WorldWideScience

Sample records for ript io ns

  1. Io

    International Nuclear Information System (INIS)

    Nash, D.B.; Yoder, C.F.; Carr, M.H.; Gradie, J.; Hunten, D.M.

    1986-01-01

    The present work reviews the history of Io studies and describes the current level of understanding of Io's physics, chemistry, geology, orbital dynamics, and geophysics. Consideration is given to the satellite's internal, superficial, atmospheric, plasma, and magnetospheric properties and how they interrelate. A pictorial map of Io's surface based on Voyager 1 and 2 images is presented. It is found that Io's surface color and spectra are dominated by sulfur compounds which may include various sulfur allotropes. Volcanic processes yielding three kinds of surface features (vent regions, plains, and mountains) dominate Io's surface geology. The Io plasma torus corotates with Jupiter's magnetic field in the plane of Jupiter's centrifugal equator centered at Io's orbital radius

  2. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  3. Volcanism on Io

    Science.gov (United States)

    Davies, Ashley Gerard

    2014-03-01

    Preface; Introduction; Part I. Io, 1610 to 1995: Galileo to Galileo: 1. Io, 1610-1979; 2. Between Voyager and Galileo: 1979-95; 3. Galileo at Io; Part II. Planetary Volcanism: Evolution and Composition: 4. Io and Earth: formation, evolution, and interior structure; 5. Magmas and volatiles; Part III. Observing and Modeling Volcanic Activity: 6. Observations: thermal remote sensing of volcanic activity; 7. Models of effusive eruption processes; 8. Thermal evolution of volcanic eruptions; Part IV. Galileo at Io: the Volcanic Bestiary: 9. The view from Galileo; 10. The lava lake at Pele; 11. Pillan and Tvashtar: lava fountains and flows; 12. Prometheus and Amirani: Effusive activity and insulated flows; 13. Loki Patera: Io's powerhouse; 14. Other volcanoes and eruptions; Part V. Volcanism on Io: The Global View: 15. Geomorphology: paterae, shields, flows and mountains; 16. Volcanic plumes; 17. Hot spots; Part VI. Io after Galileo: 18. Volcanism on Io: a post-Galileo view; 19. The future of Io observations; Appendix 1; Appendix 2; References; Index.

  4. Io after Galileo

    International Nuclear Information System (INIS)

    Lopes, Rosaly M C; Williams, David A

    2005-01-01

    Io, the volcanically active innermost large moon of Jupiter, was a target of intense study during the recently completed NASA Galileo mission to Jupiter (1989-2003). Galileo's suite of instruments obtained unprecedented observations of Io, including high spatial resolution imaging in the visible and infrared. This paper reviews the insights gained about Io's surface, atmosphere and space environment during the Galileo mission. Io is thought to have a large Fe-FeS core, whose radius is slightly less than half the radius of Io and whose mass is 20% of the moon. The lack of an intrinsic magnetic field implies that the core is either completely solid or completely liquid. The mantle of Io appears to undergo a high degree of partial melting (20-50% molten) that produces ultramafic lavas dominated by Mg-rich orthopyroxene in an apparent 'mushy magma ocean', suggesting an undifferentiated mantle. The crust of Io is thought to be rigid, 20-30 km thick, cold away from volcanic heat sources and composed of mafic to ultramafic silicates. Tidal flexing due to Io's orbital resonance produces ∼100 m tides at the surface, generating heat that powers Io's volcanism. Silicate volcanism appears to be dominant at most hot spots, although secondary sulfur volcanism may be important in some areas. The key discoveries of the Galileo era at Io were: (1) the detection of high-temperature volcanism (ultramafic, superheated mafic or 'ceramic'); (2) the detection of both S 2 and SO 2 gas in Ionian plumes; (3) the distinction between eruption styles, including between Pelean plumes (originating from central vents) and Promethean plumes (originating from silicate lava flow fronts); (4) the relationship between mountains and paterae, which indicates that many paterae are formed as magma preferentially ascends along tectonic faults associated with mountain building; (5) the lack of detection of an intrinsic magnetic field; (6) a new estimate of global heat flow; and (7) increased understanding

  5. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  6. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  7. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  8. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  9. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  10. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  11. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  12. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  13. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  14. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  15. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  16. Dangoraižio projektavimo ypatumai

    Directory of Open Access Journals (Sweden)

    Robertas Volvačiovas

    2011-06-01

    Full Text Available Santrauka. Straipsnyje išskiriami pagrindiniai dangoraižio įgyvendinimo ir gyvavimo etapai, aptariamas dangoraižio projektavimo etapas, dangoraižio techninio projekto (TP ir darbo projekto (DP sudėtis, išskiriamos pagrindinės dangoraižių problemos, iškylančios projektavimo etape, ir pateikiami sprendimo būdai.Straipsnis lietuvių kalba

  17. Interference of transcription across H-NS binding sites and repression by H-NS.

    Science.gov (United States)

    Rangarajan, Aathmaja Anandhi; Schnetz, Karin

    2018-05-01

    Nucleoid-associated protein H-NS represses transcription by forming extended DNA-H-NS complexes. Repression by H-NS operates mostly at the level of transcription initiation. Less is known about how DNA-H-NS complexes interfere with transcription elongation. In vitro H-NS has been shown to enhance RNA polymerase pausing and to promote Rho-dependent termination, while in vivo inhibition of Rho resulted in a decrease of the genome occupancy by H-NS. Here we show that transcription directed across H-NS binding regions relieves H-NS (and H-NS/StpA) mediated repression of promoters in these regions. Further, we observed a correlation of transcription across the H-NS-bound region and de-repression. The data suggest that the transcribing RNA polymerase is able to remodel the H-NS complex and/or dislodge H-NS from the DNA and thus relieve repression. Such an interference of transcription and H-NS mediated repression may imply that poorly transcribed AT-rich loci are prone to be repressed by H-NS, while efficiently transcribed loci escape repression. © 2018 John Wiley & Sons Ltd.

  18. On I/O Virtualization Management

    Science.gov (United States)

    Danciu, Vitalian A.; Metzker, Martin G.

    The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management of I/O devices could be limited to basic technical requirments (e.g. the establishment and termination of fixed-point links), the additional flexibility carries in its wake additional management requirements on the representation and control of I/O sub-systems.

  19. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  20. K2 Au(IO3)5 and β-KAu(IO3)4: Polar Materials with Strong SHG Responses Originating from Synergistic Effect of AuO4 and IO3 Units.

    Science.gov (United States)

    Xu, Xiang; Hu, Chun-Li; Li, Bing-Xuan; Mao, Jiang-Gao

    2016-01-26

    Two new polar potassium gold iodates, namely, K2 Au(IO3)5 (Cmc21) and β-KAu(IO3)4 (C2), have been synthesized and structurally characterized. Both compounds feature zero-dimensional polar [Au(IO3)4](-) units composed of an AuO4 square-planar unit coordinated by four IO3(-) ions in a monodentate fashion. In β-KAu(IO3)4, isolated [Au(IO3)4](-) ions are separated by K(+) ions, whereas in K2 Au(IO3)5, isolated [Au(IO3)4](-) ions and non-coordinated IO3(-) units are separated by K(+) ions. Both compounds are thermally stable up to 400 °C and exhibit high transmittance in the NIR region (λ=800-2500 nm) with measured optical band gaps of 2.65 eV for K2 Au(IO3 )5 and 2.75 eV for β-KAu(IO3)4. Powder second-harmonic generation measurements by using λ=2.05 μm laser radiation indicate that K2 Au(IO3)5 and β-KAu(IO3)4 are both phase-matchable materials with strong SHG responses of approximately 1.0 and 1.3 times that of KTiOPO4, respectively. Theoretical calculations based on DFT methods confirm that such strong SHG responses originate from a synergistic effect of the AuO4 and IO3 units. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  2. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  3. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  4. NS19504

    DEFF Research Database (Denmark)

    Nausch, Bernhard; Rode, Frederik; Jørgensen, Susanne

    2014-01-01

    channel activators and identified a small-molecule positive modulator, NS19504 (5-[(4-bromophenyl)methyl]-1,3-thiazol-2-amine), which activated the BK channel with an EC50 value of 11.0 ± 1.4 µM. Hit validation was performed using high-throughput electrophysiology (QPatch), and further characterization......19504 activated BK channels in native smooth muscle cells from guinea pig urinary bladder. In guinea pig urinary bladder strips, NS19504 (1 µM) reduced spontaneous phasic contractions, an effect that was significantly inhibited by the specific BK channel blocker iberiotoxin. In contrast, NS19504 (1 µ......M) only modestly inhibited nerve-evoked contractions and had no effect on contractions induced by a high K(+) concentration consistent with a K(+) channel-mediated action. Collectively, these results show that NS19504 is a positive modulator of BK channels and provide support for the role of BK channels...

  5. Erosional scarps on Io

    International Nuclear Information System (INIS)

    McCauley, J.F.; Soderblom, L.A.; Smith, B.A.

    1979-01-01

    Irregular or fretted scarps on Io as revealed during the voyager 1 mission are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO 2 is proposed to explain these complexly eroded terrains on Io. (author)

  6. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  7. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  8. 50 ns Backup Solution

    CERN Document Server

    Kain, V; Bartosik, H; Goddard, B; Höfle, W; Iadarola, G; Meddahi, M; Pieloni, T; Rumolo, G; Salvant, B; Wenninger, J

    2014-01-01

    The baseline bunch spacing for LHC high luminosity proton-proton operation after LS3 is 25 ns to maximize the integrated luminosity while keeping the pile-up low. The success of this mode of operation is not guaranteed. Electron cloud, UFOs, long-range beambeam, heating and other effects might make 25 ns operation in the LHC and/or the injectors difficult. This talk will review possible showstoppers in the LHC and injectors for 25 ns operation and discuss possible remedies. An alternative would be re-considering 50 ns operation. An estimate of the 50 ns performance will be given. The question of whether a different upgrade path would have to be chosen in case of 50 ns operation will also be addressed.

  9. 50 ns Backup Solution

    International Nuclear Information System (INIS)

    Kain, V; Arduini, G; Bartosik, H; Goddard, B; Höfle, W; Iadarola, G; Meddahi, M; Pieloni, T; Rumolo, G; Salvant, B; Wenninger, J

    2014-01-01

    The baseline bunch spacing for LHC high luminosity proton-proton operation after LS3 is 25 ns to maximize the integrated luminosity while keeping the pile-up low. The success of this mode of operation is not guaranteed. Electron cloud, UFOs, long-range beambeam, heating and other effects might make 25 ns operation in the LHC and/or the injectors difficult. This talk will review possible showstoppers in the LHC and injectors for 25 ns operation and discuss possible remedies. An alternative would be re-considering 50 ns operation. An estimate of the 50 ns performance will be given. The question of whether a different upgrade path would have to be chosen in case of 50 ns operation will also be addressed

  10. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  11. Volcanic features of Io

    International Nuclear Information System (INIS)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    The volcanic features of Io as detected during the Voyager mission are discussed. The volcanic activity is apparently higher than on any other body in the Solar System. Its volcanic landforms are compared with features on Earth to indicate the type of volcanism present on Io. (U.K.)

  12. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  13. Volcanic eruption plumes on Io

    International Nuclear Information System (INIS)

    Strom, R.G.; Terrile, R.J.; Masursky, H.; Hansen, C.

    1979-01-01

    The detection of an umbrella-shaped plume extending about 280 km above the bright limb of Io was one of the most important discoveries made during the Voyager 1 encounter with the jovian system. This discovery proves that Io is volcanically active at present, and the number and magnitude of these eruptions indicate that Io is the most volcanically active body so far discovered in the Solar System. Preliminary analyses of these eruptive plumes are presented. (U.K.)

  14. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  15. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP...

  16. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  17. I/O in the ATLAS multithreaded framework

    CERN Document Server

    Cranshaw, Jack; The ATLAS collaboration; Nowak, Marcin

    2018-01-01

    Scalable multithreading poses challenges to I/O, and the performance of a thread-safe I/O strategy may depend upon many factors, including I/O latencies, whether tasks are CPU- or I/O-intensive, and thread count. In a multithreaded framework, an I/O infrastructure must efficiently supply event data to and collect it from many threads processing multiple events in flight. In particular, on-demand reading from multiple threads may challenge caching strategies that were developed for serial processing and may need to be enhanced. This I/O infrastructure must also address how to read, make available, and propagate in-file metadata and other non-event data needed as context for event processing. We describe the design and scheduling of I/O components in the ATLAS multithreaded control framework, AthenaMT, for both event and non-event I/O. We discuss issues associated with exploiting the multithreading capabilities of our underlying persistence technology, ROOT, in a manner harmonious with the ATLAS framework’s o...

  18. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  19. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  20. Giant magnons under NS-NS and Melvin fields

    International Nuclear Information System (INIS)

    Huang, W.-H.

    2006-01-01

    The giant magnon is a rotating spiky string configuration which has the same dispersion relation between the energy and angular momentum as that of a spin magnon. In this paper we investigate the effects of the NS-NS and Melvin fields on the giant magnon. We first analyze the energy and angular momenta of the two-spin spiky D-string moving on the AdS 3 x S 1 with the NS-NS field. Due to the infinite boundary of the AdS spacetime the D-string solution will extend to infinity and it appears the divergences. After adding the counter terms we obtain the dispersion relation of the corresponding giant magnon. The result shows that there will appear a prefactor before the angular momentum, in addition to some corrections in the sine function. We also see that the spiky profile of a rotating D-string plays an important role in mapping it to a spin magnon. We next investigate the energy and angular momentum of the one-spin spiky fundamental string moving on the R x S 2 with the electric or magnetic Melvin field. The dispersion relation of the corresponding deformed giant magnon is also obtained. We discuss some properties of the correction terms and their relations to the spin chain with deformations

  1. Host cell killing by the West Nile Virus NS2B-NS3 proteolytic complex: NS3 alone is sufficient to recruit caspase-8-based apoptotic pathway

    International Nuclear Information System (INIS)

    Ramanathan, Mathura P.; Chambers, Jerome A.; Pankhong, Panyupa; Chattergoon, Michael; Attatippaholkun, Watcharee; Dang, Kesen; Shah, Neelima; Weiner, David B.

    2006-01-01

    The West Nile Virus (WNV) non-structural proteins 2B and 3 (NS2B-NS3) constitute the proteolytic complex that mediates the cleavage and processing of the viral polyprotein. NS3 recruits NS2B and NS5 proteins to direct protease and replication activities. In an effort to investigate the biology of the viral protease, we cloned cDNA encoding the NS2B-NS3 proteolytic complex from brain tissue of a WNV-infected dead crow, collected from the Lower Merion area (Merion strain). Expression of the NS2B-NS3 gene cassette induced apoptosis within 48 h of transfection. Electron microscopic analysis of NS2B-NS3-transfected cells revealed ultra-structural changes that are typical of apoptotic cells including membrane blebbing, nuclear disintegration and cytoplasmic vacuolations. The role of NS3 or NS2B in contributing to host cell apoptosis was examined. NS3 alone triggers the apoptotic pathways involving caspases-8 and -3. Experimental results from the use of caspase-specific inhibitors and caspase-8 siRNA demonstrated that the activation of caspase-8 was essential to initiate apoptotic signaling in NS3-expressing cells. Downstream of caspase-3 activation, we observed nuclear membrane ruptures and cleavage of the DNA-repair enzyme, PARP in NS3-expressing cells. Nuclear herniations due to NS3 expression were absent in the cells treated with a caspase-3 inhibitor. Expression of protease and helicase domains themselves was sufficient to trigger apoptosis generating insight into the apoptotic pathways triggered by NS3 from WNV

  2. How to Improve Fault Tolerance in Disaster Predictions: A Case Study about Flash Floods Using IoT, ML and Real Data

    Science.gov (United States)

    Furquim, Gustavo; Filho, Geraldo P. R.; Pessin, Gustavo; Pazzi, Richard W.

    2018-01-01

    The rise in the number and intensity of natural disasters is a serious problem that affects the whole world. The consequences of these disasters are significantly worse when they occur in urban districts because of the casualties and extent of the damage to goods and property that is caused. Until now feasible methods of dealing with this have included the use of wireless sensor networks (WSNs) for data collection and machine-learning (ML) techniques for forecasting natural disasters. However, there have recently been some promising new innovations in technology which have supplemented the task of monitoring the environment and carrying out the forecasting. One of these schemes involves adopting IP-based (Internet Protocol) sensor networks, by using emerging patterns for IoT. In light of this, in this study, an attempt has been made to set out and describe the results achieved by SENDI (System for dEtecting and forecasting Natural Disasters based on IoT). SENDI is a fault-tolerant system based on IoT, ML and WSN for the detection and forecasting of natural disasters and the issuing of alerts. The system was modeled by means of ns-3 and data collected by a real-world WSN installed in the town of São Carlos - Brazil, which carries out the data collection from rivers in the region. The fault-tolerance is embedded in the system by anticipating the risk of communication breakdowns and the destruction of the nodes during disasters. It operates by adding intelligence to the nodes to carry out the data distribution and forecasting, even in extreme situations. A case study is also included for flash flood forecasting and this makes use of the ns-3 SENDI model and data collected by WSN. PMID:29562657

  3. How to Improve Fault Tolerance in Disaster Predictions: A Case Study about Flash Floods Using IoT, ML and Real Data

    Directory of Open Access Journals (Sweden)

    Gustavo Furquim

    2018-03-01

    Full Text Available The rise in the number and intensity of natural disasters is a serious problem that affects the whole world. The consequences of these disasters are significantly worse when they occur in urban districts because of the casualties and extent of the damage to goods and property that is caused. Until now feasible methods of dealing with this have included the use of wireless sensor networks (WSNs for data collection and machine-learning (ML techniques for forecasting natural disasters. However, there have recently been some promising new innovations in technology which have supplemented the task of monitoring the environment and carrying out the forecasting. One of these schemes involves adopting IP-based (Internet Protocol sensor networks, by using emerging patterns for IoT. In light of this, in this study, an attempt has been made to set out and describe the results achieved by SENDI (System for dEtecting and forecasting Natural Disasters based on IoT. SENDI is a fault-tolerant system based on IoT, ML and WSN for the detection and forecasting of natural disasters and the issuing of alerts. The system was modeled by means of ns-3 and data collected by a real-world WSN installed in the town of São Carlos - Brazil, which carries out the data collection from rivers in the region. The fault-tolerance is embedded in the system by anticipating the risk of communication breakdowns and the destruction of the nodes during disasters. It operates by adding intelligence to the nodes to carry out the data distribution and forecasting, even in extreme situations. A case study is also included for flash flood forecasting and this makes use of the ns-3 SENDI model and data collected by WSN.

  4. How to Improve Fault Tolerance in Disaster Predictions: A Case Study about Flash Floods Using IoT, ML and Real Data.

    Science.gov (United States)

    Furquim, Gustavo; Filho, Geraldo P R; Jalali, Roozbeh; Pessin, Gustavo; Pazzi, Richard W; Ueyama, Jó

    2018-03-19

    The rise in the number and intensity of natural disasters is a serious problem that affects the whole world. The consequences of these disasters are significantly worse when they occur in urban districts because of the casualties and extent of the damage to goods and property that is caused. Until now feasible methods of dealing with this have included the use of wireless sensor networks (WSNs) for data collection and machine-learning (ML) techniques for forecasting natural disasters. However, there have recently been some promising new innovations in technology which have supplemented the task of monitoring the environment and carrying out the forecasting. One of these schemes involves adopting IP-based (Internet Protocol) sensor networks, by using emerging patterns for IoT. In light of this, in this study, an attempt has been made to set out and describe the results achieved by SENDI (System for dEtecting and forecasting Natural Disasters based on IoT). SENDI is a fault-tolerant system based on IoT, ML and WSN for the detection and forecasting of natural disasters and the issuing of alerts. The system was modeled by means of ns-3 and data collected by a real-world WSN installed in the town of São Carlos - Brazil, which carries out the data collection from rivers in the region. The fault-tolerance is embedded in the system by anticipating the risk of communication breakdowns and the destruction of the nodes during disasters. It operates by adding intelligence to the nodes to carry out the data distribution and forecasting, even in extreme situations. A case study is also included for flash flood forecasting and this makes use of the ns-3 SENDI model and data collected by WSN.

  5. VisIO: enabling interactive visualization of ultra-scale, time-series data via high-bandwidth distributed I/O systems

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Christopher J [Los Alamos National Laboratory; Ahrens, James P [Los Alamos National Laboratory; Wang, Jun [UCF

    2010-10-15

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visuaUzation of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data; as they are not configured or provisioned to provide necessary I/O read rates. In this paper, we propose a new I/O library for visualization applications: VisIO. Visualization applications commonly use N-to-N reads within their parallel enabled readers which provides an incentive for a shared-nothing approach to I/O, similar to other data-intensive approaches such as Hadoop. However, unlike other data-intensive applications, visualization requires: (1) interactive performance for large data volumes, (2) compatibility with MPI and POSIX file system semantics for compatibility with existing infrastructure, and (3) use of existing file formats and their stipulated data partitioning rules. VisIO, provides a mechanism for using a non-POSIX distributed file system to provide linear scaling of 110 bandwidth. In addition, we introduce a novel scheduling algorithm that helps to co-locate visualization processes on nodes with the requested data. Testing using VisIO integrated into Para View was conducted using the Hadoop Distributed File System (HDFS) on TACC's Longhorn cluster. A representative dataset, VPIC, across 128 nodes showed a 64.4% read performance improvement compared to the provided Lustre installation. Also tested, was a dataset representing a global ocean salinity simulation that showed a 51.4% improvement in read performance over Lustre when using our VisIO system. VisIO, provides powerful high-performance I/O services to visualization applications, allowing for interactive performance with ultra-scale, time-series data.

  6. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  7. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  8. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  9. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  10. Towards multi-layer interoperability of heterogeneous IoT platforms : the INTER-IoT approach

    NARCIS (Netherlands)

    Fortino, Giancarlo; Savaglio, Claudio; Palau, Carlos E.; de Puga, Jara Suarez; Ghanza, Maria; Paprzycki, Marcin; Montesinos, Miguel; Liotta, Antonio; Llop, Miguel; Gravina, R.; Palau, C.E.; Manso, M.; Liotta, A.; Fortino, G.

    2018-01-01

    Open interoperability delivers on the promise of enabling vendors and developers to interact and interoperate, without interfering with anyone’s ability to compete by delivering a superior product and experience. In the absence of global IoT standards, the INTER-IoT voluntary approach will support

  11. Juno-UVS observation of the Io footprint: Influence of Io's local environment and passage into eclipse on the strength of the interaction

    Science.gov (United States)

    Hue, V.; Gladstone, R.; Greathouse, T. K.; Versteeg, M.; Bonfond, B.; Saur, J.; Davis, M. W.; Roth, L.; Grodent, D. C.; Gerard, J. C. M. C.; Kammer, J.; Bolton, S. J.; Levin, S.; Connerney, J. E. P.

    2017-12-01

    The Juno mission offers an unprecedented opportunity to study Jupiter, from its internal structure to its magnetospheric environment. Juno-UVS is a UV spectrograph with a bandpass of 70vantage point above the poles. In particular, UVS has observed the instantaneous Io footprint and extended tail as Io enters into eclipse. This observation may better constrain whether the atmosphere of Io is sustained via volcanic activity or sublimation. Among other processes, the modulation of Io's footprint brightness correlates to the strength of the interaction between the Io plasma torus and its ionosphere, which, in turn, is likely to be affected by the atmospheric collapse. UVS observed the Io footprint during two eclipses that occurred on PJ1 and PJ3, and one additional eclipse observation is planned during PJ9 (24 Oct. 2017). We present how the electrodynamic coupling between Io and Jupiter is influenced by changes in Io's local environment, e.g. Io's passage in and out of eclipse and Io's traverse of the magnetodisc plasma sheet.

  12. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  13. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  14. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  15. Does Io's ionosphere influence Jupiter's radio bursts.

    Science.gov (United States)

    Webster, D. L.; Alksne, A. Y.; Whitten, R. C.

    1972-01-01

    Goldreich and Lynden-Bell's theory of Jupiter's Io-correlated decametric radiation sets a lower limit to Io's conductivity, high enough to carry the current associated with the radiated power. Dermott's analysis of conductivities of rocks and ice shows no such conductivity at Io's temperature. However, we show that if Io has even a small atmosphere, say of methane as suggested by Binder and Cruikshank, or of argon or nitrogen, it will have an ionosphere with adequate conductivity to meet the above criterion. A requirement for higher conductivity was found by Goldreich and Lynden-Bell on the basis of motion of magnetic lines past Io. This requirement appears to us unnecessary in view of experiments which prove that motion of the lines is not the source of the electromotance.

  16. The atmosphere and ionosphere of Io

    International Nuclear Information System (INIS)

    McElroy, M.B.; Yung, Y.L.

    1975-01-01

    A variety of models for Io's atmosphere, ionosphere, surface, and environment are developed and discussed in the context of recent observational data. The sodium emission detected by Brown appears to require a collisional excitation process in Io's atmosphere, and the extended sodium emission measured by Trafton et al. may require scattering of the planetary radiation by an extended sodium cloud. The sodium is presumably present initially in bound form on Io's surface and may be released by the sputtering mechanism suggested by Matson et al. The ionosphere detected by the radio occultation experiment on Pioneer 10 could be attributed to photoionization of atmospheric sodium if Io's atmosphere could sustain significant vertical motions, of order 1 s/sup -1/ directed up during the day, down at night. Vertical motions of this magnitude could be driven by condensation of atmospheric NH 3 . The total density of gas at Io's surface appears to lie in the range 10 10 -10 12 molecules cm/sup -3/. Corpuscular ionization could play an additional role for the ionosphere. In this case the sateSe should exhibit an exceedingly bright, approx.10 kR, airglow at Lα. The incomplete hydrogen torus observed by Judge and Carlson in the vicinity of Io requires a large supply of hydrogen from the satellite's atmosphere. The escape flux should be of order 10 11 cm/sup -2/ s/sup -1/ and could be maintained by photolysis of atmospheric NH 3 . The observed geometry of the hydrogen torus appears to require a surprisingly short lifetime, approx.10 5 s, for neutral hydrogen near Io's orbit, and may indicate the presence of a large flux, approx.10 9 cm/sup -2/ s/sup -1/, of low-energy protons in Jupiter's magnetosphere. Implications of the hydrogen torus for the energy and mass balance of Jupiter's magnetosphere are discussed briefly, and observational programs are identified which might illuminate present uncertainties in our understanding of Io

  17. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  18. Heat flow from Io /JI/

    Science.gov (United States)

    Matson, D. L.; Ransford, G. A.; Johnson, T. V.

    1981-01-01

    The existing ground-based measurements of Io's thermal emission at infrared wavelengths of 8.4, 10.6, and 21 microns have been reexamined. Present in these data is the signature of hot spots, presumably similar to the hot spots seen by the IRIS experiment on Voyager. It is possible to extract from these data the total amount of power radiated. Since the hot spots are believed to be a result of deep-seated activity in Io and since the remainder of Io's surface is an extraordinarily poor thermal conductor, the power radiated by the hot spots is essentially the total heat flow. The analysis yields a heat flow of 2 + or - 1 W/sq m. This value is tremendously large in comparison to the average heat flow of the earth (0.06 W/sq m) and the moon (0.02 W/sq m), but is characteristic of active geothermal areas on the earth. A heat flow this large requires that the interior of Io be at least partially molten on a global scale.

  19. Introduction to Network Simulator NS2

    CERN Document Server

    Issariyakul, Teerawat

    2012-01-01

    "Introduction to Network Simulator NS2" is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, ra

  20. Molecular dynamic simulation of complex NS2B-NS3 DENV2 ...

    African Journals Online (AJOL)

    Several vaccines have been developed against the disease, but they only ... a two component NS2B-NS3 protease that cleaves viral precursor proteins, and ... The results provide conformational changes of enzyme-inhibitor complex that is ...

  1. TRIO: Burst Buffer Based I/O Orchestration

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Teng [Auburn University; Oral, H Sarp [ORNL; Pritchard, Michael [Auburn University; Wang, Bin [Auburn University; Yu, Weikuan [Auburn University

    2015-01-01

    The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel filesystem can incur significant I/O contention on storage servers. Such contention in turn degrades the raw bandwidth utilization of storage servers and prolongs the average job I/O time of concurrent applications. Recently burst buffer has been proposed as an intermediate layer to absorb the bursty I/O traffic from compute nodes to storage backend. But an I/O orchestration mechanism is still desired to efficiently move checkpointing data from bursty buffers to storage backend. In this paper, we propose a burst buffer based I/O orchestration framework, named TRIO, to intercept and reshape the bursty writes for better sequential write traffic to storage severs. Meanwhile, TRIO coordinates the flushing orders among concurrent burst buffers to alleviate the contention on storage server bandwidth. Our experimental results reveal that TRIO can deliver 30.5% higher bandwidth and reduce the average job I/O time by 37% on average for data-intensive applications in various checkpointing scenarios.

  2. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  3. Rutes amb iOS

    OpenAIRE

    Nofuentes Azcárate, Pedro

    2011-01-01

    Projecte de l'implementació d'una aplicació per registrar i gestionar recorreguts basada al sistema operatiu iOS amb la possibilitat de sincronitzar amb un servei web sobre la plataforma Google App Engine. Proyecto de implementación de una aplicación para registrar y gestionar recorridos basada en el sistema operativo iOS con la posibilidad de sincronizar con un servicio web sobre la plataforma Google App Engine. Implementation project for an application to record and manage routes, bas...

  4. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  5. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  6. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  7. Notes on the Wess-Zumino-Witten-like structure: L{sub ∞} triplet and NS-NS superstring field theory

    Energy Technology Data Exchange (ETDEWEB)

    Matsunaga, Hiroaki [Institute of Physics, the Czech Academy of Sciences,Na Slovance 2, Prague 8 (Czech Republic); Yukawa Institute for Theoretical Physics, Kyoto University,Kyoto 606-8502 (Japan)

    2017-05-17

    In the NS-NS sector of superstring field theory, there potentially exist three nilpotent generators of gauge transformations and two constraint equations: it makes the gauge algebra of type II theory somewhat complicated. In this paper, we show that every NS-NS actions have their WZW-like forms, and that a triplet of mutually commutative L{sub ∞} products completely determines the gauge structure of NS-NS superstring field theory via its WZW-like structure. We give detailed analysis about it and present its characteristic properties by focusing on two NS-NS actions proposed by https://www.doi.org/10.1007/JHEP01(2017)022 and https://www.doi.org/10.1007/JHEP08(2014)158.

  8. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  9. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  10. HUBBLE CLICKS IMAGES OF IO SWEEPING ACROSS JUPITER

    Science.gov (United States)

    2002-01-01

    While hunting for volcanic plumes on Io, NASA's Hubble Space Telescope captured these images of the volatile moon sweeping across the giant face of Jupiter. Only a few weeks before these dramatic images were taken, the orbiting telescope snapped a portrait of one of Io's volcanoes spewing sulfur dioxide 'snow.' These stunning images of the planetary duo are being released to commemorate the ninth anniversary of the Hubble telescope's launch on April 24, 1990. All of these images were taken with the Wide Field and Planetary Camera 2. The three overlapping snapshots show in crisp detail Io passing above Jupiter's turbulent clouds. The close-up picture of Io (bottom right) reveal a 120-mile-high (200-kilometer) plume of sulfur dioxide 'snow' emanating from Pillan, one of the moon's active volcanoes. 'Other observations have inferred sulfur dioxide 'snow' in Io's plumes, but this image offers direct observational evidence for sulfur dioxide 'snow' in an Io plume,' explains John R. Spencer of Lowell Observatory in Flagstaff, Ariz. A Trip Around Jupiter The three snapshots of the volcanic moon rounding Jupiter were taken over a 1.8-hour time span. Io is roughly the size of Earth's moon but 2,000 times farther away. In two of the images, Io appears to be skimming Jupiter's cloud tops, but it's actually 310,000 miles (500,000 kilometers) away. Io zips around Jupiter in 1.8 days, whereas the moon circles Earth every 28 days. The conspicuous black spot on Jupiter is Io's shadow and is about the size of the moon itself (2,262 miles or 3,640 kilometers across). This shadow sails across the face of Jupiter at 38,000 mph (17 kilometers per second). The smallest details visible on Io and Jupiter measure 93 miles (150 kilometers) across, or about the size of Connecticut. These images were further sharpened through image reconstruction techniques. The view is so crisp that one would have to stand on Io to see this much detail on Jupiter with the naked eye. The bright patches on Io

  11. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  12. NMR analysis of the dynamic exchange of the NS2B cofactor between open and closed conformations of the West Nile virus NS2B-NS3 protease.

    Directory of Open Access Journals (Sweden)

    Xun-Cheng Su

    Full Text Available BACKGROUND: The two-component NS2B-NS3 proteases of West Nile and dengue viruses are essential for viral replication and established targets for drug development. In all crystal structures of the proteases to date, the NS2B cofactor is located far from the substrate binding site (open conformation in the absence of inhibitor and lining the substrate binding site (closed conformation in the presence of an inhibitor. METHODS: In this work, nuclear magnetic resonance (NMR spectroscopy of isotope and spin-labeled samples of the West Nile virus protease was used to investigate the occurrence of equilibria between open and closed conformations in solution. FINDINGS: In solution, the closed form of the West Nile virus protease is the predominant conformation irrespective of the presence or absence of inhibitors. Nonetheless, dissociation of the C-terminal part of the NS2B cofactor from the NS3 protease (open conformation occurs in both the presence and the absence of inhibitors. Low-molecular-weight inhibitors can shift the conformational exchange equilibria so that over 90% of the West Nile virus protease molecules assume the closed conformation. The West Nile virus protease differs from the dengue virus protease, where the open conformation is the predominant form in the absence of inhibitors. CONCLUSION: Partial dissociation of NS2B from NS3 has implications for the way in which the NS3 protease can be positioned with respect to the host cell membrane when NS2B is membrane associated via N- and C-terminal segments present in the polyprotein. In the case of the West Nile virus protease, discovery of low-molecular-weight inhibitors that act by breaking the association of the NS2B cofactor with the NS3 protease is impeded by the natural affinity of the cofactor to the NS3 protease. The same strategy can be more successful in the case of the dengue virus NS2B-NS3 protease.

