
In the future, wireless radiofrequency (RF) telecommunications networks will provide users with gigabit-per-second data rates. Therefore, these networks are evolving toward hybrid networks, which will include commonly used macro- and microcells in combination with local ultra-high density access networks consisting of so-called attocells. The use of attocells requires a proper compliance assessment of exposure to RF electromagnetic radiation. This paper presents, for the first time, such a compliance assessment of an attocell operating at 3.5 GHz with an input power of 1 mW, based on both root-mean-squared electric field strength (Erms ) and peak 10 g-averaged specific absorption rate (SAR10g ) values. The Erms values near the attocell were determined using finite-difference time-domain (FDTD) simulations and measurements by a tri-axial probe. They were compared to the International Commission on Non-Ionizing Radiation Protection's (ICNIRP) reference levels. All measured and simulated Erms values above the attocell were below 5.9 V/m and lower than reference levels. The SAR10g values were measured in a homogeneous phantom, which resulted in an SAR10g of 9.7 mW/kg, and used FDTD simulations, which resulted in an SAR10g of 7.2 mW/kg. FDTD simulations of realistic exposure situations were executed using a heterogeneous phantom, which yielded SAR10g values lower than 2.8 mW/kg. The studied dosimetric quantities were in compliance with ICNIRP guidelines when the attocell was fed an input power <1 mW. The deployment of attocells is thus a feasible solution for providing broadband data transmission without drastically increasing personal RF exposure. Bioelectromagnetics. 38:295-306, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.
Zhou, Kecheng; Liu, Minxia; Cao, Yi
Tumorigenesis is a multi-step and complex process with multi-factors involved. Deregulated oncogenes and tumor suppressor genes (TSGs) induced by genetic and epigenetic factors are considered as the driving force in the development and progression of cancer. Besides, microRNAs (miRNAs) act vital roles in tumorigenesis through regulating some oncogenes and TSGs. Interestingly, miRNAs are also regulated by oncogenes and TSGs. Considering the entangled regulation, here we propose a new insight into these regulation relationships in cancer: oncogene–miRNA–TSG network, which further emphasizes roles of miRNA, as well as highlights the network regulation among oncogene, miRNA, and TSG during tumorigenesis. The oncogene–miRNA–TSG network demonstrates that oncogenes and TSGs not only show functional synergy, but also there are regulatory relationships among oncogenes and TSGs during tumorigenesis, which could be mediated by miRNAs. In view of the oncogene–miRNA–TSG network involved in many oncogenes, miRNAs, and TSGs, as well as occurring in various tumor types, the anomaly of this network may be a common event in cancers and participates in tumorigenesis. This hypothesis broadens horizons of molecular mechanisms underlying tumorigenesis, and may provide a new promising venue for the prediction, diagnosis, and even therapy of cancer. PMID:28736730
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
Jyoti, Vishav; Kaler, Rajinder Singh
A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.
Full Text Available Random packet CDMA (RP-CDMA is a recently proposed random transmission scheme which has been designed from the beginning as a cross-layer method to overcome the restrictive nature of the Aloha protocol. Herein, we more precisely model its performance and investigate throughput and network stability. In contrast to previous works, we adopt the spread Aloha model for header transmission, and the performance of different joint detection methods for the payload data is investigated. Furthermore, we introduce performance measures for multiple access systems based on the diagonal elements of a modified multipacket reception matrix, and show that our measures describe the upper limit of the vector of stable arrival rates for a finite number of users. Finally, we simulate queue sizes and throughput characteristics of RP-CDMA with various receiver structures and compare them to spread Aloha.
Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Le Minh, Hoa; Malekmohammadi, Amin
This paper comparatively investigates the transmission performance of absolute added correlative coding (AACC) using non-return-to-zero (NRZ) and return-to-zero (RZ) pulse shapes with a binary intensity modulation direct detection receiver in 40 Gb/s optical metro-access networks operating at 1550 nm. It is shown that, for AACC transmission, the NRZ impulse shaping is superior in comparison to RZ in spectral efficiency, dispersion tolerance, residual dispersion and self-phase modulation (SPM) tolerance. However, RZ-AACC experiences a 1-2 dB advantage in receiver sensitivity over NRZ-AACC for back-to-back configuration as well as after 300-km single-mode fiber delivery.
Kempter, Roland; Amini, Peiman; Farhang-Boroujeny, Behrouz
Random packet CDMA (RP-CDMA) is a recently proposed random transmission scheme which has been designed from the beginning as a cross-layer method to overcome the restrictive nature of the Aloha protocol. Herein, we more precisely model its performance and investigate throughput and network stability. In contrast to previous works, we adopt the spread Aloha model for header transmission, and the performance of different joint detection methods for the payload data is investigated. Furthermore, we introduce performance measures for multiple access systems based on the diagonal elements of a modified multipacket reception matrix, and show that our measures describe the upper limit of the vector of stable arrival rates for a finite number of users. Finally, we simulate queue sizes and throughput characteristics of RP-CDMA with various receiver structures and compare them to spread Aloha.
Full Text Available The Finnish Mobile Operators face two main challenges: (i mobile data subscriptions penetration and traffic are experiencing rapid growth; and (ii government intervenes in the market to attain contradictory goals related to extensive high-speed mobile networks and energy consumption reduction. The mobile operators have to increase the capacity in their networks, taking energy efficiency into account. The reduction of energy consumption in mobile networks results to the reducing carbon emissions, and possibly to cost savings. The purpose of this study is to investigate the wide-to-local area offloading in urban regions in Finland and examine the impact of such a network on the wide area access network in terms of energy and capacity. The results show that the capacity relief ranges from 9.7 to 38.7 %, depending on the penetration of local area service, but the energy savings in macro cellular network are negligible.
Full Text Available Myocardial infarction (MI is a severe coronary artery disease and a leading cause of mortality and morbidity worldwide. However, the molecular mechanisms of MI have yet to be fully elucidated. In this study, we compiled MI-related genes, MI-related microRNAs (miRNAs and known human transcription factors (TFs, and we then identified 1,232 feed-forward loops (FFLs among these miRNAs, TFs and their co-regulated target genes through integrating target prediction. By merging these FFLs, the first miRNA and TF mediated regulatory network for MI was constructed, from which four regulators (SP1, ESR1, miR-21-5p and miR-155-5p and three regulatory modules that might play crucial roles in MI were then identified. Furthermore, based on the miRNA and TF mediated regulatory network and literature survey, we proposed a pathway model for miR-21-5p, the miR-29 family and SP1 to demonstrate their potential co-regulatory mechanisms in cardiac fibrosis, apoptosis and angiogenesis. The majority of the regulatory relations in the model were confirmed by previous studies, which demonstrated the reliability and validity of this miRNA and TF mediated regulatory network. Our study will aid in deciphering the complex regulatory mechanisms involved in MI and provide putative therapeutic targets for MI.
Rodríguez, Sebastián; Morales Vicente, Alvaro; Rommel, Simon
A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit.......A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit....
Zhang, Hao; Li, Yanpu; Liu, Yuanning; Liu, Haiming; Wang, Hongyu; Jin, Wen; Zhang, Yanmei; Zhang, Chao; Xu, Dong
It has been found that microRNAs (miRNAs) can function as a regulatory factor across species. For example, food-derived plant miRNAs may pass through the gastrointestinal (GI) tract, enter into the plasma and serum of mammals, and interact with endogenous RNAs to regulate their expression. Although this new type of regulatory mechanism is not well understood, it provides a fresh look at the relationship between food consumption and physiology. To investigate this new type of mechanism, we conducted a systematic computational study to analyze the potential functions of these dietary miRNAs in the human body. In this paper, we predicted human and plant target genes using RNAhybrid and set some criteria to further filter them. Then we built the cross-species regulatory network according to the filtered targets, extracted central nodes by PageRank algorithm and built core modules. We summarized the functions of these modules to three major categories: ion transport, metabolic process and stress response, and especially some target genes are highly related to ion transport, polysaccharides and the lipid metabolic process. Through functional analysis, we found that human and plants have similar functions such as ion transport and stress response, so our study also indicates the existence of a close link between exogenous plant miRNA targets and digestive/urinary organs. According to our analysis results, we suggest that the ingestion of these plant miRNAs may have a functional impact on consuming organisms in a cross-kingdom way, and the dietary habit may affect the physiological condition at a genetic level. Our findings may be useful for discovering cross-species regulatory mechanism in further study.
Riester, Scott M; Lin, Yang; Wang, Wei; Cong, Lin; Mohamed Ali, Abdel-Moneim; Peck, Sun H; Smith, Lachlan J; Currier, Bradford L; Clark, Michelle; Huddleston, Paul; Krauss, William; Yaszemski, Michael J; Morrey, Mark E; Abdel, Matthew P; Bydon, Mohamad; Qu, Wenchun; Larson, Annalise N; van Wijnen, Andre J; Nassr, Ahmad
Degenerative disk disease of the spine is a major cause of back pain and disability. Optimization of regenerative medical therapies for degenerative disk disease requires a deep mechanistic understanding of the factors controlling the structural integrity of spinal tissues. In this investigation, we sought to identify candidate regulatory genes controlling extracellular matrix synthesis in spinal tissues. To achieve this goal we performed high throughput next generation RNA sequencing on 39 annulus fibrosus and 21 nucleus pulposus human tissue samples. Specimens were collected from patients undergoing surgical discectomy for the treatment of degenerative disk disease. Our studies identified associations between extracellular matrix genes, growth factors, and other important regulatory molecules. The fibrous matrix characteristic of annulus fibrosus was associated with expression of the growth factors platelet derived growth factor beta (PDGFB), vascular endothelial growth factor C (VEGFC), and fibroblast growth factor 9 (FGF9). Additionally we observed high expression of multiple signaling proteins involved in the NOTCH and WNT signaling cascades. Nucleus pulposus extracellular matrix related genes were associated with the expression of numerous diffusible growth factors largely associated with the transforming growth signaling cascade, including transforming factor alpha (TGFA), inhibin alpha (INHA), inhibin beta A (INHBA), bone morphogenetic proteins (BMP2, BMP6), and others. this investigation provides important data on extracellular matrix gene regulatory networks in disk tissues. This information can be used to optimize pharmacologic, stem cell, and tissue engineering strategies for regeneration of the intervertebral disk and the treatment of back pain. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res. © 2017 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.