  13. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  14. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  15. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  16. Flavivirus NS3 and NS5 proteins interaction network: a high-throughput yeast two-hybrid screen

    Directory of Open Access Journals (Sweden)

    Canard Bruno

    2011-10-01

    Full Text Available Abstract Background The genus Flavivirus encompasses more than 50 distinct species of arthropod-borne viruses, including several major human pathogens, such as West Nile virus, yellow fever virus, Japanese encephalitis virus and the four serotypes of dengue viruses (DENV type 1-4. Each year, flaviviruses cause more than 100 million infections worldwide, some of which lead to life-threatening conditions such as encephalitis or haemorrhagic fever. Among the viral proteins, NS3 and NS5 proteins constitute the major enzymatic components of the viral replication complex and are essential to the flavivirus life cycle. Results We report here the results of a high-throughput yeast two-hybrid screen to identify the interactions between human host proteins and the flavivirus NS3 and NS5 proteins. Using our screen results and literature curation, we performed a global analysis of the NS3 and NS5 cellular targets based on functional annotation with the Gene Ontology features. We finally created the first flavivirus NS3 and NS5 proteins interaction network and analysed the topological features of this network. Our proteome mapping screen identified 108 human proteins interacting with NS3 or NS5 proteins or both. The global analysis of the cellular targets revealed the enrichment of host proteins involved in RNA binding, transcription regulation, vesicular transport or innate immune response regulation. Conclusions We proposed that the selective disruption of these newly identified host/virus interactions could represent a novel and attractive therapeutic strategy in treating flavivirus infections. Our virus-host interaction map provides a basis to unravel fundamental processes about flavivirus subversion of the host replication machinery and/or immune defence strategy.

  17. NIMS Observation of Hotspots on Io

    Science.gov (United States)

    1996-01-01

    Io has been imaged by the Near Infrared Mapping Spectrometer (NIMS) on Galileo. The image on the right shows for the first time the distribution of volcanic hotspots on the surface of Io, as seen by NIMS. Three of these hotspots are new discoveries, only detectable with the NIMS instrument. This image was taken during the G1 encounter on June 29 1996. The image on the left shows the same view of Io as seen by the Voyager spacecraft in 1979. At least one dozen hotspots have been identified from this NIMS image. Most of the hotspot locations can be matched with volcanic features on the surface of Io, including the vent area of the active Prometheus plume.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  18. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  19. Volcanogenic Sulfur on Earth and Io: Composition and Spectroscopy

    Science.gov (United States)

    Kargel, J.S.; Delmelle, P.; Nash, D.B.

    1999-01-01

    The causes of Io's variegated surface, especially the roles of sulfur, and the geochemical history of sulfur compounds on Io are not well understood. Suspecting that minor impurities in sulfur might be important, we have investigated the major and trace element chemistry and spectroscopic reflectance of natural sulfur from a variety of terrestrial volcanic-hydrothermal environments. Evidence suggests that Io may be substantially coated with impure sulfur. On Earth, a few tenths of a percent to a few percent of chalcophile trace elements (e.g., As and Se) comonly occur in sulfur and appear to stabilize material of yellow, brown, orange, and red hues, which may persist even at low temperatures. Percentage levels of chalcophile impurities are reasonably expected to occur on Io in vapor sublimate deposits and flows derived from such deposits. Such impurities join a host of other mechanisms that might explain Io's reds and yellows. Two-tenths to two percent opaque crystalline impurities, particularly pyrite (FeS2), commonly produces green, gray, and black volcanic sulfur on Earth and might explain areas of Io having deposits of these colors. Pyrite produces a broad absorption near 1 ??m that gradually diminishes out to 1.6 ??m - similar but not identical to the spectrum of Io seen in Galileo NIMS data. Percentage amounts of carbonaceous impurities and tens of percent SiO2 (as silicates) also strongly affect the spectral properties of Earth's sulfur. Io's broad absorption between 0.52 and 0.64 ??m remains unexplained by these data but could be due to sodium sulfides, as suggested previously by others, or to As, Se, or other impurities. These impurities and others, such as P and Cl (which could exist on Io's surface in amounts over 1% that of sulfur), greatly alter the molecular structure of molten and solid sulfur. Minor impurities could impact Io's geology, such as the morphology of sulfur lava flows and the ability of sulfur to sustain high relief. We have not found

  20. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  1. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  2. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  3. Analysis of hepatitis C virus core/NS5A protein co-localization using novel cell culture systems expressing core-NS2 and NS5A of genotypes 1-7

    DEFF Research Database (Denmark)

    Galli, Andrea; Scheel, Troels K H; Prentoe, Jannick C

    2013-01-01

    Hepatitis C virus (HCV) is an important human pathogen infecting hepatocytes. With the advent of infectious cell culture systems, the HCV particle assembly and release processes are finally being uncovered. The HCV core and NS5A proteins co-localize on cytoplasmic lipid droplets (c......LDs) or on the endoplasmic reticulum (ER) at different stages of particle assembly. Current knowledge on assembly and release is primarily based on studies in genotype 2a cell culture systems; however, given the high genetic heterogeneity of HCV, variations might exist among genotypes. Here, we developed novel HCV strain...... JFH1-based recombinants expressing core-NS2 and NS5A from genotypes 1-7, and analysed core and NS5A co-localization in infected cells. Huh7.5 cells were transfected with RNA of core-NS2/NS5A recombinants and putative adaptive mutations were analysed by reverse genetics. Adapted core-NS2/NS5A...

  4. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  5. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  6. IoT-B&B: Edge-Based NFV for IoT Devices with CPE Crowdsourcing

    Directory of Open Access Journals (Sweden)

    He Zhu

    2018-01-01

    Full Text Available For embracing the ubiquitous Internet-of-Things (IoT devices, edge computing and Network Function Virtualization (NFV have been enabled in branch offices and homes in the form of virtual Customer-Premises Equipment (vCPE. A Service Provider (SP deploys vCPE instances as Virtual Network Functions (VNFs on top of generic physical Customer-Premises Equipment (pCPE to ease administration. Upon a usage surge of IoT devices at a certain part of the network, vCPU, memory, and other resource limitations of a single pCPE node make it difficult to add new services handling the high demand. In this paper, we present IoT-B&B, a novel architecture featuring resource sharing of pCPE nodes. When a pCPE node has sharable resources available, the SP will utilize its free resources as a “bed-and-breakfast” place to deploy vCPE instances in need. A placement algorithm is also presented to assign vCPE instances to a cost-efficient pCPE node. By keeping vCPE instances at the network edge, their costs of hosting are reduced. Meanwhile, the transmission latencies are maintained at acceptable levels for processing real-time data burst from IoT devices. The traffic load to the remote, centralized cloud can be substantially reduced.

  7. Computer Aided Screening of Phytochemicals from Garcinia against the Dengue NS2B/NS3 Protease.

    Science.gov (United States)

    Qamar, Tahir Ul; Mumtaz, Arooj; Ashfaq, Usman Ali; Azhar, Samia; Fatima, Tabeer; Hassan, Muhammad; Hussain, Syed Sajid; Akram, Waheed; Idrees, Sobia

    2014-01-01

    Dengue virus NS2/NS3 protease because of its ability to cleave viral proteins is considered as an attractive target to screen antiviral agents. Medicinal plants contain a variety of phytochemicals that can be used as drug against different diseases and infections. Therefore, this study was designed to uncover possible phytochemical of different classes (Aromatic, Carbohydrates, Lignin, Saponins, Steroids, Tannins, Terpenoids, Xanthones) that could be used as inhibitors against the NS2B/NS3 protease of DENV. With the help of molecular docking, Garcinia phytochemicals found to be bound deeply inside the active site of DENV NS2B/NS3 protease among all tested phytochemicals and had interactions with catalytic triad (His51, Asp75, Ser135). Thus, it can be concluded from the study that these Gracinia phytochemicals could serve as important inhibitors to inhibit the viral replication inside the host cell. Further in-vitro investigations require confirming their efficacy.

  8. Sabatilles : Adaptació a iOS

    OpenAIRE

    Cots Sanfeliu, Jordi

    2015-01-01

    Adaptació del conte en format paper Sabatilles a aplicació en iOS per a dispositius mòbils d'Apple. Adaptación del cuento en formato papel Sabatilles a aplicación en iOS para dispositivos móviles de Apple. Bachelor thesis for the Computer Science program.

  9. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  10. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  11. Internet of Tangible Things (IoTT: Challenges and Opportunities for Tangible Interaction with IoT

    Directory of Open Access Journals (Sweden)

    Leonardo Angelini

    2018-01-01

    Full Text Available In the Internet of Things era, an increasing number of everyday objects are able to offer innovative services to the user. However, most of these devices provide only smartphone or web user interfaces. As a result, the interaction is disconnected from the physical world, decreasing the user experience and increasing the risk of user alienation from the physical world. We argue that tangible interaction can counteract this trend and this article discusses the potential benefits and the still open challenges of tangible interaction applied to the Internet of Things. After an analysis of open challenges for Human-Computer Interaction in IoT, we summarize current trends in tangible interaction and extrapolate eight tangible interaction properties that could be exploited for designing novel interactions with IoT objects. Through a systematic review of tangible interaction applied to IoT, we show what has been already explored in the systems that pioneered the field and the future explorations that still have to be conducted. In order to guide future work in this field, we propose a design card set for supporting the generation of tangible interfaces for IoT objects. The card set has been evaluated during a workshop with 21 people and the results are discussed.

  12. Io's Pele Hemisphere

    Science.gov (United States)

    1996-01-01

    Jupiter's moon Io with Pele prominently in view. The inset images are from the Voyager 1 (top) and 2 (bottom) spacecraft using the violet, blue, and orange filters. The large image is from Galileo, using the violet, green, and red filters. The colors in the Galileo image are closer to what the human eye would see. With the filters used in the Solid State Imaging system on Galileo, it is clear now that some of the recent volcanic deposits on Io are indeed very red, a point not resolved by Voyager. Scientists speculate that the red deposits are a form of Sulfur produced in volcanic eruptions on Io. Note the rapid changes seen in the shape of the distal (far from the vent) plume deposits from Pele between Voyagers 1 (April, 1979) and 2 (July, 1979). The Galileo image was obtained by the imaging system on board the spacecraft in June, 1996. North is to the top.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA'is Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  13. On the road to secure and privacy-preserving IoT ecosystems

    OpenAIRE

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan

    2017-01-01

    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ecosystems. BIG IoT aims to facilitate cross-platform and cross-domain application developments and establish centralized marketplaces to allow resource monetization. This combination of multi-platform applications, heterogeneity of the IoT, as well as enabling marketing and a...

  14. An Optimizing Compiler for Petascale I/O on Leadership Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States); Kandemir, Mahmut [Pennsylvania State Univ., State College, PA (United States)

    2015-03-18

    In high-performance computing systems, parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions.

  15. NS simulator for beginners

    CERN Document Server

    Altman, Eitan

    2012-01-01

    NS-2 is an open-source discrete event network simulator which is widely used by both the research community as well as by the people involved in the standardization protocols of IETF. The goal of this book is twofold: on one hand to learn how to use the NS-2 simulator, and on the other hand, to become acquainted with and to understand the operation of some of the simulated objects using NS-2 simulations. The book is intended to help students, engineers or researchers who need not have much background in programming or who want to learn through simple examples how to analyse some simulated obje

  16. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  17. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  18. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  19. Io's Active Eruption Plumes: Insights from HST

    Science.gov (United States)

    Jessup, K. L.; Spencer, J. R.

    2011-10-01

    Taking advantage of the available data, we recently [10] completed a detailed analysis of the spectral signature of Io's Pele-type Tvashtar plume as imaged by the HST Wide Field and Planetary Camera 2 (HST/WFPC2) via absorption during Jupiter transit and via reflected sunlight in 2007, as well as HST/WFPC2 observations of the 1997 eruption of Io's Prometheus-type Pillan plume (Fig. 1). These observations were obtained in the 0.24-0.42 μm range, where the plumes gas absorption and aerosol scattering properties are most conspicuous. By completing a detailed analysis of these observations, several key aspects of the reflectance and the absorption properties of the two plumes have been revealed. Additionally, by considering the analysis of the HST imaging data in light of previously published spectral analysis of Io's Prometheus and Pele-type plumes several trends in the plume properties have been determined, allowing us to define the relative significance of each plume on the rate of re-surfacing occurring on Io and providing the measurements needed to better assess the role the volcanoes play in the stability of Io's tenuous atmosphere.

  20. Clustering Approaches for Pragmatic Two-Layer IoT Architecture

    Directory of Open Access Journals (Sweden)

    J. Sathish Kumar

    2018-01-01

    Full Text Available Connecting all devices through Internet is now practical due to Internet of Things. IoT assures numerous applications in everyday life of common people, government bodies, business, and society as a whole. Collaboration among the devices in IoT to bring various applications in the real world is a challenging task. In this context, we introduce an application-based two-layer architectural framework for IoT which consists of sensing layer and IoT layer. For any real-time application, sensing devices play an important role. Both these layers are required for accomplishing IoT-based applications. The success of any IoT-based application relies on efficient communication and utilization of the devices and data acquired by the devices at both layers. The grouping of these devices helps to achieve the same, which leads to formation of cluster of devices at various levels. The clustering helps not only in collaboration but also in prolonging overall network lifetime. In this paper, we propose two clustering algorithms based on heuristic and graph, respectively. The proposed clustering approaches are evaluated on IoT platform using standard parameters and compared with different approaches reported in literature.

  1. Mutagenesis of Dengue Virus Protein NS2A Revealed a Novel Domain Responsible for Virus-Induced Cytopathic Effect and Interactions between NS2A and NS2B Transmembrane Segments.

    Science.gov (United States)

    Wu, Ren-Huang; Tsai, Ming-Han; Tsai, Kuen-Nan; Tian, Jia Ni; Wu, Jian-Sung; Wu, Su-Ying; Chern, Jyh-Haur; Chen, Chun-Hong; Yueh, Andrew

    2017-06-15

    The NS2A protein of dengue virus (DENV) has eight predicted transmembrane segments (pTMS1 to -8) and participates in RNA replication, virion assembly, and host antiviral response. However, the roles of specific amino acid residues within the pTMS regions of NS2A during the viral life cycle are not clear. Here, we explore the function of DENV NS2A by introducing a series of alanine substitutions into the N-terminal half (pTMS1 to -4) of the protein in the context of a DENV infectious clone or subgenomic replicon. Six NS2A mutants (NM5, -7, -9, and -17 to -19) around pTMS1 and -2 displayed a novel phenotype showing a >1,000-fold reduction in virus yield, an absence of plaque formation despite wild-type-like replicon activity, and infectious-virus-like particle yields. HEK-293 cells infected with the six NS2A mutant viruses failed to cause a virus-induced cytopathic effect (CPE) by MitoCapture staining, cell proliferation, and lactate dehydrogenase release assays. Sequencing analyses of pseudorevertant viruses derived from lethal-mutant viruses revealed two consensus reversion mutations, leucine to phenylalanine at codon 181 (L181F) within pTMS7 of NS2A and isoleucine to threonine at codon 114 (I114T) within NS2B. The introduction of an NS2A-L181F mutation into the lethal (NM15, -16, -25, and -33) and CPE-defective (NM7, -9, and -19) mutants substantially rescued virus infectivity and virus-induced CPE, respectively, whereas the NS2B-L114T mutation rescued the NM16, -25, and -33 mutants. In conclusion, the results revealed the essential roles of the N-terminal half of NS2A in RNA replication and virus-induced CPE. Intramolecular interactions between pTMSs of NS2A and intermolecular interactions between the NS2A and NS2B proteins were also implicated. IMPORTANCE The characterization of the N-terminal (current study) and C-terminal halves of DENV NS2A is the most comprehensive mutagenesis study to date to investigate the function of NS2A during the flaviviral life cycle

  2. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  3. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  4. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  5. Getting Priorities Straight: Improving Linux Support for Database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  6. In Vitro Evaluation of Novel Inhibitors against the NS2B-NS3 Protease of Dengue Fever Virus Type 4

    Directory of Open Access Journals (Sweden)

    Thi Thanh Hanh Nguyen

    2013-12-01

    Full Text Available The discovery of potent therapeutic compounds against dengue virus is urgently needed. The NS2B-NS3 protease (NS2B-NS3pro of dengue fever virus carries out all enzymatic activities needed for polyprotein processing and is considered to be amenable to antiviral inhibition by analogy. Virtual screening of 300,000 compounds using Autodock 3 on the GVSS platform was conducted to identify novel inhibitors against the NS2B-NS3pro. Thirty-six compounds were selected for in vitro assay against NS2B-NS3pro expressed in Pichia pastoris. Seven novel compounds were identified as inhibitors with IC50 values of 3.9 ± 0.6–86.7 ± 3.6 μM. Three strong NS2B-NS3pro inhibitors were further confirmed as competitive inhibitors with Ki values of 4.0 ± 0.4, 4.9 ± 0.3, and 3.4 ± 0.1 μM, respectively. Hydrophobic and hydrogen bond interactions between amino acid residues in the NS3pro active site with inhibition compounds were also identified.

  7. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  8. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  9. Identification of novel small molecule inhibitors against NS2B/NS3 serine protease from Zika virus

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hyun; Ren, Jinhong; Nocadello, Salvatore; Rice, Amy J.; Ojeda, Isabel; Light, Samuel; Minasov, George; Vargas, Jason; Nagarathnam, Dhanapalan; Anderson, Wayne F.; Johnson, Michael E. (UIC); (NWU); (Novalex); (DNSK)

    2016-12-26

    Zika flavivirus infection during pregnancy appears to produce higher risk of microcephaly, and also causes multiple neurological problems such as Guillain–Barré syndrome. The Zika virus is now widespread in Central and South America, and is anticipated to become an increasing risk in the southern United States. With continuing global travel and the spread of the mosquito vector, the exposure is expected to accelerate, but there are no currently approved treatments against the Zika virus. The Zika NS2B/NS3 protease is an attractive drug target due to its essential role in viral replication. Our studies have identified several compounds with inhibitory activity (IC50) and binding affinity (KD) of ~5–10 μM against the Zika NS2B-NS3 protease from testing 71 HCV NS3/NS4A inhibitors that were initially discovered by high-throughput screening of 40,967 compounds. Competition surface plasmon resonance studies and mechanism of inhibition analyses by enzyme kinetics subsequently determined the best compound to be a competitive inhibitor with a Ki value of 9.5 μM. We also determined the X-ray structure of the Zika NS2B-NS3 protease in a “pre-open conformation”, a conformation never observed before for any flavivirus proteases. This provides the foundation for new structure-based inhibitor design.

  10. An Optimizing Compiler for Petascale I/O on Leadership-Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Kandemir, Mahmut Taylan [PSU; Choudary, Alok [Northwestern; Thakur, Rajeev [ANL

    2014-03-01

    In high-performance computing (HPC), parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our DOE project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions Two new sections in this report compared to the previous report are IOGenie and SSD/NVM-specific optimizations.

  11. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  12. NS1-binding protein abrogates the elevation of cell viability by the influenza A virus NS1 protein in association with CRKL

    Energy Technology Data Exchange (ETDEWEB)

    Miyazaki, Masaya [Department of Cancer Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan); Nishihara, Hiroshi, E-mail: hnishihara@med.hokudai.ac.jp [Department of Translational Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan); Hasegawa, Hideki [Department of Pathology, National Institute of Infectious Diseases, Sinjuku-ku, Tokyo (Japan); Tashiro, Masato [Influenza Virus Research Center, National Institute of Infectious Diseases, Sinjuku-ku, Tokyo (Japan); Wang, Lei [Department of Translational Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan); Kimura, Taichi; Tanino, Mishie; Tsuda, Masumi [Department of Cancer Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan); Tanaka, Shinya [Department of Cancer Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan); Department of Translational Pathology, Hokkaido University Graduate School of Medicine, N15W7, Kita-ku, Sapporo 060-8638 (Japan)

    2013-11-29

    Highlights: •NS1 induced excessive phosphorylation of ERK and elevated cell viability. •NS1-BP expression and CRKL knockdown abolished survival effect of NS1. •NS1-BP and NS1 formed the complex through the interaction with CRKL-SH3(N). -- Abstract: The influenza A virus non-structural protein 1 (NS1) is a multifunctional virulence factor consisting of an RNA binding domain and several Src-homology (SH) 2 and SH3 binding motifs, which promotes virus replication in the host cell and helps to evade antiviral immunity. NS1 modulates general host cell physiology in association with various cellular molecules including NS1-binding protein (NS1-BP) and signaling adapter protein CRK-like (CRKL), while the physiological role of NS1-BP during influenza A virus infection especially in association with NS1 remains unclear. In this study, we analyzed the intracellular association of NS1-BP, NS1 and CRKL to elucidate the physiological roles of these molecules in the host cell. In HEK293T cells, enforced expression of NS1 of A/Beijing (H1N1) and A/Indonesia (H5N1) significantly induced excessive phosphorylation of ERK and elevated cell viability, while the over-expression of NS1-BP and the abrogation of CRKL using siRNA abolished such survival effect of NS1. The pull-down assay using GST-fusion CRKL revealed the formation of intracellular complexes of NS1-BP, NS1 and CRKL. In addition, we identified that the N-terminus SH3 domain of CRKL was essential for binding to NS1-BP using GST-fusion CRKL-truncate mutants. This is the first report to elucidate the novel function of NS1-BP collaborating with viral protein NS1 in modulation of host cell physiology. In addition, an alternative role of adaptor protein CRKL in association with NS1 and NS1-BP during influenza A virus infection is demonstrated.

  13. hnRNP A2/B1 interacts with influenza A viral protein NS1 and inhibits virus replication potentially through suppressing NS1 RNA/protein levels and NS1 mRNA nuclear export

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yimeng; Zhou, Jianhong; Du, Yuchun, E-mail: ydu@uark.edu

    2014-01-20

    The NS1 protein of influenza viruses is a major virulence factor and exerts its function through interacting with viral/cellular RNAs and proteins. In this study, we identified heterogeneous nuclear ribonucleoprotein A2/B1 (hnRNP A2/B1) as an interacting partner of NS1 proteins by a proteomic method. Knockdown of hnRNP A2/B1 by small interfering RNA (siRNA) resulted in higher levels of NS vRNA, NS1 mRNA, and NS1 protein in the virus-infected cells. In addition, we demonstrated that hnRNP A2/B1 proteins are associated with NS1 and NS2 mRNAs and that knockdown of hnRNP A2/B1 promotes transport of NS1 mRNA from the nucleus to the cytoplasm in the infected cells. Lastly, we showed that knockdown of hnRNP A2/B1 leads to enhanced virus replication. Our results suggest that hnRNP A2/B1 plays an inhibitory role in the replication of influenza A virus in host cells potentially through suppressing NS1 RNA/protein levels and NS1 mRNA nucleocytoplasmic translocation. - Highlights: • Cellular protein hnRNP A2/B1 interacts with influenza viral protein NS1. • hnRNP A2/B1 suppresses the levels of NS1 protein, vRNA and mRNA in infected cells. • hnRNP A2/B1 protein is associated with NS1 and NS2 mRNAs. • hnRNP A2/B1 inhibits the nuclear export of NS1 mRNAs. • hnRNP A2/B1 inhibits influenza virus replication.

  14. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  15. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  16. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  17. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  18. Topographic evidence for shield volcanism on Io

    International Nuclear Information System (INIS)

    Moore, J.M.; Mcewen, A.S.; Albin, E.F.; Greeley, R.

    1986-01-01

    Similarities between terrestrial shield volcanoes and a volcano on Io observed in Voyager I imagery of the satellite at 30 0 S, 246 0 W are delineated. A photoclinometry model was used to numerically estimate the slope based on the Minnaert photometric function. The slope values are accurate to within 10 deg on the sun-facing slope and 1 deg on the shadow side. As found with shield volcanoes, the feature has a central edifice, 40-50 km in diameter, and a broad, elliptical base, 77 x 90 km across. The summit of the Io volcano is 2.2-2.8 km above the surrounding plane and contains a caldera about 5 km in diameter. The similarity in shape between basaltic terrestrial shield volcanoes and the Io volcano indicates that the Io feature may also be composed of basalt. The composition could be sulfur if the heat flow was under 0.05 W/sq m, as it might have been in later stages of formation. 9 references

  19. Assessment of Drug Binding Potential of Pockets in the NS2B/NS3 Dengue Virus Protein

    Science.gov (United States)

    Amelia, F.; Iryani; Sari, P. Y.; Parikesit, A. A.; Bakri, R.; Toepak, E. P.; Tambunan, U. S. F.

    2018-04-01

    Every year an endemic dengue fever estimated to affect over 390 million cases in over 128 countries occurs. However, the antigen types which stimulate the human immune response are variable, as a result, neither effective vaccines nor antiviral treatments have been successfully developed for this disease. The NS2B/NS3 protease of the dengue virus (DENV) responsible for viral replication is a potential drug target. The ligand-enzyme binding site determination is a key role in the success of virtual screening of new inhibitors. The NS2B/NS3 protease of DENV (PDB ID: 2FOM) has two pockets consisting of 37 (Pocket 1) and 27 (Pocket 2) amino acid residues in each pocket. In this research, we characterized the amino acid residues for binding sites in NS3/NS2B based on the hydrophobicity, the percentage of charged residues, volume, depth, ΔGbinding, hydrogen bonding and bond length. The hydrophobic percentages of both pockets are high, 59 % (Pocket 1) and 41% (Pocket 2) and the percentage of charged residues in Pocket 1 and 2 are 22% and 48%, and the pocket volume is less than 700 Å3. An interaction analysis using molecular docking showed that interaction between the ligand complex and protein in Pocket 1 is more negative than Pocket 2. As a result, Pocket 1 is the better potential target for a ligand to inhibit the action of NS2B/NS3 DENV.

  20. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  1. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  2. A case study in application I/O on Linux clusters

    International Nuclear Information System (INIS)

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  3. IoTA: IoT Automated SIP-based Emergency Call Triggering System for general eHealth purposes

    OpenAIRE

    Andriopoulou, F; Orphanoudakis, T; Dagiuklas, A

    2017-01-01

    The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency services are currently offered by public safety stakeholders that do not support call trigg...

  4. Boron tolerance in NS wheat lines

    Directory of Open Access Journals (Sweden)

    Brdar Milka

    2006-01-01

    Full Text Available Boron is an essential micronutrient for higher plants. Present in excessive amounts boron becomes toxic and can limit plant growth and yield. Suppression of root growth is one of the symptoms of boron toxicity in wheat. This study was undertaken to investigate the response of 10 perspective NS lines of wheat to high concentrations of boron. Analysis of root growth was done on young plants, germinated and grown in the presence of different concentrations of boric acid (0, 50,100 and 150 mg/1. Significant differences occurred between analyzed genotypes and treatments regarding root length. Average suppression of root growth was between 11,6 and 34,2%, for line NS 252/02 are even noted 61,4% longer roots at treatments in relation to the control. Lines with mean suppression of root growth less than 20% (NS 101/02, NS 138/01, NS 53/03 and NS 73/02 may be considered as boron tolerant. Spearmans coefficients showed high level of agreement regarding rang of root length for genotypes treated with 100 and 150 mg H3BO3/l.

  5. The Structure and Composition of Io's Atmosphere

    Science.gov (United States)

    Smyth, W. H.; Marconi, M. L.

    2011-12-01

    Io's atmosphere is thought to be generated principally by sublimation on the dayside and by multiple volcanoes scattered throughout its surface and more concentrated near the equator. While SO2 seems to be the principle product of these sources, many other chemical species are placed into the atmosphere by these sources, including substantial amounts of SO and S2 as well as smaller but observationally significant amounts of Na bearing molecules. These species in turn interact strongly with the torus plasma generating additional species such as O2, S, O, and Na. The strong interaction of the torus plasma with the neutral atmosphere not only exerts a profound effect on the composition of Io's atmosphere but also strongly affects the dynamics and thermodynamics of Io's atmosphere, particularly at higher altitudes. In addition, as Io orbits Jupiter, the change in location of the sublimation region and the eclipse of Io as it passes through Jupiter's shadow result in substantial variation in the atmosphere. A complex time-dependent three-dimensional atmosphere with strong spatial compositional variation is created. Here we extend the two-dimensional multispecies Navier-Stokes model of Smyth and Wong (2004) to three-dimensions, include two volcanic sources similar to Pele and Loki, and include the effect of Io's movement around Jupiter on sublimation. The effects of the torus plasma are also included as in Smyth and Wong. We will present the overall composition and structure of the atmosphere, O to S ratios in the upper atmosphere, and discuss a potential issue with the O2 abundance. Smyth, W.H. and M.C. Wong, Icarus 171, 171-182, 2004.

  6. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  7. Docking, synthesis and bioassay studies of imine derivatives as potential inhibitors for dengue NS2B/ NS3 serine protease

    Directory of Open Access Journals (Sweden)

    Neni Frimayanti

    2017-11-01

    Full Text Available Objective: To search imine derivatives as new active agents against dengue type 2 NS2B/NS3 using molecular docking, since there is no effective vaccine against flaviviral infections. Methods: In this research, molecular docking was performed for a series of imine derivatives and the information obtained from the docking studies was used to explore the binding modes of these imine derivatives with dengue type 2 NS2B/NS3 serine protease. A set of imine were synthesized and bioassay study of the inhibitory activities of these compounds was then performed. Results: The results indicated that MY8 and MY4 have the ability to inhibit DEN2 NS2B/NS3 proteolytic activity. Conclusions: These two compounds were chosen as the reference for the next stage in drug design as new inhibitor agents against NS2B/NS3.

  8. Multiscale periodic structure in the Io wake

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P R; Wright, A N

    1989-06-08

    The decametric radio emissions from Jupiter are known to be influenced by the Galilean satellite Io. It is believed that the structure in these emissions is associated with the Alfven-wave wake downstream of Io. However, recent studies have shown that the structure of the wake cannot be as simple as originally thought. Here we present preliminary results from an eigenmode synthesis of the Alfven waves launched by Io, and find that several important periodicities emerge. Observations of the decametric emissions reveal fine, medium-and large-scale structure. The simulation we present here can provide structure on each of these scales, unlike earlier models. (author).

  9. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  10. APLIKACIJA ZA PRIKAZ SLEDENJA VOZIL NA OPERACIJSKEM SISTEMU iOS

    OpenAIRE

    Mlinar, Tilen

    2011-01-01

    V diplomski nalogi prikazujemo razvoj aplikacije za operacijski sistem iOS. Razvili smo aplikacijo za sledenje vozil. V teoretičnem delu se najprej seznanimo z operacijskim sistemom iOS ter njegovo arhitekturo, nato predstavimo arhitekturo aplikacij iOS. Sledi opis kompleta razvojnih orodij v iOS SDK. V nadaljevanju se seznanimo še s programskim jezikom Objective-C, lokacijsko odvisnimi storitvam, podsistemom MapKit in delovanjem aplikacije v ozadju operacijskega sistema. V praktičnem delu op...

  11. Conflict Detection Algorithm to Minimize Locking for MPI-IO Atomicity

    Science.gov (United States)

    Sehrish, Saba; Wang, Jun; Thakur, Rajeev

    Many scientific applications require high-performance concurrent I/O accesses to a file by multiple processes. Those applications rely indirectly on atomic I/O capabilities in order to perform updates to structured datasets, such as those stored in HDF5 format files. Current support for atomicity in MPI-IO is provided by locking around the operations, imposing lock overhead in all situations, even though in many cases these operations are non-overlapping in the file. We propose to isolate non-overlapping accesses from overlapping ones in independent I/O cases, allowing the non-overlapping ones to proceed without imposing lock overhead. To enable this, we have implemented an efficient conflict detection algorithm in MPI-IO using MPI file views and datatypes. We show that our conflict detection scheme incurs minimal overhead on I/O operations, making it an effective mechanism for avoiding locks when they are not needed.

  12. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  13. The Haskell Programmer's Guide to the IO Monad : Don't Panic

    NARCIS (Netherlands)

    Klinger, S.

    2005-01-01

    Now, that you have started with Haskell, have you written a program doing IO yet, like reading a file or writing on the terminal? Then you have used the IO monad—but do you understand how it works? The standard explanation is, that the IO monad hides the non-functional IO actions —which do have side

  14. Resistance Analyses of HCV NS3/4A Protease and NS5B Polymerase from Clinical Studies of Deleobuvir and Faldaprevir.

    Directory of Open Access Journals (Sweden)

    Kristi L Berger

    Full Text Available The resistance profile of anti-hepatitis C virus (HCV agents used in combination is important to guide optimal treatment regimens. We evaluated baseline and treatment-emergent NS3/4A and NS5B amino-acid variants among HCV genotype (GT-1a and -1b-infected patients treated with faldaprevir (HCV protease inhibitor, deleobuvir (HCV polymerase non-nucleoside inhibitor, and ribavirin in multiple clinical studies.HCV NS3/4A and NS5B population sequencing (Sanger method was performed on all baseline plasma samples (n = 1425 NS3; n = 1556 NS5B and on post-baseline plasma samples from patients with virologic failure (n = 113 GT-1a; n = 221 GT-1b. Persistence and time to loss of resistance-associated variants (RAVs was estimated using Kaplan-Meier analysis.Faldaprevir RAVs (NS3 R155 and D168 and deleobuvir RAVs (NS5B 495 and 496 were rare (90%. Virologic relapse was associated with RAVs in both NS3 and NS5B (53% GT-1b; 52% GT-1b; some virologic relapses had NS3 RAVs only (47% GT-1a; 17% GT-1b. Median time to loss of GT-1b NS5B P495 RAVs post-treatment (5 months was less than that of GT-1b NS3 D168 (8.5 months and GT-1a R155 RAVs (11.5 months.Faldaprevir and deleobuvir RAVs are more prevalent among virologic failures than at baseline. Treatment response was not compromised by common NS3 polymorphisms; however, alanine at NS5B amino acid 499 at baseline (wild-type in GT-1a, polymorphism in GT-1b may reduce response to this deleobuvir-based regimen.

  15. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  16. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  17. Knowledge driven discovery for opportunistic IoT networking.

    OpenAIRE

    Pozza, Riccardo

    2015-01-01

    So far, the Internet of Things (IoT) has been concerned with the objective of connecting every-thing, or any object to the Internet world. By collaborating towards the creation of new services, the IoT has introduced the opportunity to add smartness to our cities, homes, buildings and healthcare systems, as well as businesses and products. In many scenarios, objects or IoT devices are not always statically deployed, but they may be free to move around being carried by people or vehicles, whil...

  18. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  19. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  20. Purification and crystallization of dengue and West Nile virus NS2B–NS3 complexes

    Energy Technology Data Exchange (ETDEWEB)

    D’Arcy, Allan, E-mail: allan.darcy@novartis.com; Chaillet, Maxime; Schiering, Nikolaus; Villard, Frederic [Novartis Institutes of Biomedical Research, Protease Platform, Klybeckstrasse 144, CH 4002 Basel (Switzerland); Lim, Siew Pheng [Novartis Institutes of Tropical Diseases (Singapore); Lefeuvre, Peggy [Novartis Institutes of Biomedical Research, Protease Platform, Klybeckstrasse 144, CH 4002 Basel (Switzerland); Erbel, Paul [Novartis Institutes of Biomedical Research, Protease Platform, Klybeckstrasse 144, CH 4002 Basel (Switzerland); Novartis Institutes of Tropical Diseases (Singapore)

    2006-02-01

    Crystals of dengue serotype 2 and West Nile virus NS2B–NS3 protease complexes have been obtained and the crystals of both diffract to useful resolution. Sample homogeneity was essential for obtaining X-ray-quality crystals of the dengue protease. Controlled proteolysis produced a crystallizable fragment of the apo West Nile virus NS2B–NS3 and crystals were also obtained in the presence of a peptidic inhibitor. Both dengue and West Nile virus infections are an increasing risk to humans, not only in tropical and subtropical areas, but also in North America and parts of Europe. These viral infections are generally transmitted by mosquitoes, but may also be tick-borne. Infection usually results in mild flu-like symptoms, but can also cause encephalitis and fatalities. Approximately 2799 severe West Nile virus cases were reported this year in the United States, resulting in 102 fatalities. With this alarming increase in the number of West Nile virus infections in western countries and the fact that dengue virus already affects millions of people per year in tropical and subtropical climates, there is a real need for effective medicines. A possible therapeutic target to combat these viruses is the protease, which is essential for virus replication. In order to provide structural information to help to guide a lead identification and optimization program, crystallizations of the NS2B–NS3 protease complexes from both dengue and West Nile viruses have been initiated. Crystals that diffract to high resolution, suitable for three-dimensional structure determinations, have been obtained.

  1. Purification and crystallization of dengue and West Nile virus NS2B–NS3 complexes

    International Nuclear Information System (INIS)

    D’Arcy, Allan; Chaillet, Maxime; Schiering, Nikolaus; Villard, Frederic; Lim, Siew Pheng; Lefeuvre, Peggy; Erbel, Paul

    2006-01-01

    Crystals of dengue serotype 2 and West Nile virus NS2B–NS3 protease complexes have been obtained and the crystals of both diffract to useful resolution. Sample homogeneity was essential for obtaining X-ray-quality crystals of the dengue protease. Controlled proteolysis produced a crystallizable fragment of the apo West Nile virus NS2B–NS3 and crystals were also obtained in the presence of a peptidic inhibitor. Both dengue and West Nile virus infections are an increasing risk to humans, not only in tropical and subtropical areas, but also in North America and parts of Europe. These viral infections are generally transmitted by mosquitoes, but may also be tick-borne. Infection usually results in mild flu-like symptoms, but can also cause encephalitis and fatalities. Approximately 2799 severe West Nile virus cases were reported this year in the United States, resulting in 102 fatalities. With this alarming increase in the number of West Nile virus infections in western countries and the fact that dengue virus already affects millions of people per year in tropical and subtropical climates, there is a real need for effective medicines. A possible therapeutic target to combat these viruses is the protease, which is essential for virus replication. In order to provide structural information to help to guide a lead identification and optimization program, crystallizations of the NS2B–NS3 protease complexes from both dengue and West Nile viruses have been initiated. Crystals that diffract to high resolution, suitable for three-dimensional structure determinations, have been obtained

  2. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  3. Performance of commercial dengue NS1 ELISA and molecular analysis of NS1 gene of dengue viruses obtained during surveillance in Indonesia.

    Science.gov (United States)

    Aryati, Aryati; Trimarsanto, Hidayat; Yohan, Benediktus; Wardhani, Puspa; Fahri, Sukmal; Sasmono, R Tedjo

    2013-12-29

    Early diagnosis of dengue infection is crucial for better management of the disease. Diagnostic tests based on the detection of dengue virus (DENV) Non Structural Protein 1 (NS1) antigen are commercially available with different sensitivities and specificities observed in various settings. Dengue is endemic in Indonesia and clinicians are increasingly using the NS1 detection for dengue confirmation. This study described the performance of Panbio Dengue Early NS1 and IgM Capture ELISA assays for dengue detection during our surveillance in eight cities in Indonesia as well as the genetic diversity of DENV NS1 genes and its relationship with the NS1 detection. The NS1 and IgM/IgG ELISA assays were used for screening and confirmation of dengue infection during surveillance in 2010-2012. Collected serum samples (n = 440) were subjected to RT-PCR and virus isolation, in which 188 samples were confirmed for dengue infection. The positivity of the ELISA assays were correlated with the RT-PCR results to obtain the sensitivity of the assays. The NS1 genes of 48 Indonesian virus isolates were sequenced and their genetic characteristics were studied. Using molecular data as gold standard, the sensitivity of NS1 ELISA assay for samples from Indonesia was 56.4% while IgM ELISA was 73.7%. When both NS1 and IgM results were combined, the sensitivity increased to 89.4%. The NS1 sensitivity varied when correlated with city/geographical origins and DENV serotype, in which the lowest sensitivity was observed for DENV-4 (19.0%). NS1 sensitivity was higher in primary (67.6%) compared to secondary infection (48.2%). The specificity of NS1 assay for non-dengue samples were 100%. The NS1 gene sequence analysis of 48 isolates revealed the presence of polymorphisms of the NS1 genes which apparently did not influence the NS1 sensitivity. We observed a relatively low sensitivity of NS1 ELISA for dengue detection on RT-PCR-positive dengue samples. The detection rate increased significantly

  4. Instant OpenCV for iOS

    CERN Document Server

    Kornyakov, Kirill

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book uses a very practical approach, with each recipe and their associated sample projects or examples focusing on a particular aspect of the technology.This book is intended for OpenCV developers who are interested in porting their applications to the iOS platform. Basic experience with OpenCV, computer vision, Objective C, and other iOS tools is encouraged.

  5. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  6. New upper limits for atmospheric constituents on Io

    Science.gov (United States)

    Fink, U.; Larson, H. P.; Gautier, T. N., III

    1976-01-01

    A spectrum of Io from 0.86 to 2.7 microns with a resolution of 3.36 per cm and a signal to rms noise ratio of 120 is presented. No absorptions due to any atmospheric constituents on Io could be found in the spectrum. Upper limits of 0.12 cm-atm for NH3, 0.12 cm-atm for CH4, 0.4 cm-atm for N2O, and 24 cm-atm for H2S were determined. Laboratory spectra of ammonia frosts as a function of temperature were compared with the spectrum of Io and showed this frost not to be present at the surface of Io. A search for possible resonance lines of carbon, silicon, and sulfur, as well as the 1.08-micron line of helium, proved negative. Upper emission limits of 60, 18, 27, and 60 kilorayleighs, respectively, were established for these lines.

  7. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  8. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  9. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  10. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  11. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  12. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  13. Stability of sulfur slopes on Io

    Science.gov (United States)

    Clow, G. D.; Carr, M. H.

    1980-01-01

    The mechanical properties of elemental sulfur are such that the upper crust of Io cannot be primarily sulfur. For heat flows in the range 100-1000 ergs/sq cm sec sulfur becomes ductile within several hundred meters of the surface and would prevent the formation of calderas with depths greater than this. However, the one caldera for which precise depth data are available is 2 km deep, and this value may be typical. A study of the mechanical equilibrium of simple slopes shows that the depth to the zone of rapid ductile flow strongly controls the maximum heights for sulfur slopes. Sulfur scarps with heights greater than 1 km will fail for all heat flows greater than 180 ergs/sq cm sec and slope angles greater than 22.5 deg. The observed relief on Io is inconsistent with that anticipated for a predominantly sulfur crust. However, a silicate crust with several percent sulfur included satisfies both the mechanical constraints and the observed presence of sulfur on Io.

  14. Rationalizing meat consumption. The 4Ns.

    Science.gov (United States)

    Piazza, Jared; Ruby, Matthew B; Loughnan, Steve; Luong, Mischel; Kulik, Juliana; Watkins, Hanne M; Seigerman, Mirra

    2015-08-01

    Recent theorizing suggests that the 4Ns - that is, the belief that eating meat is natural, normal, necessary, and nice - are common rationalizations people use to defend their choice of eating meat. However, such theorizing has yet to be subjected to empirical testing. Six studies were conducted on the 4Ns. Studies 1a and 1b demonstrated that the 4N classification captures the vast majority (83%-91%) of justifications people naturally offer in defense of eating meat. In Study 2, individuals who endorsed the 4Ns tended also to objectify (dementalize) animals and included fewer animals in their circle of moral concern, and this was true independent of social dominance orientation. Subsequent studies (Studies 3-5) showed that individuals who endorsed the 4Ns tend not to be motivated by ethical concerns when making food choices, are less involved in animal-welfare advocacy, less driven to restrict animal products from their diet, less proud of their animal-product decisions, tend to endorse Speciesist attitudes, tend to consume meat and animal products more frequently, and are highly committed to eating meat. Furthermore, omnivores who strongly endorsed the 4Ns tended to experience less guilt about their animal-product decisions, highlighting the guilt-alleviating function of the 4Ns. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Advanced I/O for large-scale scientific applications

    International Nuclear Information System (INIS)

    Klasky, Scott; Schwan, Karsten; Oldfield, Ron A.; Lofstead, Gerald F. II

    2010-01-01

    As scientific simulations scale to use petascale machines and beyond, the data volumes generated pose a dual problem. First, with increasing machine sizes, the careful tuning of IO routines becomes more and more important to keep the time spent in IO acceptable. It is not uncommon, for instance, to have 20% of an application's runtime spent performing IO in a 'tuned' system. Careful management of the IO routines can move that to 5% or even less in some cases. Second, the data volumes are so large, on the order of 10s to 100s of TB, that trying to discover the scientifically valid contributions requires assistance at runtime to both organize and annotate the data. Waiting for offline processing is not feasible due both to the impact on the IO system and the time required. To reduce this load and improve the ability of scientists to use the large amounts of data being produced, new techniques for data management are required. First, there is a need for techniques for efficient movement of data from the compute space to storage. These techniques should understand the underlying system infrastructure and adapt to changing system conditions. Technologies include aggregation networks, data staging nodes for a closer parity to the IO subsystem, and autonomic IO routines that can detect system bottlenecks and choose different approaches, such as splitting the output into multiple targets, staggering output processes. Such methods must be end-to-end, meaning that even with properly managed asynchronous techniques, it is still essential to properly manage the later synchronous interaction with the storage system to maintain acceptable performance. Second, for the data being generated, annotations and other metadata must be incorporated to help the scientist understand output data for the simulation run as a whole, to select data and data features without concern for what files or other storage technologies were employed. All of these features should be attained while

  16. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  17. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  18. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  19. A Model of Socially Connected Web Objects for IoT Applications

    OpenAIRE

    Ali, Sajjad; Kibria, Muhammad Golam; Jarwar, Muhammad Aslam; Lee, Hoon Ki; Chong, Ilyoung

    2018-01-01

    The Internet of Things (IoT) is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT), emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT application...

  20. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  1. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  2. Radial and azimuthal distribution of Io's oxygen neutral cloud observed by Hisaki/EXCEED

    Science.gov (United States)

    Koga, R.; Tsuchiya, F.; Kagitani, M.; Sakanoi, T.; Yoneda, M.; Yoshikawa, I.; Yoshioka, K.; Murakami, G.; Yamazaki, A.; Kimura, T.; Smith, H. T.

    2017-12-01

    We report the spatial distributions of oxygen neural cloud surrounding Jupiter's moon Io and along Io's orbit observed by the HISAKI satellite. Atomic oxygen and sulfur in Io's atmosphere escape from the exobase and move to corona ( 5.8 Io radii) mainly due to atmospheric sputtering. Io plasma torus is formed by ionization of these atoms by electron impact and charge exchange processes. It is essential to examine the dominant source of Io plasma torus, particularly in the vicinity of Io (5.8 Io radii; extended neutral clouds). The spatial distribution of oxygen and sulfur neutral clouds is important to understand the source. The extreme ultraviolet spectrometer called EXCEED (Extreme Ultraviolet Spectroscope for Exospheric Dynamics) installed on the Hisaki satellite observed Io plasma torus continuously in 2014-2015, and we carried out the monitoring of the distribution of atomic oxygen emission at 130.4 nm. The emission averaged over the distance range of 4.5-6.5 Jovian radii on the dawn and dusk sides strongly depends on the Io phase angle (IPA), and has a emission peak between IPA of 60-90 degrees on the dawn side, and between 240-270 degrees on the dusk side, respectively. It also shows the asymmetry with respect to Io's position: the intensity averaged for IPA 60-90 degrees (13.3 Rayleighs (R)) is 1.2 times greater than that for IPA 90-120 degrees (11.1 R) on the dawn side. The similar tendency is found on the dusk side. Weak atomic oxygen emission (4 R) uniformly distributes in every IPA. We also examined the radial distribution of the oxygen neutral cloud during the same period and found the emission peak near Io's orbit with decreasing the intensity toward 8.0 Jupiter radii. The results show the high density component of the oxygen neutral cloud is concentrated around Io and extends mainly toward leading side of Io. In addition, the low density neutrals uniformly exist along Io's orbit. Both components extend radially outward up to 8 Jovian radii with

  3. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  4. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  5. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  6. UMAMI: A Recipe for Generating Meaningful Metrics through Holistic I/O Performance Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lockwood, Glenn K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yoo, Wucherl [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wright, Nicholas J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Snyder, Shane [Argonne National Lab. (ANL), Argonne, IL (United States); Harms, Kevin [Argonne National Lab. (ANL), Argonne, IL (United States); Nault, Zachary [Argonne National Lab. (ANL), Argonne, IL (United States); Carns, Philip [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-12

    I/O efficiency is essential to productivity in scientific computing, especially as many scientific domains become more data-intensive. Many characterization tools have been used to elucidate specific aspects of parallel I/O performance, but analyzing components of complex I/O subsystems in isolation fails to provide insight into critical questions: how do the I/O components interact, what are reasonable expectations for application performance, and what are the underlying causes of I/O performance problems? To address these questions while capitalizing on existing component-level characterization tools, we propose an approach that combines on-demand, modular synthesis of I/O characterization data into a unified monitoring and metrics interface (UMAMI) to provide a normalized, holistic view of I/O behavior. We evaluate the feasibility of this approach by applying it to a month-long benchmarking study on two distinct largescale computing platforms. We present three case studies that highlight the importance of analyzing application I/O performance in context with both contemporaneous and historical component metrics, and we provide new insights into the factors affecting I/O performance. By demonstrating the generality of our approach, we lay the groundwork for a production-grade framework for holistic I/O analysis.

  7. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh, Hossein; Burkhalter, Lukas; Hithnawi, Anwar; Duquennoy, Simon

    2017-01-01

    Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delega...

  8. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  9. Layout-Aware I/O Scheduling for Terabits Data Movement

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Atchley, Scott [ORNL; Vallee, Geoffroy R [ORNL; Shipman, Galen M [ORNL

    2013-01-01

    Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

  10. A neuro-immune, neuro-oxidative and neuro-nitrosative model of prenatal and postpartum depression.

    Science.gov (United States)

    Roomruangwong, Chutima; Anderson, George; Berk, Michael; Stoyanov, Drozdstoy; Carvalho, André F; Maes, Michael

    2018-02-02

    A large body of evidence indicates that major affective disorders are accompanied by activated neuro-immune, neuro-oxidative and neuro-nitrosative stress (IO&NS) pathways. Postpartum depression is predicted by end of term prenatal depressive symptoms whilst a lifetime history of mood disorders appears to increase the risk for both prenatal and postpartum depression. This review provides a critical appraisal of available evidence linking IO&NS pathways to prenatal and postpartum depression. The electronic databases Google Scholar, PubMed and Scopus were sources for this narrative review focusing on keywords, including perinatal depression, (auto)immune, inflammation, oxidative, nitric oxide, nitrosative, tryptophan catabolites (TRYCATs), kynurenine, leaky gut and microbiome. Prenatal depressive symptoms are associated with exaggerated pregnancy-specific changes in IO&NS pathways, including increased C-reactive protein, advanced oxidation protein products and nitric oxide metabolites, lowered antioxidant levels, such as zinc, as well as lowered regulatory IgM-mediated autoimmune responses. The latter pathways coupled with lowered levels of endogenous anti-inflammatory compounds, including ω3 polyunsaturated fatty acids, may also underpin the pathophysiology of postpartum depression. Although increased bacterial translocation, lipid peroxidation and TRYCAT pathway activation play a role in mood disorders, similar changes do not appear to be relevant in perinatal depression. Some IO&NS biomarker characteristics of mood disorders are found in prenatal depression indicating that these pathways partly contribute to the association of a lifetime history of mood disorders and perinatal depression. However, available evidence suggests that some IO&NS pathways differ significantly between perinatal depression and mood disorders in general. This review provides a new IO&NS model of prenatal and postpartum depression. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Using a 2D Model of the Io Plasma Torus to Investigate the Effects of Density Variations on the Morphology and Intensity of the Io Footprint

    Science.gov (United States)

    Payan, A. P.; Rajendar, A.; Paty, C. S.; Bonfond, B.; Crary, F.

    2012-12-01

    Io is the primary source of plasma in the Jovian magnetosphere, continuously releasing approximately 1 ton/s of SO2 from volcanic eruptions. The interaction of Io with Jupiter's magnetosphere is strongly influenced by the density structure of the resulting plasma torus and the position of Io relative to the center of the torus [Bonfond et al. 2008]. This unusual interaction produces a complex auroral feature on Jupiter's ionosphere known as the Io footprint. Hubble Space Telescope (HST) observations of Jupiter's far-UV aurora during spring 2007 showed an increased number of isolated auroral blobs along with a continuous expansion of Jupiter's main auroral oval over a few months. These blobs were associated with several large injections of hot plasma between 9 and 27 Jovian radii. These events coincided with a large volcanic eruption of the Tvashtar Paterae on Io, as observed by the New Horizons spacecraft [Spencer et al., 2007]. This, in turn, may have resulted in a significant increase in the plasma torus density. Besides, on June 7th, 2007, the Io footprint momentarily became so faint that it disappeared under a diffuse patch of emission remaining from an injection blob [Bonfond et al., 2012]. The goal of the present study is to examine the relationship between the increased density of the plasma torus and the dimming of the Io footprint. We implement a 2D model of the Io plasma torus that treats the variable-density torus as being composed of discrete layers of uniform density. As the co-rotating plasma in the plasma torus impinges on Io, Alfvén waves are launched at a pushback angle obtained from Gurnett and Goertz [1981]. The waves propagate inside the plasma torus through reflection and refraction at density discontinuities where they lose some of their initial energy. Using the above model, we can track the Alfvén wave fronts in the plasma torus and determine the longitude at which they exit the torus along with the corresponding remaining energy. Since

  12. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  13. Identification of drug resistance and immune-driven variations in hepatitis C virus (HCV) NS3/4A, NS5A and NS5B regions reveals a new approach toward personalized medicine.

    Science.gov (United States)

    Ikram, Aqsa; Obaid, Ayesha; Awan, Faryal Mehwish; Hanif, Rumeza; Naz, Anam; Paracha, Rehan Zafar; Ali, Amjad; Janjua, Hussnain Ahmed

    2017-01-01

    Cellular immune responses (T cell responses) during hepatitis C virus (HCV) infection are significant factors for determining the outcome of infection. HCV adapts to host immune responses by inducing mutations in its genome at specific sites that are important for HLA processing/presentation. Moreover, HCV also adapts to resist potential drugs that are used to restrict its replication, such as direct-acting antivirals (DAAs). Although DAAs have significantly reduced disease burden, resistance to these drugs is still a challenge for the treatment of HCV infection. Recently, drug resistance mutations (DRMs) observed in HCV proteins (NS3/4A, NS5A and NS5B) have heightened concern that the emergence of drug resistance may compromise the effectiveness of DAAs. Therefore, the NS3/4A, NS5A and NS5B drug resistance variations were investigated in this study, and their prevalence was examined in a large number of protein sequences from all HCV genotypes. Furthermore, potential CD4 + and CD8 + T cell epitopes were predicted and their overlap with genetic variations was explored. The findings revealed that many reported DRMs within NS3/4A, NS5A and NS5B are not drug-induced; rather, they are already present in HCV strains, as they were also detected in HCV-naïve patients. This study highlights several hot spots in which HLA and drug selective pressure overlap. Interestingly, these overlapping mutations were frequently observed among many HCV genotypes. This study implicates that knowledge of the host HLA type and HCV subtype/genotype can provide important information in defining personalized therapy. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Proceedings First Workshop on Architectures, Languages and Paradigms for IoT

    OpenAIRE

    Pianini, Danilo; Salvaneschi, Guido

    2018-01-01

    The 1st workshop on Architectures, Languages and Paradigms for IoT (ALP4IoT 2017), was held in Turin on September 19th, 2017. ALP4IoT was a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). The workshop aimed at critically reviewing the state-of-the-art and the state-of-the-practice of formal techniques and software methods for the IoT, presenting open problems and challenges and triggering a discussion among the participants with different views an...

  15. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  16. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  17. A post-Galileo view of Io's interior

    Science.gov (United States)

    Keszthelyi, L.; Jaeger, W.L.; Turtle, E.P.; Milazzo, M.; Radebaugh, J.

    2004-01-01

    We present a self-consistent model for the interior of Io, taking the recent Galileo data into account. In this model, Io has a completely molten core, substantially molten mantle, and a very cold lithosphere. Heat from magmatic activity can mobilize volatile compounds such as SO2 in the lithosphere, and the movement of such cryogenic fluids may be important in the formation of surface features including sapping scarps and paterae. ?? Published by Elsevier Inc.

  18. SMART-ITEM: IoT-Enabled Smart Living

    OpenAIRE

    Kor, A; Pattinson, C; Yanovsky, M; Kharchenko, V

    2017-01-01

    The main goal of this proposed project is to harness the emerging IoT technology to empower elderly population to self-manage their own health, stay active, healthy, and independent as long as possible within a smart and secured living environment. An integrated open-sourced IoT ecosystem will be developed. It will encompass the entire data lifecycle which involves the following processes: data acquisition, data transportation; data integration, processing, manipulation and computation; visua...

  19. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  20. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  1. Understanding the I/O Performance Gap Between Cori KNL and Haswell

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Jialin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Tang, Houjun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Bhimji, Wahid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Cook, Brandon [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Austin, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thakur, Bhupender [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Lockwood, Glenn [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Deslippe, Jack [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Prabhat, None [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)

    2017-05-01

    The Cori system at NERSC has two compute partitions with different CPU architectures: a 2,004 node Haswell partition and a 9,688 node KNL partition, which ranked as the 5th most powerful and fastest supercomputer on the November 2016 Top 500 list. The compute partitions share a common storage configuration, and understanding the IO performance gap between them is important, impacting not only to NERSC/LBNL users and other national labs, but also to the relevant hardware vendors and software developers. In this paper, we have analyzed performance of single core and single node IO comprehensively on the Haswell and KNL partitions, and have discovered the major bottlenecks, which include CPU frequencies and memory copy performance. We have also extended our performance tests to multi-node IO and revealed the IO cost difference caused by network latency, buffer size, and communication cost. Overall, we have developed a strong understanding of the IO gap between Haswell and KNL nodes and the lessons learned from this exploration will guide us in designing optimal IO solutions in many-core era.

  2. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra. In ....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part.......In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  3. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  4. ATLAS I/O Performance Optimization in As-Deployed Environments

    CERN Document Server

    Maier, Thomas; The ATLAS collaboration; Bhimji, Wahid; Elmsheuser, Johannes; van Gemmeren, Peter; Malon, David; Krumnack, Nils

    2015-01-01

    I/O is a fundamental determinant in the overall performance of physics analysis and other data-intensive scientific computing. It is, further, crucial to effective resource delivery by the facilities and infrastructure that support data-intensive science. To understand I/O performance, clean measurements in controlled environments are essential, but effective optimization requires as well an understanding of the complicated realities of as-deployed environments. These include a spectrum of local and wide-area data delivery and resilience models, heterogeneous storage systems, matches and mismatches between data organization and access patterns, multi-user considerations that may help or hinder individual job performance, and more. The ATLAS experiment has organized an interdisciplinary working group of I/O, persistence, analysis framework, distributed infrastructure, site deployment, and external experts to understand and improve I/O performance in preparation for Run 2 of the Large Hadron Collider. The adopt...

  5. Volcanism on Io: The Galileo NIMS Io Thermal Emission Database (NITED)

    Science.gov (United States)

    Davies, A. G.; Veeder, G. J.; Matson, D. L.; Johnson, T. V.

    2011-12-01

    In order to determine the magnitude of thermal emission from Io's volcanoes and variability with time at local, regional and global scales, we have calculated the 4.7 or 5 μm radiant flux for every hot spot in every Galileo Near Infrared Mapping Spectrometer (NIMS) observation obtained during the Galileo mission between June 1996 and October 2001. The resulting database contains over 1000 measurements of radiant flux, corrected for emission angle, range to target, and, where necessary, incident sunlight. Io's volcanoes produce the most voluminous and most powerful eruptions in the Solar System [1] and NIMS was the ideal instrument for measuring thermal emission from these volcanoes (see [1, 2]). NIMS covered the infrared from 0.7 to 5.2 μm, so measurement of hot spot thermal emission at ~5 μm was possible even in daytime observations. As part of a campaign to quantify magnitude and variability of volcanic thermal emission [1, 3-5] we examined the entire NIMS dataset (196 observations). The resulting NIMS Io Thermal Emission Database (NITED) allows the charting of 5-μm thermal emission at individual volcanoes, identifying individual eruption episodes, and enabling the comparison of activity at different hot spots [e.g., 6] and different regions of Io. Some ionian hot spots were detected only once or twice by NIMS (e.g., Ah Peku Patera, seen during I32), but most were detected many times (e.g., Culann, Tupan and Zamama, [6]). For example, the database contains over 40 observations of Loki Patera (some at high emission angle, and two partial observations). There are 55 observations of Pele. The 27 nighttime observations of Pele show a remarkably steady 5-μm radiant flux of 35 ± 12 GW/μm. There are 34 observations of Pillan, which erupted violently in 1997. Although in many observations low spatial resolution makes it difficult to separate hot spot pairs such as Susanoo Patera and Mulungu Patera; Tawhaki Patera and Hi'iaka Patera; and Janus Patera and Kanehekili

  6. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  7. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  8. The Method of System Test using I/O Stimulator

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts.

  9. The Method of System Test using I/O Stimulator

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi

    2016-01-01

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts

  10. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  11. Service framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2016-01-01

    Internet of Things (IoT) is a revolutionary technology, where devices around us will be capable of sensing, reacting, responding and working autonomously to provide services to the users e.g. within smart homes, enterprises, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)". However, providing the appropriate services to the users depending on their requirements is a major challenge for IoPTS. After reviewing...

  12. NIMS: hotspots on Io during G2

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 7 September 1996. This image shows (on the right) Io as seen in the infrared by NIMS. The image on the left shows the same view from Voyager in 1979. This NIMS image can be compared to the NIMS images from the G1 orbit (June 1996) to monitor changes on Io. The NIMS image is at 4.9 microns, showing thermal emissions from the hotspots. The brightness of the pixels is a function of size and temperature.At least 10 hotspots have been identified and can be matched with surface features. An accurate determination of the position of the hotspot in the vicinity of Shamash Patera is pending. Hotspots are seen in the vicinity of Prometheus, Volund and Marduk, all sites of volcanic plume activity during the Galileo encounters, and also of active plumes in 1979. Temperatures and areas have been calculated for the hotspots shown. Temperatures range from 828 K (1031 F) to 210 K (- 81.4 F). The lowest temperature is significantly higher than the Io background (non-hotspot) surface temperature of about 100 K (-279 F). Hotspot areas range from 6.5 square km (2.5 sq miles) to 40,000 sq km (15,400 sq miles). The hottest hotspots have smallest areas, and the cooler hotspots have the largest areas. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Galileo mission is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, Washington, D.C.This image and other images and data received from Galileo are posted on the Galileo mission home page on the World Wide Web at http://galileo.jpl.nasa.gov.

  13. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  14. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  15. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  16. NIMS: hotspots on Io during G2 (continued)

    Science.gov (United States)

    1997-01-01

    This is another Near Infrared Mapping Spectrometer (NIMS) image of Io, taken during the G2 encounter in September 1996. This is a dayside image of Io (on the right) against the clouds of Jupiter (the blue background). On the left is a Voyager mosaic of Io with the same viewing geometry for comparison purposes. This NIMS data set has been processed to highlight the positions of hot spots on the surface of Io. At least 11 can be seen. Two of the hotspots are newly discovered by the NIMS instrument. Others correspond to sites of plume eruptions and volcanic calderas and volcanic flows. This image can be compared with the SSI image P-47971 released on October 23, 1996, which was taken almost exactly the same position.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  17. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  18. Localisation system in wireless sensor networks using ns-2

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2012-04-01

    Full Text Available -1 /************************************************************************** ********** * * File: readme.asn * * Author: Adnan Abu-Mahfouz * * Date: March 2012 * * Description: Localisation system in wireless sensor networks using ns-2... *************************************************************************** *********/ /************************************************************************** *************************************************************************** *****/ 1. Introduction: ns-2 contains several flexible features that encourage researchers to use ns-2 to investigate the characteristics of wireless sensor networks (WSNs). However, to implement and evaluate localisation algorithms, the current ns- 2...

  19. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  20. A survey on LPWA technology: LoRa and NB-IoT

    Directory of Open Access Journals (Sweden)

    Rashmi Sharan Sinha

    2017-03-01

    Full Text Available By 2020, more than twenty five billion devices would be connected through wireless communications. In accordance with the rapid growth of the internet of things (IoT market, low power wide area (LPWA technologies have become popular. In various LPWA technologies, narrowband (NB-IoT and long range (LoRa are two leading technologies. In this paper, we provide a comprehensive survey on NB-IoT and LoRa as efficient solutions connecting the devices. It is shown that unlicensed LoRa has advantages in terms of battery lifetime, capacity, and cost. Meanwhile, licensed NB-IoT offers benefits in terms of QoS, latency, reliability, and range.

  1. Volcanism on Jupiter's moon Io and its relation to interior processes

    Science.gov (United States)

    Hamilton, Christopher

    2013-04-01

    Jupiter's moon Io is the most volcanically active body in the Solar System and offers insight into processes of tidal heating, melt generation, and magma ascent. Investigating these processes contributes to a better understanding of Io's geologic history, internal structure, and tidal dissipation mechanisms, as well as to understanding similar processes operating on other tidally-heated worlds (e.g., Europa, Enceladus, and some exoplanets). Four recent developments provide new observational constraints that prompt re-examination of the relationships between Io's surficial geology and interior structure. These developments include: (1) completion of the first 1:15,000,000 scale geologic map of Io based on a synthesis of Voyager and Galileo data; (2) re-interpretation of Galileo magnetometer data, which suggests that Io has a globally continuous subsurface magma ocean; (3) new global surveys of the power output from volcanic centers on Io; and (4) identification of an offset between volcano concentrations and surface heat flux maxima predicted by solid body tidal heating models. In this study, the spatial distributions of volcanic hotspots and paterae on Io are characterized using distance-based clustering techniques and nearest neighbor statistics. Distance-based clustering results support a dominant role for asthenospheric heating within Io, but show a 30-60° eastward offset in volcano concentrations relative to locations of predicted surface heat flux maxima. The observed asymmetry in volcano concentrations, with respect to the tidal axis, cannot be explained by existing solid body tidal heating models. However, identification of a global magma ocean within Io raises the intriguing possibility that a fluid tidal response—analogous to the heating of icy satellites by fluid tidal dissipation in their liquid oceans—may modify Io's thermal budget and locations of enhanced volcanism. The population density of volcanoes is greatest near the equator, which also

  2. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  3. Integrating Facebook iOS SDK with your application

    CERN Document Server

    Macrì, Giuseppe

    2013-01-01

    A tutorial-based guide with chapters focusing on learning and embedding crucial Facebook features.If you are a developer who wishes to develop and monetize your apps on the App store, then this is the book for you. This book assumes you have basic knowledge of iOS programming using Objective-C and XCode, however, prior knowledge of Facebook iOS SDK is not required.

  4. Functional investigation of grass carp reovirus nonstructural protein NS80

    Directory of Open Access Journals (Sweden)

    Shao Ling

    2011-04-01

    Full Text Available Abstract Background Grass Carp Reovirus (GCRV, a highly virulent agent of aquatic animals, has an eleven segmented dsRNA genome encased in a multilayered capsid shell, which encodes twelve proteins including seven structural proteins (VP1-VP7, and five nonstructural proteins (NS80, NS38, NS31, NS26, and NS16. It has been suggested that the protein NS80 plays an important role in the viral replication cycle that is similar to that of its homologous protein μNS in the genus of Orthoreovirus. Results As a step to understanding the basis of the part played by NS80 in GCRV replication and particle assembly, we used the yeast two-hybrid (Y2H system to identify NS80 interactions with proteins NS38, VP4, and VP6 as well as NS80 and NS38 self-interactions, while no interactions appeared in the four protein pairs NS38-VP4, NS38-VP6, VP4-VP4, and VP4-VP6. Bioinformatic analyses of NS80 with its corresponding proteins were performed with all currently available homologous protein sequences in ARVs (avian reoviruses and MRVs (mammalian reoviruses to predict further potential functional domains of NS80 that are related to VFLS (viral factory-like structures formation and other roles in viral replication. Two conserved regions spanning from aa (amino acid residues of 388 to 433, and 562 to 580 were discovered in this study. The second conserved region with corresponding conserved residues Tyr565, His569, Cys571, Asn573, and Glu576 located between the two coiled-coils regions (aa ~513-550 and aa ~615-690 in carboxyl-proximal terminus were supposed to be essential to form VFLS, so that aa residues ranging from 513 to 742 of NS80 was inferred to be the smallest region that is necessary for forming VFLS. The function of the first conserved region including Ala395, Gly419, Asp421, Pro422, Leu438, and Leu443 residues is unclear, but one-third of the amino-terminal region might be species specific, dominating interactions with other viral components. Conclusions Our

  5. Instant Passbook app development for iOS how-to

    CERN Document Server

    Moon, Keith D

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A step-by-step guide, focusing on simple projects to help you create a Passbook app for iOS 6.Instant Passbook App Development for iOS 6 How-to is for registered Apple iOS developers, experienced in building an app using Objective-C and Xcode, looking to add Passbook functionality to their app. You will need to have an understanding of the JSON format, REST APIs, and a server-side language like Ruby. Familiarity with executing commands via the Terminal app is expected for the exerci

  6. Latitudinal oscillations of plasma within the Io torus

    Science.gov (United States)

    Cummings, W. D.; Dessler, A. J.; Hill, T. W.

    1980-01-01

    The equilibrium latitude and the period of oscillations about this equilibrium latitude are calculated for a plasma in a centrifugally dominated tilted dipole magnetic field representing Jupiter's inner magnetosphere. It is found that for a hot plasma the equilibrium latitude in the magnetic equator, for a cold plasma it is the centrifugal equator, and for a warm plasma it is somewhere in between. An illustrative model is adopted in which atoms are sputtered from the Jupiter-facing hemisphere of Io and escape Io's gravity to be subsequently ionized some distance from Io. Finally, it is shown that ionization generally does not occur at the equilibrium altitude, and that the resulting latitudinal oscillations provide an explanation for the irregularities in electron concentration within the torus, as reported by the radioastronomy experiment aboard Voyager I.