Fahmy, Khalid; Akber, Mira; Cai, Xiaoli; Koul, Aabid; Hayder, Awais; Baumgartner, Stefan
The Bicoid (Bcd) protein gradient in Drosophila serves as a paradigm for gradient formation in textbooks. To explain the generation of the gradient, the ARTS model, which is based on the observation of a bcd mRNA gradient, proposes that the bcd mRNA, localized at the anterior pole at fertilization, migrates along microtubules (MTs) at the cortex to the posterior to form a bcd mRNA gradient which is translated to form a protein gradient. To fulfil the criteria of the ARTS model, an early cortical MT network is thus a prerequisite. We report hitherto undiscovered MT activities in the early embryo important for bcd mRNA transport: (i) an early and omnidirectional MT network exclusively at the anterior cortex of early nuclear cycle embryos showing activity during metaphase and anaphase only, (ii) long MTs up to 50 µm extending into the yolk at blastoderm stage to enable basal-apical transport. The cortical MT network is not anchored to the actin cytoskeleton. The posterior transport of the mRNA via the cortical MT network critically depends on maternally-expressed αTubulin67C and the minus-end motor Ncd. In either mutant, cortical transport of the bcd mRNA does not take place and the mRNA migrates along another yet undisclosed interior MT network, instead. Our data strongly corroborate the ARTS model and explain the occurrence of the bcd mRNA gradient.
de Oliveira, Raimunda Félix; de Andrade, Luiz Odorico Monteiro; Goya, Neusa
This article analyzes user viewpoints regarding mental health care, with a focus on comprehensiveness and access at Psychosocial Care Centers (PCCs). It is a qualitative study with theoretical and methodological references of the Fourth Generation Evaluation and application of the Hermeneutic Dialectic Circle technique. Twelve users of ten mental health services in Fortaleza were interviewed from March to May 2011. Themes of the study were grouped from the narratives, with the hermeneutics of Paul Ricoeur as the benchmark for analysis. The thematic categories were: viewpoints on mental healthcare; conflicts between supply and the subjective need to receive; similarities and differences: from tutelage to autonomy; absence and belonging: open PCCs and non-community centers; between stigma and humanization. The main findings are: the PCCs are seen as spaces for conviviality able to establish affective and social networks; stigma, prejudice and tutelage are present in the services, in their families and in the community; asylum practices persist in alternative services; the humanization of care extends access and bonding in the services; the trajectory of users of the Unified Health System occurs due to their social and health needs.
David Tung Chong Wong
Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.
Radaydeh, Redha Mahmoud Mesleh
This paper addresses the effect of co-tier interference on the performance of multiuser overlaid cellular networks that share the same available resources. It assumed that each macrocell contains a number of self-configurable and randomly located femtocells that employ the open-access control strategy to reduce the effect of cross-tier interference. It is also assumed that the desired user equipment (UE) can access only one of the available channels, maintains simple decoding circuitry with single receive antenna, and has limited knowledge of the instantaneous channel state information (CSI) due to resource limitation. To mitigate the effect of co-tier interference in the absence of the CSI of the desired UE, a low-complexity switched-based scheme for single channel selection based on the predicted interference levels associated with available channels is proposed for the case of over-loaded channels. Through the analysis, new general formulation for the statistics of the resulting instantaneous interference power and some performance measures are presented. The effect of the switching threshold on the efficiency and performance of the proposed scheme is studied. Numerical and simulation results to clarify the usefulness of the proposed scheme in reducing the impact of co-tier interference are also provided. © 2011 IEEE.
This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.
Dhaini, Ahmad R.
Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.
Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi
Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.
Rahmani, Bahareh; Zimmermann, Michael T; Grill, Diane E; Kennedy, Richard B; Oberg, Ann L; White, Bill C; Poland, Gregory A; McKinney, Brett A
Clusters of genes in co-expression networks are commonly used as functional units for gene set enrichment detection and increasingly as features (attribute construction) for statistical inference and sample classification. One of the practical challenges of clustering for these purposes is to identify an optimal partition of the network where the individual clusters are neither too large, prohibiting interpretation, nor too small, precluding general inference. Newman Modularity is a spectral clustering algorithm that automatically finds the number of clusters, but for many biological networks the cluster sizes are suboptimal. In this work, we generalize Newman Modularity to incorporate information from indirect paths in RNA-Seq co-expression networks. We implement a merge-and-split algorithm that allows the user to constrain the range of cluster sizes: large enough to capture genes in relevant pathways, yet small enough to resolve distinct functions. We investigate the properties of our recursive indirect-pathways modularity (RIP-M) and compare it with other clustering methods using simulated co-expression networks and RNA-seq data from an influenza vaccine response study. RIP-M had higher cluster assignment accuracy than Newman Modularity for finding clusters in simulated co-expression networks for all scenarios, and RIP-M had comparable accuracy to Weighted Gene Correlation Network Analysis (WGCNA). RIP-M was more accurate than WGCNA for modest hard thresholds and comparable for high, while WGCNA was slightly more accurate for soft thresholds. In the vaccine study data, RIP-M and WGCNA enriched for a comparable number of immunologically relevant pathways.
In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling devices to the frames’ radio resources blocks (RRBs) of the single-antenna base-stations (BSs), adjusting the transmit power levels, and for synchronizing the transmit frames across the connected BSs. Previous studies show that the jointly coordinated scheduling and power control problem in the considered CRAN can be solved using an approach that scales exponentially with the number of BSs, devices, and RRBs, which makes the practical implementation infeasible for reasonably sized networks. This paper instead proposes a low-complexity solution to the problem, under the constraints that each device cannot be served by more than one BS but can be served by multiple RRBs within each BS frame, and under the practical assumption that the channel is constant during the duration of each frame. The paper utilizes graph-theoretical based techniques and shows that constructing a single power control graph is sufficient to obtain the optimal solution with a complexity that is independent of the number of RRBs. Simulation results reveal the optimality of the proposed solution for slow-varying channels, and show that the solution performs near-optimal for highly correlated channels.
Puerto, Gustavo; Mora, José; Ortega, Beatriz; Capmany, José
This paper presents different strategies to define the architecture of a Radio-Over-Fiber (RoF) Access networks enabling Peer-to-Peer (P2P) functionalities. The architectures fully exploit the flexibility of a wavelength router based on the feedback configuration of an Arrayed Waveguide Grating (AWG) and an optical switch to broadcast P2P services among diverse infrastructures featuring dynamic channel allocation and enabling an optical platform for 3G and beyond wireless backhaul requirements. The first architecture incorporates a tunable laser to generate a dedicated wavelength for P2P purposes and the second architecture takes advantage of reused wavelengths to enable the P2P connectivity among Optical Network Units (ONUs) or Base Stations (BS). While these two approaches allow the P2P connectivity in a one at a time basis (1:1), the third architecture enables the broadcasting of P2P sessions among different ONUs or BSs at the same time (1:M). Experimental assessment of the proposed architecture shows approximately 0.6% Error Vector Magnitude (EVM) degradation for wireless services and 1 dB penalty in average for 1 x 10(-12) Bit Error Rate (BER) for wired baseband services.
Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L
In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).
This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.
Hong, Mingyi; Alviar, Jorge
Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum management in the CRN focus on a single task of the problem, e.g., spectrum sensing, spectrum decision, spectrum sharing or spectrum mobility. In this work, we argue that for certain network configurations, jointly performing several tasks of the spectrum management improves the spectrum efficiency. Specifically, we study the uplink resource management problem in a CRN where there exist multiple cognitive users (CUs) and access points (APs), with each AP operates on a set of non-overlapping channels. The CUs, in order to maximize their uplink transmission rates, have to associate to a suitable AP (spectrum decision), and to share the channels belong to this AP with other CUs (spectrum sharing). These tasks are clearly interdependent, and the problem of how they should be carried out efficiently and distributedly is still open in the lit...
Rutledge, William; Gibson, Regina; Siegel, Eric; Duke, Kelly; Jones, Rise; Rucinski, Diane; Nunn, Gary; Torrence, W Alvin; Lewellen-Williams, Charlotte; Stewart, Chara; Blann, Kimberly; Belleton, Larry; Fincher, Lindsey; Klimberg, V Suzanne; Greene, Paul; Thomas, Billy; Erwin, Deborah; Henry-Tillman, Ronda
The origin of cancer health disparities and mortality in Arkansas is multifactorial. In response to a cooperative agreement with the National Cancer Institute's Center to Reduce Cancer Health Disparities, the Arkansas Special Populations Access Network (ASPAN) was developed to reduce these disparities. ASPAN's partnership with local primary care physicians of the Arkansas Medical, Dental, and Pharmaceutical Association through the Cancer Education Awareness Program is the focus of this article. A quasi-experimental intervention, the Community Cancer Education Awareness Program, was employed that included 1) physician education to increase awareness of risk factors and cancer screening; and 2) patient education to increase screening, and 3) patient-generated screening questionnaires to prompt discussion of cancer risk and screening recommendations between patients and physicians. Two urban and 2 rural clinics were targeted during a 12-month period with interval intervention assessments. Baseline review of records (n = 200) from patients >/=40 were utilized to assess the rate of breast, prostate, and colorectal screenings among clinics. For the patient education intervention, patients (n = 120) were interviewed via a 34-item assessment. Physician awareness of cancer risk factors and screening recommendations significantly increased. Statistically significant increases were seen for prostate (P = .028), breast (P = .036), and colorectal (P change agent, the ASPAN provider network successfully enhanced cancer screening awareness of minority physicians and their patients. Cancer 2006. (c) 2006 American Cancer Society.
Zhai, Linbo; Wang, Hua; Gao, Chuangen
The quality of service (QoS) is important issue for cognitive radio networks. In the cognitive radio system, the licensed users, also called primary users (PUs), are authorized to utilize the wireless spectrum, while unlicensed users, also called secondary users (SUs), are not authorized to use the wireless spectrum. SUs access the wireless spectrum opportunistically when the spectrum is idle. While SUs use an idle channel, the instance that PUs come back makes SUs terminate their communications and leave the current channel. Therefore, quality of service (QoS) is difficult to be ensured for SUs. In this paper, we first propose an analysis model to obtain QoS for cognitive radio networks such as blocking probability, completed traffic and termination probability of SUs. When the primary users use the channels frequently, QoS of SUs is difficult to be ensured, especially the termination probability. Then, we propose a channel reservation scheme to improve QoS of SUs. The scheme makes the terminated SUs move to the reserved channels and keep on communications. Simulation results show that our scheme can improve QoS of SUs especially the termination probability with a little cost of blocking probability in dynamic environment.
Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.
Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.
Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. The central thesis of this work is that energy efficient medium access and sleep scheduling mechanisms can be designed without necessarily sacrificing application-specific latency performance. We validate this thesis through results from four case studies that cover various aspects of medium access and sleep scheduling design in wireless sensor networks. Our first effort, DMAC, is to design an adaptive low latency and energy efficient MAC for data gathering to reduce the sleep latency. We propose staggered schedule, duty cycle adaptation, data prediction and the use of more-to-send packets to enable seamless packet forwarding under varying traffic load and channel contentions. Simulation and experimental results show significant energy savings and latency reduction while ensuring high data reliability. The second research effort, DESS, investigates the problem of designing sleep schedules in arbitrary network communication topologies to minimize the worst case end-to-end latency (referred to as delay diameter). We develop a novel graph-theoretical formulation, derive and analyze optimal solutions for the tree and ring topologies and heuristics for arbitrary topologies. The third study addresses the problem of minimum latency joint scheduling and routing (MLSR). By constructing a novel delay graph, the optimal joint scheduling and routing can be solved by M node-disjoint paths algorithm under multiple channel model. We further extended the algorithm to handle dynamic traffic changes and topology changes. A heuristic solution is proposed for MLSR under single channel interference. In the fourth study, EEJSPC, we first formulate a fundamental optimization problem that provides tunable
Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. Copyright 2016 Prous Science, S.A.U. or its licensors. All rights reserved.