  7. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  8. IoT-Based Car's Parking Monitoring System

    OpenAIRE

    Dwiputra Albertus Ega; Khoswanto Handry; Sutjiadi Raymond; Lim Resmana

    2018-01-01

    Internet-of-things-based technologies have advanced so much and helped public necessities. The use of IoT at a parking lot will help vehicle users to know the availability of a parking location through smartphones. This IoT-based parking system is created by using controllers, sensors, servers and cloud. Controllers and sensors will be placed on the ceiling of each parking slots to detect the presence of a car. Server collect the results of the sensors and store them in Cloud. System test is ...

  9. I/O load balancing for big data HPC applications

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Arnab K. [Virginia Polytechnic Institute and State University; Goyal, Arpit [Virginia Polytechnic Institute and State University; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Butt, Ali R. [Virginia Tech, Blacksburg, VA; Brim, Michael J. [ORNL; Srinivasa, Sangeetha B. [Virginia Polytechnic Institute and State University

    2018-01-01

    High Performance Computing (HPC) big data problems require efficient distributed storage systems. However, at scale, such storage systems often experience load imbalance and resource contention due to two factors: the bursty nature of scientific application I/O; and the complex I/O path that is without centralized arbitration and control. For example, the extant Lustre parallel file system-that supports many HPC centers-comprises numerous components connected via custom network topologies, and serves varying demands of a large number of users and applications. Consequently, some storage servers can be more loaded than others, which creates bottlenecks and reduces overall application I/O performance. Existing solutions typically focus on per application load balancing, and thus are not as effective given their lack of a global view of the system. In this paper, we propose a data-driven approach to load balance the I/O servers at scale, targeted at Lustre deployments. To this end, we design a global mapper on Lustre Metadata Server, which gathers runtime statistics from key storage components on the I/O path, and applies Markov chain modeling and a minimum-cost maximum-flow algorithm to decide where data should be placed. Evaluation using a realistic system simulator and a real setup shows that our approach yields better load balancing, which in turn can improve end-to-end performance.

  10. Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Moody, A

    2009-08-18

    In the race to PetaFLOP-speed supercomputing systems, the increase in computational capability has been accompanied by corresponding increases in CPU count, total RAM, and storage capacity. However, a proportional increase in storage bandwidth has lagged behind. In order to improve system reliability and to reduce maintenance effort for modern large-scale systems, system designers have opted to remove node-local storage from the compute nodes. Today's multi-TeraFLOP supercomputers are typically attached to parallel file systems that provide only tens of GBs/s of I/O bandwidth. As a result, such machines have access to much less than 1GB/s of I/O bandwidth per TeraFLOP of compute power, which is below the generally accepted limit required for a well-balanced system. In a many ways, the current I/O bottleneck limits the capabilities of modern supercomputers, specifically in terms of limiting their working sets and restricting fault tolerance techniques, which become critical on systems consisting of tens of thousands of components. This paper resolves the dilemma between high performance and high reliability by presenting an alternative system design which makes use of node-local storage to improve aggregate system I/O bandwidth. In this work, we focus on the checkpointing use-case and present an experimental evaluation of the Scalable Checkpoint/Restart (SCR) library, a new adaptive checkpointing library that uses node-local storage to significantly improve the checkpointing performance of large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching a measured 700GB/s of aggregate bandwidth on 8,752 processors and an estimated 1TB/s for a similarly structured machine of 12,500 processors. This corresponds to a speedup of over 70x compared to the bandwidth provided by the 10GB/s parallel file system the cluster uses. Further, SCR can adapt to an environment in which there is wide variation in performance or capacity among

  11. Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks.

    Science.gov (United States)

    Lee, Jinseong; Lee, Jaiyong

    2017-09-01

    The current expansion of the Internet of things (IoT) demands improved communication platforms that support a wide area with low energy consumption. The 3rd Generation Partnership Project introduced narrowband IoT (NB-IoT) as IoT communication solutions. NB-IoT devices should be available for over 10 years without requiring a battery replacement. Thus, a low energy consumption is essential for the successful deployment of this technology. Given that a high amount of energy is consumed for radio transmission by the power amplifier, reducing the uplink transmission time is key to ensure a long lifespan of an IoT device. In this paper, we propose a prediction-based energy saving mechanism (PBESM) that is focused on enhanced uplink transmission. The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. In this way, our mechanism reduces the number of random accesses and the energy consumed by radio transmission. Simulation results showed that the energy consumption using the proposed PBESM is reduced by up to 34% in comparison with that in the conventional NB-IoT method.

  12. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  13. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  14. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  15. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  16. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  17. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  18. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  19. IoT’s Tiny Steps towards 5G: Telco’s Perspective

    Directory of Open Access Journals (Sweden)

    Enida Cero

    2017-10-01

    Full Text Available The numerous and diverse applications of the Internet of Things (IoT have the potential to change all areas of daily life of individuals, businesses, and society as a whole. The vision of a pervasive IoT spans a wide range of application domains and addresses the enabling technologies needed to meet the performance requirements of various IoT applications. In order to accomplish this vision, this paper aims to provide an analysis of literature in order to propose a new classification of IoT applications, specify and prioritize performance requirements of such IoT application classes, and give an insight into state-of-the-art technologies used to meet these requirements, all from telco’s perspective. A deep and comprehensive understanding of the scope and classification of IoT applications is an essential precondition for determining their performance requirements with the overall goal of defining the enabling technologies towards fifth generation (5G networks, while avoiding over-specification and high costs. Given the fact that this paper presents an overview of current research for the given topic, it also targets the research community and other stakeholders interested in this contemporary and attractive field for the purpose of recognizing research gaps and recommending new research directions.

  20. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  1. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  2. The Io Volcano Observer (IVO) for NASA Discovery 2015

    Science.gov (United States)

    McEwen, Alfred S.; Turtle, Elizabeth P.; Thomas, Nicolas

    2015-04-01

    IVO was first proposed as a NASA Discovery mission in 2010, powered by the Advanced Sterling Radioisotope Generators (ASRGs) to provide a compact spacecraft that points and settles quickly. The 2015 IVO uses advanced lightweight solar arrays and a 1-dimensional pivot to achieve similar observing flexibility during a set of fast (~18 km/s) flybys of Io. The John Hopkins University Applied Physics Lab (APL) leads mission implementation, with heritage from MESSENGER, New Horizons, and the Van Allen Probes. All science objectives from the Io Observer New Frontiers concept recommended in the 2011 Decadal Survey are addressed by IVO. There are 5 instruments plus gravity science: Narrow- and wide-angle cameras (NAC and WAC), Dual fluxgate magnetometers (DMAG), a thermal mapper (TMAP, from DLR), and particle environment package for Io (PEPI) consisting of an ion and neutral mass spectrometer (INMS, from UBE) and a plasma ion analyzer (PIA, from IRF). A student collaboration hotspot mapper (HOTMAP) is an option. The NAC and TMAP are on a ± 90° pivot for off-nadir targeting during encounters and for distant monitoring. The DMAG sensors are on the end and middle of 3.8-m boom and collect data continuously. WAC and HOTMAP are mounted on the S/C nadir deck, and observe during ±20 minutes of each Io closest approach, except orbits I0 and I2. PEPI is mounted on the S/C structure with the INMS field of view in the ram direction when the S/C nadir deck points at Io, and the PIA and has a large (hemispheric) field of view that will often include the upstream direction. Gravity science requires pointing the high-gain antenna at Earth during the I0 and I2 encounters. IVO launches in 2021 and arrives at Jupiter in early 2026. A close Io flyby (I0) ~1.5 hrs. after Jupiter orbit insertion lowers the orbit period, followed by 8 additional encounters achieving the suite of science objectives. The highly elliptical orbit with perijove near Io is inclined >40° to Jupiter's orbital plane

  3. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  4. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid; Elsawy, Hesham; Zhu, Quanyan; Alouini, Mohamed-Slim

    2017-01-01

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple

  5. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  6. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  7. Lyso-myristoyl phosphatidylcholine micelles sustain the activity of Dengue non-structural (NS) protein 3 protease domain fused with the full-length NS2B.

    Science.gov (United States)

    Huang, Qiwei; Li, Qingxin; Joy, Joma; Chen, Angela Shuyi; Ruiz-Carrillo, David; Hill, Jeffrey; Lescar, Julien; Kang, Congbao

    2013-12-01

    Dengue virus (DENV), a member of the flavivirus genus, affects 50-100 million people in tropical and sub-tropical regions. The DENV protease domain is located at the N-terminus of the NS3 protease and requires for its enzymatic activity a hydrophilic segment of the NS2B that acts as a cofactor. The protease is an important antiviral drug target because it plays a crucial role in virus replication by cleaving the genome-coded polypeptide into mature functional proteins. Currently, there are no drugs to inhibit DENV protease activity. Most structural and functional studies have been conducted using protein constructs containing the NS3 protease domain connected to a soluble segment of the NS2B membrane protein via a nine-residue linker. For in vitro structural and functional studies, it would be useful to produce a natural form of the DENV protease containing the NS3 protease domain and the full-length NS2B protein. Herein, we describe the expression and purification of a natural form of DENV protease (NS2BFL-NS3pro) containing the full-length NS2B protein and the protease domain of NS3 (NS3pro). The protease was expressed and purified in detergent micelles necessary for its folding. Our results show that this purified protein was active in detergent micelles such as lyso-myristoyl phosphatidylcholine (LMPC). These findings should facilitate further structural and functional studies of the protease and will facilitate drug discovery targeting DENV. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. Evidence of a global magma ocean in Io's interior.

    Science.gov (United States)

    Khurana, Krishan K; Jia, Xianzhe; Kivelson, Margaret G; Nimmo, Francis; Schubert, Gerald; Russell, Christopher T

    2011-06-03

    Extensive volcanism and high-temperature lavas hint at a global magma reservoir in Io, but no direct evidence has been available. We exploited Jupiter's rotating magnetic field as a sounding signal and show that the magnetometer data collected by the Galileo spacecraft near Io provide evidence of electromagnetic induction from a global conducting layer. We demonstrate that a completely solid mantle provides insufficient response to explain the magnetometer observations, but a global subsurface magma layer with a thickness of over 50 kilometers and a rock melt fraction of 20% or more is fully consistent with the observations. We also place a stronger upper limit of about 110 nanoteslas (surface equatorial field) on the dynamo dipolar field generated inside Io.

  9. Identification and subcellular localization of porcine deltacoronavirus accessory protein NS6

    International Nuclear Information System (INIS)

    Fang, Puxian; Fang, Liurong; Liu, Xiaorong; Hong, Yingying; Wang, Yongle; Dong, Nan; Ma, Panpan; Bi, Jing; Wang, Dang; Xiao, Shaobo

    2016-01-01

    Porcine deltacoronavirus (PDCoV) is an emerging swine enteric coronavirus. Accessory proteins are genus-specific for coronavirus, and two putative accessory proteins, NS6 and NS7, are predicted to be encoded by PDCoV; however, this remains to be confirmed experimentally. Here, we identified the leader-body junction sites of NS6 subgenomic RNA (sgRNA) and found that the actual transcription regulatory sequence (TRS) utilized by NS6 is non-canonical and is located upstream of the predicted TRS. Using the purified NS6 from an Escherichia coli expression system, we obtained two anti-NS6 monoclonal antibodies that could detect the predicted NS6 in cells infected with PDCoV or transfected with NS6-expressing plasmids. Further studies revealed that NS6 is always localized in the cytoplasm of PDCoV-infected cells, mainly co-localizing with the endoplasmic reticulum (ER) and ER-Golgi intermediate compartments, as well as partially with the Golgi apparatus. Together, our results identify the NS6 sgRNA and demonstrate its expression in PDCoV-infected cells. -- Highlights: •The leader-body fusion site of NS6 sgRNA is identified. •NS6 sgRNA uses a non-canonical transcription regulatory sequence (TRS). •NS6 can be expressed in PDCoV-infected cell. •NS6 predominantly localize to the ER complex and ER-Golgi intermediate compartment.

  10. Identification and subcellular localization of porcine deltacoronavirus accessory protein NS6

    Energy Technology Data Exchange (ETDEWEB)

    Fang, Puxian; Fang, Liurong; Liu, Xiaorong; Hong, Yingying; Wang, Yongle; Dong, Nan; Ma, Panpan [State Key Laboratory of Agricultural Microbiology, College of Veterinary Medicine, Huazhong Agricultural University, Wuhan 430070 (China); The Cooperative Innovation Center for Sustainable Pig Production, Wuhan 430070 (China); Bi, Jing [State Key Laboratory of Agricultural Microbiology, College of Veterinary Medicine, Huazhong Agricultural University, Wuhan 430070 (China); Department of Immunology and Aetology, College of Basic Medicine, Hubei University of Chinese Medicine, Wuhan 430065 (China); Wang, Dang [State Key Laboratory of Agricultural Microbiology, College of Veterinary Medicine, Huazhong Agricultural University, Wuhan 430070 (China); The Cooperative Innovation Center for Sustainable Pig Production, Wuhan 430070 (China); Xiao, Shaobo, E-mail: vet@mail.hzau.edu.cn [State Key Laboratory of Agricultural Microbiology, College of Veterinary Medicine, Huazhong Agricultural University, Wuhan 430070 (China); The Cooperative Innovation Center for Sustainable Pig Production, Wuhan 430070 (China)

    2016-12-15

    Porcine deltacoronavirus (PDCoV) is an emerging swine enteric coronavirus. Accessory proteins are genus-specific for coronavirus, and two putative accessory proteins, NS6 and NS7, are predicted to be encoded by PDCoV; however, this remains to be confirmed experimentally. Here, we identified the leader-body junction sites of NS6 subgenomic RNA (sgRNA) and found that the actual transcription regulatory sequence (TRS) utilized by NS6 is non-canonical and is located upstream of the predicted TRS. Using the purified NS6 from an Escherichia coli expression system, we obtained two anti-NS6 monoclonal antibodies that could detect the predicted NS6 in cells infected with PDCoV or transfected with NS6-expressing plasmids. Further studies revealed that NS6 is always localized in the cytoplasm of PDCoV-infected cells, mainly co-localizing with the endoplasmic reticulum (ER) and ER-Golgi intermediate compartments, as well as partially with the Golgi apparatus. Together, our results identify the NS6 sgRNA and demonstrate its expression in PDCoV-infected cells. -- Highlights: •The leader-body fusion site of NS6 sgRNA is identified. •NS6 sgRNA uses a non-canonical transcription regulatory sequence (TRS). •NS6 can be expressed in PDCoV-infected cell. •NS6 predominantly localize to the ER complex and ER-Golgi intermediate compartment.

  11. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  12. Io's UV-V Eclipse Emission: Implications for Pele-type Plumes

    Science.gov (United States)

    Moore, C. H.; Goldstein, D. B.; Varghese, P. L.; Trafton, L. M.

    2010-03-01

    Simulations of Io's NUV-V emission in eclipse show that S2-rich giant plumes' S2 concentrations and activity levels effect the absolute brightness and the east/west intensity ratio across Io allowing for plume activity to be determined from observed spectra.

  13. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  14. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  15. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  16. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  17. Understanding I/O workload characteristics of a Peta-scale storage system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Gunasekaran, Raghul [ORNL

    2015-01-01

    Understanding workload characteristics is critical for optimizing and improving the performance of current systems and software, and architecting new storage systems based on observed workload patterns. In this paper, we characterize the I/O workloads of scientific applications of one of the world s fastest high performance computing (HPC) storage cluster, Spider, at the Oak Ridge Leadership Computing Facility (OLCF). OLCF flagship petascale simulation platform, Titan, and other large HPC clusters, in total over 250 thousands compute cores, depend on Spider for their I/O needs. We characterize the system utilization, the demands of reads and writes, idle time, storage space utilization, and the distribution of read requests to write requests for the Peta-scale Storage Systems. From this study, we develop synthesized workloads, and we show that the read and write I/O bandwidth usage as well as the inter-arrival time of requests can be modeled as a Pareto distribution. We also study the I/O load imbalance problems using I/O performance data collected from the Spider storage system.

  18. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  19. Novel nucleotide and amino acid covariation between the 5'UTR and the NS2/NS3 proteins of hepatitis C virus: bioinformatic and functional analyses.

    Directory of Open Access Journals (Sweden)

    Hung-Yu Sun

    Full Text Available Molecular covariation of highly polymorphic viruses is thought to have crucial effects on viral replication and fitness. This study employs association rule data mining of hepatitis C virus (HCV sequences to search for specific evolutionary covariation and then tests functional relevance on HCV replication. Data mining is performed between nucleotides in the untranslated regions 5' and 3'UTR, and the amino acid residues in the non-structural proteins NS2, NS3 and NS5B. Results indicate covariance of the 243(rd nucleotide of the 5'UTR with the 14(th, 41(st, 76(th, 110(th, 211(th and 212(th residues of NS2 and with the 71(st, 175(th and 621(st residues of NS3. Real-time experiments using an HCV subgenomic system to quantify viral replication confirm replication regulation for each covariant pair between 5'UTR₂₄₃ and NS2-41, -76, -110, -211, and NS3-71, -175. The HCV subgenomic system with/without the NS2 region shows that regulatory effects vanish without NS2, so replicative modulation mediated by HCV 5'UTR₂₄₃ depends on NS2. Strong binding of the NS2 variants to HCV RNA correlates with reduced HCV replication whereas weak binding correlates with restoration of HCV replication efficiency, as determined by RNA-protein immunoprecipitation assay band intensity. The dominant haplotype 5'UTR₂₄₃-NS2-41-76-110-211-NS3-71-175 differs according to the HCV genotype: G-Ile-Ile-Ile-Gly-Ile-Met for genotype 1b and A-Leu-Val-Leu-Ser-Val-Leu for genotypes 1a, 2a and 2b. In conclusion, 5'UTR₂₄₃ co-varies with specific NS2/3 protein amino acid residues, which may have significant structural and functional consequences for HCV replication. This unreported mechanism involving HCV replication possibly can be exploited in the development of advanced anti-HCV medication.

  20. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  1. Rab5 Enhances Classical Swine Fever Virus Proliferation and Interacts with Viral NS4B Protein to Facilitate Formation of NS4B Related Complex

    Directory of Open Access Journals (Sweden)

    Jihui Lin

    2017-08-01

    Full Text Available Classical swine fever virus (CSFV is a fatal pig pestivirus and causes serious financial losses to the pig industry. CSFV NS4B protein is one of the most important viral replicase proteins. Rab5, a member of the small Rab GTPase family, is involved in infection and replication of numerous viruses including hepatitis C virus and dengue virus. Until now, the effects of Rab5 on the proliferation of CSFV are poorly defined. In the present study, we showed that Rab5 could enhance CSFV proliferation by utilizing lentivirus-mediated constitutive overexpression and eukaryotic plasmid transient overexpression approaches. On the other hand, lentivirus-mediated short hairpin RNA knockdown of Rab5 dramatically inhibited virus production. Co-immunoprecipitation, glutathione S-transferase pulldown and laser confocal microscopy assays further confirmed the interaction between Rab5 and CSFV NS4B protein. In addition, intracellular distribution of NS4B-Red presented many granular fluorescent signals (GFS in CSFV infected PK-15 cells. Inhibition of basal Rab5 function with Rab5 dominant negative mutant Rab5S34N resulted in disruption of the GFS. These results indicate that Rab5 plays a critical role in facilitating the formation of the NS4B related complexes. Furthermore, it was observed that NS4B co-localized with viral NS3 and NS5A proteins in the cytoplasm, suggesting that NS3 and NS5A might be components of the NS4B related complex. Taken together, these results demonstrate that Rab5 positively modulates CSFV propagation and interacts with NS4B protein to facilitate the NS4B related complexes formation.

  2. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  3. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  4. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  5. An IoT-enabled supply chain integration framework : empirical case studies

    OpenAIRE

    Wakenshaw, Susan Y. L.; Maple, Carsten; Chen, Daqiang; Micillo, Rosario

    2017-01-01

    Supply chain integration is crucial for supply chain performance, particularly in industry 4.0. With the proliferation of Internet of Things (IoT) and the use of cyber-physical systems, supply chain integration needs to be greatly enhanced. In this paper, we explore supply integration (process and application) in the supply chain network enabled by IoT. Using the case study method, we investigate technical and business applications of IoT in supply chains and how it can interface with the pro...

  6. A neural network and IoT-based scheme for performance assessment in Internet of Robotic Things

    OpenAIRE

    Razafimandimby , Cristanel; Loscri , Valeria; Vegni , Anna Maria

    2016-01-01

    International audience; Internet of Robotic Things (IoRT) is a new concept introduced for the first time by ABI Research. Unlike the Internet of Things (IoT), IoRT provides an active sensorization and is considered as the new evolution of IoT. This new concept will bring new opportunities and challenges, while providing new business ideas for IoT and robotics’ entrepreneurs. In this paper, we will focus particularly on two issues: (i) connectivity maintenance among multiple IoRT robots, and (...

  7. Uncovering the Images and Meanings of International Organizations (IOs) in Higher Education Research

    Science.gov (United States)

    Shahjahan, Riyad A.; Madden, Meggan

    2015-01-01

    Employing Stuart Hall's concept of representation, we examine how international organizations (IOs) are presented in the higher education literature. This paper examines how IOs, such as the World Bank, OECD, and UNESCO, are conceptualized and represented by higher education researchers. We focus on three main representations of IOs in the higher…

  8. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  9. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  10. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  11. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  12. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  13. IoT: Tecnologías, usos, tendencias y desarrollo futuro

    OpenAIRE

    Bliznakoff del Valle, David J.

    2015-01-01

    Trabajo de investigación sobre el estado del IoT en el año 2014, previsiones de crecimiento y tecnologías futuras. Treball de recerca sobre l'estat del IoT l'any 2014, previsions de creixement i tecnologies futures. Master thesis for the Telecommunication Technologies program.

  14. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  15. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  16. Collaborative Working Architecture for IoT-Based Applications.

    Science.gov (United States)

    Mora, Higinio; Signes-Pont, María Teresa; Gil, David; Johnsson, Magnus

    2018-05-23

    The new sensing applications need enhanced computing capabilities to handle the requirements of complex and huge data processing. The Internet of Things (IoT) concept brings processing and communication features to devices. In addition, the Cloud Computing paradigm provides resources and infrastructures for performing the computations and outsourcing the work from the IoT devices. This scenario opens new opportunities for designing advanced IoT-based applications, however, there is still much research to be done to properly gear all the systems for working together. This work proposes a collaborative model and an architecture to take advantage of the available computing resources. The resulting architecture involves a novel network design with different levels which combines sensing and processing capabilities based on the Mobile Cloud Computing (MCC) paradigm. An experiment is included to demonstrate that this approach can be used in diverse real applications. The results show the flexibility of the architecture to perform complex computational tasks of advanced applications.

  17. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  18. I/O routing in a multidimensional torus network

    Science.gov (United States)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2018-04-24

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  19. NS Pudarka: A new winter wheat cultivar

    Directory of Open Access Journals (Sweden)

    Hristov Nikola

    2014-01-01

    Full Text Available The high-yielding, medium late winter wheat cultivar NS Pudarka was developed by crossing genetic divergent parents: line NMNH-07 and cv. NS 40S and Simonida. In cultivar NS Pudarka genes responsible for high yield potential, very good technological quality, resistance to lodging, low temperature and diseases, were successfully combined. It was registered by Ministry of agriculture, forestry and water management of Serbia Republic in 2013. This cultivar has wide adaptability and stability of yield that enable growing in different environments with optimal agricultural practice. On the base of technological quality this cultivar belongs to the second quality class, A2 farinograph subgroup and second technological group.

  20. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  1. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  2. Minimizing End-to-End Interference in I/O Stacks Spanning Shared Multi-Level Buffer Caches

    Science.gov (United States)

    Patrick, Christina M.

    2011-01-01

    This thesis presents an end-to-end interference minimizing uniquely designed high performance I/O stack that spans multi-level shared buffer cache hierarchies accessing shared I/O servers to deliver a seamless high performance I/O stack. In this thesis, I show that I can build a superior I/O stack which minimizes the inter-application interference…

  3. Discovery of gaseous S2 in Io's Pele plume.

    Science.gov (United States)

    Spencer, J R; Jessup, K L; McGrath, M A; Ballester, G E; Yelle, R

    2000-05-19

    Spectroscopy of Io's Pele plume against Jupiter by the Hubble Space Telescope in October 1999 revealed absorption due to S2 gas, with a column density of 1.0 +/- 0.2 x 10(16) per square centimeter, and probably also SO(2) gas with a column density of 7 +/- 3 x 10(16) per square centimeter. This SO2/S2 ratio (3 to 12) is expected from equilibration with silicate magmas near the quartz-fayalite-magnetite or wüstite-magnetite buffers. Condensed S3 and S4, probable coloring agents in Pele's red plume deposits, may form by polymerization of the S2, which is unstable to ultraviolet photolysis. Diffuse red deposits near other Io volcanoes suggest that venting and polymerization of S2 gas is a widespread feature of Io volcanism.

  4. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  5. The interactomes of influenza virus NS1 and NS2 proteins identify new host factors and provide insights for ADAR1 playing a supportive role in virus replication.

    Science.gov (United States)

    de Chassey, Benoît; Aublin-Gex, Anne; Ruggieri, Alessia; Meyniel-Schicklin, Laurène; Pradezynski, Fabrine; Davoust, Nathalie; Chantier, Thibault; Tafforeau, Lionel; Mangeot, Philippe-Emmanuel; Ciancia, Claire; Perrin-Cocon, Laure; Bartenschlager, Ralf; André, Patrice; Lotteau, Vincent

    2013-01-01

    Influenza A NS1 and NS2 proteins are encoded by the RNA segment 8 of the viral genome. NS1 is a multifunctional protein and a virulence factor while NS2 is involved in nuclear export of viral ribonucleoprotein complexes. A yeast two-hybrid screening strategy was used to identify host factors supporting NS1 and NS2 functions. More than 560 interactions between 79 cellular proteins and NS1 and NS2 proteins from 9 different influenza virus strains have been identified. These interacting proteins are potentially involved in each step of the infectious process and their contribution to viral replication was tested by RNA interference. Validation of the relevance of these host cell proteins for the viral replication cycle revealed that 7 of the 79 NS1 and/or NS2-interacting proteins positively or negatively controlled virus replication. One of the main factors targeted by NS1 of all virus strains was double-stranded RNA binding domain protein family. In particular, adenosine deaminase acting on RNA 1 (ADAR1) appeared as a pro-viral host factor whose expression is necessary for optimal viral protein synthesis and replication. Surprisingly, ADAR1 also appeared as a pro-viral host factor for dengue virus replication and directly interacted with the viral NS3 protein. ADAR1 editing activity was enhanced by both viruses through dengue virus NS3 and influenza virus NS1 proteins, suggesting a similar virus-host co-evolution.

  6. The interactomes of influenza virus NS1 and NS2 proteins identify new host factors and provide insights for ADAR1 playing a supportive role in virus replication.

    Directory of Open Access Journals (Sweden)

    Benoît de Chassey

    Full Text Available Influenza A NS1 and NS2 proteins are encoded by the RNA segment 8 of the viral genome. NS1 is a multifunctional protein and a virulence factor while NS2 is involved in nuclear export of viral ribonucleoprotein complexes. A yeast two-hybrid screening strategy was used to identify host factors supporting NS1 and NS2 functions. More than 560 interactions between 79 cellular proteins and NS1 and NS2 proteins from 9 different influenza virus strains have been identified. These interacting proteins are potentially involved in each step of the infectious process and their contribution to viral replication was tested by RNA interference. Validation of the relevance of these host cell proteins for the viral replication cycle revealed that 7 of the 79 NS1 and/or NS2-interacting proteins positively or negatively controlled virus replication. One of the main factors targeted by NS1 of all virus strains was double-stranded RNA binding domain protein family. In particular, adenosine deaminase acting on RNA 1 (ADAR1 appeared as a pro-viral host factor whose expression is necessary for optimal viral protein synthesis and replication. Surprisingly, ADAR1 also appeared as a pro-viral host factor for dengue virus replication and directly interacted with the viral NS3 protein. ADAR1 editing activity was enhanced by both viruses through dengue virus NS3 and influenza virus NS1 proteins, suggesting a similar virus-host co-evolution.

  7. Silencing by H-NS potentiated the evolution of Salmonella.

    Directory of Open Access Journals (Sweden)

    Sabrina S Ali

    2014-11-01

    Full Text Available The bacterial H-NS protein silences expression from sequences with higher AT-content than the host genome and is believed to buffer the fitness consequences associated with foreign gene acquisition. Loss of H-NS results in severe growth defects in Salmonella, but the underlying reasons were unclear. An experimental evolution approach was employed to determine which secondary mutations could compensate for the loss of H-NS in Salmonella. Six independently derived S. Typhimurium hns mutant strains were serially passaged for 300 generations prior to whole genome sequencing. Growth rates of all lineages dramatically improved during the course of the experiment. Each of the hns mutant lineages acquired missense mutations in the gene encoding the H-NS paralog StpA encoding a poorly understood H-NS paralog, while 5 of the mutant lineages acquired deletions in the genes encoding the Salmonella Pathogenicity Island-1 (SPI-1 Type 3 secretion system critical to invoke inflammation. We further demonstrate that SPI-1 misregulation is a primary contributor to the decreased fitness in Salmonella hns mutants. Three of the lineages acquired additional loss of function mutations in the PhoPQ virulence regulatory system. Similarly passaged wild type Salmonella lineages did not acquire these mutations. The stpA missense mutations arose in the oligomerization domain and generated proteins that could compensate for the loss of H-NS to varying degrees. StpA variants most able to functionally substitute for H-NS displayed altered DNA binding and oligomerization properties that resembled those of H-NS. These findings indicate that H-NS was central to the evolution of the Salmonellae by buffering the negative fitness consequences caused by the secretion system that is the defining characteristic of the species.

  8. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...

  9. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  10. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  11. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  12. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  13. High-Throughput and Low-Latency Network Communication with NetIO

    Science.gov (United States)

    Schumacher, Jörn; Plessl, Christian; Vandelli, Wainer

    2017-10-01

    HPC network technologies like Infiniband, TrueScale or OmniPath provide low- latency and high-throughput communication between hosts, which makes them attractive options for data-acquisition systems in large-scale high-energy physics experiments. Like HPC networks, DAQ networks are local and include a well specified number of systems. Unfortunately traditional network communication APIs for HPC clusters like MPI or PGAS exclusively target the HPC community and are not suited well for DAQ applications. It is possible to build distributed DAQ applications using low-level system APIs like Infiniband Verbs, but it requires a non-negligible effort and expert knowledge. At the same time, message services like ZeroMQ have gained popularity in the HEP community. They make it possible to build distributed applications with a high-level approach and provide good performance. Unfortunately, their usage usually limits developers to TCP/IP- based networks. While it is possible to operate a TCP/IP stack on top of Infiniband and OmniPath, this approach may not be very efficient compared to a direct use of native APIs. NetIO is a simple, novel asynchronous message service that can operate on Ethernet, Infiniband and similar network fabrics. In this paper the design and implementation of NetIO is presented and described, and its use is evaluated in comparison to other approaches. NetIO supports different high-level programming models and typical workloads of HEP applications. The ATLAS FELIX project [1] successfully uses NetIO as its central communication platform. The architecture of NetIO is described in this paper, including the user-level API and the internal data-flow design. The paper includes a performance evaluation of NetIO including throughput and latency measurements. The performance is compared against the state-of-the- art ZeroMQ message service. Performance measurements are performed in a lab environment with Ethernet and FDR Infiniband networks.

  14. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  15. Surface changes on Io during the Galileo mission

    Science.gov (United States)

    Geissler, P.; McEwen, A.; Phillips, C.; Keszthelyi, L.; Spencer, J.

    2004-01-01

    A careful survey of Galileo SSI global monitoring images revealed more than 80 apparent surface changes that took place on Io during the 5 year period of observation, ranging from giant plume deposits to subtle changes in the color or albedo of Patera surfaces. Explosive volcanic activity was discovered at four previously unrecognized centers: an unnamed patera to the south of Karei that produced a Pele-sized red ring, a patera to the west of Zal that produced a small circular bright deposit, a large orange ring detected near the north pole of Io, and a small bright ring near Io's south pole. Only a handful of Io's many active volcanoes produced large scale explosive eruptions, and several of these erupted repeatedly, leaving at least 83% of Io's surface unaltered throughout the Galileo mission. Most of the hot spots detected from SSI, NIMS and ground-based thermal observations caused no noticeable surface changes greater than 10 km in extent over the five year period. Surface changes were found at every location where active plumes were identified, including Acala which was never seen in sunlight and was only detected through auroral emissions during eclipse. Two types of plumes are distinguished on the basis of the size and color of their deposits, confirming post-Voyager suggestions by McEwen and Soderblom [Icarus 55 (1983) 191]. Smaller plumes produce near-circular rings typically 150-200 km in radius that are white or yellow in color unless contaminated with silicates, and frequently coat their surroundings with frosts of fine-grained SO2. The larger plumes are much less numerous, limited to a half dozen examples, and produce oval, orange or red, sulfur-rich rings with maximum radii in the north-south direction that are typically in the range from 500 to 550 km. Both types of plumes can be either episodic or quasi-continuous over a five year period. Repeated eruptions of the smaller SO2-rich plumes likely contribute significantly to Io's resurfacing rate

  16. Volcanic eruptions on Io: Heat flow, resurfacing, and lava composition

    Science.gov (United States)

    Blaney, Diana L.; Johnson, Torrence V.; Matson, Dennis L.; Veeder, Glenn J.

    1995-01-01

    We model an infrared outburst on Io as being due to a large, erupting lava flow which increased its area at a rate of 1.5 x 10(exp 5)/sq m and cooled from 1225 to 555 K over the 2.583-hr period of observation. The inferred effusion rate of 3 x 10(exp 5) cu m/sec for this eruption is very high, but is not unprece- dented on the Earth and is similar to the high eruption rates suggested for early lunar volcanism. Eruptions occur approxi- mately 6% of the time on Io. These eruptions provide ample resurfacing to explain Io's lack of impact craters. We suggest that the large total radiometric heat flow, 10(exp 14) W, and the size and temperature distribution of the thermal anomalies (McEwen et al. 1992; Veeder et al. 1994) can be accounted for by a series of silicate lava flows in various stages of cooling. We propose that the whole suite of Io's currently observed thermal anomalies was produced by multiple, high-eruptive-rate silicate flows within the past century.

  17. Exploiting Efficient Transpacking for One-Sided Communication and MPI-IO

    Science.gov (United States)

    Mir, Faisal Ghias; Träff, Jesper Larsson

    Based on a construction of socalled input-output datatypes that define a mapping between non-consecutive input and output buffers, we outline an efficient method for copying of structured data. We term this operation transpacking, and show how transpacking can be applied for the MPI implementation of one-sided communication and MPI-IO. For one-sided communication via shared-memory, we demonstrate the expected performance improvements by up to a factor of two. For individual MPI-IO, the time to read or write from file dominates the overall time, but even here efficient transpacking can in some scenarios reduce file I/O time considerably. The reported results have been achieved on a single NEC SX-8 vector node.

  18. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  19. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  20. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  1. Cleavage preference distinguishes the two-component NS2B-NS3 serine proteinases of Dengue and West Nile viruses.