Wilson, Jennifer L; Dalin, Simona; Gosline, Sara; Hemann, Michael; Fraenkel, Ernest; Lauffenburger, Douglas A
Data integration stands to improve interpretation of RNAi screens which, as a result of off-target effects, typically yield numerous gene hits of which only a few validate. These off-target effects can result from seed matches to unintended gene targets (reagent-based) or cellular pathways, which can compensate for gene perturbations (biology-based). We focus on the biology-based effects and use network modeling tools to discover pathways de novo around RNAi hits. By looking at hits in a functional context, we can uncover novel biology not identified from any individual 'omics measurement. We leverage multiple 'omic measurements using the Simultaneous Analysis of Multiple Networks (SAMNet) computational framework to model a genome scale shRNA screen investigating Acute Lymphoblastic Leukemia (ALL) progression in vivo. Our network model is enriched for cellular processes associated with hematopoietic differentiation and homeostasis even though none of the individual 'omic sets showed this enrichment. The model identifies genes associated with the TGF-beta pathway and predicts a role in ALL progression for many genes without this functional annotation. We further experimentally validate the hidden genes - Wwp1, a ubiquitin ligase, and Hgs, a multi-vesicular body associated protein - for their role in ALL progression. Our ALL pathway model includes genes with roles in multiple types of leukemia and roles in hematological development. We identify a tumor suppressor role for Wwp1 in ALL progression. This work demonstrates that network integration approaches can compensate for off-target effects, and that these methods can uncover novel biology retroactively on existing screening data. We anticipate that this framework will be valuable to multiple functional genomic technologies - siRNA, shRNA, and CRISPR - generally, and will improve the utility of functional genomic studies.
Full Text Available MicroRNAs (miRNAs are a group of small non-coding RNAs that play important regulatory roles at the post-transcriptional level. Although several computational methods have been developed to compare miRNAs, it is still a challenging and a badly needed task with the availability of various biological data resources. In this study, we proposed a novel graph theoretic property based computational framework and method, called miRFunSim, for quantifying the associations between miRNAs based on miRNAs targeting propensity and proteins connectivity in the integrated protein-protein interaction network. To evaluate the performance of our method, we applied the miRFunSim method to compute functional similarity scores of miRNA pairs between 100 miRNAs whose target genes have been experimentally supported and found that the functional similarity scores of miRNAs in the same family or in the same cluster are significantly higher compared with other miRNAs which are consistent with prior knowledge. Further validation analysis on experimentally verified miRNA-disease associations suggested that miRFunSim can effectively recover the known miRNA pairs associated with the same disease and achieve a higher AUC of 83.1%. In comparison with similar methods, our miRFunSim method can achieve more effective and more reliable performance for measuring the associations of miRNAs. We also conducted the case study examining liver cancer based on our method, and succeeded in uncovering the candidate liver cancer related miRNAs such as miR-34 which also has been proven in the latest study.
Barker Jeffery L
Full Text Available Abstract Background Cortical development is a complex process that includes sequential generation of neuronal progenitors, which proliferate and migrate to form the stratified layers of the developing cortex. To identify the individual microRNAs (miRNAs and mRNAs that may regulate the genetic network guiding the earliest phase of cortical development, the expression profiles of rat neuronal progenitors obtained at embryonic day 11 (E11, E12 and E13 were analyzed. Results Neuronal progenitors were purified from telencephalic dissociates by a positive-selection strategy featuring surface labeling with tetanus-toxin and cholera-toxin followed by fluorescence-activated cell sorting. Microarray analyses revealed the fractions of miRNAs and mRNAs that were up-regulated or down-regulated in these neuronal progenitors at the beginning of cortical development. Nearly half of the dynamically expressed miRNAs were negatively correlated with the expression of their predicted target mRNAs. Conclusion These data support a regulatory role for miRNAs during the transition from neuronal progenitors into the earliest differentiating cortical neurons. In addition, by supplying a robust data set in which miRNA and mRNA profiles originate from the same purified cell type, this empirical study may facilitate the development of new algorithms to integrate various "-omics" data sets.
In Freedom of Transit and Access to Pipeline Networks under WTO Law, the author appropriately introduces the topic by stating that energy is featuring increasingly prominently as a topic in international trade law. Indeed, while being a dormant issue in the World Trade Organization (“WTO” forum for
Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José
We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...
Marcano, Andrea; Christiansen, Henrik Lehrmann
Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...
Dijk, E.M.S.; Doorn, P.K.
Data Archiving and Networked Services (DANS) promotes sustained access to digital research data in the Netherlands. Researchers can deposit their data through the online archiving system EASY. Via the portal NARCIS the research data are shown in context, namely in relation to publications, and other
Dijk, E.M.S.; Doorn, P.K.
Data Archiving and Networked Services (DANS) is the national Dutch organization for permanent access to research data, with a focus on the humanities and social sciences. DANS offers three services to the scholarly community: DataverseNL, EASY, and NARCIS. DataverseNL is intended to support data
Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...
Gu, Xiaoqing; Ding, Rui; Fu, Shirong
Senior citizens are comparatively vulnerable in accessing learning opportunities offered on the Internet due to usability problems in current web design. In an effort to build a senior-friendly learning web as a part of the Life-long Learning Network in Shanghai, usability studies of two websites currently available to Shanghai senior citizens…
Traylor, Terry Dennis
Describes the PrePRINT Network, initiated by the Department of Energy to provide access to online preprints and reprints in the sciences and some areas of technological development. Discusses posting preprints on the Internet to improve scientific communication; and explains other Web-based products created to provide scientists with professional…
The purpose of this study was to examine the principals' perceptions of social networking access and its relationship to cyberbullying, the importance of student achievement, and the school environment across the United States. This research provides some evidence on how principals perceive and understand the threat of cyberbullying and its…
The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...
Full Text Available classification of the Gauteng provincial road network using the South African Road Classification and Access Management Manual (TRH26) as a guideline. In combination with high resolution up-to-date satellite reference imagery, dwelling and building inventories...
Murali, Reena; John, Philips George; Peter S, David
The ability of small interfering RNA (siRNA) to do posttranscriptional gene regulation by knocking down targeted genes is an important research topic in functional genomics, biomedical research and in cancer therapeutics. Many tools had been developed to design exogenous siRNA with high experimental inhibition. Even though considerable amount of work has been done in designing exogenous siRNA, design of effective siRNA sequences is still a challenging work because the target mRNAs must be selected such that their corresponding siRNAs are likely to be efficient against that target and unlikely to accidentally silence other transcripts due to sequence similarity. In some cases, siRNAs may tolerate mismatches with the target mRNA, but knockdown of genes other than the intended target could make serious consequences. Hence to design siRNAs, two important concepts must be considered: the ability in knocking down target genes and the off target possibility on any nontarget genes. So before doing gene silencing by siRNAs, it is essential to analyze their off target effects in addition to their inhibition efficacy against a particular target. Only a few methods have been developed by considering both efficacy and off target possibility of siRNA against a gene. In this paper we present a new design of neural network model with whole stacking energy (ΔG) that enables to identify the efficacy and off target effect of siRNAs against target genes. The tool lists all siRNAs against a particular target with their inhibition efficacy and number of matches or sequence similarity with other genes in the database. We could achieve an excellent performance of Pearson Correlation Coefficient (R=0. 74) and Area Under Curve (AUC=0.906) when the threshold of whole stacking energy is ≥-34.6 kcal/mol. To the best of the author's knowledge, this is one of the best score while considering the "combined efficacy and off target possibility" of siRNA for silencing a gene. The proposed model
Full Text Available This paper uses a market potential approach to examine the evolution of the rail transport network of China and its spatial distributional impacts on local accessibility, with a particular focus on high-speed rail improvements. Accessibility is measured by using a “market potential” function that was derived from the general equilibrium model of the economic geography literature, and is empirically calculated based on Geographical Information System (GIS techniques. A key finding, albeit from a highly stylized model, is that rail improvements may help raise territorial polarizing patterns across counties. The results point to the profound implications of railroad network expansion on the accessibility dynamics in periphery regions relative to core regions.
Blume, C J; Hotz-Wagenblatt, A; Hüllein, J; Sellner, L; Jethwa, A; Stolz, T; Slabicki, M; Lee, K; Sharathchandra, A; Benner, A; Dietrich, S; Oakes, C C; Dreger, P; te Raa, D; Kater, A P; Jauch, A; Merkel, O; Oren, M; Hielscher, T; Zenz, T
Mutations of the tumor suppressor p53 lead to chemotherapy resistance and a dismal prognosis in chronic lymphocytic leukemia (CLL). Whereas p53 targets are used to identify patient subgroups with impaired p53 function, a comprehensive assessment of non-coding RNA targets of p53 in CLL is missing. We exploited the impaired transcriptional activity of mutant p53 to map out p53 targets in CLL by small RNA sequencing. We describe the landscape of p53-dependent microRNA/non-coding RNA induced in response to DNA damage in CLL. Besides the key p53 target miR-34a, we identify a set of p53-dependent microRNAs (miRNAs; miR-182-5p, miR-7-5p and miR-320c/d). In addition to miRNAs, the long non-coding RNAs (lncRNAs) nuclear enriched abundant transcript 1 (NEAT1) and long intergenic non-coding RNA p21 (lincRNA-p21) are induced in response to DNA damage in the presence of functional p53 but not in CLL with p53 mutation. Induction of NEAT1 and lincRNA-p21 are closely correlated to the induction of cell death after DNA damage. We used isogenic lymphoma cell line models to prove p53 dependence of NEAT1 and lincRNA-p21. The current work describes the p53-dependent miRNome and identifies lncRNAs NEAT1 and lincRNA-p21 as novel elements of the p53-dependent DNA damage response machinery in CLL and lymphoma.
Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.