    Science.gov (United States)

    Shiryaev, Sergey A; Kozlov, Igor A; Ratnikov, Boris I; Smith, Jeffrey W; Lebl, Michal; Strongin, Alex Y

    2007-02-01

    Regulated proteolysis of the polyprotein precursor by the NS2B-NS3 protease is required for the propagation of infectious virions. Unless the structural and functional parameters of NS2B-NS3 are precisely determined, an understanding of its functional role and the design of flaviviral inhibitors will be exceedingly difficult. Our objectives were to define the substrate recognition pattern of the NS2B-NS3 protease of West Nile and Dengue virises (WNV and DV respectively). To accomplish our goals, we used an efficient, 96-well plate format, method for the synthesis of 9-mer peptide substrates with the general P4-P3-P2-P1-P1'-P2'-P3'-P4'-Gly structure. The N-terminus and the constant C-terminal Gly of the peptides were tagged with a fluorescent tag and with a biotin tag respectively. The synthesis was followed by the proteolytic cleavage of the synthesized, tagged peptides. Because of the strict requirement for the presence of basic amino acid residues at the P1 and the P2 substrate positions, the analysis of approx. 300 peptide sequences was sufficient for an adequate representation of the cleavage preferences of the WNV and DV proteinases. Our results disclosed the strict substrate specificity of the WNV protease for which the (K/R)(K/R)R/GG amino acid motifs was optimal. The DV protease was less selective and it tolerated well the presence of a number of amino acid residue types at either the P1' or the P2' site, as long as the other position was occupied by a glycine residue. We believe that our data represent a valuable biochemical resource and a solid foundation to support the design of selective substrates and synthetic inhibitors of flaviviral proteinases.

  2. Long Term Monitoring of the Io Plasma Torus During the Galileo Encounter

    Science.gov (United States)

    Brown, Michael E.

    2002-01-01

    In the fall of 1999, the Galileo spacecraft made four passes into the Io plasma torus, obtaining the best in situ measurements ever of the particle and field environment in this densest region of the Jovian magnetosphere. Supporting observations from the ground are vital for understanding the global and temporal context of the in situ observations. We conducted a three-month-long Io plasma torus monitoring campaign centered on the time of the Galileo plasma torus passes to support this aspect of the Galileo mission. The almost-daily plasma density and temperature measurements obtained from our campaign allow the much more sparse but also much more detailed Galileo data to be used to address the issues of the structure of the Io plasma torus, the stability mechanism of the Jovian magnetosphere, the transport of material from the source region near Io, and the nature and source of persistent longitudinal variations. Combining the ground-based monitoring data with the detailed in situ data offers the only possibility for answering some of the most fundamental questions about the nature of the Io plasma torus.

  3. NS&T Management Observations

    Energy Technology Data Exchange (ETDEWEB)

    Gianotto, David [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-09-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  4. Recombinant HCV variants with NS5A from genotypes 1-7 have different sensitivities to an NS5A inhibitor but not interferon-a

    DEFF Research Database (Denmark)

    Scheel, Troels K H; Gottwein, Judith M; Mikkelsen, Lotte S

    2011-01-01

    Heterogeneity in the hepatitis C virus (HCV) protein NS5A influences its sensitivity to interferon-based therapy. Furthermore, NS5A is an important target for development of HCV-specific inhibitors. We aimed to develop recombinant infectious cell culture systems that express NS5A from isolates...

  5. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  6. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  7. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  8. Io After Galileo A New View of Jupiter’s Volcanic Moon

    CERN Document Server

    Lopes, Rosaly M. C

    2007-01-01

    Jupiter’s moon Io is the Solar System’s most exotic satellite. Active volcanism on Io was discovered from observations by the Voyager 1 spacecraft in 1979, confirming a possibility suggested from theoretical studies of Io’s orbit. Our knowledge of Io’s volcanism, composition, and space environment were significantly increased as a result of observations by the Galileo spacecraft from 1996 through 2001. The end of the Galileo mission in 2003 makes this an ideal time to summarize the new results in a book as no book has ever been written about Jupiter’s volcanic moon, Io.

  9. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  10. Design for an IO block array in a tile-based FPGA

    International Nuclear Information System (INIS)

    Ding Guangxin; Chen Lingdou; Liu Zhongli

    2009-01-01

    A design for an IO block array in a tile-based FPGA is presented. Corresponding with the characteristics of the FPGA, each IO cell is composed of a signal path, local routing pool and configurable input/output buffers. Shared programmable registers in the signal path can be configured for the function of JTAG, without specific boundary scan registers/latches, saving layout area. The local routing pool increases the flexibility of routing and the routability of the whole FPGA. An auxiliary power supply is adopted to increase the performance of the IO buffers at different configured IO standards. The organization of the IO block array is described in an architecture description file, from which the array layout can be accomplished through use of an automated layout assembly tool. This design strategy facilitates the design of FPGAs with different capacities or architectures in an FPGA family series. The bond-out schemes of the same FPGA chip in different packages are also considered. The layout is based on SMIC 0.13 μm logic 1P8M salicide 1.2/2.5 V CMOS technology. Our performance is comparable with commercial SRAM-based FPGAs which use a similar process. (semiconductor integrated circuits)

  11. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  12. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  13. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  14. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  15. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  16. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  17. AdiosStMan: Parallelizing Casacore Table Data System using Adaptive IO System

    Science.gov (United States)

    Wang, R.; Harris, C.; Wicenec, A.

    2016-07-01

    In this paper, we investigate the Casacore Table Data System (CTDS) used in the casacore and CASA libraries, and methods to parallelize it. CTDS provides a storage manager plugin mechanism for third-party developers to design and implement their own CTDS storage managers. Having this in mind, we looked into various storage backend techniques that can possibly enable parallel I/O for CTDS by implementing new storage managers. After carrying on benchmarks showing the excellent parallel I/O throughput of the Adaptive IO System (ADIOS), we implemented an ADIOS based parallel CTDS storage manager. We then applied the CASA MSTransform frequency split task to verify the ADIOS Storage Manager. We also ran a series of performance tests to examine the I/O throughput in a massively parallel scenario.

  18. Application of IoT concept on predictive maintenance of industrial equipment

    Directory of Open Access Journals (Sweden)

    Parpala Radu Constantin

    2017-01-01

    Full Text Available The Internet of Things (IoT concept describes an intelligent connectivity of smart devices using the internet network. Nowadays, companies try different approaches for predictive maintenance as a solution to reduce costs and the frequency of maintenance activities. The IoT platforms provide a good support for predictive maintenance as it can integrate information from different machines and manufacturing systems. The main drawback in integrating production system with IoT dedicated platforms is the communication framework, knowing that the main industrial communication protocols are incompatible with modern communication protocols implemented on IoT platforms. In this context, the present paper proposes a new and simple method for on-line monitoring and predictive maintenance of industrial equipment. This method has two features of connected manufacturing. One of these is process monitoring for constant quality assurance, the other one is condition monitoring in order to prevent unplanned downtimes. A case study is presented to demonstrate the feasibility of the proposed method.

  19. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-01-01

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424

  20. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  1. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  2. Comparing the Atmospheric Losses at Io and Europa

    Science.gov (United States)

    Dols, V. J.; Bagenal, F.; Crary, F. J.; Cassidy, T.

    2017-12-01

    At Io and Europa, the interaction of the Jovian plasma with the moon atmosphere leads to a significant loss of atomic/molecular neutrals and ions to space. The processes that lead to atmospheric escape are diverse: atmospheric sputtering, molecular dissociation, molecular ion recombination, Jeans escape etc. Each process leads to neutrals escaping at different velocities (i.e. electron impact dissociation leads to very slow atomic neutrals, sputtering might eject faster molecular neutrals). Some neutrals will be ejected out of the Jovian system; others will form extended neutral clouds along the orbit of the moons. These atomic/molecular extended neutral clouds are probably the main source of plasma for the Jovian magnetosphere. They are difficult to observe directly thus their composition and density are still poorly constrained. A future modeling of the formation of these extended clouds requires an estimate of their atmospheric sources. We estimate the atmospheric losses at Io and Europa for each loss process with a multi-species chemistry model, using a prescribed atmospheric distribution consistent with the observations. We compare the neutral losses at Io and Europa.

  3. Predictors of outcome in residential cognitive and interpersonal treatment for social phobia: do cognitive and social dysfunction moderate treatment outcome?

    Science.gov (United States)

    Borge, Finn-Magnus; Hoffart, Asle; Sexton, Harold

    2010-09-01

    The predictors of residential cognitive (RCT) and residential interpersonal Treatment (RIPT) for social phobia were explored. (1) Sotsky et al. (1991) found differential effects of CT and IPT for depression, suggesting that the level of cognitive or social dysfunction predicted differential outcome. We examined whether an analogous effect could be demonstrated in 10 weeks of residential treatment of 80 social phobia subjects. (2) We also included expectations, age of onset, severity of illness, concurrent anxiety, mood, avoidant personality disorder, and body dysmorphic disorder as predictors in this exploratory study. Main outcome was the social phobia subscale of Social Phobia and Anxiety Inventory (SPAI SP). DSM-IV axis I and II interviews were completed. (1) Sotsky et al. (1991) findings were not reproduced. However, RIPT subjects with poor general functioning were less improved following treatment. Subjects with concurrent agoraphobia responded better with RCT than subjects without agoraphobia. (2) Age of onset and expectations were the most powerful predictors of post treatment outcome. Some patient characteristics appear to impact outcome with RIPT and RCT differentially. The findings are discussed. (c) 2010 Elsevier Ltd. All rights reserved.

  4. Out of core, out of mind: Practical parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Womble, D.E.; Greenberg, D.S.; Riesen, R.E.; Wheat, S.R.

    1993-11-01

    Parallel computers are becoming more powerful and more complex in response to the demand for computing power by scientists and engineers. Inevitably, new and more complex I/O systems will be developed for these systems. In particular we believe that the I/O system must provide the programmer with the ability to explcitly manage storage (despite the trend toward complex parallel file systems and caching schemes). One method of doing so is to have a partitioned secondary storage in which each processor owns a logical disk. Along with operating system enhancements which allow overheads such as buffer copying to be avoided and libraries to support optimal remapping of data, this sort of I/O system meets the needs of high performance computing.

  5. Proof of Concept of Home IoT Connected Vehicles

    OpenAIRE

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the con...

  6. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  7. Security Framework for the Web of IoT Platforms

    OpenAIRE

    Atarah, Ivan Akoribila

    2017-01-01

    Connected devices of IoT platforms are known to produce, process and exchange vast amounts of data, most of it sensitive or personal, that need to be protected. However, achieving minimal data protection requirements such as confidentiality, integrity, availability and non-repudiation in IoT platforms is a non-trivial issue. For one reason, the trillions of interacting devices provide larger attack surfaces. Secondly, high levels of personal and private data sharing in this ubiquitous and het...

  8. Role of nonstructural protein NS2A in flavivirus assembly

    NARCIS (Netherlands)

    Leung, J.Y.; Pijlman, G.P.; Kondratieva, N.; Hyde, J.; Mackenzie, J.M.; Khromykh, A.A.

    2008-01-01

    Flavivirus nonstructural (NS) proteins are involved in RNA replication and modulation of the host antiviral response; however, evidence is mounting that some NS proteins also have essential roles in virus assembly. Kunjin virus (KUN) NS2A is a small, hydrophobic, transmembrane protein that is part

  9. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  10. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  11. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    OpenAIRE

    Bako Ali; Ali Ismail Awad

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in te...

  12. Towards an MDD Based Framework for Self Adaptive IoT Applications Development

    OpenAIRE

    Abuseta, Yousef

    2018-01-01

    As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising...

  13. Io Pele plume

    Science.gov (United States)

    2000-01-01

    Voyager 1 took this narrow-angle camera image on 5 March 1979 from a distance of 450,000 kilometers. At this geometry, the camera looks straight down through a volcanic plume at one of Io's most active volcanos, Pele. The large heart-shaped feature is the region where Pele's plume falls to the surface. At the center of the 'heart' is the small dark fissure that is the source of the eruption. The Voyager Project is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science.

  14. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  15. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  16. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  17. Mountains on Io: High-resolution Galileo observations, initial interpretations, and formation models

    Science.gov (United States)

    Turtle, E.P.; Jaeger, W.L.; Keszthelyi, L.P.; McEwen, A.S.; Milazzo, M.; Moore, J.; Phillips, C.B.; Radebaugh, J.; Simonelli, D.; Chuang, F.; Schuster, P.; Alexander, D.D.A.; Capraro, K.; Chang, S.-H.; Chen, A.C.; Clark, J.; Conner, D.L.; Culver, A.; Handley, T.H.; Jensen, D.N.; Knight, D.D.; LaVoie, S.K.; McAuley, M.; Mego, V.; Montoya, O.; Mortensen, H.B.; Noland, S.J.; Patel, R.R.; Pauro, T.M.; Stanley, C.L.; Steinwand, D.J.; Thaller, T.F.; Woncik, P.J.; Yagi, G.M.; Yoshimizu, J.R.; Alvarez Del Castillo, E.M.; Beyer, R.; Branston, D.; Fishburn, M.B.; Muller, Birgit; Ragan, R.; Samarasinha, N.; Anger, C.D.; Cunningham, C.; Little, B.; Arriola, S.; Carr, M.H.; Asphaug, E.; Morrison, D.; Rages, K.; Banfield, D.; Bell, M.; Burns, J.A.; Carcich, B.; Clark, B.; Currier, N.; Dauber, I.; Gierasch, P.J.; Helfenstein, P.; Mann, M.; Othman, O.; Rossier, L.; Solomon, N.; Sullivan, R.; Thomas, P.C.; Veverka, J.; Becker, T.; Edwards, K.; Gaddis, L.; Kirk, R.; Lee, E.; Rosanova, T.; Sucharski, R.M.; Beebe, R.F.; Simon, A.; Belton, M.J.S.; Bender, K.; Fagents, S.; Figueredo, P.; Greeley, R.; Homan, K.; Kadel, S.; Kerr, J.; Klemaszewski, J.; Lo, E.; Schwarz, W.; Williams, D.; Williams, K.; Bierhaus, B.; Brooks, S.; Chapman, C.R.; Merline, B.; Keller, J.; Tamblyn, P.; Bouchez, A.; Dyundian, U.; Ingersoll, A.P.; Showman, A.; Spitale, J.; Stewart, S.; Vasavada, A.; Breneman, H.H.; Cunningham, W.F.; Johnson, T.V.; Jones, T.J.; Kaufman, J.M.; Klaasen, K.P.; Levanas, G.; Magee, K.P.; Meredith, M.K.; Orton, G.S.; Senske, D.A.; West, A.; Winther, D.; Collins, G.; Fripp, W.J.; Head, J. W.; Pappalardo, R.; Pratt, S.; Prockter, L.; Spaun, N.; Colvin, T.; Davies, M.; DeJong, E.M.; Hall, J.; Suzuki, S.; Gorjian, Z.; Denk, T.; Giese, B.; Koehler, U.; Neukum, G.; Oberst, J.; Roatsch, T.; Tost, W.; Wagner, R.; Dieter, N.; Durda, D.; Geissler, P.; Greenberg, R.J.; Hoppa, G.; Plassman, J.; Tufts, R.; Fanale, F.P.; Granahan, J.C.

    2001-01-01

    During three close flybys in late 1999 and early 2000 the Galileo spacecraft ac-quired new observations of the mountains that tower above Io's surface. These images have revealed surprising variety in the mountains' morphologies. They range from jagged peaks several kilometers high to lower, rounded structures. Some are very smooth, others are covered by numerous parallel ridges. Many mountains have margins that are collapsing outward in large landslides or series of slump blocks, but a few have steep, scalloped scarps. From these observations we can gain insight into the structure and material properties of Io's crust as well as into the erosional processes acting on Io. We have also investigated formation mechanisms proposed for these structures using finite-element analysis. Mountain formation might be initiated by global compression due to the high rate of global subsidence associated with Io's high resurfacing rate; however, our models demonstrate that this hypothesis lacks a mechanism for isolating the mountains. The large fraction (???40%) of mountains that are associated with paterae suggests that in some cases these features are tectonically related. Therefore we have also simulated the stresses induced in Io's crust by a combination of a thermal upwelling in the mantle with global lithospheric compression and have shown that this can focus compressional stresses. If this mechanism is responsible for some of Io's mountains, it could also explain the common association of mountains with paterae. Copyright 2001 by the American Geophysical Union.

  18. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.

    Science.gov (United States)

    Hung, Chung-Wen; Hsu, Wen-Ting

    2018-05-23

    Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices. In this paper, the power consumption and cryptographic calculation requirement for different payload lengths and AES encryption types are analyzed. These types include software-based AES-CB, hardware-based AES-ECB (Electronic Codebook Mode), and hardware-based AES-CCM (Counter with CBC-MAC Mode). The calculation requirement and power consumption for these AES encryption types are measured on the Texas Instruments LAUNCHXL-CC1310 platform. The experimental results show that the hardware-based AES performs better than the software-based AES in terms of power consumption and calculation cycle requirements. In addition, in terms of AES mode selection, the AES-CCM-MIC64 mode may be a better choice if the IoT device is considering security, encryption calculation requirement, and low power consumption at the same time. However, if the IoT device is pursuing lower power and the payload length is generally less than 16 bytes, then AES-ECB could be considered.

  19. Dengue Virus NS2B/NS3 Protease Inhibitors Exploiting the Prime Side.

    Science.gov (United States)

    Lin, Kuan-Hung; Ali, Akbar; Rusere, Linah; Soumana, Djade I; Kurt Yilmaz, Nese; Schiffer, Celia A

    2017-05-15

    The mosquito-transmitted dengue virus (DENV) infects millions of people in tropical and subtropical regions. Maturation of DENV particles requires proper cleavage of the viral polyprotein, including processing of 8 of the 13 substrate cleavage sites by dengue virus NS2B/NS3 protease. With no available direct-acting antiviral targeting DENV, NS2/NS3 protease is a promising target for inhibitor design. Current design efforts focus on the nonprime side of the DENV protease active site, resulting in highly hydrophilic and nonspecific scaffolds. However, the prime side also significantly modulates DENV protease binding affinity, as revealed by engineering the binding loop of aprotinin, a small protein with high affinity for DENV protease. In this study, we designed a series of cyclic peptides interacting with both sides of the active site as inhibitors of dengue virus protease. The design was based on two aprotinin loops and aimed to leverage both key specific interactions of substrate sequences and the entropic advantage driving aprotinin's high affinity. By optimizing the cyclization linker, length, and amino acid sequence, the tightest cyclic peptide achieved a K i value of 2.9 μM against DENV3 wild-type (WT) protease. These inhibitors provide proof of concept that both sides of DENV protease active site can be exploited to potentially achieve specificity and lower hydrophilicity in the design of inhibitors targeting DENV. IMPORTANCE Viruses of the flaviviral family, including DENV and Zika virus transmitted by Aedes aegypti , continue to be a threat to global health by causing major outbreaks in tropical and subtropical regions, with no available direct-acting antivirals for treatment. A better understanding of the molecular requirements for the design of potent and specific inhibitors against flaviviral proteins will contribute to the development of targeted therapies for infections by these viruses. The cyclic peptides reported here as DENV protease inhibitors

  20. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  1. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  2. Identification of radio emission from the Io flux tube

    International Nuclear Information System (INIS)

    Riddle, A.C.

    1983-01-01

    Many theories and observations suggest that Jovian decametric radio emission is generated in flux tubes that pass close to Io's orbit. However, comparison of theory and observation is hindered by lack of knowledge as to which specific flux tube is responsible for a particular emission. In this note, emission from the instantaneous Io flux tube is identified. This makes possible a mapping of emissions onto the causative flux tubes for a significant range of Jovian longitudes (240 0 --360 0 )

  3. Thermal Remote Sensing of Lava Lakes on Io and Earth (Invited)

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.; McEwen, A. S.

    2013-12-01

    Volcanology has been transformed by remote sensing. For decades, Earth's volcanoes have been studied in the infrared by a wide variety of instruments on spacecraft at widely varying spectral, spatial and temporal resolutions, for which techniques have been developed to interpret and understand ongoing volcanic eruptions. The study of volcanism on Io, the only Solar System body besides Earth known to have ongoing, high temperature, silicate-based effusive and explosive volcanic eruptions, requires new remote sensing techniques. The extraordinary volcanism allows us to examine Io's interior and composition from the material erupted onto the surface. For Io, the biggest question in the wake of NASA's Galileo mission concerns the eruption temperature of Io's dominant silicate lavas [1,2]. Constraining eruption temperature constrains magma composition, in turn a reflection of the composition, physical state and tidal heating within Io. However, the extraction of lava eruption temperature from remote sensing data is difficult. Detector saturation is likely except when the hot material fills a tiny fraction of a resolution element, unless instruments are designed for this objective. High temperature lava surfaces cool rapidly, so remote observations can miss the peak temperature. Observations at different wavelengths must be acquired nearly simultaneously to derive accurate temperatures of very hot and dynamic sources [3]. Uncertainties regarding hot lava emissivity [4] also reduce the confidence in derived temperatures. From studying thermal emission data from different styles of volcanic activity on Earth by remote sensing in conjunction with contemporaneous observations on the ground, it is found that only certain styles of volcanic activity are suitable for deriving liquid lava temperatures [3]. Active lava lakes are particularly useful, especially during a phase of lava fountaining. Examination and analysis of FLIR data obtained at the Erta'Ale (Ethiopia) basaltic

  4. Investment Opportunity Set (IOS Berbasis Pertumbuhan Perusahaan dan Kaitannya Dengan Upaya Peningkatan Nilai Perusahaan

    Directory of Open Access Journals (Sweden)

    Eka Handriani

    2016-06-01

    Full Text Available This research aims to develop theoretical approach to complete the conceptual controversy regarding the research results on the investment policy and firm value. This research employs firm value, investment opportunity set (IOS, funding and dividend as variables. Dividends in the research proxied by dividend pay out ratio (DPR, funding proxied by DER and firm value indicated by Tobin’s q, which are mediated by IOS. The sample are taken from 154 manufacturing company financial statements during 2010 to 2012. The data were tested using path analysis. The research found that dividend and funding policy positively influence IOS. Investment opportunity (IOS positively influences the firm value. IOS was able to mediate the effect of dividends to the firm value, and also the influence of funding decisions to firm value.

  5. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  6. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  7. A conformational switch high-throughput screening assay and allosteric inhibition of the flavivirus NS2B-NS3 protease.

    Directory of Open Access Journals (Sweden)

    Matthew Brecher

    2017-05-01

    Full Text Available The flavivirus genome encodes a single polyprotein precursor requiring multiple cleavages by host and viral proteases in order to produce the individual proteins that constitute an infectious virion. Previous studies have revealed that the NS2B cofactor of the viral NS2B-NS3 heterocomplex protease displays a conformational dynamic between active and inactive states. Here, we developed a conformational switch assay based on split luciferase complementation (SLC to monitor the conformational change of NS2B and to characterize candidate allosteric inhibitors. Binding of an active-site inhibitor to the protease resulted in a conformational change of NS2B and led to significant SLC enhancement. Mutagenesis of key residues at an allosteric site abolished this induced conformational change and SLC enhancement. We also performed a virtual screen of NCI library compounds to identify allosteric inhibitors, followed by in vitro biochemical screening of the resultant candidates. Only three of these compounds, NSC135618, 260594, and 146771, significantly inhibited the protease of Dengue virus 2 (DENV2 in vitro, with IC50 values of 1.8 μM, 11.4 μM, and 4.8 μM, respectively. Among the three compounds, only NSC135618 significantly suppressed the SLC enhancement triggered by binding of active-site inhibitor in a dose-dependent manner, indicating that it inhibits the conformational change of NS2B. Results from virus titer reduction assays revealed that NSC135618 is a broad spectrum flavivirus protease inhibitor, and can significantly reduce titers of DENV2, Zika virus (ZIKV, West Nile virus (WNV, and Yellow fever virus (YFV on A549 cells in vivo, with EC50 values in low micromolar range. In contrast, the cytotoxicity of NSC135618 is only moderate with CC50 of 48.8 μM on A549 cells. Moreover, NSC135618 inhibited ZIKV in human placental and neural progenitor cells relevant to ZIKV pathogenesis. Results from binding, kinetics, Western blot, mass spectrometry and

  8. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  9. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  10. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  11. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  12. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  13. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  14. Modifying Cement Hydration with NS@PCE Core-Shell Nanoparticles

    Directory of Open Access Journals (Sweden)

    Yue Gu

    2017-01-01

    Full Text Available It is generally accepted that fine particles could accelerate cement hydration process, or, more specifically, this accelerating effect can be attributed to additional surface area introduced by fine particles. In addition to this view, the surface state of fine particles is also an important factor, especially for nanoparticles. In the previous study, a series of nano-SiO2-polycarboxylate superplasticizer core-shell nanoparticles (NS@PCE were synthesized, which have a similar particle size distribution but different surface properties. In this study, the impact of NS@PCE on cement hydration was investigated by heat flow calorimetry, mechanical property measurement, XRD, and SEM. Results show that, among a series of NS@PCE, NS@PCE-2 with a moderate shell-core ratio appeared to be more effective in accelerating cement hydration. As dosage increases, the efficiency of NS@PCE-2 would reach a plateau which is quantified by various characteristic values. Compressive strength results indicate that strength has a linear correlation with cumulative heat release. A hypothesis was proposed to explain the modification effect of NS@PCE, which highlights a balance between initial dispersion and pozzolanic reactivity. This paper provides a new understanding for the surface modification of supplementary cementitious materials and their application and also sheds a new light on nano-SiO2 for optimizing cement-based materials.

  15. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...... standby power compared to bidirectional IO Standard based Video PHY controller. It is defined that for 6 GHz operated frequency Video PHY controller, the 32% total on-chip power is reduced using unidirectional IO Standard based Video PHY controller is less compared to bidirectional IO Standard based Video...

  16. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  17. Hotspots on Io During the Ganymede 2 Encounter

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 6 September 1996. This image shows, on the right, Io as seen by NIMS, centered on 150 W longitude. The image on the left shows the same view point from Voyager data (from the encounters in 1979 and 1980). The NIMS image can be compared to the NIMS hotspot image from the G1 orbit (June 1996) to monitor changes on Io. The most dramatic feature of the G2 image is the hotspot at Malik Patera. Preliminary analysis of the data yields a temperature of at least 1000 K (727 C) for this hotspot, an increase of more than 300 K from the G1 encounter. In the overlap area of the G1 and G2 images all the hotspots seen during the G1 encounter are also seen in the G2 image. Other hotspots were seen, including one at the Pele plume origin site. This image is at the 4 micron band to best view the Malik hotspot. Most of the other hotspots are best seen at longer wavelengths. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  18. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  19. Synthesis, crystal structure and optical properties of two new layered cadmium iodates: Cd(IO3)X (X=Cl, OH)

    International Nuclear Information System (INIS)

    Yang, Bing-Ping; Mao, Jiang-Gao

    2014-01-01

    Systematic explorations of new compounds in the cadmium iodate system by hydrothermal reactions led to two layered iodates, namely, Cd(IO 3 )X (X=Cl, OH). Cd(IO 3 )Cl crystallizes in the orthorhombic space group Cmca (No. 64) whereas Cd(IO 3 )(OH) crystallizes in the orthorhombic space group Pnma (No. 62). Cd(IO 3 )Cl displays a unique double layered structure composed of 1 ∞ [Cd−O 3 Cl] n chains. Cadmium octahedrons form a 1D chain along the a-axis through edge sharing, and such chains are further interconnected via IO 3 groups to form a special double layer on (020) plane. Cd(IO 3 )(OH) also exhibits a layered structure that is composed of cadmium cations, IO 3 groups and hydroxyl ions. Within a layer, chains of CdO 6 edge-shared octahedra are observed along the b-axis. And these chains are connected by IO 3 groups into a layer parallel to the bc plane. Spectroscopic characterizations, elemental analysis, and thermogravimetric analysis for the reported two compounds are also presented. - Graphical abstract: Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. Cd(IO 3 )Cl features a unique double layered structure whereas Cd(IO 3 )(OH) displays an ordinary layered structure. - Highlights: • Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. • Cd(IO 3 )Cl features a unique double layered structure. • Cd(IO 3 )(OH) displays an ordinary layered structure. • The spectroscopic and thermal properties have been studied in detail

  20. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  1. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  2. BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2016-12-01

    Full Text Available Recently, the rapid advancement in technologies of modern intelligent objects has led to a new network paradigm, called the Internet of Things (IoT, in which every networked and automated object has been connected in a pervasive manner. New types of IoT-based application services are thus presented. In a healthcare oriented environment, the usage of IoT has brought opportunities for assisting physicians (or nurses to provide on-demand and real-time body-care services to patients with higher accuracy and better efficiency. However, while IoT-oriented techniques deliver such advantages, they may encounter system security vulnerabilities and patient privacy threats not seen in the past. In this paper, we propose a robust IoT-based healthcare system, called BSNCare+, in which body sensor networks (BSNs are adopted as the underlying communication architecture. In the proposed healthcare system, we exploit lightweight crypto-primitives to construct a secure communication mechanism that does achieve data confidentiality and entity authentication among intelligent body sensors, the mobile gateway and the backend BSN-Care server. In addition, we evaluate the performance of the proposed healthcare system using the Raspberry PI series platform. The results show the practicability and feasibility of BSNCare+.

  3. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  4. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  5. Infection of Common Marmosets with GB Virus B Chimeric Virus Encoding the Major Nonstructural Proteins NS2 to NS4A of Hepatitis C Virus.

    Science.gov (United States)

    Zhu, Shaomei; Li, Tingting; Liu, Bochao; Xu, Yuxia; Sun, Yachun; Wang, Yilin; Wang, Yuanzhan; Shuai, Lifang; Chen, Zixuan; Allain, Jean-Pierre; Li, Chengyao

    2016-09-15

    A lack of immunocompetent-small-primate models has been an obstacle for developing hepatitis C virus (HCV) vaccines and affordable antiviral drugs. In this study, HCV/GB virus B (GBV-B) chimeric virus carrying the major nonstructural proteins NS2 to NS4A (HCV NS2 to -4A chimera) was produced and used to infect common marmosets, since HCV NS2 to NS4A proteins are critical proteases and major antigens. Seven marmosets were inoculated intrahepatically with HCV NS2 to -4A chimera RNA for primary infection or intravenously injected with chimera-containing serum for passage infection. Three animals used as controls were injected with phosphate-buffered saline (PBS) or GBV-B, respectively. Six of seven HCV NS2 to -4A chimera-infected marmosets exhibited consistent viremia and one showed transient viremia during the course of follow-up detection. All six infected animals with persistent circulating viremia presented characteristics typical of viral hepatitis, including viral RNA and proteins in hepatocytes and histopathological changes in liver tissue. Viremia was consistently detected for 5 to 54 weeks of follow-up. FK506 immunosuppression facilitated the establishment of persistent chimera infection in marmosets. An animal with chimera infection spontaneously cleared the virus in blood 7 weeks following the first inoculation, but viral-RNA persistence, low-level viral protein, and mild necroinflammation remained in liver tissue. The specific antibody and T-cell response to HCV NS3 in this viremia-resolved marmoset was boosted by rechallenging, but no viremia was detected during 57 weeks of follow-up. The chimera-infected marmosets described can be used as a suitable small-primate animal model for studying novel antiviral drugs and T-cell-based vaccines against HCV infection. HCV infection causes approximately 70% of chronic hepatitis and is frequently associated with primary liver cancer globally. Chimpanzees have been used as a reliable primate model for HCV infection

  6. Dengue NS1 Antigen - for Early Detection of Dengue Virus Infection

    Directory of Open Access Journals (Sweden)

    Amol Hartalkar

    2015-08-01

    Full Text Available Objectives: To evaluate the efficacy of NS1 antigen assay for early diagnosis of dengue virus infection in a tertiary care hospital. Methods: This cross sectional study was carried out in department of Medicine from August to December 2013. Total 100 patients with dengue fever were included. Complete blood count, alanine aminotransferase (ALT, aspartate aminotransferase (AST, Dengue NS1 antigen and IgM and IgG antibodies of dengue virus were done in all cases. Results: Of the 100 sera tested, 75% were positive for dengue virus infection based on dengue NS1 antigen, IgM antibody and IgG antibody. Dengue NS1 antigen and IgM, IgG antibody were able to detect dengue virus infection between day 1 to day 8 in 92% of samples, 86.7% of samples and 82.6% of samples respectively. Sixty nine percent (69% were found positive for dengue NS1 antigen, 65% were IgM positive and 62% were IgG positive. Based on the dengue NS1 antigen and IgM antibody combination, 74% were positive for dengue virus infections. Sensitivity of Dengue NS1 antigen was 92.3% and specificity of 74.28% in comparison to IgM antibody. Detection rate increased to 75%, based on the antigen and IgG antibody combination. Sensitivity of dengue NS1 antigen was 90.3% and specificity of 65.8% in comparison to IgG antibody. Conclusion: Dengue NS1 antigen is a useful, sensitive and specific test for early diagnosis of dengue virus infection and it improves diagnostic efficiency in combination with antibody test. Key words: Dengue fever, NS1 antigen. Introduction: Dengue fever (DF is the most common arboviral illness in humans. Each year, an estimated 50-100 million cases of dengue fever and 500,000 cases of dengue hemorrhagic fever occur worldwide, with 30000 deaths (mainly in children. Globally 2.5-3 billion people in approximately 112 tropical and subtropical countries are at risk of dengue.of samples respectively. Sixty nine percent (69% were found positive for dengue NS1 antigen, 65% were Ig

  7. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  8. Extreme Worlds of the Outer Solar System: Dynamic Processes on Uranus & Io

    Science.gov (United States)

    Kleer, Katherine Rebecca de

    A central goal of planetary science is the creation of a framework within which the properties of each solar system body can be understood as the product of initial conditions acted on by fundamental physical processes. The solar system's extreme worlds -- those objects that lie at the far ends of the spectrum in terms of planetary environment -- bring to light our misconceptions and present us with opportunities to expand and generalize this framework. Unraveling the processes at work in diverse planetary environments contextualizes our understanding of Earth, and provides a basis for interpreting specific signatures from planets beyond our own solar system. Uranus and Io, with their unusual planetary environments, present two examples of such worlds in the outer solar system. Uranus, one of the outer solar system's ice giants, produces an anomalously low heat flow and orbits the sun on its side. Its relative lack of bright storm features and its bizarre multi-decadal seasons provide insight into the relative effects of internal heat flow and time- varying solar insolation on atmospheric dynamics, while its narrow rings composed of dark, macroscopic particles encode the history of bombardment and satellite disruption within the system. Jupiter's moon Io hosts the most extreme volcanic activity anywhere in the solar system. Its tidally-powered geological activity provides a window into this satellite's interior, permitting rare and valuable investigations into the exchange of heat and materials between interiors and surfaces. In particular, Io provides a laboratory for studying the process of tidal heating, which shapes planets and satellites in our solar system and beyond. A comparison between Earth and Io contextualizes the volcanism at work on our home planet, revealing the effects of planetary size, atmospheric density, and plate tectonics on the style and mechanisms of geological activity. This dissertation investigates the processes at work on these solar

  9. Lemon : An MPI parallel I/O library for data encapsulation using LIME

    NARCIS (Netherlands)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message

  10. NS Otto Hahn

    International Nuclear Information System (INIS)

    Schafstall, H.G.