Li, Chengxian; Liu, Haihong; Zhang, Tonghua; Yan, Fang
In this paper, a gene regulatory network mediated by small noncoding RNA involving two time delays and diffusion under the Neumann boundary conditions is studied. Choosing the sum of delays as the bifurcation parameter, the stability of the positive equilibrium and the existence of spatially homogeneous and spatially inhomogeneous periodic solutions are investigated by analyzing the corresponding characteristic equation. It is shown that the sum of delays can induce Hopf bifurcation and the diffusion incorporated into the system can effect the amplitude of periodic solutions. Furthermore, the spatially homogeneous periodic solution always exists and the spatially inhomogeneous periodic solution will arise when the diffusion coefficients of protein and mRNA are suitably small. Particularly, the small RNA diffusion coefficient is more robust and its effect on model is much less than protein and mRNA. Finally, the explicit formulae for determining the direction of Hopf bifurcation and the stability of the bifurcating periodic solutions are derived by employing the normal form theory and center manifold theorem for partial functional differential equations. Finally, numerical simulations are carried out to illustrate our theoretical analysis.
representation of miRNA deregulations in the malignant transformation of neurofibroma to MPNST is given is Fig. 4. Fibrosarcoma Fibrosarcoma ...characterized miRNA expres- sion and function in human fibrosarcoma cell line HT1080. Liu and Wilson  have demonstrated that miR-520c and miR-373 increases...confirmed by the inverse correlation of the expression of miR-409-3p with angiogenin in mouse xenograft tissues and in human fibrosarcoma samples
Zhang, Zhengdong D; Nayar, Madhavi; Ammons, David; Rampersad, Joanne; Fox, George E
A partial knockout compensation method to screen 5S ribosomal RNA sequence variants in vivo is described. The system utilizes an Escherichia coli strain in which five of eight genomic 5S rRNA genes were deleted in conjunction with a plasmid which is compensatory when carrying a functionally active 5S rRNA. The partial knockout strain is transformed with a population of potentially compensatory plasmids each carrying a randomly generated 5S rRNA gene variant. a The ability to compensate the slow growth rate of the knockout strain is used in conjunction with sequencing to rapidly identify variant 5S rRNAs that are functional as well as those that likely are not. The assay is validated by showing that the growth rate of 15 variants separately expressed in the partial knockout strain can be accurately correlated with in vivo assessments of the potential validity of the same variants. A region of 5S rRNA was mutagenized with this approach and nine novel variants were recovered and characterized. Unlike a complete knockout system, the method allows recovery of both deleterious and functional variants.. The method can be used to study variants of any 5S rRNA in the E. coli context including those of E. coli.
Full Text Available We study secondary random access in multi-input multi-output cognitive radio networks, where a slotted ALOHA-type protocol and successive interference cancellation are used. We first introduce three types of transmit beamforming performed by secondary users, where multiple antennas are used to suppress the interference at the primary base station and/or to increase the received signal power at the secondary base station. Then, we show a simple decentralized power allocation along with the equivalent single-antenna conversion. To exploit the multiuser diversity gain, an opportunistic transmission protocol is proposed, where the secondary users generating less interference are opportunistically selected, resulting in a further reduction of the interference temperature. The proposed methods are validated via computer simulations. Numerical results show that increasing the number of transmit antennas can greatly reduce the interference temperature, while increasing the number of receive antennas leads to a reduction of the total transmit power. Optimal parameter values of the opportunistic transmission protocol are examined according to three types of beamforming and different antenna configurations, in terms of maximizing the cognitive transmission capacity. All the beamforming, decentralized power allocation, and opportunistic transmission protocol are performed by the secondary users in a decentralized manner, thus resulting in an easy implementation in practice.
Full Text Available To meet the increasing demand of high-data-rate services of high-speed railway (HSR passengers, cloud radio access network (C-RAN is proposed. This paper investigates the tradeoff between energy efficiency (EE performance and capacity in C-RAN of HSR. Considering that the train location can be predicted, we propose a predictable path loss based time domain power allocation method (PPTPA to improve EE performance of HSR communication system. First, we consider that the communication system of HSR only bears the passenger information services (PISs. The energy-efficient power allocation problem with delay constraint is studied. The formulated problem is nonconvex. To deal with it, an equivalent convex problem is reformulated. Based on PPTPA, we propose an iterative algorithm to improve the EE performance. Second, we consider that the PISs and the train control services (TCSs are all bore. A capacity optimization problem with joint EE and services transmission delay constraints is formulated. Based on PPTPA, we propose a hybrid power allocation scheme to improve the capacity of the system. Finally, we analyze the effect of small-scale fading on EE performance. The effectiveness of the proposed power allocation algorithm is validated by HSR channel measurement trace based emulation results and extensive simulation results.
Lin, Huifa; Shin, Won-Yong
We study secondary random access in multi-input multi-output cognitive radio networks, where a slotted ALOHA-type protocol and successive interference cancellation are used. We first introduce three types of transmit beamforming performed by secondary users, where multiple antennas are used to suppress the interference at the primary base station and/or to increase the received signal power at the secondary base station. Then, we show a simple decentralized power allocation along with the equivalent single-antenna conversion. To exploit the multiuser diversity gain, an opportunistic transmission protocol is proposed, where the secondary users generating less interference are opportunistically selected, resulting in a further reduction of the interference temperature. The proposed methods are validated via computer simulations. Numerical results show that increasing the number of transmit antennas can greatly reduce the interference temperature, while increasing the number of receive antennas leads to a reduction of the total transmit power. Optimal parameter values of the opportunistic transmission protocol are examined according to three types of beamforming and different antenna configurations, in terms of maximizing the cognitive transmission capacity. All the beamforming, decentralized power allocation, and opportunistic transmission protocol are performed by the secondary users in a decentralized manner, thus resulting in an easy implementation in practice.
Schäfer, Angela; Scientific MaNIDA Team
The Marine Network for Integrated Data Access (MaNIDA) builds a sustainable e-Infrastructure to support discovery and re-use of data from distinct marine and earth science data providers in Germany (see ESSI1.2 and ESSI2.2). Thereby we implement the "Data Portal of German Marine Research" for coherent discovery, view, download and dissemination of aggregated content. MaNIDA receives a unique momentum from the cooperation and financial partnership between main German marine research institutes (AWI, MARUM, HZG, GEOMAR, Uni Hamburg, Uni Kiel, Uni Bremen) and the Federal Maritime and Hydrographic Agency as well as active participation in international and major EU-initiatives (ICSU, GEOSS, SeaDataNet, EMODNET, ODIP). Together with a coherent management strategy coordinated by the Alfred Wegener Institute, Helmholtz Center for Polar and Marine Research, sustainability will be achieved via the long-term commitment of framework funding by the Helmholtz Association, Germany's largest scientific research organization for large-scale facilities and scientific infrastructure. Strategic Aims The installation of the "Data Portal of German Marine Research" will address the urgent demands of the German research community for reliable and easy access to marine research data at one single point of access and truth. Primary focus will be given to data derived from nationally operated research and monitoring facilities (vessels, observatories, alert systems, etc), whereby related contextual content and publications will become an integral part of the aggregation effort. For the scientific community we define responsibilities and commitments across partners while complementing existing data repositories and the new portal with well-articulated workflows from the instrument to the data product. Necessary level of quality assurance and user support will be implemented to achieve substantial enhancements in the whole lifecycle management of marine scientific data. The creation of a data
Naga Prasad, Sathyamangla V.; Duan, Zhong-Hui; Gupta, Manveen K.; Surampudi, Venkata Suresh K.; Volinia, Stefano; Calin, George A.; Liu, Chang-Gong; Kotwal, Ashwin; Moravec, Christine S.; Starling, Randall C.; Perez, Dianne M.; Sen, Subha; Wu, Qingyu; Plow, Edward F.; Croce, Carlo M.
It is well established that gene expression patterns are substantially altered in cardiac hypertrophy and heart failure, but the reasons for such differences are not clear. MicroRNAs (miRNAs) are short noncoding RNAs that provide a novel mechanism for gene regulation. The goal of this study was to comprehensively test for alterations in miRNA expression using human heart failure samples with an aim to build signaling pathway networks using predicted targets for the miRNAs and to identify noda...
Full Text Available Introduction: Health Care Networks (HCN are seen as a possibility for articulating and coordinating actions, health services and is a priority in the health system. One strategy to assure their improvement is the Tutorial Education Program (PET-Redes in the health area. Within this context, it is important to understand the challenges and strengths for the effectiveness of HCN to the network care. Objective: To identify and analyze the perceptions of professionals who are preceptors of PET-Networks (Stork/at-risk infants Network and Disabled People Network about the configuration of the network care and the challenges of professional actions related to it. Method: Qualitative study conducted through two focus groups with professionals that are preceptors of the PET-Networks. Thematic analysis was used for data analysis. Results: Both networks presented the following categories related to the network care configuration: access, comprehensive health care and communication. For this care network configuration, some challenges mentioned include geographical and architectural barriers, lack of social support, lack of transportation, failure on care flow and discontinuities in the communicative process. To deal with these challenges, the following strategies were mentioned: implementation of electronic medical records and formulation of specific forums for debate and articulation of actions, among others. It is important to notice that these categories are intertwined and that more challenges than strategies to overcome them were pointed out by the participants. Conclusion: There are several challenges for effective HCN from different levels and the construction of strategies needs to be convened among all persons involved in the HCN
Miao, Yiming; Tian, Yuanwen; Cheng, Jingjing; Hossain, M. Shamim; Ghoneim, Ahmed
With the development of LPWA (Low Power Wide Area) technology, the emerging NB-IoT (Narrowband Internet of Things) technology is becoming popular with wide area and low-data-rate services. In order to achieve objectives such as huge amount of connection and wide area coverage within NB-IoT, the problem of network congestion generated by random access of numerous devices should be solved. In this paper, we first introduce the background of NB-IoT and investigate the research on random access o...
David, L.; Percebois, J
The gas deregulation process implies crucial choices concerning access to transportation networks. These choices deal with the nature, the structure and the level of access fees. This paper proposes an evaluation of different systems implemented both in Europe and North America, in relation to normative pricing references. The rules according to which shippers can buy or sell capacity represent another kind of choice that Regulators have to make. This paper proposes a simple model which demonstrates that secondary market prices should not be subject to a cap and emphasizes the need of a 'use-it-or-lose-it' rule on this market. (authors)
Junge, Alexander; Refsgaard, Jan Christian; Garde, Christian
Non-coding RNAs (ncRNAs) fulfill a diverse set of biological functions relying on interactions with other molecular entities. The advent of new experimental and computational approaches makes it possible to study ncRNAs and their associations on an unprecedented scale. We present RAIN (RNA Associ......) co-occurrences found by text mining Medline abstracts. Each resource was assigned a reliability score by assessing its agreement with a gold standard set of microRNA-target interactions. RAIN is available at: http://rth.dk/resources/rain...
Full Text Available The National Accessibility Portal (NAP) is a website specifically designed to give South Africans living with disabilities access to important information which may enhance their lives. This information includes lists of schools for children...