    1983-01-01

    For the bulk cargo ship had been chosen the advanced PWR, the secial characteristic of which is an integrated primary loop with automatic pressurisation. Altogether the Otto Hahn covered over half a million sea-miles. In-service inspections and examinations of the reactor plant were effected by control authorities every year. During the whole operating period the NS Otto Hahn showed a safe and reliable behaviour even from the view of radiation protection. (DG) [de

  11. Aplikasi Rekomendasi Pola Makan Berbasis iOS

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2012-12-01

    Full Text Available The goal for implementing this system is to help users manage and track history about their eat pattern, choose proper food for body’s need, and pick restaurants. Methodology used for this research contains three parts, which is analysis, design, and literature study. In requirement analysis, we do some interview withnutritionist and food provider, analysis iOS user, compare with same kind of application, and identify components that we need. In design method, we use Unified Modelling Language approach, ERD design, and user interface design. The result is a food planning mobile application with iOS platform. This application canhelp user manage and track their eat pattern, help user choose balanced food that suitable for their body, and inform user where they can get food they plan to eat.

  12. Classification of Volcanic Eruptions on Io and Earth Using Low-Resolution Remote Sensing Data

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.

    2005-01-01

    Two bodies in the Solar System exhibit high-temperature active volcanism: Earth and Io. While there are important differences in the eruptions on Earth and Io, in low-spatial-resolution data (corresponding to the bulk of available and foreseeable data of Io), similar styles of effusive and explosive volcanism yield similar thermal flux densities. For example, a square metre of an active pahoehoe flow on Io looks very similar to a square metre of an active pahoehoe flow on Earth. If, from observed thermal emission as a function of wavelength and change in thermal emission with time, the eruption style of an ionian volcano can be constrained, estimates of volumetric fluxes can be made and compared with terrestrial volcanoes using techniques derived for analysing terrestrial remotely-sensed data. In this way we find that ionian volcanoes fundamentally differ from their terrestrial counterparts only in areal extent, with Io volcanoes covering larger areas, with higher volumetric flux. Io outbursts eruptions have enormous implied volumetric fluxes, and may scale with terrestrial flood basalt eruptions. Even with the low-spatial resolution data available it is possible to sometimes constrain and classify eruption style both on Io and Earth from the integrated thermal emission spectrum. Plotting 2 and 5 m fluxes reveals the evolution of individual eruptions of different styles, as well as the relative intensity of eruptions, allowing comparison to be made from individual eruptions on both planets. Analyses like this can be used for interpretation of low-resolution data until the next mission to the jovian system. For a number of Io volcanoes (including Pele, Prometheus, Amirani, Zamama, Culann, Tohil and Tvashtar) we do have high/moderate resolution imagery to aid determination of eruption mode from analyses based only on low spatial-resolution data.

  13. Efficient hepatitis c virus genotype 1b core-NS5A recombinants permit efficacy testing of protease and NS5A inhibitors

    DEFF Research Database (Denmark)

    Pham, Long V.; Ramirez Almeida, Santseharay; Carlsen, Thomas H R

    2017-01-01

    Hepatitis C virus (HCV) strains belong to seven genotypes with numerous subtypes that respond differently to antiviral therapies. Genotype 1, and primarily subtype 1b, is the most prevalent genotype worldwide. The development of recombinant HCV infectious cell culture systems for different variants......, permitted by the high replication capacity of strain JFH1 (genotype 2a), has advanced efficacy and resistance testing of antivirals. However, efficient infectious JFH1-based cell cultures of subtype 1b are limited and comprise only the 5= untranslated region (5=UTR)-NS2, NS4A, or NS5A regions. Importantly...

  14. Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  15. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  16. The final Galileo SSI observations of Io: Orbits G28-I33

    Science.gov (United States)

    Turtle, E.P.; Keszthelyi, L.P.; McEwen, A.S.; Radebaugh, J.; Milazzo, M.; Simonelli, D.P.; Geissler, P.; Williams, D.A.; Perry, J.; Jaeger, W.L.; Klaasen, K.P.; Breneman, H.H.; Denk, T.; Phillips, C.B.

    2004-01-01

    We present the observations of Io acquired by the Solid State Imaging (SSI) experiment during the Galileo Millennium Mission (GMM) and the strategy we used to plan the exploration of Io. Despite Galileo's tight restrictions on data volume and downlink capability and several spacecraft and camera anomalies due to the intense radiation close to Jupiter, there were many successful SSI observations during GMM. Four giant, high-latitude plumes, including the largest plume ever observed on Io, were documented over a period of eight months; only faint evidence of such plumes had been seen since the Voyager 2 encounter, despite monitoring by Galileo during the previous five years. Moreover, the source of one of the plumes was Tvashtar Catena, demonstrating that a single site can exhibit remarkably diverse eruption styles - from a curtain of lava fountains, to extensive surface flows, and finally a ??? 400 km high plume - over a relatively short period of time (??? 13 months between orbits 125 and G29). Despite this substantial activity, no evidence of any truly new volcanic center was seen during the six years of Galileo observations. The recent observations also revealed details of mass wasting processes acting on Io. Slumping and landsliding dominate and occur in close proximity to each other, demonstrating spatial variation in material properties over distances of several kilometers. However, despite the ubiquitous evidence for mass wasting, the rate of volcanic resurfacing seems to dominate; the floors of paterae in proximity to mountains are generally free of debris. Finally, the highest resolution observations obtained during Galileo's final encounters with Io provided further evidence for a wide diversity of surface processes at work on Io. ?? 2003 Elsevier Inc. All rights reserved.

  17. Evolutionary dynamics of hepatitis C virus NS3 protease domain during and following treatment with narlaprevir, a potent NS3 protease inhibitor

    NARCIS (Netherlands)

    de Bruijne, J.; Thomas, X. V.; Rebers, S. P.; Weegink, C. J.; Treitel, M. A.; Hughes, E.; Bergmann, J. F.; de Knegt, R. J.; Janssen, H. L. A.; Reesink, H. W.; Molenkamp, R.; Schinkel, J.

    2013-01-01

    Narlaprevir, a hepatitis C virus (HCV) NS3/4A serine protease inhibitor, has demonstrated robust antiviral activity in a placebo-controlled phase 1 study. To study evolutionary dynamics of resistant variants, the NS3 protease sequence was clonally analysed in thirty-two HCV genotype 1-infected

  18. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  19. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.

    Science.gov (United States)

    Ma, Xiao; Lin, Chuang; Zhang, Han; Liu, Jianwei

    2018-06-15

    Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.

  20. SSTL I/O Standard Based Arithmetic Circuits Design on FPGA

    DEFF Research Database (Denmark)

    Goswami, Kavita; Pandey, Bishwajeet; Hussain, Dil muhammed Akbar

    2016-01-01

    -Tiryagbhyam”. SSTL135_R is minimum I/O power consumer. SSTL135_DCI is maximum power consumer. When we use SSTL135_R in place of SSTL12, SSTL12_DCI, SSTL15, and SSTL135_DCI, there is 42.5%, 82.7%, 28.12%, and 72.9% reduction in I/O power at 21oC, 40oC, 53.5oC and 56.7oC. This design is implemented on Artix-7 FPGA...

  1. Case Study: IoT Data Integration for Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Pinka Krišjānis

    2016-12-01

    Full Text Available Nowadays the Internet of Things (IoT is one of the most trending technologies. It is expected that by year 2020 there will be 50 billion of Internet-connected devices. Fields like smart cities and smart homes largely rely on IoT phenomena by using a wide variety of sensors for data collection, analysis and corresponding actions. The paper describes how this trending and relatively new technology is applied at Riga Technical University for educational purposes.

  2. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  3. Hepatitis C Virus NS3 Inhibitors: Current and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Kazi Abdus Salam

    2013-01-01

    Full Text Available Currently, hepatitis C virus (HCV infection is considered a serious health-care problem all over the world. A good number of direct-acting antivirals (DAAs against HCV infection are in clinical progress including NS3-4A protease inhibitors, RNA-dependent RNA polymerase inhibitors, and NS5A inhibitors as well as host targeted inhibitors. Two NS3-4A protease inhibitors (telaprevir and boceprevir have been recently approved for the treatment of hepatitis C in combination with standard of care (pegylated interferon plus ribavirin. The new therapy has significantly improved sustained virologic response (SVR; however, the adverse effects associated with this therapy are still the main concern. In addition to the emergence of viral resistance, other targets must be continually developed. One such underdeveloped target is the helicase portion of the HCV NS3 protein. This review article summarizes our current understanding of HCV treatment, particularly with those of NS3 inhibitors.

  4. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  5. mIoT Slice for 5G Systems: Design and Performance Evaluation.

    Science.gov (United States)

    Trivisonno, Riccardo; Condoluci, Massimo; An, Xueli; Mahmoodi, Toktam

    2018-02-21

    Network slicing is a key feature of the upcoming 5G networks allowing the design and deployment of customized communication systems to integrate services provided by vertical industries. In this context, massive Internet of Things (mIoT) is regarded as a compelling use case, both for its relevance from business perspective, and for the technical challenges it poses to network design. With their envisaged massive deployment of devices requiring sporadic connectivity and small data transmission, yet Quality of Service (QoS) constrained, mIoT services will need an ad-hoc end-to-end (E2E) slice, i.e., both access and core network with enhanced Control and User planes (CP/UP). After revising the key requirements of mIoT and identifying major shortcomings of previous generation networks, this paper presents and evaluates an E2E mIoT network slicing solution, featuring a new connectivity model overcoming the load limitations of legacy systems. Unique in its kind, this paper addresses mIoT requirements from an end-to-end perspective highlighting and solving, unlike most prior related work, the connectivity challenges posed to the core network. Results demonstrate that the proposed solution, reducing CP signaling and optimizing UP resource utilization, is a suitable candidate for next generation network standards to efficiently handle massive device deployment.

  6. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability.

    Science.gov (United States)

    Jarwar, Muhammad Aslam; Kibria, Muhammad Golam; Ali, Sajjad; Chong, Ilyoung

    2018-01-26

    In the ubiquitous Internet of Things (IoT) environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  7. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam Jarwar

    2018-01-01

    Full Text Available In the ubiquitous Internet of Things (IoT environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  8. CIAE 600 kV ns pulse neutron generator

    International Nuclear Information System (INIS)

    Shen Guanren; Guan Xialing; Chen Hongtao

    2001-01-01

    The overall composition of CIAE 600 kV ns Pulse Neutron Generator (CPNG) are introduced, and its characteristic, main technological performance and application were also given. CPNG consists of high voltage power supply with highest output voltage 600 kV, direct current 15 mA, stability and ripple ≤0.1%, 2214 mm x 1604 mm x 1504 mm stainless steel high voltage electrode, built in head equipment uniform field accelerating tube, ns pulsed installation, turbomolecular vacuum pump system and drift pipes at 0 degree and 45 degree. Its characteristics are: (1) high current beam; (2) high current beam ns pulsed installation made use of low energy for chopper and high energy for buncher; (3) compactly laid out and simple in structure

  9. [11C]NS8880, a promising PET radiotracer targeting the norepinephrine transporter

    DEFF Research Database (Denmark)

    Vase, Karina Højrup; Peters, Dan; Nielsen, Elsebeth Ø

    2014-01-01

    -azabicyclo[3.2.1]octane (NS8880), targeting NET. NS8880 has an in vitro binding profile comparable to desipramine and is structurally not related to reboxetine. METHODS: Labeling of NS8880 with [11C] was achieved by a non-conventional technique: substitution of pyridinyl fluorine with [11C]methanolate...... yields with high purity. The PET in vivo evaluation in pig and rat revealed a rapid brain uptake of [11C]NS8880 and fast obtaining of equilibrium. Highest binding was observed in thalamic and hypothalamic regions. Pretreatment with desipramine efficiently reduced binding of [11C]NS8880. CONCLUSION: Based...... on the pre-clinical results obtained so far [11C]NS8880 displays promising properties for PET imaging of NET....

  10. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  11. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    INSTRUTOR /OPERATOR STATION (IOS) AI O...The three functional categories also define three different users in terms of jobs and qualifications (if the functions have been allocated to manual ...function manually (e.g., collect the data S required from schedules, printed course outlines and telephone calls to training and facility managers).

  12. Two Decades (almost) of Keck Observations of Io

    Science.gov (United States)

    De Pater, I.; Davies, A. G.; de Kleer, K.

    2015-12-01

    We have regularly observed Io with the 10-m Keck Telescope since 1998, initially using the speckle imaging technique, and switching to Adaptive Optics techniques when this became available in 2001. In this talk we will discuss several eruptions that we witnessed, and present 20-30 year timelines of thermal emission from Pele, Pillan, Janus Patera, Kanehekili Fluctus, and Loki Patera, updating timelines in recent publications [1, 2] with additional Keck adaptive optics data obtained between 2002 and 2015. These new timelines are the most comprehensive plots ever produced of the volcanic thermal emission variability for these or any other locations on Io, utilizing data from multiple ground- and space-based assets. Our continuing multi-decadal observing program forms the basis for charting the variability of Io's volcanic activity, of great importance for understanding the evolution of the Galilean satellite system, and with the expectation of new missions to the jovian system in the next decade. Acknowledgements: This research is in part supported by NSF grant AST-1313485 to UC Berkeley. AGD is supported by a grant from the NASA OPR Program. References: [1] Davies et al. (2012) Icarus, 221, 466-470. [2] Rathbun and Spencer (2010) Icarus, 209, 625-630.

  13. A self-supporting wireless IoT node that uses kinetic energy harvesting

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2017-01-01

    The Internet-of-Things (IoT) is expected to be the next revolution of the internet where trillions of IoT nodes will be deployed on a global scale. It is foreseen that a considerable part of these will be deployed in smart buildings and smart homes where they will provide innovative solutions...

  14. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  15. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  16. Mosquito densonucleosis virus non-structural protein NS2 is necessary for a productive infection

    International Nuclear Information System (INIS)

    Azarkh, Eugene; Robinson, Erin; Hirunkanokpun, Supanee; Afanasiev, Boris; Kittayapong, Pattamaporn; Carlson, Jonathan; Corsini, Joe

    2008-01-01

    Mosquito densonucleosis viruses synthesize two non-structural proteins, NS1 and NS2. While NS1 has been studied relatively well, little is known about NS2. Antiserum was raised against a peptide near the N-terminus of NS2, and used to conduct Western blot analysis and immuno-fluorescence assays. Western blots revealed a prominent band near the expected size (41 kDa). Immuno-fluorescence studies of mosquito cells transfected with AeDNV indicate that NS2 has a wider distribution pattern than does NS1, and the distribution pattern appears to be a function of time post-infection. Nuclear localization of NS2 requires intact C-terminus but does not require additional viral proteins. Mutations ranging from complete NS2 knock-out to a single missense amino acid substitution in NS2 can significantly reduce viral replication and production of viable progeny

  17. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io......T have shown that the concern about the security and privacy play a huge role for the mass adoption of the IoT/M2M as cloud services. Among the important topics within the security and privacy, the access control is an important mechanism, which essentially manages how the important assets or resource...

  18. The Holistic Targeting (HOT) methodology as the means to improve Information Operations (IO) target development and prioritization

    OpenAIRE

    Ieva, Christopher S.

    2008-01-01

    Prioritization. In response to this challenge, this study proposes five recommendations to enhance IO integration into the Joint Targeting Cycle: the use of interim IO Joint Munitions Effectiveness Manual (JMEM) techniques to better forecast cognitive effects, the adoption of the Measure of Worth (MOW) model to assess IO effects, the HOT methodology to develop and prioritize IO targets, the use of compendium software facilitate targeting problem understanding and the network analysis to...

  19. A Software Product Line Process to Develop Agents for the IoT

    Directory of Open Access Journals (Sweden)

    Inmaculada Ayala

    2015-07-01

    Full Text Available One of the most important challenges of this decade is the Internet of Things (IoT, which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL. Specifically, we propose to use Self-StarMASMAS, multi-agent system agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  20. A Software Product Line Process to Develop Agents for the IoT.

    Science.gov (United States)

    Ayala, Inmaculada; Amor, Mercedes; Fuentes, Lidia; Troya, José M

    2015-07-01

    One of the most important challenges of this decade is the Internet of Things (IoT), which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL). Specifically, we propose to use Self-StarMASMAS, multi-agent system) agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  1. AGILE Observations of the Gravitational-wave Source GW170817: Constraining Gamma-Ray Emission from an NS-NS Coalescence

    Science.gov (United States)

    Verrecchia, F.; Tavani, M.; Donnarumma, I.; Bulgarelli, A.; Evangelista, Y.; Pacciani, L.; Ursi, A.; Piano, G.; Pilia, M.; Cardillo, M.; Parmiggiani, N.; Giuliani, A.; Pittori, C.; Longo, F.; Lucarelli, F.; Minervini, G.; Feroci, M.; Argan, A.; Fuschino, F.; Labanti, C.; Marisaldi, M.; Fioretti, V.; Trois, A.; Del Monte, E.; Antonelli, L. A.; Barbiellini, G.; Caraveo, P.; Cattaneo, P. W.; Colafrancesco, S.; Costa, E.; D'Amico, F.; Ferrari, A.; Giommi, P.; Morselli, A.; Paoletti, F.; Pellizzoni, A.; Picozza, P.; Rappoldi, A.; Soffitta, P.; Vercellone, S.; Baroncelli, L.; Zollino, G.

    2017-12-01

    The LIGO-Virgo Collaboration (LVC) detected, on 2017 August 17, an exceptional gravitational-wave (GW) event temporally consistent within ˜ 1.7 {{s}} with the GRB 1708117A observed by Fermi-GBM and INTEGRAL. The event turns out to be compatible with a neutron star-neutron star (NS-NS) coalescence that subsequently produced a radio/optical/X-ray transient detected at later times. We report the main results of the observations by the AGILE satellite of the GW170817 localization region (LR) and its electromagnetic (EM) counterpart. At the LVC detection time T 0, the GW170817 LR was occulted by the Earth. The AGILE instrument collected useful data before and after the GW/GRB event because in its spinning observation mode it can scan a given source many times per hour. The earliest exposure of the GW170817 LR by the gamma-ray imaging detector started about 935 s after T 0. No significant X-ray or gamma-ray emission was detected from the LR that was repeatedly exposed over timescales of minutes, hours, and days before and after GW170817, also considering Mini-calorimeter and Super-AGILE data. Our measurements are among the earliest ones obtained by space satellites on GW170817 and provide useful constraints on the precursor and delayed emission properties of the NS-NS coalescence event. We can exclude with high confidence the existence of an X-ray/gamma-ray emitting magnetar-like object with a large magnetic field of {10}15 {{G}}. Our data are particularly significant during the early stage of evolution of the EM remnant.

  2. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  3. Enabling interoperability-as-a-service for connected IoT infrastructures and Smart Objects

    DEFF Research Database (Denmark)

    Hovstø, Asbjørn; Guan, Yajuan; Quintero, Juan Carlos Vasquez

    2018-01-01

    Lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of non-interoperable infrastructu...

  4. Unexpected Functional Divergence of Bat Influenza Virus NS1 Proteins.

    Science.gov (United States)

    Turkington, Hannah L; Juozapaitis, Mindaugas; Tsolakos, Nikos; Corrales-Aguilar, Eugenia; Schwemmle, Martin; Hale, Benjamin G

    2018-03-01

    Recently, two influenza A virus (FLUAV) genomes were identified in Central and South American bats. These sequences exhibit notable divergence from classical FLUAV counterparts, and functionally, bat FLUAV glycoproteins lack canonical receptor binding and destroying activity. Nevertheless, other features that distinguish these viruses from classical FLUAVs have yet to be explored. Here, we studied the viral nonstructural protein NS1, a virulence factor that modulates host signaling to promote efficient propagation. Like all FLUAV NS1 proteins, bat FLUAV NS1s bind double-stranded RNA and act as interferon antagonists. Unexpectedly, we found that bat FLUAV NS1s are unique in being unable to bind host p85β, a regulatory subunit of the cellular metabolism-regulating enzyme, phosphoinositide 3-kinase (PI3K). Furthermore, neither bat FLUAV NS1 alone nor infection with a chimeric bat FLUAV efficiently activates Akt, a PI3K effector. Structure-guided mutagenesis revealed that the bat FLUAV NS1-p85β interaction can be reengineered (in a strain-specific manner) by changing two to four NS1 residues (96L, 99M, 100I, and 145T), thereby creating a hydrophobic patch. Notably, ameliorated p85β-binding is insufficient for bat FLUAV NS1 to activate PI3K, and a chimeric bat FLUAV expressing NS1 with engineered hydrophobic patch mutations exhibits cell-type-dependent, but species-independent, propagation phenotypes. We hypothesize that bat FLUAV hijacking of PI3K in the natural bat host has been selected against, perhaps because genes in this metabolic pathway were differentially shaped by evolution to suit the unique energy use strategies of this flying mammal. These data expand our understanding of the enigmatic functional divergence between bat FLUAVs and classical mammalian and avian FLUAVs. IMPORTANCE The potential for novel influenza A viruses to establish infections in humans from animals is a source of continuous concern due to possible severe outbreaks or pandemics. The

  5. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

    Directory of Open Access Journals (Sweden)

    K. C. Okafor

    2017-01-01

    Full Text Available With the Internet of Everything (IoE paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications.

  6. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  7. Enhancing Coverage in Narrow Band-IoT Using Machine Learning

    OpenAIRE

    Chafii , Marwa; Bader , Faouzi; Palicot , Jacques

    2018-01-01

    International audience; —Narrow Band-Internet of Thing (NB-IoT) is a recently proposed technology by 3GPP in Release-13. It provides low energy consumption and wide coverage in order to meet the requirements of its diverse applications that span social, industrial and environmental aspects. Increasing the number of repetitions of the transmission has been selected as a promising approach to enhance the coverage in NB-IoT up to 164 dB in terms of maximum coupling loss for uplink transmissions,...

  8. Towards Understanding of IoT Ecosystems in the Healthcare Sector

    OpenAIRE

    Pesonen, Ari; Sulin, Jussi

    2016-01-01

    This study aimed to outline an ecosystem to IoT based health/elderly care solutions and to the needs of both single actors and the whole ecosystem. Moreover, the aim was to understand the relations and dynamics between different actors in this ecosystem. The research questions for this study were: 1. How do industry professionals perceive the current state of health care? 2. How do the digitalization and IoT affect the health sector, and what advancements are needed to speed up the proces...

  9. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  10. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  11. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  12. Active Volcanism on Io as Seen by Galileo SSI

    Science.gov (United States)

    McEwen, A.S.; Keszthelyi, L.; Geissler, P.; Simonelli, D.P.; Carr, M.H.; Johnson, T.V.; Klaasen, K.P.; Breneman, H.H.; Jones, T.J.; Kaufman, J.M.; Magee, K.P.; Senske, D.A.; Belton, M.J.S.; Schubert, G.

    1998-01-01

    Active volcanism on Io has been monitored during the nominal Galileo satellite tour from mid 1996 through late 1997. The Solid State Imaging (SSI) experiment was able to observe many manifestations of this active volcanism, including (1) changes in the color and albedo of the surface, (2) active airborne plumes, and (3) glowing vents seen in eclipse. About 30 large-scale (tens of kilometers) surface changes are obvious from comparison of the SSI images to those acquired by Voyager in 1979. These include new pyroclastic deposits of several colors, bright and dark flows, and caldera-floor materials. There have also been significant surface changes on Io during the Galileo mission itself, such as a new 400-km-diameter dark pyroclastic deposit around Pillan Patera. While these surface changes are impressive, the number of large-scale changes observed in the four months between the Voyager 1 and Voyager 2 flybys in 1979 suggested that over 17 years the cumulative changes would have been much more impressive. There are two reasons why this was not actually the case. First, it appears that the most widespread plume deposits are ephemeral and seem to disappear within a few years. Second, it appears that a large fraction of the volcanic activity is confined to repeated resurfacing of dark calderas and flow fields that cover only a few percent of Io's surface. The plume monitoring has revealed 10 active plumes, comparable to the 9 plumes observed by Voyager. One of these plumes was visible only in the first orbit and three became active in the later orbits. Only the Prometheus plume has been consistently active and easy to detect. Observations of the Pele plume have been particularly intriguing since it was detected only once by SSI, despite repeated attempts, but has been detected several times by the Hubble Space Telescope at 255 nm. Pele's plume is much taller (460 km) than during Voyager 1 (300 km) and much fainter at visible wavelengths. Prometheus-type plumes (50

  13. Adopting the Essence Framework to Derive a Practice Library for the Development of IoT Systems

    NARCIS (Netherlands)

    Giray, Görkem; Tekinerdogan, B.; Tüzün, E.

    2018-01-01

    The Internet of Things (IoT) is a global network of smart devices which enables these objects to collect and exchange data. Research in the IoT is still progressing, and it is now being applied in various domains. One of the key observations is that the development of IoT systems is not trivial and

  14. The Role of Internet of Things (IoT in Smart Cities: Technology Roadmap-oriented Approaches

    Directory of Open Access Journals (Sweden)

    Eunil Park

    2018-05-01

    Full Text Available Since the concept of a smart city was introduced, IoT (Internet of Things has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM of a smart city. Moreover, the survey with about 200 experts was conducted to investigate both the importance and essentiality of detail components of IoT technologies for a smart city. Based on the survey results, the focal points and essential elements for the successful developments of a smart city are presented.

  15. IoT-based flood embankments monitoring system

    Science.gov (United States)

    Michta, E.; Szulim, R.; Sojka-Piotrowska, A.; Piotrowski, K.

    2017-08-01

    In the paper a concept of flood embankments monitoring system based on using Internet of Things approach and Cloud Computing technologies will be presented. The proposed system consists of sensors, IoT nodes, Gateways and Cloud based services. Nodes communicates with the sensors measuring certain physical parameters describing the state of the embankments and communicates with the Gateways. Gateways are specialized active devices responsible for direct communication with the nodes, collecting sensor data, preprocess the data, applying local rules and communicate with the Cloud Services using communication API delivered by cloud services providers. Architecture of all of the system components will be proposed consisting IoT devices functionalities description, their communication model, software modules and services bases on using a public cloud computing platform like Microsoft Azure will be proposed. The most important aspects of maintaining the communication in a secure way will be shown.

  16. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-06-29

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. There is a delicate interplay between the carrier sensing threshold of the contention based medium access protocol and the choice of packet forwarding strategy selected at each hop by the devices. The fundamental problem in optimizing the performance of such networks is to balance the tradeoff between conflicting performance objectives such as the spatial frequency reuse, transmission quality, and packet progress towards the destination. In this paper, we use a stochastic geometry approach to quantify the performance of multi-hop massive IoT networks in terms of the spatial frequency reuse and the transmission quality under different packet forwarding schemes. We also develop a comprehensive performance metric that can be used to optimize the system to achieve the best performance. The results can be used to select the best forwarding scheme and tune the carrier sensing threshold to optimize the performance of the network according to the delay constraints and transmission quality requirements.

  17. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  18. Security and Privacy Issues for an IoT based Smart Home

    OpenAIRE

    GENEIATAKIS DIMITRIOS; KOUNELIS IOANNIS; NEISSE RICARDO; NAI FOVINO IGOR; STERI GARY; BALDINI GIANMARCO

    2017-01-01

    Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable...

  19. [Clinical significance of NS1-BP expression in esophageal squamous cell carcinoma].

    Science.gov (United States)

    Ren, K; Qian, D; Wang, Y W; Pang, Q S; Zhang, W C; Yuan, Z Y; Wang, P

    2018-01-23

    Objective: To investigate the clinical significance of NS1-BP expression in patients with esophageal squamous cell carcinoma (ESCC), and to study the roles of NS1-BP in proliferation and apoptosis of ESCC cells. Methods: A total of 98 tumor tissues and 30 adjacent normal tissues from 98 ESCC patients were used as study group and control group, and these samples were collected in Sun Yat-Sen University Cancer Center between 2002 and 2008. In addition, 46 ESCC tissues which were collected in Cancer Institute and Hospital of Tianjin Medical University were used as validation group. Expression of mucosal NS1-BP was detected by immunohistochemistry. Kaplan-Meier curve and log-rank test were used to analyze the survival rate. Multivariate Cox proportional hazard model was used to analyze the prognostic factors. Furthermore, NS1-BP was over expressed or knocked down in ESCC cells by transient transfection. Protein levels of c-Myc were detected by western blot. Cell viability and apoptosis was analyzed by MTT assay and flow cytometry. Results: Among all of tested samples, NS1-BP were down-regulated in 9 out of 30 non-tumorous normal esophageal tissues (30.0%) and 85 out of 144 ESCC tissues (59.0%), respectively, showing a statistically significant difference ( P =0.012). In the study group, three-year disease-free survival rate of NS1-BP high expression group (53.2%) was significantly higher than that of NS1-BP low expression group (27.6%; P =0.009). In the validation group, the three-year disease-free survival rates were 57.8% and 25.5% in NS1-BP high and low levels groups, respectively, showing a similar results ( P =0.016). Importantly, multivariate analyses showed that low expression of NS1-BP was an independent predictor for chemoradiotherapy sensitivity and shorter disease-free survival time in ESCC patients( P <0.05 for all). Furthermore, overexpressed NS1-BP in TE-1 cells repressed c-Myc expression, inhibited cell proliferation and promoted apoptosis. In contrast

  20. Izrada 2D video igre za iOS platformu

    OpenAIRE

    Kampuš, Dominik

    2016-01-01

    Tema ovog završnog rada temelji se na izradi 2D video igre za iOS mobilni uređaj te njezinoj demonstraciji na istom. Kroz rad su opisane sve bitne funkcije GameSalad Creator-a koje su potrebne kod izrade igre bazirane na 2 dimenzije. Također se prolazi kroz iOS operativni sustav, što je on i kako se razvijao. Spominje se i tema koja govori općenito o igrama na mobilnim uređajima. U završnom dijelu rada prikazan je postupak izrade, koje funkcije programa se točno koriste i kako se igra može te...

  1. An IoT virtualization Framework for Fast and Lossless Communication

    DEFF Research Database (Denmark)

    Patil, Sulakshana; Mihovska, Albena D.; Prasad, Ramjee

    2014-01-01

    enough and lossless. The virtualization of the network allows for low computational complexity and improved processing efficiency. The various contributions have been made in the applications that were found by IoT. The proposed global framework controls data transmission delay, reduces the data loss......An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design...

  2. Getting priorities straight: improving Linux support for database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ...

  3. Structure-based discovery of clinically approved drugs as Zika virus NS2B-NS3 protease inhibitors that potently inhibit Zika virus infection in vitro and in vivo.

    Science.gov (United States)

    Yuan, Shuofeng; Chan, Jasper Fuk-Woo; den-Haan, Helena; Chik, Kenn Ka-Heng; Zhang, Anna Jinxia; Chan, Chris Chung-Sing; Poon, Vincent Kwok-Man; Yip, Cyril Chik-Yan; Mak, Winger Wing-Nga; Zhu, Zheng; Zou, Zijiao; Tee, Kah-Meng; Cai, Jian-Piao; Chan, Kwok-Hung; de la Peña, Jorge; Pérez-Sánchez, Horacio; Cerón-Carrasco, José Pedro; Yuen, Kwok-Yung

    2017-09-01

    Zika virus (ZIKV) infection may be associated with severe complications in fetuses and adults, but treatment options are limited. We performed an in silico structure-based screening of a large chemical library to identify potential ZIKV NS2B-NS3 protease inhibitors. Clinically approved drugs belonging to different drug classes were selected among the 100 primary hit compounds with the highest predicted binding affinities to ZIKV NS2B-NS3-protease for validation studies. ZIKV NS2B-NS3 protease inhibitory activity was validated in most of the selected drugs and in vitro anti-ZIKV activity was identified in two of them (novobiocin and lopinavir-ritonavir). Molecular docking and molecular dynamics simulations predicted that novobiocin bound to ZIKV NS2B-NS3-protease with high stability. Dexamethasone-immunosuppressed mice with disseminated ZIKV infection and novobiocin treatment had significantly (P < 0.05) higher survival rate (100% vs 0%), lower mean blood and tissue viral loads, and less severe histopathological changes than untreated controls. This structure-based drug discovery platform should facilitate the identification of additional enzyme inhibitors of ZIKV. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Antiviral Activity and Resistance Analysis of NS3/4A Protease Inhibitor Grazoprevir and NS5A Inhibitor Elbasvir in Hepatitis C Virus GT4 Replicons.

    Science.gov (United States)

    Asante-Appiah, Ernest; Curry, Stephanie; McMonagle, Patricia; Ingravallo, Paul; Chase, Robert; Nickle, David; Qiu, Ping; Howe, Anita; Lahser, Frederick C

    2017-07-01

    Although genotype 4 (GT4)-infected patients represent a minor overall percentage of the global hepatitis C virus (HCV)-infected population, the high prevalence of the genotype in specific geographic regions coupled with substantial sequence diversity makes it an important genotype to study for antiviral drug discovery and development. We evaluated two direct-acting antiviral agents-grazoprevir, an HCV NS3/4A protease inhibitor, and elbasvir, an HCV NS5A inhibitor-in GT4 replicons prior to clinical studies in this genotype. Following a bioinformatics analysis of available GT4 sequences, a set of replicons bearing representative GT4 clinical isolates was generated. For grazoprevir, the 50% effective concentration (EC 50 ) against the replicon bearing the reference GT4a (ED43) NS3 protease and NS4A was 0.7 nM. The median EC 50 for grazoprevir against chimeric replicons encoding NS3/4A sequences from GT4 clinical isolates was 0.2 nM (range, 0.11 to 0.33 nM; n = 5). The difficulty in establishing replicons bearing NS3/4A resistance-associated substitutions was substantially overcome with the identification of a G162R adaptive substitution in NS3. Single NS3 substitutions D168A/V identified from de novo resistance selection studies reduced grazoprevir antiviral activity by 137- and 47-fold, respectively, in the background of the G162R replicon. For elbasvir, the EC 50 against the replicon bearing the reference full-length GT4a (ED43) NS5A gene was 0.0002 nM. The median EC 50 for elbasvir against chimeric replicons bearing clinical isolates from GT4 was 0.0007 nM (range, 0.0002 to 34 nM; n = 14). De novo resistance selection studies in GT4 demonstrated a high propensity to suppress the emergence of amino acid substitutions that confer high-potency reductions to elbasvir. Phenotypic characterization of the NS5A amino acid substitutions identified (L30F, L30S, M31V, and Y93H) indicated that they conferred 15-, 4-, 2.5-, and 7.5-fold potency losses, respectively, to elbasvir

  5. Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT

    DEFF Research Database (Denmark)

    Vejlgaard, Benny; Lauridsen, Mads; Nguyen, Huan Cong

    2017-01-01

    is challenged for indoor coverage. Furthermore, the study analyzes the capacity of the four technologies assuming a traffic growth from 1 to 10 IoT device per user. The conclusion is that the 95 %-tile uplink failure rate for outdoor users is below 5 % for all technologies. For indoor users only NB-IoT provides......In this paper the coverage and capacity of SigFox, LoRa, GPRS, and NB-IoT is compared using a real site deployment covering 8000 km2 in Northern Denmark. Using the existing Telenor cellular site grid it is shown that the four technologies have more than 99 % outdoor coverage, while GPRS...

  6. Epitope Sequences in Dengue Virus NS1 Protein Identified by Monoclonal Antibodies

    Directory of Open Access Journals (Sweden)

    Leticia Barboza Rocha

    2017-10-01

    Full Text Available Dengue nonstructural protein 1 (NS1 is a multi-functional glycoprotein with essential functions both in viral replication and modulation of host innate immune responses. NS1 has been established as a good surrogate marker for infection. In the present study, we generated four anti-NS1 monoclonal antibodies against recombinant NS1 protein from dengue virus serotype 2 (DENV2, which were used to map three NS1 epitopes. The sequence 193AVHADMGYWIESALNDT209 was recognized by monoclonal antibodies 2H5 and 4H1BC, which also cross-reacted with Zika virus (ZIKV protein. On the other hand, the sequence 25VHTWTEQYKFQPES38 was recognized by mAb 4F6 that did not cross react with ZIKV. Lastly, a previously unidentified DENV2 NS1-specific epitope, represented by the sequence 127ELHNQTFLIDGPETAEC143, is described in the present study after reaction with mAb 4H2, which also did not cross react with ZIKV. The selection and characterization of the epitope, specificity of anti-NS1 mAbs, may contribute to the development of diagnostic tools able to differentiate DENV and ZIKV infections.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  8. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  9. Geologic mapping of the Amirani-Gish Bar region of Io: Implications for the global geologic mapping of Io

    Science.gov (United States)

    Williams, D.A.; Keszthelyi, L.P.; Crown, D.A.; Jaeger, W.L.; Schenk, P.M.

    2007-01-01

    We produced the first geologic map of the Amirani-Gish Bar region of Io, the last of four regional maps generated from Galileo mission data. The Amirani-Gish Bar region has five primary types of geologic materials: plains, mountains, patera floors, flows, and diffuse deposits. The flows and patera floors are thought to be compositionally similar, but are subdivided based on interpretations regarding their emplacement environments and mechanisms. Our mapping shows that volcanic activity in the Amirani-Gish Bar region is dominated by the Amirani Eruptive Center (AEC), now recognized to be part of an extensive, combined Amirani-Maui flow field. A mappable flow connects Amirani and Maui, suggesting that Maui is fed from Amirani, such that the post-Voyager designation "Maui Eruptive Center" should be revised. Amirani contains at least four hot spots detected by Galileo, and is the source of widespread bright (sulfur?) flows and active dark (silicate?) flows being emplaced in the Promethean style (slowly emplaced, compound flow fields). The floor of Gish Bar Patera has been partially resurfaced by dark lava flows, although other parts of its floor are bright and appeared unchanged during the Galileo mission. This suggests that the floor did not undergo complete resurfacing as a lava lake as proposed for other ionian paterae. There are several other hot spots in the region that are the sources of both active dark flows (confined within paterae), and SO2- and S2-rich diffuse deposits. Mapped diffuse deposits around fractures on mountains and in the plains appear to serve as the source for gas venting without the release of magma, an association previously unrecognized in this region. The six mountains mapped in this region exhibit various states of degradation. In addition to gaining insight into this region of Io, all four maps are studied to assess the best methodology to use to produce a new global geologic map of Io based on the newly released, combined Galileo

  10. Theoretical investigations of the IO,{sup q+} (q = 2, 3, 4) multi-charged ions: Metastability, characterization and spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Hammami, H. [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France); EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Yazidi, O. [Laboratoire de Spectroscopie Atomique Moléculaire et Applications, Département de Physique, Faculté des Sciences de Tunis, Université de Tunis-El Manar, Le Belvédère, 1060 Tunis (Tunisia); Ben El Hadj Rhouma, M. [EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Al Mogren, M. M. [Chemistry Department, Faculty of Science, King Saud University, PO Box 2455, Riyadh 11451 (Saudi Arabia); Hochlaf, M., E-mail: hochlaf@univ-mlv.fr [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France)

    2014-07-07

    Using ab initio methodology, we studied the IO{sup q+} (q = 2, 3, 4) multi-charged ions. Benchmark computations on the IO(X{sup 2}Π) neutral species allow validate the current procedure. For IO{sup 2+}, several potential wells were found on the ground and the electronic excited states potentials with potential barriers with respect to dissociation, where this dication can exist in the gas phase as long-lived metastable molecules. We confirm hence the recent observation of the dication by mass spectrometry. Moreover, we predict the existence of the metastable IO{sup 3+} trication, where a shallow potential well along the IO internuclear distance is computed. This potential well supports more than 10 vibrational levels. The IO{sup 3+} excited states are repulsive in nature, as well as the computed potentials for the IO{sup 4+} tetracation. For the bound states, we give a set of spectroscopic parameters including excitation transition energies, equilibrium distances, harmonic and anharmonic vibrational terms, and rotational constants. At the MRCI + Q/aug-cc-pV5Z(-PP) level, the adiabatic double and triple ionization energies of IO are computed to be ∼28.1 eV and ∼55.0 eV, respectively.

  11. Role of Non-Volatile Memories in Automotive and IoT Markets

    Science.gov (United States)

    2017-03-01

    Standard Manufacturing Supply Long Term Short to Medium Term Density Up to 16MB Up to 2MB IO Configuration Up to x128 Up to x32 Design for Test...Role of Non-Volatile Memories in Automotive and IoT Markets Vipin Tiwari Director, Business Development and Product Marketing SST – A Wholly Own...microcontrollers (MCU) and certainly one of the most challenging elements to master. This paper addresses the role of non-volatile memories for

  12. TRESCIMO M2M-IoT testbed: smart cities solutions in Europe and Africa

    CSIR Research Space (South Africa)

    Barros, M

    2016-06-01

    Full Text Available component federation are required. TRESCIMO is a project that created facilities to experiment with services distributed over continents for two IoT domain trials and developed a general solution for scaling the IoT infrastructure in a Proof...

  13. The Role of Internet of Things (IoT) in Smart Cities: Technology Roadmap-oriented Approaches

    OpenAIRE

    Eunil Park; Angel P. del Pobil; Sang Jib Kwon

    2018-01-01

    Since the concept of a smart city was introduced, IoT (Internet of Things) has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM) of a smart city. Moreover, the survey with about 200 experts was conducted to investigate ...

  14. The effect of glycosylation on cytotoxicity of Ibaraki virus nonstructural protein NS3

    Science.gov (United States)

    URATA, Maho; WATANABE, Rie; IWATA, Hiroyuki

    2015-01-01

    The cytotoxicity of Ibaraki virus nonstructural protein NS3 was confirmed, and the contribution of glycosylation to this activity was examined by using glycosylation mutants of NS3 generated by site-directed mutagenesis. The expression of NS3 resulted in leakage of lactate dehydrogenase to the culture supernatant, suggesting the cytotoxicity of this protein. The lack of glycosylation impaired the transport of NS3 to the plasma membrane and resulted in reduced cytotoxicity. Combined with the previous observation that NS3 glycosylation was specifically observed in mammalian cells (Urata et al., Virus Research 2014), it was suggested that the alteration of NS3 cytotoxicity through modulating glycosylation is one of the strategies to achieve host specific pathogenisity of Ibaraki virus between mammals and vector arthropods. PMID:26178820

  15. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  16. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  17. Io with Loki Plume on Bright Limb

    Science.gov (United States)

    1990-01-01

    Voyager 1 image of Io showing active plume of Loki on limb. Heart-shaped feature southeast of Loki consists of fallout deposits from active plume Pele. The images that make up this mosaic were taken from an average distance of approximately 490,000 kilometers (340,000 miles).

  18. On possible life on Jupiter's satellite Io

    Science.gov (United States)

    Vidmachenko, A. P.

    2018-05-01

    Some of the satellites of Jupiter may well be suitable both for mastering, and for finding possible traces of life there. Among them such satellite like Io - nearest Galilean satellite of Jupiter, and one of the most volcanically active bodies in the solar system. Warming of the mantle is caused by a powerful tidal force from the side of Jupiter. This leads to the heating of some parts of the mantle to a temperature above 1800 K, with an average surface temperature of about 140 K. But under its surface can be safe and even comfortable shelters, where life could once have come from the outside (even in a very primitive form), and could survive to this day. Moreover, according to some model's assumptions, Io could sometime be formed in another part of the Solar system, where the water could exist. Note that on neighboring Galilean satellites now exist significant amounts of water .

  19. Global Distribution of Active Volcanism on Io as Known at the End of the Galileo Mission

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp. Lucas W.; Smythe, W. D.; Radebaugh, J.; Turtle, E.; Perry, J.; Bruno, B.

    2004-01-01

    Hot spots are manifestations of Io s mechanism of internal heating and heat transfer. Therefore, the global distribution of hot spots and their power output has important implications for how Io is losing heat. The end of the Galileo mission is an opportune time to revisit studies of the distribution of hot spots on Io, and to investigate the distribution of their power output.

  20. Active Volcanic Eruptions on Io

    Science.gov (United States)

    1996-01-01

    Six views of the volcanic plume named Prometheus, as seen against Io's disk and near the bright limb (edge) of the satellite by the SSI camera on the Galileo spacecraft during its second (G2) orbit of Jupiter. North is to the top of each frame. To the south-southeast of Prometheus is another bright spot that appears to be an active plume erupting from a feature named Culann Patera. Prometheus was active 17 years ago during both Voyager flybys, but no activity was detected by Voyager at Culann. Both of these plumes were seen to glow in the dark in an eclipse image acquired by the imaging camera during Galileo's first (G1) orbit, and hot spots at these locations were detected by Galileo's Near-Infrared Mapping Spectrometer.The plumes are thought to be driven by heating sulfur dioxide in Io's subsurface into an expanding fluid or 'geyser'. The long-lived nature of these eruptions requires that a substantial supply of sulfur dioxide must be available in Io's subsurface, similar to groundwater. Sulfur dioxide gas condenses into small particles of 'snow' in the expanding plume, and the small particles scatter light and appear bright at short wavelengths. The images shown here were acquired through the shortest-wavelength filter (violet) of the Galileo camera. Prometheus is about 300 km wide and 75 km high and Culann is about 150 km wide and less than 50 km high. The images were acquired on September 4, 1996 at a range of 2,000,000 km (20 km/pixel resolution). Prometheus is named after the Greek fire god and Culann is named after the Celtic smith god.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can

  1. A PhD abstract presentation on Cluster Framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2014-01-01

    The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device will be conne......The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)."However, managing such a huge number of devices is a major challenge for IoPTS. In any given context, a number of devices will work together...... announce their services to those who need them. Users can access these services with the help of widely interconnected devices. To access the services user has to provide some personal data. In IoPTS services are large in numbers, and to protect the user data there is a need to ensure that these services...

  2. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  3. Interactive Level Design for iOS Assignment Delivery: A Case Study

    Directory of Open Access Journals (Sweden)

    Anson Brown

    2014-02-01

    Full Text Available This paper presents an application of an iOS-based online gaming assignment in a real classroom. The core concept of the project is a gameplay environment involving two players that have full control over creation and modification of levels. This level design mechanism was implemented in an iOS-based game in the area of genetics and based on an existing written assignment. The game includes support for both instructors, who have the ability to create and post assignments and students, who can take the assignments. Two trials of the iOS application consisted of in-class testing of twenty- one students. Students first took the original paper assignment, followed by the iOS version. Start times, end times, and grades were recorded for both versions. A comprehensive study of the grades and times for the iOS version of the assignment versus the paper version was conducted and is presented in this paper. Our Study showed that the iOS version was completed much faster in nearly every case while a strong delivery mechanism is needed to ensure student grades and completion of the assignment will not be affected. These results are not unexpected due to some major difference between the two formats. Future updates and additions will address any currently existing issues.

  4. Impact of impurities on the α-LiIO{sub 3} crystal growth: Technique for measuring the “dead zone”

    Energy Technology Data Exchange (ETDEWEB)

    Noskova, A. N., E-mail: anna-13.08@mail.ru; Rubakha, V. I.; Prokhorov, A. P. [Russian Academy of Sciences, Institute of Applied Physics (Russian Federation)

    2017-01-15

    Lithium iodate (α-LiIO{sub 3}) single crystal is a promising nonlinear optical material, which used for efficient laser radiation conversion in the visible and near-IR regions. A technique for measuring the “dead zone” (ΔТ{sub dz}) of LiIO{sub 3} solutions has been developed; data on the impact of Fe(IO{sub 3}){sub 2}, AgIO{sub 3}, CsOH, H{sub 3}PO{sub 4}, and methyl methacrylate on the growth of the (100) face of α-LiIO{sub 3} crystals have been presented; and the dependences of the nucleation and motion of single steps on the degree of supersaturation have been measured. It is shown that the ΔТ{sub dz} value makes it possible to estimate the validity of solutions for growing α-LiIO{sub 3} crystals. The results of measuring the face growth rates and step velocities for KDP and α-LiIO{sub 3} crystals are compared.

  5. Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

    OpenAIRE

    Ford, David Thomas; Qamar, Sreman

    2017-01-01

    In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technolo...

  6. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  7. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  8. Top-Down Delivery of IoT-based Applications for Seniors Behavior Change Capturing Exploiting a Model-Driven Approach

    OpenAIRE

    Fiore, Alessandro; Caione, Adriana; Mainetti, Luca; Manco, Luigi; Vergallo, Roberto

    2018-01-01

    Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols. Developers and experts ask for new solutions that speed up the prototyping of IoT applications. One of these solutions is Web of Topics (WoX) middleware, a model-driven Cloud platform that aims to ease IoT applications developing, introducing a strong semantic abstraction of the IoT concepts. In W...

  9. The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  10. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  11. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  12. Beginning iPhone 4 Development Exploring the IOS SDK

    CERN Document Server

    Nutting, Jack; LaMarche, Jeff

    2011-01-01

    The authors of the bestselling Beginning iPhone 3 Development are back, with the same excellent material completely updated for iOS 4 and written from the ground up using the latest version of Apple's Xcode 3. All source code has been updated to use the latest Xcode templates and current APIs, and all-new screenshots show Xcode 3 in action. Beginning iPhone 4 Development is a complete course in iOS development. You'll master techniques that work on iPhone, iPad, and iPod touch. We start with the basics, showing you how to download and install the tools you'll need, and how to create your first

  13. Pro Core Data for iOS Data Access and Persistence Engine for iPhone, iPad, and iPod Touch

    CERN Document Server

    Privat, M

    2011-01-01

    The power of Core Data allows iOS developers to efficiently store and retrieve application data using familiar object-oriented paradigms. Pro Core Data for iOS explains both how and why to use Core Data for data storage, from simple to advanced techniques. Covering common and advanced persistence patterns, this book prepares any iOS developer to store and retrieve data accurately and proficiently. Lots of iOS development books touch on Core Data, taking you through a few mainstream use cases for storing and retrieving data in your iOS applications. In Pro Core Data for iOS, however, we take yo

  14. The Future of HCV Therapy: NS4B as an Antiviral Target

    Directory of Open Access Journals (Sweden)

    Hadas Dvory-Sobol

    2010-11-01

    Full Text Available Chronic hepatitis C virus (HCV infection is a major worldwide cause of liver disease, including cirrhosis and hepatocellular carcinoma. It is estimated that more than 170 million individuals are infected with HCV, with three to four million new cases each year. The current standard of care, combination treatment with interferon and ribavirin, eradicates the virus in only about 50% of chronically infected patients. Notably, neither of these drugs directly target HCV. Many new antiviral therapies that specifically target hepatitis C (e.g. NS3 protease or NS5B polymerase inhibitors are therefore in development, with a significant number having advanced into clinical trials. The nonstructural 4B (NS4B protein, is among the least characterized of the HCV structural and nonstructural proteins and has been subjected to few pharmacological studies. NS4B is an integral membrane protein with at least four predicted transmembrane (TM domains. A variety of functions have been postulated for NS4B, such as the ability to induce the membranous web replication platform, RNA binding and NTPase activity. This review summarizes potential targets within the nonstructural protein NS4B, with a focus on novel classes of NS4B inhibitors.

  15. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2015-01-01

    Full Text Available In a progressive business intelligence (BI environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requirements of contemporary BI-services. Thus, reengineering a superseded knowledge base into a renovated knowledge base system can yield greater business value and is more cost effective and feasible than standardising a new system for the same purpose. Thus, in this work, we propose an IoT knowledge reengineering framework (IKR framework for implementation in a neurofuzzy system to build, organise, and reuse knowledge to provide BI-services to the things (man, machines, places, and processes involved in business through the network of IoT objects. The analysis and discussion show that the IKR framework can be well suited to creating improved anticipation in IoT-driven BI-applications.

  16. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  17. Uncoupling of Protease trans-Cleavage and Helicase Activities in Pestivirus NS3.

    Science.gov (United States)

    Zheng, Fengwei; Lu, Guoliang; Li, Ling; Gong, Peng; Pan, Zishu

    2017-11-01

    The nonstructural protein NS3 from the Flaviviridae family is a multifunctional protein that contains an N-terminal protease and a C-terminal helicase, playing essential roles in viral polyprotein processing and genome replication. Here we report a full-length crystal structure of the classical swine fever virus (CSFV) NS3 in complex with its NS4A protease cofactor segment (PCS) at a 2.35-Å resolution. The structure reveals a previously unidentified ∼2,200-Å 2 intramolecular protease-helicase interface comprising three clusters of interactions, representing a "closed" global conformation related to the NS3-NS4A cis -cleavage event. Although this conformation is incompatible with protease trans -cleavage, it appears to be functionally important and beneficial to the helicase activity, as the mutations designed to perturb this conformation impaired both the helicase activities in vitro and virus production in vivo Our work reveals important features of protease-helicase coordination in pestivirus NS3 and provides a key basis for how different conformational states may explicitly contribute to certain functions of this natural protease-helicase fusion protein. IMPORTANCE Many RNA viruses encode helicases to aid their RNA genome replication and transcription by unwinding structured RNA. Being naturally fused to a protease participating in viral polyprotein processing, the NS3 helicases encoded by the Flaviviridae family viruses are unique. Therefore, how these two enzyme modules coordinate in a single polypeptide is of particular interest. Here we report a previously unidentified conformation of pestivirus NS3 in complex with its NS4A protease cofactor segment (PCS). This conformational state is related to the protease cis -cleavage event and is optimal for the function of helicase. This work provides an important basis to understand how different enzymatic activities of NS3 may be achieved by the coordination between the protease and helicase through different

  18. Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

    NARCIS (Netherlands)

    Abbasi, A.; Hashemi, M.; Zambon, E.; Etalle, S.; Havarneanu, G.; Setola, R.; Nassopoulos, H.; Wolthusen, S.

    2016-01-01

    Input/OutputisthemechanismthroughwhichProgrammable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based

  19. The relevance of technological autonomy in the acceptance of IoT services in retail

    NARCIS (Netherlands)

    Constantinides, Efthymios; Kahlert, Marius; de Vries, Sjoerd A.

    2017-01-01

    The Internet of Things (IoT) represents a shift towards a digitally enriched environment connecting smart objects and users that promises to provide retailers with innovative ways to approach their customers. IoT technologies differ from previous innovations as they are ubiquitous, intelligent and

  20. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  1. The effects of non-synonymous single nucleotide polymorphisms (nsSNPs) on protein-protein interactions.

    Science.gov (United States)

    Yates, Christopher M; Sternberg, Michael J E

    2013-11-01

    Non-synonymous single nucleotide polymorphisms (nsSNPs) are single base changes leading to a change to the amino acid sequence of the encoded protein. Many of these variants are associated with disease, so nsSNPs have been well studied, with studies looking at the effects of nsSNPs on individual proteins, for example, on stability and enzyme active sites. In recent years, the impact of nsSNPs upon protein-protein interactions has also been investigated, giving a greater insight into the mechanisms by which nsSNPs can lead to disease. In this review, we summarize these studies, looking at the various mechanisms by which nsSNPs can affect protein-protein interactions. We focus on structural changes that can impair interaction, changes to disorder, gain of interaction, and post-translational modifications before looking at some examples of nsSNPs at human-pathogen protein-protein interfaces and the analysis of nsSNPs from a network perspective. © 2013.

  2. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  3. Multiple Input Energy Harvesting Systems for Autonomous IoT End-Nodes

    Directory of Open Access Journals (Sweden)

    Johan J. Estrada-López

    2018-03-01

    Full Text Available The Internet-of-Things (IoT paradigm is under constant development and is being enabled by the latest research work from both industrial and academic communities. Among the many contributions in such diverse areas as sensor manufacturing, network protocols, and wireless communications, energy harvesting techniques stand out as a key enabling technology for the realization of batteryless IoT end-node systems. In this paper, we give an overview of the recent developments in circuit design for ultra-low power management units (PMUs, focusing mainly in the architectures and techniques required for energy harvesting from multiple heterogeneous sources. The paper starts by discussing a general structure for IoT end-nodes and the main characteristics of PMUs for energy harvesting. Then, an overview is given of different published works for multisource power harvesting, observing their main advantages and disadvantages and comparing their performance. Finally, some open areas of research in multisource harvesting are observed and relevant conclusions are given.

  4. Nodding syndrome (NS) and Onchocerca Volvulus (OV) in Northern Uganda.

    Science.gov (United States)

    Lagoro, David Kitara; Arony, Denis Anywar

    2017-01-01

    Nodding Syndrome (NS) is a childhood neurological disorder characterized by atonic seizures, cognitive decline, school dropout, muscle weakness, thermal dysfunction, wasting and stunted growth. There are recent published information suggesting associations between Nodding Syndrome (NS) with cerebrospinal fluid (CSF) VGKC antibodies and serum leiomidin-1 antibody cross reacting with Onchocerca Volvulus ( OV ). These findings suggest a neuro-inflammatory cause of NS and they are important findings in the search for the cause of Nodding Syndrome. These observations perhaps provide further, the unique explanation for the association between Nodding Syndrome and Onchocerca Volvulus . Many clinical and epidemiological studies had shown a significant correlation between NS and infestation with a nematode, Onchocerca volvulus which causes a disease, Onchocerciasis , some of which when left untreated can develop visual defect ("River Blindness"). While these studies conducted in Northern Uganda and Southern Sudan indicate a statistically significant association with ( OV infection (using positive skin snips), we observe that ( OV is generally endemic in many parts of Sub Saharan Africa and Latin America and that to date, no NS cases have been recorded in those regions. This letter to the Editor is to provide additional information on the current view about the relationship between Nodding Syndrome and Onchocerca Volvulus as seen in Northern Uganda.

  5. Genetic Defects Underlie the Non-syndromic Autosomal Recessive Intellectual Disability (NS-ARID

    Directory of Open Access Journals (Sweden)

    Saleha Shamim

    2017-05-01

    Full Text Available Intellectual disability (ID is a neurodevelopmental disorder which appears frequently as the result of genetic mutations and may be syndromic (S-ID or non-syndromic (NS-ID. ID causes an important economic burden, for patient's family, health systems, and society. Identifying genes that cause S-ID can easily be evaluated due to the clinical symptoms or physical anomalies. However, in the case of NS-ID due to the absence of co-morbid features, the latest molecular genetic techniques can be used to understand the genetic defects that underlie it. Recent studies have shown that non-syndromic autosomal recessive (NS-ARID is extremely heterogeneous and contributes much more than X-linked ID. However, very little is known about the genes and loci involved in NS-ARID relative to X-linked ID, and whose complete genetic etiology remains obscure. In this review article, the known genetic etiology of NS-ARID and possible relationships between genes and the associated molecular pathways of their encoded proteins has been reviewed which will enhance our understanding about the underlying genes and mechanisms in NS-ARID.

  6. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  7. Learn Unity 4 for iOS game development

    CERN Document Server

    Chu, Philip

    2013-01-01

    The only book on Unity 4 game development The only up-to-date book on Unity for iOS Philip Chu is the author of a very popular online Unity tutorial, frequently recommended on sites like StackOverflow

  8. Production of recombinant dengue non-structural 1 (NS1) proteins from clinical virus isolates.

    Science.gov (United States)

    Yohan, Benediktus; Wardhani, Puspa; Aryati; Trimarsanto, Hidayat; Sasmono, R Tedjo

    2017-01-01

    Dengue is a febrile disease caused by infection of dengue virus (DENV). Early diagnosis of dengue infection is important for better management of the disease. The DENV Non-Structural Protein 1 (NS1) antigen has been routinely used for the early dengue detection. In dengue epidemic countries such as Indonesia, clinicians are increasingly relying on the NS1 detection for confirmation of dengue infection. Various NS1 diagnostic tests are commercially available, however different sensitivities and specificities were observed in various settings. This study was aimed to generate dengue NS1 recombinant protein for the development of dengue diagnostic tests. Four Indonesian DENV isolates were used as the source of the NS1 gene cloning, expression, and purification in bacterial expression system. Recombinant NS1 proteins were successfully purified and their antigenicities were assessed. Immunization of mice with recombinant proteins observed the immunogenicity of the NS1 protein. The generated recombinant proteins can be potentially used in the development of NS1 diagnostic test. With minimal modifications, this method can be used for producing NS1 recombinant proteins from isolates obtained from other geographical regions. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Near-surface flow of volcanic gases on Io

    International Nuclear Information System (INIS)

    Lee, S.W.; Thomas, P.C.

    1980-01-01

    Significant near-surface flow of gas several hundred kilometers from Pele (Plume 1) on Io is indicated by a series of bright, elongate albedo markings. Particles produced at small, local vents are apparently carried as much as 70 km farther 'downwind' from Pele. The gas densities and velocities necessary to suspend 0.1 to 10 micron particles at such a distance imply mass flow rates of 10 to the 7th - 10 to the 9th g/sec. Such flow rates are consistent with other estimates of mass transport by the plume. The large flow rates so far from the source allow an estimate of the rate of resurfacing of Io by lava flows and pyroclastics that is independent of estimates based on meteorite flux or on the amount of solids carried within the plumes themselves

  10. Characterization of Io's volcanic activity by infrared polarimetry

    International Nuclear Information System (INIS)

    Goguen, J.D.; Sinton, W.M.

    1985-01-01

    The thermal emission from Io's volcanic hot spots is linearly polarized.Infrared measurements at 4.76 micrometers show disk-integrated polarization as large as 1.6 percent. The degree and position angle of linear polarization vary with Io's rotation in a manner characteristic of emission from a small number of hot spots. A model incorporating three hot spots best fits the data. The largest of these hot spots lies to the northeast of Loki Patera, as mapped from Voyager, and the other spot on the trailing hemisphere is near Ra Patera. The hot spot on the leading hemisphere corresponds to no named feature on the Voyager maps. The value determined for the index of refraction of the emitting surface is a lower bound; it is similar to that of terrestrial basalts and is somewhat less than that of sulfur. 25 references

  11. Gelatin nanoparticles enhance delivery of hepatitis C virus recombinant NS2 gene.

    Science.gov (United States)

    Sabet, Salwa; George, Marina A; El-Shorbagy, Haidan M; Bassiony, Heba; Farroh, Khaled Y; Youssef, Tareq; Salaheldin, Taher A

    2017-01-01

    Development of an effective non-viral vaccine against hepatitis C virus infection is of a great importance. Gelatin nanoparticles (Gel.NPs) have an attention and promising approach as a viable carrier for delivery of vaccine, gene, drug and other biomolecules in the body. The present study aimed to develop stable Gel.NPs conjugated with nonstructural protein 2 (NS2) gene of Hepatitis C Virus genotype 4a (HCV4a) as a safe and an efficient vaccine delivery system. Gel.NPs were synthesized and characterized (size: 150±2 nm and zeta potential +17.6 mv). NS2 gene was successfully cloned and expressed into E. coli M15 using pQE-30 vector. Antigenicity of the recombinant NS2 protein was confirmed by Western blotting to verify the efficiency of NS2 as a possible vaccine. Then NS2 gene was conjugated to gelatin nanoparticles and a successful conjugation was confirmed by labeling and imaging using Confocal Laser Scanning Microscope (CLSM). Interestingly, the transformation of the conjugated NS2/Gel.NPs complex into E. coli DH5-α was 50% more efficient than transformation with the gene alone. In addition, conjugated NS2/Gel.NPs with ratio 1:100 (w/w) showed higher transformation efficiency into E. coli DH5-α than the other ratios (1:50 and 2:50). Gel.NPs effectively enhanced the gene delivery in bacterial cells without affecting the structure of NS2 gene and could be used as a safe, easy, rapid, cost-effective and non-viral vaccine delivery system for HCV.

  12. City Hub : a cloud based IoT platform for Smart Cities

    OpenAIRE

    Lea, Rodger; Blackstock, Michael

    2014-01-01

    Cloud based Smart City hubs are an attractive approach to addressing some of the complex issues faced when deploying PaaS infrastructure for Smart Cities. In this paper we introduce the general notion of IoT hubs and then discusses our work to generalize our IoT hub as a Smart City PaaS. Two key issues are identified, support for hybrid public/private cloud and interoperability. We briefly describe our approach to these issues and discuss our experiences deploying two cloud-based Smart City h...

  13. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  14. Data Compatibility to Enhance Sustainable Capabilities for Autonomous Analytics in IoT

    Directory of Open Access Journals (Sweden)

    Kaleem Razzaq Malik

    2017-05-01

    Full Text Available The collection of raw data is based on sensors embedded in devices or the environment for real-time data extraction. Nowadays, the Internet of Things (IoT environment is used to support autonomous data collection by reducing human involvement. It is hard to analyze such data, especially when working with the sensors in a real-time environment. On using data analytics in IoT with the help of RDF, many issues can be resolved. Resultant data will have a better chance of quality analytics by reforming data into the semantical annotation. Industrial correspondence through data will be improved by the induction of semantics at large due to efficient data capturing, whereas one popular medium of sensors’ data storage is Relational Database (RDB. This study provides a complete automated mechanism to transform from loosely structured data stored in RDB into RDF. These data are obtained from sensors in semantically annotated RDF stores. The given study comprises methodology for improving compatibility by introducing bidirectional transformation between classical DB and RDF data stores to enhance the sustainable capabilities of IoT systems for autonomous analytics. Two case studies, one on weather and another on heart-rate measurement collections through IoT sensors, are used to show the transformation process in operation.

  15. D-Branes in the Background of NS Fivebranes

    CERN Document Server

    Elitzur, Shmuel; Rabinovici, Eliezer; Sarkisian, G; Kutasov, D; Elitzur, Shmuel; Giveon, Amit; Kutasov, David; Rabinovici, Eliezer; Sarkissian, Gor

    2000-01-01

    We study the dynamics of $D$-branes in the near-horizon geometry of $NS$ fivebranes. This leads to a holographically dual description of the physics of $D$-branes ending on and/or intersecting $NS5$-branes. We use it to verify some properties of such $D$-branes which were deduced indirectly in the past, and discuss some instabilities of non-supersymmetric brane configurations. Our construction also describes vacua of Little String Theory which are dual to open plus closed string theory in asymptotically linear dilaton spacetimes.

  16. High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

    Directory of Open Access Journals (Sweden)

    Sal vatore Gaglio

    2015-05-01

    Full Text Available While the vision of Internet of Things (IoT is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but e ective paradigm of executable code exchange among nodes. In this paper, we show how our methodology can be used to provide IoT resource constrained devices with reasoning abilities by implementing a Fuzzy Logic symbolic extension on deployed nodes at runtime.

  17. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a

  18. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  19. Predicting deleterious nsSNPs: an analysis of sequence and structural attributes

    Directory of Open Access Journals (Sweden)

    Saqi Mansoor AS

    2006-04-01

    Full Text Available Abstract Background There has been an explosion in the number of single nucleotide polymorphisms (SNPs within public databases. In this study we focused on non-synonymous protein coding single nucleotide polymorphisms (nsSNPs, some associated with disease and others which are thought to be neutral. We describe the distribution of both types of nsSNPs using structural and sequence based features and assess the relative value of these attributes as predictors of function using machine learning methods. We also address the common problem of balance within machine learning methods and show the effect of imbalance on nsSNP function prediction. We show that nsSNP function prediction can be significantly improved by 100% undersampling of the majority class. The learnt rules were then applied to make predictions of function on all nsSNPs within Ensembl. Results The measure of prediction success is greatly affected by the level of imbalance in the training dataset. We found the balanced dataset that included all attributes produced the best prediction. The performance as measured by the Matthews correlation coefficient (MCC varied between 0.49 and 0.25 depending on the imbalance. As previously observed, the degree of sequence conservation at the nsSNP position is the single most useful attribute. In addition to conservation, structural predictions made using a balanced dataset can be of value. Conclusion The predictions for all nsSNPs within Ensembl, based on a balanced dataset using all attributes, are available as a DAS annotation. Instructions for adding the track to Ensembl are at http://www.brightstudy.ac.uk/das_help.html

  20. Oncolytic effects of a novel influenza A virus expressing interleukin-15 from the NS reading frame.

    Directory of Open Access Journals (Sweden)

    Marijke van Rikxoort

    Full Text Available Oncolytic influenza A viruses with deleted NS1 gene (delNS1 replicate selectively in tumour cells with defective interferon response and/or activated Ras/Raf/MEK/ERK signalling pathway. To develop a delNS1 virus with specific immunostimulatory properties, we used an optimised technology to insert the interleukin-15 (IL-15 coding sequence into the viral NS gene segment (delNS1-IL-15. DelNS1 and delNS1-IL-15 exerted similar oncolytic effects. Both viruses replicated and caused caspase-dependent apoptosis in interferon-defective melanoma cells. Virus replication was required for their oncolytic activity. Cisplatin enhanced the oncolytic activity of delNS1 viruses. The cytotoxic drug increased delNS1 replication and delNS1-induced caspase-dependent apoptosis. Interference with MEK/ERK signalling by RNAi-mediated depletion or the MEK inhibitor U0126 did not affect the oncolytic effects of the delNS1 viruses. In oncolysis sensitive melanoma cells, delNS1-IL-15 (but not delNS1 infection resulted in the production of IL-15 levels ranging from 70 to 1140 pg/mL in the cell culture supernatants. The supernatants of delNS1-IL-15-infected (but not of delNS1-infected melanoma cells induced primary human natural killer cell-mediated lysis of non-infected tumour cells. In conclusion, we constructed a novel oncolytic influenza virus that combines the oncolytic activity of delNS1 viruses with immunostimulatory properties through production of functional IL-15. Moreover, we showed that the oncolytic activity of delNS1 viruses can be enhanced in combination with cytotoxic anti-cancer drugs.