Madsen, Peter; Suhr, Lau Frejstrup; Rodríguez Páez, Juan Sebastián
We present a successful experimental evaluation of 4 level Pulse Amplitude Modulation (4-PAM) and Duobinary modulation. An experimental performance evaluation is presented for Duobinary 4 PAM and other modulation formats. All modulation formants used, may be considered to be implemented in future...... Passive Optical Network (PON) class access networks with limited electrical bandwidth. We compared NRZ, Duobinary, 4-PAM and Duobinary 4-PAM operating at 9 Gbaud over 20 km single mode fiber. The results provides an insight and guidelines on the utilization of these advanced modulation formats....
Carr, Michelle; Nielsen, Tore
Study Objectives: The goals of the study were to assess semantic priming to emotion and nonemotion cue words using a novel measure of associational breadth for participants who either took rapid eye movement (REM) or nonrapid eye movement (NREM) naps or who remained awake, and to assess the relation of priming to REM sleep consolidation and REM sleep inertia effects. Design: The associational breadth task was applied in both a priming condition, where cue words were signaled to be memorized prior to sleep (primed), and a nonpriming condition, where cue words were not memorized (nonprimed). Cue words were either emotional (positive, negative) or nonemotional. Participants were randomly assigned to either an awake (WAKE) or a sleep condition, which was subsequently split into NREM or REM groups depending on stage at awakening. Setting: Hospital-based sleep laboratory. Participants: Fifty-eight healthy participants (22 male) ages 18 to 35 y (mean age = 23.3 ± 4.08 y). Measurements and Results: The REM group scored higher than the NREM or WAKE groups on primed, but not nonprimed emotional cue words; the effect was stronger for positive than for negative cue words. However, REM time and percent correlated negatively with degree of emotional priming. Priming occurred for REM awakenings but not for NREM awakenings, even when the latter sleep episodes contained some REM sleep. Conclusions: Associational breadth may be selectively consolidated during REM sleep for stimuli that have been tagged as important for future memory retrieval. That priming decreased with REM time and was higher only for REM sleep awakenings is consistent with two explanatory REM sleep processes: REM sleep consolidation serving emotional downregulation and REM sleep inertia. Citation: Carr M, Nielsen T. Morning REM sleep naps facilitate broad access to emotional semantic networks. SLEEP 2015;38(3):433–443. PMID:25409100
Willemen, Pieter; Laselva, Daniela; Wang, Yu; Kovács, Istvan; Djapic, Relja; Moerman, Ingrid
...) via controlled loading of these systems. In emerging heterogeneous networks characterized by different cell sizes and diverse WLAN deployments, automatic tuning of the network selection functionality plays a crucial role...
Papenfort, Kai; Vogel, Jörg
Spot42 is a paradigm for small RNAs that fine-tune carbon metabolism. In this issue of Molecular Cell, Beisel and Storz (2011) reveal that this conserved RNA acts through a multioutput feedforward loop to modulate the global dynamics of sugar consumption. Copyright © 2011 Elsevier Inc. All rights reserved.
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period
Yang, Ken-Chi; Hsu, Chia-Lang; Lin, Chen-Ching; Juan, Hsueh-Fen; Huang, Hsuan-Cheng
.... Mirin is a web-based application suitable for identifying functional modules from protein-protein interaction networks regulated by aberrant miRNAs under user-defined biological conditions such as cancers...
Etemadi, Manal; Gorji, Hasan Abolghasem; Kangarani, Hannaneh Mohammadi; Ashtarian, Kioomars
The extent of universal health coverage in terms of financial protection is worrisome in Iran. There are challenges in health policies to guarantee financial accessibility to health services, especially for poor people. Various institutions offer support to ensure that the poor have financial access to health services. The aim of this study is to investigate the relationship network among the institutions active in this field. This study is a policy document analysis. It evaluates the country's legal documents in the field of financial support to the poor for healthcare after the Islamic Revolution in Iran. The researchers looked for the documents on the related websites and referred to the related organizations. The social network analysis approach was chosen for the analysis of the documents. Block-modelling and multi-dimensional scaling (MDS) was used to determine the network structures. The UCINET software was employed to analyse the data. Most the main actors of this network are chosen from the government budget. There is no legal communication and cooperation among some of the actors because of their improper position in the network. Seven blocks have been clustered by CONCOR in terms of the actor's degree of similarity. The social distance among the actors of the seven blocks is very short. Power distribution in the field of financial support to the poor has a fragmented structure; however, it is mainly run by a dominant block consisting of The Supreme Council of Welfare and Social Security, Health Insurance Organization, and the Ministry of Health and Medical Education. The financial support for the poor network involves multiple actors. This variety has created a series of confusions in terms of the type, level, and scope of responsibilities among the actors. The weak presence legislative and regulatory institutions and also non-governmental institutions are the main weak points of this network. Copyright © 2017 Elsevier Ltd. All rights reserved.
Kaup, Fabian; Michelinakis, Foivos; Bui, Nicola
quality is affected by a number of factors, including network operator and available technologies. However, most studies measuring the cellular network do not consider the performance implications of network configuration and management. To this end, this paper reports about an extensive data set...
Harden, Jennifer W.; Hugelius, Gustaf; Koven, Charlie; Sulman, Ben; O'Donnell, Jon; He, Yujie
Soils are capacitors for carbon and water entering and exiting through land-atmosphere exchange. Capturing the spatiotemporal variations in soil C exchange through monitoring and modeling is difficult in part because data are reported unevenly across spatial, temporal, and management scales and in part because the unit of measure generally involves destructive harvest or non-recurrent measurements. In order to improve our fundamental basis for understanding soil C exchange, a multi-user, open source, searchable database and network of scientists has been formed. The International Soil Carbon Network (ISCN) is a self-chartered, member-based and member-owned network of scientists dedicated to soil carbon science. Attributes of the ISCN include 1) Targeted ISCN Action Groups which represent teams of motivated researchers that propose and pursue specific soil C research questions with the aim of synthesizing seminal articles regarding soil C fate. 2) Datasets to date contributed by institutions and individuals to a comprehensive, searchable open-access database that currently includes over 70,000 geolocated profiles for which soil C and other soil properties. 3) Derivative products resulting from the database, including depth attenuation attributes for C concentration and storage; C storage maps; and model-based assessments of emission/sequestration for future climate scenarios. Several examples illustrate the power of such a database and its engagement with the science community. First, a simplified, data-constrained global ecosystem model estimated a global sensitivity of permafrost soil carbon to climate change (g sensitivity) of -14 to -19 Pg C °C-1 of warming on a 100 years time scale. Second, using mathematical characterizations of depth profiles for organic carbon storage, C at the soil surface reflects Net Primary Production (NPP) and its allotment as moss or litter, while e-folding depths are correlated to rooting depth. Third, storage of deep C is highly
Full Text Available Hui Cai,1 Jiping Xu,2 Yifang Han,3 Zhengmao Lu,1 Ting Han,1 Yibo Ding,4 Liye Ma1 1Department of General Surgery, Changhai Hospital, Second Military Medical University, Shanghai, 2Department of Medical Administration, Changhai Hospital, Second Military Medical University, Shanghai, 3Department of Epidemiology, Research Institute for Medicine of Nanjing Command, Nanjing, 4Department of Epidemiology, Changhai Hospital, Second Military Medical University, Shanghai, People’s Republic of China Purpose: This study aimed to identify molecular prognostic biomarkers for gastric cancer. Methods: mRNA and miRNA expression profiles of eligible gastric cancer and control samples were downloaded from Gene Expression Omnibus to screen the differentially expressed genes (DEGs and differentially expressed miRNAs (DEmiRs, using MetaDE and limma packages, respectively. Target genes of the DEmiRs were also collected from both predictive and experimentally validated target databases of miRNAs. The overlapping genes between selected targets and DEGs were identified as risk genes, followed by functional enrichment analysis. Human pathways and their corresponding genes were downloaded from the Kyoto Encyclopedia of Genes and Genomes (KEGG database for the expression analysis of each pathway in gastric cancer samples. Next, co-pathway pairs were selected according to the Pearson correlation coefficients. Finally, the co-pathway pairs, miRNA–target pairs, and risk gene–pathway pairs were merged into a complex interaction network, the most important nodes (miRNAs/target genes/co-pathway pairs of which were selected by calculating their degrees.Results: Totally, 1,260 DEGs and 144 DEmiRs were identified. There were 336 risk genes found in the 9,572 miRNA–target pairs. Judging from the pathway expression files, 45 co-pathway pairs were screened out. There were 1,389 interactive pairs and 480 nodes in the integrated network. Among all nodes in the network, focal
Lundblad, Eirik W.; Xiao, Gaoping; Ko, Jae-hyeong; Altman, Sidney
A method of inhibiting the expression of particular genes by using external guide sequences (EGSs) has been improved in its rapidity and specificity. Random EGSs that have 14-nt random sequences are used in the selection procedure for an EGS that attacks the mRNA for a gene in a particular location. A mixture of the random EGSs, the particular target RNA, and RNase P is used in the diagnostic procedure, which, after completion, is analyzed in a gel with suitable control lanes. Within a few ho...
Suneja, Gita; Bacon, Monica; Small, William; Sang Y Ryu; Kitchener, Henry C; Gaffney, David K.
Introduction: The burden of cervical cancer is large and growing in developing countries, due in large part to limited access to screening services and lack of human papillomavirus (HPV) vaccination. In spite of modern advances in diagnostic and therapeutic modalities, outcomes from cervical cancer have not markedly improved in recent years. Novel clinical trials are urgently needed to improve outcomes from cervical cancer worldwide. Methods: The Cervix Cancer Research Network (CCRN), a su...
Gita eSuneja; Monica eBacon; William eSmall; Sang Y Ryu; Kitchener, Henry C; Gaffney, David K.
Introduction: The burden of cervical cancer is large and growing in developing countries, due in large part to limited access to screening services and lack of human papillomavirus (HPV) vaccination. In spite of modern advances in diagnostic and therapeutic modalities, outcomes from cervical cancer have not markedly improved in recent years. Novel clinical trials are urgently needed to improve outcomes from cervical cancer worldwide. Methods: The Cervix Cancer Research Network (CCRN), a sub...
Pham, Tien Thang; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso
We report on experimental demonstration of an impulse radio ultrawideband (IR-UWB) based converged communication and sensing system. A 1550-nm VCSEL-generated IR-UWB signal is used for 2-Gbps wireless data distribution over 800-m and 50-km single mode fiber links which present short-range in...... application, paving the way forward for the development and deployment of converged UWB VCSEL-based technologies in access and in-building networks of the future....