  1. Identification of specific regions in hepatitis C virus core, NS2 and NS5A that genetically interact with p7 and co-ordinate infectious virus production.

    Science.gov (United States)

    Gouklani, H; Beyer, C; Drummer, H; Gowans, E J; Netter, H J; Haqshenas, G

    2013-04-01

    The p7 protein of hepatitis C virus (HCV) is a small, integral membrane protein that plays a critical role in virus replication. Recently, we reported two intergenotypic JFH1 chimeric viruses encoding the partial or full-length p7 protein of the HCV-A strain of genotype 1b (GT1b; Virology; 2007; 360:134). In this study, we determined the consensus sequences of the entire polyprotein coding regions of the wild-type JFH1 and the revertant chimeric viruses and identified predominant amino acid substitutions in core (K74M), NS2 (T23N, H99P) and NS5A (D251G). Forward genetic analysis demonstrated that all single mutations restored the infectivity of the defective chimeric genomes suggesting that the infectious virus production involves the association of p7 with specific regions in core, NS2 and NS5A. In addition, it was demonstrated that the NS2 T23N facilitated the generation of infectious intergenotypic chimeric virus encoding p7 from GT6 of HCV. © 2012 Blackwell Publishing Ltd.

  2. Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Mahalle, Parikshit N.; Prasad, Neeli R.

    2011-01-01

    Economics of scale in Internet of Things (IoT) presents new security challenges for ubiquitous devices in terms of authentication, addressing and embedded security. Currently available cryptographic techniques require further analysis to determine applicability to IoT. We introduce...

  3. Optical fiber sensors for IoT and smart devices

    CERN Document Server

    Domingues, Maria de Fátima F

    2017-01-01

    This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and analyzing their complexity. Under this scope, this brief presents the existing silica optical fiber sensors and polymer optical fiber sensors solutions, comparing its field of action (sensitivity, accuracy), complexity of manufacture and economic cost. Special attention is given to low-cost production methods. This brief evaluates the different existing techniques, assessing the accuracy and suitability of these sensors for possible Internet of Things (IoT) integration in different considered scenarios. Critical analytical techniques, also covered in this brief, are expected to play a key role in the world of IoT and the smart city of tomorrow.

  4. Ideation of IoT services with citizen: coupling GenIoT and AloHa! methods

    OpenAIRE

    Negri , Anne-Laure; Trousse , Brigitte; Senach , Bernard

    2012-01-01

    International audience; This paper introduces a methodology for designing service concepts in the specific paradigm of the Internet of Things (IoT). In the frame of the European project ELLIOT - Experiential Living Lab for Internet Of Things -, the Living Lab ICT Usage Lab aims at co-creating "green" services, i.e. services based on air quality and noise measurement. These services are invented in an open innovation setting, by a set of stakeholders and not a given service provider. In this c...

  5. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    Directory of Open Access Journals (Sweden)

    Majid Bayani

    2018-01-01

    Full Text Available En la actualidad, las Tecnologías de Información y Comunicación (TIC y asuntos relacionados, tales como el Internet de las Cosas (IoT, por sus siglas en inglés, tiene una influencia decisiva en todos los aspectos de la vida humana. IoT como fenómeno dominante es la transformación de la vida diaria mediante el uso de las funciones inteligentes como la de Identificación por Radio Frecuencia (RFID, por sus siglas en inglés y las Redes de Tecnología de Sensores Inalámbricos (WSN, por sus siglas en inglés. Conforme el IoT avanza, se amplía en tamaño y dimensiones, mejorando muchos de los contextos de la sociedad; tales como, el sistema tradicional de biblioteca. Esta investigación propone un marco de ejecución sobre el empleo del IoT con el fin de renovar la estructura y esquema convencional de las bibliotecas a sistemas inteligentes en línea. El IoT permite la conectividad en tiempo real de un objeto físico (como un libro o cualquier otro tipo de texto mediante el uso de las etiquetas RFID y sensores diminutos. El monitoreo continuo de los libros en tiempo real y la localización de objetos de manera geográfica son algunas de las características que se derivan del uso de las etiquetas de IoT. Estas características de IoT permiten la implementación de una línea de bibliotecas por medio de una cadena de suministros, la integración con diferentes tipos de tecnologías como la base de datos, la recopilación de datos y sistemas en la nube. El Internet de las Cosas también ofrece una panorámica de la vinculación entre el gran número de universidades y bibliotecas en el mundo en tiempo real, todo el tiempo. Se concluye que el implementar el IoT en sistemas de gestión de bibliotecas sería una estructura prometedora que puede jugar un papel vital en la organización de conocimientos del ser humano y en el acceso a informaciones para ayudar a investigadores, diseñadores y administradores en una manera más eficiente e

  6. Io - One of at Least Four Simultaneous Erupting Volcanic Eruptions

    Science.gov (United States)

    1979-01-01

    This photo of an active volcanic eruption on Jupiter's satellite Io was taken 1 hour, 52 minutes after the accompanying picture, late in the evening of March 4, 1979, Pacific time. On the limb of the satellite can be seen one of at least four simultaneous volcanic eruptions -- the first such activity ever observed on another celestial body. Seen against the limb are plume-like structures rising more than 60 miles (100 kilometers) above the surface. Several eruptions have been identified with volcanic structures on the surface of Io, which have also been identified by Voyager 1's infrared instrument as being abnormally hot -- several hundred degrees warmer than surrounding terrain. The fact that several eruptions appear to be occurring at the same time suggests that Io has the most active surface in the solar system and that volcanism is going on there essentially continuously. Another characteristic of the observed volcanism is that it appears to be extremely explosive, with velocities more than 2,000 miles an hour (at least 1 kilometer per second). That is more violent than terrestrial volcanoes like Etna, Vesuvius or Krakatoa.

  7. Extending the POSIX I/O interface: a parallel file system perspective.

    Energy Technology Data Exchange (ETDEWEB)

    Vilayannur, M.; Lang, S.; Ross, R.; Klundt, R.; Ward, L.; Mathematics and Computer Science; VMWare, Inc.; SNL

    2008-12-11

    The POSIX interface does not lend itself well to enabling good performance for high-end applications. Extensions are needed in the POSIX I/O interface so that high-concurrency HPC applications running on top of parallel file systems perform well. This paper presents the rationale, design, and evaluation of a reference implementation of a subset of the POSIX I/O interfaces on a widely used parallel file system (PVFS) on clusters. Experimental results on a set of micro-benchmarks confirm that the extensions to the POSIX interface greatly improve scalability and performance.

  8. Pro iOS Geo building apps with location based services

    CERN Document Server

    Andreucci, Giacomo

    2013-01-01

    Deepen your app development skills with Pro iOS Geo. This book shows you how to use geolocation-based tools to enhance the iOS apps you develop. Author Giacomo Andreucci describes different ways to integrate geo services, depending on the kind of app you're looking to develop: a web app, a hybrid app, or a native app. You'll discover how to use the Google Maps API features to integrate powerful geo capabilities in your apps with a little effort. You'll learn how to: Design geographic features for your apps while respecting usability criteria Design touristic geo apps Use HTML5 and the Google M

  9. Device Centric Throughput and QoS Optimization for IoTsin a Smart Building Using CRN-Techniques

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-10-01

    Full Text Available The Internet of Things (IoT has gained an incredible importance in the communication and networking industry due to its innovative solutions and advantages in diverse domains. The IoT’ network is a network of smart physical objects: devices, vehicles, buildings, etc. The IoT has a number of applications ranging from smart home, smart surveillance to smart healthcare systems. Since IoT consists of various heterogeneous devices that exhibit different traffic patterns and expect different quality of service (QoS in terms of data rate, bit error rate and the stability index of the channel, therefore, in this paper, we formulated an optimization problem to assign channels to heterogeneous IoT devices within a smart building for the provisioning of their desired QoS. To solve this problem, a novel particle swarm optimization-based algorithm is proposed. Then, exhaustive simulations are carried out to evaluate the performance of the proposed algorithm. Simulation results demonstrate the supremacy of our proposed algorithm over the existing ones in terms of throughput, bit error rate and the stability index of the channel.

  10. Desain dan Aplikasi Internet of Thing (IoT untuk Smart Grid Power Sistem

    Directory of Open Access Journals (Sweden)

    Nur Asyik Hidayatullah

    2017-04-01

    Full Text Available Jaringan listrik cerdas atau yang lebih dikenal dengan istilah Smart Grid merupakan salah satu bentuk transformasi dan reformasi teknologi di industri ketenagalistrikan. Smart Grid adalah jaringan energi listrik modern yang secara cerdas dapat mengintegrasikan jaringan listrik dengan perangkat komunikasi yang mendukung pembangkit dan jaringan transmisi distribusi listrik menjadi lebih atraktif, komunikatif dan berkualitas. Smart Grid juga mampu untuk mencegah dan mengisolasi gangguan dengan cepat serta menyajikan informasi data kelistrikan secara real time. Sedangkan Internet of Thing (IoT adalah sebuah metode yang bertujuan untuk memaksimalkan manfaat dari konektivitas internet untuk melakukan transfer dan pemrosesan data-data atau informasi melalui sebuah jaringan internet secara nirkabel, virtual dan otonom. IoT secara teknis dapat mendorong dalam mengembangkan jaringan smart grid dengan mengintegrasikan insfrastruktur utama power sistem mulai dari sisi pembangkit sampai dengan konsumen akhir melalui wireless sensor network secara otomatis. Dengan pemanfaatan IoT diharapkan dapat meningkatkan keandalan sistem informasi dari jaringan listrik serta meningkatkan efisiensi terhadap insfrastruktur listrik yang sudah tersedia. Artikel ini akan menyajikan konsep teknologi smart grid, internet of thing dan membahas model desain dan aplikasi IoT di jaringan smart grid.

  11. A Model of H-NS Mediated Compaction of Bacterial DNA

    NARCIS (Netherlands)

    Joyeux, M.; Vreede, J.

    2013-01-01

    The histone-like nucleoid structuring protein (H-NS) is a nucleoid-associated protein, which is involved in both gene regulation and DNA compaction. H-NS can bind to DNA in two different ways: in trans, by binding to two separate DNA duplexes, or in cis, by binding to different sites on the same

  12. Electron distribution functions in Io plasma torus

    International Nuclear Information System (INIS)

    Boev, A.G.

    2003-01-01

    Electron distribution functions measured by the Voyager 1 in different shares of the Io plasma torus are explained. It is proved that their suprathermal tails are formed by the electrical field induced by the 'Jupiter wind'. The Maxwellian parts of all these spectra characterize thermal equilibrium populations of electrons and the radiation of exited ions

  13. Synthesis and characterization of f-element iodate architectures with variable dimensionality, alpha- and beta-Am(IO3)3.

    Science.gov (United States)

    Runde, Wolfgang; Bean, Amanda C; Brodnax, Lia F; Scott, Brian L

    2006-03-20

    Two americium(III) iodates, beta-Am(IO3)3 (I) and alpha-Am(IO3)3 (II), have been prepared from the aqueous reactions of Am(III) with KIO(4) at 180 degrees C and have been characterized by single-crystal X-ray diffraction, diffuse reflectance, and Raman spectroscopy. The alpha-form is consistent with the known structure type I of anhydrous lanthanide iodates. It consists of a three-dimensional network of pyramidal iodate groups bridging [AmO8] polyhedra where each of the americium ions are coordinated to eight iodate ligands. The beta-form reveals a novel architecture that is unknown within the f-element iodate series. beta-Am(IO3)3 exhibits a two-dimensional layered structure with nine-coordinate Am(III) atoms. Three crystallographically unique pyramidal iodate anions link the Am atoms into corrugated sheets that interact with one another through intermolecular IO3-...IO3- interactions forming dimeric I2O10 units. One of these anions utilizes all three O atoms to simultaneously bridge three Am atoms. The other two iodate ligands bridge only two Am atoms and have one terminal O atom. In contrast to alpha-Am(IO3)3, where the [IO3] ligands are solely corner-sharing with [AmO8] polyhedra, a complex arrangement of corner- and edge-sharing mu2- and mu3-[IO3] pyramids can be found in beta-Am(IO3)3. Crystallographic data: I, monoclinic, space group P2(1)/n, a = 8.871(3) A, b = 5.933(2) A, c = 15.315(4) A, beta = 96.948(4) degrees , V = 800.1(4) A(3), Z = 4; II, monoclinic, space group P2(1)/c, a = 7.243(2) A, b = 8.538(3) A, c = 13.513(5) A, beta = 100.123(6) degrees , V = 822.7(5) A(3), Z = 4.

  14. Performance Analysis of Dual-Polarized Massive MIMO System with Human-Care IoT Devices for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jun-Ki Hong

    2018-01-01

    Full Text Available The performance analysis of the dual-polarized massive multiple-input multiple-output (MIMO system with Internet of things (IoT devices is studied when outdoor human-care IoT devices are connected to a cellular network via a dual-polarized massive MIMO system. The research background of the performance analysis of dual-polarized massive MIMO system with IoT devices is that recently the data usage of outdoor human-care IoT devices has increased. Therefore, the outdoor human-care IoT devices are necessary to connect with 5G cellular networks which can expect 1000 times higher performance compared with 4G cellular networks. Moreover, in order to guarantee the safety of the patient for emergency cases, a human-care Iot device must be connected to cellular networks which offer more stable communication for outdoors compared to short-range communication technologies such as Wi-Fi, Zigbee, and Bluetooth. To analyze the performance of the dual-polarized massive MIMO system for human-care IoT devices, a dual-polarized MIMO spatial channel model (SCM is proposed which considers depolarization effect between the dual-polarized transmit-antennas and the receive-antennas. The simulation results show that the performance of the dual-polarized massive MIMO system is improved about 16% to 92% for 20 to 150 IoT devices compared to conventional single-polarized massive MIMO system for identical size of the transmit array.

  15. Pruning-Based, Energy-Optimal, Deterministic I/O Device Scheduling for Hard Real-Time Systems

    Science.gov (United States)

    2005-02-01

    However, DPM via I/O device scheduling for hard real - time systems has received relatively little attention. In this paper,we present an offline I/O...polynomial time. We present experimental results to show that EDS and MDO reduce the energy consumption of I/O devices significantly for hard real - time systems .

  16. Developments in ROOT I/O and trees

    International Nuclear Information System (INIS)

    Brun, R; Frank, M; Kreshuk, A; Rademakers, F; Canal, P; Russo, P; Linev, S

    2008-01-01

    For the last several months the main focus of development in the ROOT I/O package has been code consolidation and performance improvements. We introduced a new pre-fetch mechanism to minimize the number of transactions between client and server, hence reducing the effect of latency on the time it takes to read a file both locally and over wide are network. We will review the implementation and how well it works in different conditions (gain of an order of magnitude for remote file access). We will also briefly describe new utilities, including a faster implementation of TTree cloning (gain of an order of magnitude), a generic mechanism for object references, and a new entry list mechanism tuned both for small and large number of selections. In addition to reducing the coupling with the core module and becoming its owns library (libRIO) (as part of the general restructuring of the ROOT libraries), the I/O package has been enhanced in the area of XML and SQL support, thread safety, schema evolution, tree queries, and many other areas

  17. Designing Agent Based Inter-Organizational Systems: Business and IOS alignment in the Port of Rotterdam

    NARCIS (Netherlands)

    Douma, A.M.; Moonen, Hans; van Hillegersberg, Jos; van de Rakt, Bastiaan; Schutten, Johannes M.J.

    2006-01-01

    Inter-organizational systems (IOS) hold high promises for improving the coordination of activities in logistics business networks. Although several successful IOS have been implemented, success is scarce in situations where different parties like to keep a large degree of autonomy, are hardly

  18. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  19. Supersymmetric non-singular fractional D2-branes and NS-NS 2-branes

    International Nuclear Information System (INIS)

    Cvetic, M.; Gibbons, G.W.; Lue, H.; Pope, C.N.

    2001-01-01

    We obtain regular deformed D2-brane solutions with fractional D2-branes arising as wrapped D4-branes. The space transverse to the D2-brane is a complete Ricci-flat 7-manifold of G 2 holonomy, which is asymptotically conical with principal orbits that are topologically CP 3 or the flag manifold SU(3)/(U(1)xU(1)). We obtain the solution by first constructing an L 2 normalisable harmonic 3-form. We also review a previously-obtained regular deformed D2-brane whose transverse space is a different 7-manifold of G 2 holonomy, with principal orbits that are topologically S 3 xS 3 . This describes D2-branes with fractional NS-NS 2-branes coming from the wrapping of 5-branes, which is supported by a non-normalisable harmonic 3-form on the 7-manifold. We prove that both types of solutions are supersymmetric, preserving 1/16 of the maximal supersymmetry and hence that they are dual to N=1 three-dimensional gauge theories. In each case, the spectrum for minimally-coupled scalars is discrete, indicating confinement in the infrared region of the dual gauge theories. We examine resolutions of other branes, and obtain necessary conditions for their regularity. The resolution of many of these seems to lie beyond supergravity. In the process of studying these questions, we construct new explicit examples of complete Ricci-flat metrics

  20. The potential of Internet of m-health Things "m-IoT" for non-invasive glucose level sensing.

    Science.gov (United States)

    Istepanian, R S H; Hu, S; Philip, N Y; Sungoor, A

    2011-01-01

    An amalgamated concept of Internet of m-health Things (m-IoT) has been introduced recently and defined as a new concept that matches the functionalities of m-health and IoT for a new and innovative future (4G health) applications. It is well know that diabetes is a major chronic disease problem worldwide with major economic and social impact. To-date there have not been any studies that address the potential of m-IoT for non-invasive glucose level sensing with advanced opto-physiological assessment technique and diabetes management. In this paper we address the potential benefits of using m-IoT in non-invasive glucose level sensing and the potential m-IoT based architecture for diabetes management. We expect to achieve intelligent identification and management in a heterogeneous connectivity environment from the mobile healthcare perspective. Furthermore this technology will enable new communication connectivity routes between mobile patients and care services through innovative IP based networking architectures.

  1. UCH 3 and 4 plant computer system I/O point summary

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What's more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new

  2. An IoT System for Remote Monitoring of Patients at Home

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2017-03-01

    Full Text Available Application areas that utilize the concept of IoT can be broadened to healthcare or remote monitoring areas. In this paper, a remote monitoring system for patients at home in IoT environments is proposed, constructed, and evaluated through several experiments. To make it operable in IoT environments, a protocol conversion scheme between ISO/IEEE 11073 protocol and oneM2M protocol, and a Multiclass Q-learning scheduling algorithm based on the urgency of biomedical data delivery to medical staff are proposed. In addition, for the sake of patients’ privacy, two security schemes are proposed—the separate storage scheme of data in parts and the Buddy-ACK authorization scheme. The experiment on the constructed system showed that the system worked well and the Multiclass Q-learning scheduling algorithm performs better than the Multiclass Based Dynamic Priority scheduling algorithm. We also found that the throughputs of the Multiclass Q-learning scheduling algorithm increase almost linearly as the measurement time increases, whereas the throughputs of the Multiclass Based Dynamic Priority algorithm increase with decreases in the increasing ratio.

  3. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  4. Noonan syndrome and Turner syndrome patients respond similarly to 4 years' growth-hormone therapy

    DEFF Research Database (Denmark)

    Lee, Peter A; Ross, Judith L; Pedersen, Birgitte Tønnes

    2015-01-01

    BACKGROUND: Turner syndrome (TS) and Noonan syndrome (NS) are distinct syndromes associated with short stature and other similar phenotypic features. We compared the responses to growth hormone (GH) therapy of TS and NS patients enrolled in the NordiNet® International Outcome Study (IOS...

  5. Measuring energy conservation on Nova Scotia (NS) farms: A 2004 to 2011 comparison

    International Nuclear Information System (INIS)

    Bailey, J.A.; Duinker, P.; Amyotte, P.; Adams, M.; Khan, F.

    2016-01-01

    Many jurisdictions, including Nova Scotia (NS), have implemented policies and programs around energy. The NS government has targeted energy efficiency and more renewable energy as two main policy areas. The NS Department of Agriculture has taken initiative to provide support to implement energy conservation, energy efficiency and renewable energy opportunities in recent years but have these programs and policies been effective? A baseline energy use survey was conducted in 2005 and responses from mail surveys in 2012 (n = 273, 11.4% response rate) were used to measure the change in NS farm energy use data reported for 2004 and 2011. There have been significant reductions in energy use on NS farms. On average, NS farmers spent $8790 on energy expenses in 2011 compared to $11,228 in 2004. Adjusting for inflation, this is a 32% decrease, despite energy commodity pricing increases beyond the inflation rate. This is likely due to a decrease in energy use and a shift from gasoline use to diesel use. By the end of 2012, 36.0% of NS farmers (more than 860) had received some level of support to evaluate their energy options. This includes 410 energy audits compared to only 36 by the end of 2005. - Highlights: • Nova Scotia farmers decreased their energy costs by 32% between 2004 and 2011. • Energy reductions were likely due to decreased energy use and a shift in fuel use. • An estimated 374 NS farms had an energy audit between 2005 and 2012.

  6. Expression of NS1 of PPV in E.coli%猪细小病毒NS1基因的原核表达

    Institute of Scientific and Technical Information of China (English)

    冉旭华; 闻晓波; 孟凡; 周恩民

    2007-01-01

    根据GenBank发表的猪细小病毒(porcine parvovirus, PPV)中国株基因序列设计引物,通过PCR方法扩增到了PPV LJL12株NS1全长基因,将其克隆到原核表达载pET30a(+)上,成功构建原核表达载体pET30a-NS1,将其转化到大肠杆菌BL21(DE3)感受态细胞.经IPTG诱导表达后,进行SDS-PAGE和Western blot分析.SDS-PAGE电泳显示NS1在大肠杆菌中得到成功表达,重组蛋白大小约为86 ku,与预期大小相符;Western blot分析表明,该蛋白能与PPV阳性血清发生特异性反应,证明该蛋白具有良好生物学活性.NS1在大肠杆菌中成功表达,具有免疫原性,可作为鉴别诊断抗原用于PPV的临床检测.

  7. Construction and analysis of a plant non-specific lipid transfer protein database (nsLTPDB).

    Science.gov (United States)

    Wang, Nai-Jyuan; Lee, Chi-Ching; Cheng, Chao-Sheng; Lo, Wei-Cheng; Yang, Ya-Fen; Chen, Ming-Nan; Lyu, Ping-Chiang

    2012-01-01

    Plant non-specific lipid transfer proteins (nsLTPs) are small and basic proteins. Recently, nsLTPs have been reported involved in many physiological functions such as mediating phospholipid transfer, participating in plant defence activity against bacterial and fungal pathogens, and enhancing cell wall extension in tobacco. However, the lipid transfer mechanism of nsLTPs is still unclear, and comprehensive information of nsLTPs is difficult to obtain. In this study, we identified 595 nsLTPs from 121 different species and constructed an nsLTPs database--nsLTPDB--which comprises the sequence information, structures, relevant literatures, and biological data of all plant nsLTPs http://nsltpdb.life.nthu.edu.tw/. Meanwhile, bioinformatics and statistics methods were implemented to develop a classification method for nsLTPs based on the patterns of the eight highly-conserved cysteine residues, and to suggest strict Prosite-styled patterns for Type I and Type II nsLTPs. The pattern of Type I is C X2 V X5-7 C [V, L, I] × Y [L, A, V] X8-13 CC × G X12 D × [Q, K, R] X2 CXC X16-21 P X2 C X13-15C, and that of Type II is C X4 L X2 C X9-11 P [S, T] X2 CC X5 Q X2-4 C[L, F]C X2 [A, L, I] × [D, N] P X10-12 [K, R] X4-5 C X3-4 P X0-2 C. Moreover, we referred the Prosite-styled patterns to the experimental mutagenesis data that previously established by our group, and found that the residues with higher conservation played an important role in the structural stability or lipid binding ability of nsLTPs. Taken together, this research has suggested potential residues that might be essential to modulate the structural and functional properties of plant nsLTPs. Finally, we proposed some biologically important sites of the nsLTPs, which are described by using a new Prosite-styled pattern that we defined.

  8. Construction and analysis of a plant non-specific lipid transfer protein database (nsLTPDB

    Directory of Open Access Journals (Sweden)

    Wang Nai-Jyuan

    2012-01-01

    Full Text Available Abstract Background Plant non-specific lipid transfer proteins (nsLTPs are small and basic proteins. Recently, nsLTPs have been reported involved in many physiological functions such as mediating phospholipid transfer, participating in plant defence activity against bacterial and fungal pathogens, and enhancing cell wall extension in tobacco. However, the lipid transfer mechanism of nsLTPs is still unclear, and comprehensive information of nsLTPs is difficult to obtain. Methods In this study, we identified 595 nsLTPs from 121 different species and constructed an nsLTPs database -- nsLTPDB -- which comprises the sequence information, structures, relevant literatures, and biological data of all plant nsLTPs http://nsltpdb.life.nthu.edu.tw/. Results Meanwhile, bioinformatics and statistics methods were implemented to develop a classification method for nsLTPs based on the patterns of the eight highly-conserved cysteine residues, and to suggest strict Prosite-styled patterns for Type I and Type II nsLTPs. The pattern of Type I is C X2 V X5-7 C [V, L, I] × Y [L, A, V] X8-13 CC × G X12 D × [Q, K, R] X2 CXC X16-21 P X2 C X13-15C, and that of Type II is C X4 L X2 C X9-11 P [S, T] X2 CC X5 Q X2-4 C[L, F]C X2 [A, L, I] × [D, N] P X10-12 [K, R] X4-5 C X3-4 P X0-2 C. Moreover, we referred the Prosite-styled patterns to the experimental mutagenesis data that previously established by our group, and found that the residues with higher conservation played an important role in the structural stability or lipid binding ability of nsLTPs. Conclusions Taken together, this research has suggested potential residues that might be essential to modulate the structural and functional properties of plant nsLTPs. Finally, we proposed some biologically important sites of the nsLTPs, which are described by using a new Prosite-styled pattern that we defined.

  9. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  10. Cellular automata model for traffic flow at intersections in internet of vehicles

    Science.gov (United States)

    Zhao, Han-Tao; Liu, Xin-Ru; Chen, Xiao-Xu; Lu, Jian-Cheng

    2018-03-01

    Considering the effect of the front vehicle's speed, the influence of the brake light and the conflict of the traffic flow, we established a cellular automata model called CE-NS for traffic flow at the intersection in the non-vehicle networking environment. According to the information interaction of Internet of Vehicles (IoV), introducing parameters describing the congestion and the accurate speed of the front vehicle into the CE-NS model, we improved the rules of acceleration, deceleration and conflict, and finally established a cellular automata model for traffic flow at intersections of IoV. The relationship between traffic parameters such as vehicle speed, flow and average travel time is obtained by numerical simulation of two models. Based on this, we compared the traffic situation of the non-vehicle networking environment with conditions of IoV environment, and analyzed the influence of the different degree of IoV on the traffic flow. The results show that the traffic speed is increased, the travel time is reduced, the flux of intersections is increased and the traffic flow is more smoothly under IoV environment. After the vehicle which achieves IoV reaches a certain proportion, the operation effect of the traffic flow begins to improve obviously.

  11. LHC experience with different bunch spacings in 2011 (25, 50 and 75 ns)

    International Nuclear Information System (INIS)

    Rumolo, G.; Iadarola, G.; Dominguez, O.; Arduini, G.; Bartosik, H.; Claudet, S.; Esteban-Mueller, J.; Roncarolo, F.; Shaposhnikova, E.; Tavian, L.

    2012-01-01

    LHC operation in 2011 had a smooth start in March with 75 ns beams and only one month later moved to 50 ns beam, after a successful dedicated scrubbing run. Several observables, such as pressure rise, heat load in the arcs, beam instability, emittance growth and synchronous phase shift, clearly pointed to the presence of an electron cloud inside the machine during the first days of operation with 50 ns beams. The gradual reduction of all these effects, and their eventual disappearance, over the days of the scrubbing run, indicated electron cloud mitigation and allowed physics production to shift to 50 ns beams. Up to the end of the run the quality of the 50 ns beams was increased by regular stages (first lower transverse emittances, then higher intensities), so that these beams could provide steadily improving peak luminosities. Furthermore, five MD sessions with 25 ns beams took place in the period June-October, but the quality of these beams was always deteriorated by severe electron cloud effects. However, a clear improvement was noticed also with the 25 ns runs. An estimation of the present state of conditioning of the machine and the required scrubbing time can be inferred from electron cloud simulations compared with measured data. (authors)

  12. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  13. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... It can be expected in the future that the number of such clusters will grow exponentially, leading to an ultradense environment of interconnected devices belonging to the same or different clusters with the human user as the center point for the information being sensed, gathered, and processed...

  14. Utility of dengue NS1 antigen rapid diagnostic test for use in difficult to reach areas and its comparison with dengue NS1 ELISA and qRT-PCR.

    Science.gov (United States)

    Shukla, Mohan K; Singh, Neeru; Sharma, Ravendra K; Barde, Pradip V

    2017-07-01

    The objective of this study was to demonstrate the utility of dengue virus (DENV) non structural protein 1 (NS1) based rapid diagnostic test (RDT) for use in tribal and difficult to reach areas for early dengue (DEN) diagnosis in acute phase patients and evaluate its sensitivity and specificity against DENV NS1 enzyme linked immune sorbent assay (ELISA) and real time reverse transcriptase polymerase chain reaction (qRT-PCR). The DENV NS1 RDT was used for preliminary diagnosis during outbreaks in difficult to reach rural and tribal areas. The diagnosis was confirmed by DENV NS1 ELISA in the laboratory. The samples were also tested and serotyped by qRT-PCR. The results were evaluated using statistical tests. The DENV NS1 RDT showed 99.2% sensitivity and 96.0% specificity when analyzed using DENV NS1 ELISA as standard. The specificity and sensitivity of the RDT when compared with qRT-PCR was 93.6% and 91.1%, respectively. The serotype specific evaluation showed more than 90% sensitivity and specificity for DENV-1, 2, and 3. The RDT proved a good diagnostic tool in difficult to reach rural and tribal areas. Further evaluation studies with different commercially available RDTs in different field conditions are essential, that will help clinicians and patients for treatment and programme managers for timely intervention. © 2017 Wiley Periodicals, Inc.

  15. H-NS Facilitates Sequence Diversification of Horizontally Transferred DNAs during Their Integration in Host Chromosomes.

    Directory of Open Access Journals (Sweden)

    Koichi Higashi

    2016-01-01

    Full Text Available Bacteria can acquire new traits through horizontal gene transfer. Inappropriate expression of transferred genes, however, can disrupt the physiology of the host bacteria. To reduce this risk, Escherichia coli expresses the nucleoid-associated protein, H-NS, which preferentially binds to horizontally transferred genes to control their expression. Once expression is optimized, the horizontally transferred genes may actually contribute to E. coli survival in new habitats. Therefore, we investigated whether and how H-NS contributes to this optimization process. A comparison of H-NS binding profiles on common chromosomal segments of three E. coli strains belonging to different phylogenetic groups indicated that the positions of H-NS-bound regions have been conserved in E. coli strains. The sequences of the H-NS-bound regions appear to have diverged more so than H-NS-unbound regions only when H-NS-bound regions are located upstream or in coding regions of genes. Because these regions generally contain regulatory elements for gene expression, sequence divergence in these regions may be associated with alteration of gene expression. Indeed, nucleotide substitutions in H-NS-bound regions of the ybdO promoter and coding regions have diversified the potential for H-NS-independent negative regulation among E. coli strains. The ybdO expression in these strains was still negatively regulated by H-NS, which reduced the effect of H-NS-independent regulation under normal growth conditions. Hence, we propose that, during E. coli evolution, the conservation of H-NS binding sites resulted in the diversification of the regulation of horizontally transferred genes, which may have facilitated E. coli adaptation to new ecological niches.

  16. H-NS Facilitates Sequence Diversification of Horizontally Transferred DNAs during Their Integration in Host Chromosomes.

    Science.gov (United States)

    Higashi, Koichi; Tobe, Toru; Kanai, Akinori; Uyar, Ebru; Ishikawa, Shu; Suzuki, Yutaka; Ogasawara, Naotake; Kurokawa, Ken; Oshima, Taku

    2016-01-01

    Bacteria can acquire new traits through horizontal gene transfer. Inappropriate expression of transferred genes, however, can disrupt the physiology of the host bacteria. To reduce this risk, Escherichia coli expresses the nucleoid-associated protein, H-NS, which preferentially binds to horizontally transferred genes to control their expression. Once expression is optimized, the horizontally transferred genes may actually contribute to E. coli survival in new habitats. Therefore, we investigated whether and how H-NS contributes to this optimization process. A comparison of H-NS binding profiles on common chromosomal segments of three E. coli strains belonging to different phylogenetic groups indicated that the positions of H-NS-bound regions have been conserved in E. coli strains. The sequences of the H-NS-bound regions appear to have diverged more so than H-NS-unbound regions only when H-NS-bound regions are located upstream or in coding regions of genes. Because these regions generally contain regulatory elements for gene expression, sequence divergence in these regions may be associated with alteration of gene expression. Indeed, nucleotide substitutions in H-NS-bound regions of the ybdO promoter and coding regions have diversified the potential for H-NS-independent negative regulation among E. coli strains. The ybdO expression in these strains was still negatively regulated by H-NS, which reduced the effect of H-NS-independent regulation under normal growth conditions. Hence, we propose that, during E. coli evolution, the conservation of H-NS binding sites resulted in the diversification of the regulation of horizontally transferred genes, which may have facilitated E. coli adaptation to new ecological niches.

  17. MANER : Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In

  18. ns-2 extension to simulate localization system in wireless sensor networks

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2011-09-01

    Full Text Available The ns-2 network simulator is one of the most widely used tools by researchers to investigate the characteristics of wireless sensor networks. Academic papers focus on results and rarely include details of how ns-2 simulations are implemented...

  19. Io è una storia: autore, narratore, personaggi nella narrazione di sé

    Directory of Open Access Journals (Sweden)

    Giorgio Bert

    2011-04-01

    Full Text Available L’io che si racconta non parla di ciò che avviene ma di ciò che è avvenuto, e anche se sono passati pochi istanti si tratta già di passato. Il presente non si può narrare, il presente è un vortice, un caos; il tentativo di raccontare le cose mentre avvengono si risolve in una comunicazione confusa, spezzettata, balbettante in cui si intrecciano in modo poco coerente e disordinato eventi, fatti, emozioni, interpretazioni. Tra l’io che vive e l’io che racconta esiste un fossato invalicabile. Quando la persona narra e si narra costruisce una storia che –per quanto tenga conto di fatti effettivamente avvenuti- non è (né potrebbe essere una fedele descrizione di quanto è accaduto. La narrazione dà alla sequenza degli eventi un ordine arbitrario, colmando i vuoti, omettendo particolari e spesso, più o meno consapevolmente, inventandone di nuovi. Ciò che ne risulta è in ogni caso fiction.

  20. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...