Zhang, Junwen; Yu, Jianjun; Wang, Jing; Xu, Mu; Cheng, Lin; Lu, Feng; Shen, Shuyi; Yan, Yan; Cho, Hyunwoo; Guidotti, Daniel; Chang, Gee-kung
Fifth-generation (5G) wireless access network promises to support higher access data rate with more than 1,000 times capacity with respect to current long-term evolution (LTE) systems. New radio-access-technologies (RATs) based on higher carrier frequencies to millimeter-wave (MMW) radio-over-fiber, and carrier-aggregation (CA) using multi-band resources are intensively studied to support the high data rate access and effectively use of frequency resources in heterogeneous mobile network (Het-Net). In this paper, we investigate several enabling technologies for MMW RoF systems in 5G Het-Net. Efficient mobile fronthaul (MFH) solutions for 5G centralized radio access network (C-RAN) and beyond are proposed, analyzed and experimentally demonstrated based on the analog scheme. Digital predistortion based on memory polynomial for analog MFH linearization are presented with improved EVM performances and receiver sensitivity. We also propose and experimentally demonstrate a novel inter-/intra- RAT CA scheme for 5G Het- Net. The real-time standard 4G-LTE signal is carrier-aggregated with three broadband 60GHz MMW signals based on proposed optical-domain band-mapping method. RATs based on new waveforms have also been studied here to achieve higher spectral-efficiency (SE) in asynchronous environments. Full-duplex asynchronous quasi-gapless carrier aggregation scheme for MMW ROF inter-/intra-RAT based on the FBMC is also presented with 4G-LTE signals. Compared with OFDM-based signals with large guard-bands, FBMC achieves higher spectral-efficiency with better EVM performance at less received power and smaller guard-bands.
Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.
Martínez Bascuñán, Marcela; Rojas Quezada, Carolina
Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA), the second largest city in Chile. The city's public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted regression (GWR) and ordinary least squares (OLS) for modelling accessibility with socioeconomic and transport variables is proposed. The explanatory variables investigated are: illiterate population, rural housing, alternative housing, homes with a motorised vehicle, public transport routes, and connectivity. Our results identify that approximately 4.1% of the population have unfavourable or very unfavourable accessibility to public hospitals, which correspond to rural areas located south of CMA. Application of a local GWR model (0.87 R2 adjusted) helped to improve the settings over the use of traditional OLS methods (multiple regression) (0.67 R2 adjusted) and to find the spatial distribution of both coefficients of the explanatory variables, demonstrating the local significance of the model. Thus, accessibility studies have enormous potential to contribute to the development of public health and transport policies in turn to achieve equality in spatial accessibility to specialised health care.
Marcela Martínez Bascuñán
Full Text Available Accessibility models in transport geography based on geographic information systems have proven to be an effective method in determining spatial inequalities associated with public health. This work aims to model the spatial accessibility from populated areas within the Concepción metropolitan area (CMA, the second largest city in Chile. The city’s public hospital network is taken into consideration with special reference to socio-regional inequalities. The use of geographically weighted regression (GWR and ordinary least squares (OLS for modelling accessibility with socioeconomic and transport variables is proposed. The explanatory variables investigated are: illiterate population, rural housing, alternative housing, homes with a motorised vehicle, public transport routes, and connectivity. Our results identify that approximately 4.1% of the population have unfavourable or very unfavourable accessibility to public hospitals, which correspond to rural areas located south of CMA. Application of a local GWR model (0.87 R2 adjusted helped to improve the settings over the use of traditional OLS methods (multiple regression (0.67 R2 adjusted and to find the spatial distribution of both coefficients of the explanatory variables, demonstrating the local significance of the model. Thus, accessibility studies have enormous potential to contribute to the development of public health and transport policies in turn to achieve equality in spatial accessibility to specialised health care.
In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.
Beard, Jordan A.; Tenga, Alexa; Hills, Justin; Hoyer, Jessica D.; Cherian, Milu T.; Wang, Yong-Dong; Chen, Taosheng
Nuclear receptor subfamily 4 group A member 2 (NR4A2) is an orphan nuclear receptor that is over-expressed in cancer and promotes cell proliferation, migration, transformation, and chemoresistance. Increased expression and function of NR4A2 have been attributed to various signaling pathways, but little is known about microRNA (miRNA) regulation of NR4A2 in cancer. To investigate the posttranscriptional regulation of NR4A2, we used a 3′ untranslated region (UTR) reporter screen and identified miR-34 as a putative regulator of NR4A2. By using computer predictions, we identified and confirmed an miRNA recognition element in the 3′ UTR of NR4A2 that was responsible for miR-34–mediated suppression. We next demonstrated that overexpression of exogenous miR-34 or activation of the p53 pathway, which regulates endogenous miR-34 expression, decreased NR4A2 expression. Consistent with previous reports, overexpression of NR4A2 blocked the induction of p53 target genes, including mir-34a. This was a phenotypic effect, as NR4A2 overexpression could rescue cells from p53-induced inhibition of proliferation. In summary, our results are the first characterization of a cancer-related miRNA capable of regulating NR4A2 and suggest a network and possible feedback mechanism involving p53, miR-34, and NR4A2. PMID:27121375
Full Text Available The ability to adapt to diverse micro-environmental challenges encountered within a host is of pivotal importance to the opportunistic fungal pathogen C. albicans. We have quantified C.albicans and M. musculus gene expression dynamics during phagocytosis by dendritic cells in a genome-wide, time-resolved analysis using simultaneous RNA-seq. A robust network inference map was generated from this dataset using NetGenerator, predicting novel interactions between the host and the pathogen. We experimentally verified predicted interdependent sub-networkscomprising Hap3 in C. albicans, and Ptx3 and Mta2 in M. musculus. Remarkably, binding of recombinant Ptx3 to the C. albicans cell wall was found to regulate the expression of fungal Hap3 target genes as predicted by the network inference model. Pre-incubation of C. albicans with recombinant Ptx3 significantly altered the expression of Mta2 target cytokines such as IL-2 and IL-4 in a Hap3-dependent manner, further suggesting a role for Mta2 in host-pathogen interplay as predicted in the network inference model. We propose an integrated model for the functionality of these sub-networks during fungal invasion of immune cells, according to which binding of Ptx3 to the C. albicans cell wall induces remodelling via fungal Hap3 target genes, thereby altering the immune response to the pathogen. We show the applicability of network inference to predict interactions between host-pathogen pairs, demonstrating the usefulness of this systems biology approach to decipher mechanisms of microbial pathogenesis.
Full Text Available The study aim to find the impact of access to finance for improving the performance of MSEs in Punjab, Pakistan. The researchers also try to further estimate the moderating effect of entrepreneurial networking on the relationship between access to finance and performance of MSEs in Punjab, Pakistan. Survey research was employed to collect the data. The data for the study was collected with the help of a questionnaire adapted from the past studies. The reliability of the instrument that was used to collect data was ensured through Cronbach’s alpha and composite reliability. After ensuring the reliability of instrument, structural equation modeling was conducted by using PLS-3. The results of the study supported the arguments raised in the study that there is a positive relationship between access to finance and performance of MSEs in Punjab, Pakistan. The results also supported the argument of moderating effect of entrepreneurial networking on the relationship between access to finance and performance of MSEs in Punjab, Pakistan. The explained variation calculated through R2 has also shown that the overall model is explaining 47.1 % variation in the performance of MSEs in Punjab, Pakistan.
Schoenmakers, Daphne; Lamkaddem, Majda; Suurmond, Jeanine
Abstract : Background: Despite high prevalence of mental problems among elderly migrants in The Netherlands, the use of psychosocial care services by this group is low. Scientific evidence points at the crucial role of social support for mental health and the use of psychosocial services. We therefore explored the role of social networks in the access to psychosocial care among elderly migrants in The Netherlands. Methods: A qualitative study was conducted using semi-structured group interviews and individual interviews. The eight group and eleven individual interviews (respectively n = 58 and n = 11) were conducted in The Netherlands with Turkish, Moroccan, Surinamese, and Dutch elderly. The data were analysed through coding and comparing fragments and recognizing patterns. Results: Support of the social network is important to navigate to psychosocial care and is most frequently provided by children. However, the social network of elderly migrants is generally not able to meet the needs of the elderly. This is mostly due to poor mental health literacy of the social network, taboo, and stigma around mental illness and the busy lives of the social network members. Conclusion s : Strategies to address help-seeking barriers should consider mental health literacy in elderly migrants as well as their social networks, and counteract taboos and stigma of mental health problems.
Full Text Available Abstract: Background: Despite high prevalence of mental problems among elderly migrants in The Netherlands, the use of psychosocial care services by this group is low. Scientific evidence points at the crucial role of social support for mental health and the use of psychosocial services. We therefore explored the role of social networks in the access to psychosocial care among elderly migrants in The Netherlands. Methods: A qualitative study was conducted using semi-structured group interviews and individual interviews. The eight group and eleven individual interviews (respectively n = 58 and n = 11 were conducted in The Netherlands with Turkish, Moroccan, Surinamese, and Dutch elderly. The data were analysed through coding and comparing fragments and recognizing patterns. Results: Support of the social network is important to navigate to psychosocial care and is most frequently provided by children. However, the social network of elderly migrants is generally not able to meet the needs of the elderly. This is mostly due to poor mental health literacy of the social network, taboo, and stigma around mental illness and the busy lives of the social network members. Conclusions: Strategies to address help-seeking barriers should consider mental health literacy in elderly migrants as well as their social networks, and counteract taboos and stigma of mental health problems.
Full Text Available This paper presents the algorithm Courteous Priority Access to the shared commercial radio with offloading (CPAwO, for public safety network (PSN over LTE heterogeneous networks (HetNets. We propose a solution for prioritization of PSN users with access to the commercial radio network resources. Our model offers additional radio resources to the PSN. Furthermore, it ensures a certain priority for commercial users by assigning quantities of additional radio resources through the courteous scheme. This allows delaying preemption and blocking bearers when the radio resources are limited. The other part of CPAwO model is to apply the principle of offloading in order to reduce the impact of the macrocell congestion. This technique is to switch the new bearers arriving at the LTE macrocells to small cells, in order to decrease the number of the blocked and interrupted bearers in the network. The results of the simulation showed that the allocation of radio resources via the courteous mechanism with offloading of new bearers to small cells reduces the rate of blocking bearers and delays the preemption of active bearers present in the LTE HetNets. It also reduces the cost of the end-to-end communications, thanks to the reallocation of free frequencies.
Li, Ze; Zhang, Min; Wang, Danshi; Cui, Yue
We propose a flexible and reconfigurable wavelength-division multiplexing (WDM) multicast scheme supporting downstream emergency multicast communication for WDM optical access network (WDM-OAN) via a multicast module (MM) based on four-wave mixing (FWM) in a semiconductor optical amplifier. It serves as an emergency measure to dispose of the burst, large bandwidth, and real-time multicast service with fast service provisioning and high resource efficiency. It also plays the role of physical backup in cases of big data migration or network disaster caused by invalid lasers or modulator failures. It provides convenient and reliable multicast service and emergency protection for WDM-OAN without modifying WDM-OAN structure. The strategies of an MM setting at the optical line terminal and remote node are discussed to apply this scheme to passive optical networks and active optical networks, respectively. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment in which one-to-six/eight 10-Gbps nonreturn-to-zero-differential phase-shift keying WDM multicasts in both strategies are successfully transmitted over single-mode fiber of 20.2 km. One-to-many reconfigurable WDM multicasts dealing with higher data rate and other modulation formats of multicast service are possible through the proposed scheme. It can be applied to different WDM access technologies, e.g., time-wavelength-division multiplexing-OAN and coherent WDM-OAN, and upgraded smoothly.
Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.
Lei, Jing; Li, Baoguo; Li, Erbao; Gong, Zhenghui
Multiple access via sparse graph, such as low density signature (LDS) and sparse code multiple access (SCMA), is a promising technique for future wireless communications. This survey presents an overview of the developments in this burgeoning field, including transmitter structures, extrinsic information transform (EXIT) chart analysis and comparisons with existing multiple access techniques. Such technique enables multiple access under overloaded conditions to achieve a satisfactory performance. Message passing algorithm is utilized for multi-user detection in the receiver, and structures of the sparse graph are illustrated in detail. Outlooks and challenges of this technique are also presented.
Alimi, Isiaka A.; Monteiro, Paulo P.; Teixeira, António L.
The key paths toward the fifth generation (5G) network requirements are towards centralized processing and small-cell densification systems that are implemented on the cloud computing-based radio access networks (CC-RANs). The increasing recognitions of the CC-RANs can be attributed to their valuable features regarding system performance optimization and cost-effectiveness. Nevertheless, realization of the stringent requirements of the fronthaul that connects the network elements is highly demanding. In this paper, considering the small-cell network architectures, we present multiuser mixed radio-frequency/free-space optical (RF/FSO) relay networks as feasible technologies for the alleviation of the stringent requirements in the CC-RANs. In this study, we use the end-to-end (e2e) outage probability, average symbol error probability (ASEP), and ergodic channel capacity as the performance metrics in our analysis. Simulation results show the suitability of deployment of mixed RF/FSO schemes in the real-life scenarios.
Recent years have experienced a huge influx of daily life applications based on embedded wireless networks. While new applications with more demanding requirements and challenging deployment conditions are being explored, most of the existing networks suffer from communication deficiencies, inefficient use of resources, and inability to satisfy desired quality of service requirements. In order to carry on exploitation and exploration of embedded wireless networks in different daily life appli...
Reggiani, A; Bucci, P.; Russo, G.; Haas, A.; P. Nijkamp
See also the article in the (2011). Volume 19, issue 4, pages 528-536. Commuting is, therefore, an important equilibrating vehicle in a city network constellation. Cities act as attractors of commuters, as most economic activity occurs in cities, thus providing a high share of attractive workplaces. Cities that are centrally connected in a network may act as both centripetal and centrifugal forces in the whole system. The present paper focuses on what is named the City Network (CN) approach. ...
Ning, Shangwei; Gao, Yue; Wang, Peng; Li, Xiang; Zhi, Hui; Zhang, Yan; Liu, Yue; Zhang, Jizhou; Guo, Maoni; Han, Dong; Li, Xia
Long non-coding RNAs (lncRNAs), transcription factors and microRNAs can form lncRNA-mediated feed-forward loops (L-FFLs), which are functional network motifs that regulate a wide range of biological processes, such as development and carcinogenesis. However, L-FFL network motifs have not been systematically identified, and their roles in human cancers are largely unknown. In this study, we computationally integrated data from multiple sources to construct a global L-FFL network for six types of human cancer and characterized the topological features of the network. Our approach revealed several dysregulated L-FFL motifs common across different cancers or specific to particular cancers. We also found that L-FFL motifs can take part in other types of regulatory networks, such as mRNA-mediated FFLs and ceRNA networks, and form the more complex networks in human cancers. In addition, survival analyses further indicated that L-FFL motifs could potentially serve as prognostic biomarkers. Collectively, this study elucidated the roles of L-FFL motifs in human cancers, which could be beneficial for understanding cancer pathogenesis and treatment.
Lundblad, Eirik W; Xiao, Gaoping; Ko, Jae-Hyeong; Altman, Sidney
A method of inhibiting the expression of particular genes by using external guide sequences (EGSs) has been improved in its rapidity and specificity. Random EGSs that have 14-nt random sequences are used in the selection procedure for an EGS that attacks the mRNA for a gene in a particular location. A mixture of the random EGSs, the particular target RNA, and RNase P is used in the diagnostic procedure, which, after completion, is analyzed in a gel with suitable control lanes. Within a few hours, the procedure is complete. The action of EGSs designed by an older method is compared with EGSs designed by the random EGS method on mRNAs from two bacterial pathogens.
Radaydeh, Redha Mahmoud
This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.
51 b. Carrier Sense Multiple Access (CSMA).................................52 c. MACA and MACAW...Figure 17. Comparison of collision avoidance techniques proposed in MACA , MACAW, and MACA -BI (From [132...low power listening lrd ......................long range dependent MAC .................medium access control MACA
Sharma, Vikas; Purkait, Suvendu; Takkar, Sonam; Malgulwar, Prit Benny; Kumar, Anupam; Pathak, Pankaj; Suri, Vaishali; Sharma, Mehar C; Suri, Ashish; Kale, Shashank Sharad; Kulshreshtha, Ritu; Sarkar, Chitra
Enhancer of Zeste homologue2 (EZH2) is an epigenetic regulator that functions as oncogene in astrocytic tumors, however, EZH2 regulation remains little studied. In this study, we measured EZH2 levels in low (Gr-II,DA) and high grade (Gr-IV,GBM) astrocytic tumors and found significant increased EZH2 transcript level with grade(median DA-8.5, GBM-28.9).However, a different trend was reflected in protein levels, with GBMs showing high EZH2 LI(median-26.5) compared to DA (median 0.3). This difference in correlation of EZH2 protein and RNA levels suggested post-transcriptional regulation of EZH2, likely mediated by miRNAs. We selected eleven miRNAs that strongly predicted to target EZH2 and measured their expression. Three miRNAs (miR-26a-5p,miR27a-3p and miR-498) showed significant correlation with EZH2 protein, suggesting them as regulators of EZH2, however miR-26a-5p levels decreased with grade. ChIP analyses revealed H3K27me3 modifications in miR-26a promoter suggesting feedback loop between EZH2 and miR26a. We further measured six downstream miRNA targets of EZH2 and found significant downregulation of four (miR-181a/b and 200b/c) in GBM. Interestingly, EZH2 associated miRNAs were predicted to target 25 genes in glioma-pathway, suggesting their role in tumor formation or progression. Collectively, our work suggests EZH2 and its miRNA interactors may serve as promising biomarkers for progression of astrocytic tumors and may offer novel therapeutic strategies.
Megiorni, Francesca; Colaiacovo, Moreno; Cialfi, Samantha; McDowell, Heather P; Guffanti, Alessandro; Camero, Simona; Felsani, Armando; Losty, Paul D; Pizer, Barry; Shukla, Rajeev; Cappelli, Carlo; Ferrara, Eva; Pizzuti, Antonio; Moles, Anna; Dominici, Carlo
Neuroblastoma (NB) originates from neural crest-derived precursors and represents the most common childhood extracranial solid tumour. MicroRNAs (miRNAs), a class of small non-coding RNAs that participate in a wide variety of biological processes by regulating gene expression, appear to play an essential role within the NB context. High-throughput next generation sequencing (NGS) was applied to study the miRNA transcriptome in a cohort of NB tumours with and without MYCN-amplification (MNA and MNnA, respectively) and in dorsal root ganglia (DRG), as a control. Out of the 128 miRNAs differentially expressed in the NB vs. DRG comparison, 47 were expressed at higher levels, while 81 were expressed at lower levels in the NB tumours. We also found that 23 miRNAs were differentially expressed in NB with or without MYCN-amplification, with 17 miRNAs being upregulated and 6 being downregulated in the MNA subtypes. Functional annotation analysis of the target genes of these differentially expressed miRNAs demonstrated that many mRNAs were involved in cancer-related pathways, such as DNA-repair and apoptosis as well as FGFR and EGFR signalling. In particular, we found that miR-628-3p negatively affects MYCN gene expression. Furthermore, we identified a novel miRNA candidate with variable expression in MNA vs. MNnA tumours, whose putative target genes are implicated in the mTOR pathway. The present study provides further insight into the molecular mechanisms that correlate miRNA dysregulation to NB development and progression.
. Detailed insights into the mechanisms through which P. putida responds to different stress conditions and increased understanding of bacterial adaptation in natural and industrial settings were gained. Additionally, we identified genome-wide transcription start sites, andmany regulatory RNA elements...... such as sRNAs and riboswitches. Further, the sRNAome during the growth of bacteria was investigatedand compared to the strain without Hfq protein. Hfq has a big impact on sRNAs and gene expression in P. putida, hence many Hfq-associated sRNAs and mRNAs were found. Together, the results reported here...
Full Text Available In smart city applications, huge numbers of devices need to be connected in an autonomous manner. 3rd Generation Partnership Project (3GPP specifies that Machine Type Communication (MTC should be used to handle data transmission among a large number of devices. However, the data transmission rates are highly variable, and this brings about a congestion problem. To tackle this problem, the use of Access Class Barring (ACB is recommended to restrict the number of access attempts allowed in data transmission by utilizing strategic parameters. In this paper, we model the problem of determining the strategic parameters with a reinforcement learning algorithm. In our model, the system evolves to minimize both the collision rate and the access delay. The experimental results show that our scheme improves system performance in terms of the access success rate, the failure rate, the collision rate, and the access delay.
Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong
Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA-RNA/RNA-protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA-RNA interactions and 1619 RNA-protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA-RNA/RNA-protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA-RNA/RNA-protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. © 2014 Zhang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.
Porth, Ilga; Klápště, Jaroslav; Skyba, Oleksandr; Friedmann, Michael C; Hannemann, Jan; Ehlting, Juergen; El-Kassaby, Yousry A; Mansfield, Shawn D; Douglas, Carl J
High-throughput approaches have been widely applied to elucidate the genetic underpinnings of industrially important wood properties. Wood traits are polygenic in nature, but gene hierarchies can be assessed to identify the most important gene variants controlling specific traits within complex networks defining the overall wood phenotype. We tested a large set of genetic, genomic, and phenotypic information in an integrative approach to predict wood properties in Populus trichocarpa. Nine-yr-old natural P. trichocarpa trees including accessions with high contrasts in six traits related to wood chemistry and ultrastructure were profiled for gene expression on 49k Nimblegen (Roche NimbleGen Inc., Madison, WI, USA) array elements and for 28,831 polymorphic single nucleotide polymorphisms (SNPs). Pre-selected transcripts and SNPs with high statistical dependence on phenotypic traits were used in Bayesian network learning procedures with a stepwise K2 algorithm to infer phenotype-centric networks. Transcripts were pre-selected at a much lower logarithm of Bayes factor (logBF) threshold than SNPs and were not accommodated in the networks. Using persistent variables, we constructed cross-validated networks for variability in wood attributes, which contained four to six variables with 94-100% predictive accuracy. Accommodated gene variants revealed the hierarchy in the genetic architecture that underpins substantial phenotypic variability, and represent new tools to support the maximization of response to selection. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.
McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.
Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.
Reggiani, A.; Bucci, P; Russo, G.; de Haas, A.; Nijkamp, P.
Spatial labour markets are subjected to the forces of regional economic activity and competing network effects. Commuting is, therefore, an important equilibrating vehicle in a City Network constellation. Cities act as attractors of commuters, as most economic activity occurs in cities, thus
van Hoesel, L.F.W.
Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio's to virtually restore the cut wires. The resulting sensors can be
Klein, E.J.; Driessen, A.
The application of optical fibers has led to virtually lossless point to point data links in the core network with practically unlimited bandwidth. In response to increasing bandwidth demands of consumers the optical techniques employed in these networks are now gradually extended towards the
Spolitis, Sandis; Bobrovs, Vjaceslavs; Wagner, Christoph
Massive fiber-to-the-home network deployment is creating a challenge for telecommunications network operators: exponential increase of the power consumption at the central offices and a never ending quest for equipment upgrades operating at higher bandwidth. In this paper, we report on flexible...
This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information
Caescu, Cristina I.; Guo, Xingyi; Tesfa, Lydia; Bhagat, Tushar D.; Verma, Amit; Zheng, Deyou
Macrophage polarization between the M2 (repair, protumorigenic) and M1 (inflammatory) phenotypes is seen as a continuum of states. The detailed transcriptional events and signals downstream of colony-stimulating factor 1 receptor (CSF-1R) that contributes to amplification of the M2 phenotype and suppression of the M1 phenotype are largely unknown. Macrophage CSF-1R pTyr-721 signaling promotes cell motility and enhancement of tumor cell invasion in vitro. Combining analysis of cellular systems for CSF-1R gain of function and loss of function with bioinformatic analysis of the macrophage CSF-1R pTyr-721–regulated transcriptome, we uncovered microRNA-21 (miR-21) as a downstream molecular switch controlling macrophage activation and identified extracellular signal-regulated kinase1/2 and nuclear factor-κB as CSF-1R pTyr-721–regulated signaling nodes. We show that CSF-1R pTyr-721 signaling suppresses the inflammatory phenotype, predominantly by induction of miR-21. Profiling of the miR-21–regulated messenger RNAs revealed that 80% of the CSF-1–regulated canonical miR-21 targets are proinflammatory molecules. Additionally, miR-21 positively regulates M2 marker expression. Moreover, miR-21 feeds back to positively regulate its own expression and to limit CSF-1R–mediated activation of extracellular signal-regulated kinase1/2 and nuclear factor-κB. Consistent with an anti-inflammatory role of miRNA-21, intraperitoneal injection of mice with a miRNA-21 inhibitor increases the recruitment of inflammatory monocytes and enhances the peritoneal monocyte/macrophage response to lipopolysaccharide. These results identify the CSF-1R–regulated miR-21 network that modulates macrophage polarization. PMID:25573988
Özgür Cingiz, M; Biricik, G; Diri, B
miRNAs are key regulators that bind to target genes to suppress their gene expression level. The relations between miRNA-target genes enable users to derive co-expressed genes that may be involved in similar biological processes and functions in cells. We hypothesize that target genes of miRNAs are co-expressed, when they are regulated by multiple miRNAs. With the usage of these co-expressed genes, we can theoretically construct co-expression networks (GCNs) related to 152 diseases. In this study, we introduce ARNetMiT that utilize a hash based association rule algorithm in a novel way to infer the GCNs on miRNA-target genes data. We also present R package of ARNetMiT, which infers and visualizes GCNs of diseases that are selected by users. Our approach assumes miRNAs as transactions and target genes as their items. Support and confidence values are used to prune association rules on miRNA-target genes data to construct support based GCNs (sGCNs) along with support and confidence based GCNs (scGCNs). We use overlap analysis and the topological features for the performance analysis of GCNs. We also infer GCNs with popular GNI algorithms for comparison with the GCNs of ARNetMiT. Overlap analysis results show that ARNetMiT outperforms the compared GNI algorithms. We see that using high confidence values in scGCNs increase the ratio of the overlapped gene-gene interactions between the compared methods. According to the evaluation of the topological features of ARNetMiT based GCNs, the degrees of nodes have power-law distribution. The hub genes discovered by ARNetMiT based GCNs are consistent with the literature.
Martinez, Fernando J; Pratt, Gabriel A; Van Nostrand, Eric L; Batra, Ranjan; Huelga, Stephanie C; Kapeli, Katannya; Freese, Peter; Chun, Seung J; Ling, Karen; Gelboin-Burkhart, Chelsea; Fijany, Layla; Wang, Harrison C; Nussbacher, Julia K; Broski, Sara M; Kim, Hong Joo; Lardelli, Rea; Sundararaman, Balaji; Donohue, John P; Javaherian, Ashkan; Lykke-Andersen, Jens; Finkbeiner, Steven; Bennett, C Frank; Ares, Manuel; Burge, Christopher B; Taylor, J Paul; Rigo, Frank; Yeo, Gene W
HnRNPA2B1 encodes an RNA binding protein associated with neurodegeneration. However, its function in the nervous system is unclear. Transcriptome-wide crosslinking and immunoprecipitation in mouse spinal cord discover UAGG motifs enriched within ∼2,500 hnRNP A2/B1 binding sites and an unexpected role for hnRNP A2/B1 in alternative polyadenylation. HnRNP A2/B1 loss results in alternative splicing (AS), including skipping of an exon in amyotrophic lateral sclerosis (ALS)-associated D-amino acid oxidase (DAO) that reduces D-serine metabolism. ALS-associated hnRNP A2/B1 D290V mutant patient fibroblasts and motor neurons differentiated from induced pluripotent stem cells (iPSC-MNs) demonstrate abnormal splicing changes, likely due to increased nuclear-insoluble hnRNP A2/B1. Mutant iPSC-MNs display decreased survival in long-term culture and exhibit hnRNP A2/B1 localization to cytoplasmic granules as well as exacerbated changes in gene expression and splicing upon cellular stress. Our findings provide a cellular resource and reveal RNA networks relevant to neurodegeneration, regulated by normal and mutant hnRNP A2/B1. VIDEO ABSTRACT. Copyright © 2016 Elsevier Inc. All rights reserved.
Jose A Santiago
Full Text Available Increasing evidence indicates that Parkinson's disease (PD and type 2 diabetes (T2DM share dysregulated molecular networks. We identified 84 genes shared between PD and T2DM from curated disease-gene databases. Nitric oxide biosynthesis, lipid and carbohydrate metabolism, insulin secretion and inflammation were identified as common dysregulated pathways. A network prioritization approach was implemented to rank genes according to their distance to seed genes and their involvement in common biological pathways. Quantitative polymerase chain reaction assays revealed that a highly ranked gene, superoxide dismutase 2 (SOD2, is upregulated in PD patients compared to healthy controls in 192 whole blood samples from two independent clinical trials, the Harvard Biomarker Study (HBS and the Diagnostic and Prognostic Biomarkers in Parkinson's disease (PROBE. The results from this study reinforce the idea that shared molecular networks between PD and T2DM provides an additional source of biologically meaningful biomarkers. Evaluation of this biomarker in de novo PD patients and in a larger prospective longitudinal study is warranted.
Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José
This paper presents an experimental demonstration of a millimeter-wave wireless bridge in the W-band for transparent broadband fiber access in the sub-urban areas, where full fiber connections are impracticable....
This article critically assesses the latest European Commission policies in relation to next-generation access investment that put focus on regulated prices and relaxing of wholesale access obligations. Pointing at the vital socio-legal and economic arguments, it further challenges the assumptions of the current EU regulatory framework and calls for a more contractual utility-based model of regulation instead of the current system that overly relies on market-driven infrastructure-based competition.
set show significant enrichment result (p-value =5.505E-15) on CATTGTYY_V$SOX9_B1 term. PITX2 (7.2x) is negatively correlated with miR-211 (0.041x...25 target genes (including PITX2 itself) in the correlation network show very significant enrichment result (p-value=1.349E-33) on GGATTA_V$PITX2_Q2...proliferation and metastasis of cancer cells . Mir-211 also shows strong negative correlation with its target PITX2 (7.2x). PITX2 is activated
Cohen, Joshua L; Ata, Anooshah E; Jackson, Nateka L; Rahn, Elizabeth J; Ramaker, Ryne C; Cooper, Sara; Kerman, Ilan A; Clinton, Sarah M
Chronic stress triggers a variety of physical and mental health problems, and how individuals cope with stress influences risk for emotional disorders. To investigate molecular mechanisms underlying distinct stress coping styles, we utilized rats that were selectively-bred for differences in emotionality and stress reactivity. We show that high novelty responding (HR) rats readily bury a shock probe in the defensive burying test, a measure of proactive stress coping behavior, while low novelty responding (LR) rats exhibit enhanced immobility, a measure of reactive coping. Shock exposure in the defensive burying test elicited greater activation of HR rats' caudal dorsal raphe serotonergic cells compared to LRs, but lead to more pronounced activation throughout LRs' amygdala (lateral, basolateral, central, and basomedial nuclei) compared to HRs. RNA-sequencing revealed 271 mRNA transcripts and 33 microRNA species that were differentially expressed in HR/LR raphe and amygdala. We mapped potential microRNA-mRNA networks by correlating and clustering mRNA and microRNA expression and identified networks that differed in either the HR/LR dorsal raphe or amygdala. A dorsal raphe network linked three microRNAs which were down-regulated in LRs (miR-206-3p, miR-3559-5p, and miR-378a-3p) to repression of genes related to microglia and immune response (Cd74, Cyth4, Nckap1l, and Rac2), the genes themselves were up-regulated in LR dorsal raphe. In the amygdala, another network linked miR-124-5p, miR-146a-5p, miR-3068-3p, miR-380-5p, miR-539-3p, and miR-7a-1-3p with repression of chromatin remodeling-related genes (Cenpk, Cenpq, Itgb3bp, and Mis18a). Overall this work highlights potential drivers of gene-networks and downstream molecular pathways within the raphe and amygdala that contribute to individual differences in stress coping styles and stress vulnerabilities. Copyright © 2016 Elsevier B.V. All rights reserved.
GIF RPC, PAP, SSL, SQL TCP, UDP, NETBEUI 3. Network 2. Data Link 1. Physical Structuring and managing a multi-node network, including addressing...h0000) for transmission; ignored on reception. 27.5.5 Frame Check Sequence Field A 32-bit FCS shall be computed over the entire MAC frame...rate, LDPC codeblock size, LDPC preamble, ASM sizes, and the goal rate for mission data from the program . The light-pink boxes represent calculated