WorldWideScience

Sample records for ucb vpn mac

  1. VPN ja OpenVPN

    OpenAIRE

    Talja, Timo

    2015-01-01

    Tämän opinnäytetyön tarkoituksena on tutustua VPN-teknologiaan sekä eri salausprotokolliin. Teoriaosuudessa käydään läpi erilaisia salausprotokollia. Käytännön osuuden aikana luodaan toimiva OpenVPN-palvelinympäristö Virtualbox-virtuaalikoneohjelmiston avulla. Kaikki opinnäytetyössä käytetyt sovellukset perustuvat avoimeen lähdekoodiin. Työssä käydään läpi tarvittavat asennusvaiheet sertifikaattien sekä avaimien luontiin palvelimelle. Työssä luodaan myös esimerkiksi älypuhelimelle OpenVPN...

  2. Windows VPN Set Up | High-Performance Computing | NREL

    Science.gov (United States)

    Windows VPN Set Up Windows VPN Set Up To set up Windows for HPC VPN, here are the steps: Download your version of Windows. Note: We only support the the Endian Connect software when connecting to the a VPN connection to the HPC systems. Windows Version Connect App Windows 10

  3. VPN-yhdyskäytävä

    OpenAIRE

    Syrjä, Lauri

    2011-01-01

    Lahden ammattikorkeakoulun tekniikan alan tietoverkkolaboratorion käyttämän VPN-yhdyskäytäväohjelmiston kehittänyt yritys siirtyi toisen yrityksen omistukseen loppuvuodesta 2008. Ohjelmiston tuki lopetettiin ja sen avoin kehitys jatkui toisella tuotenimellä ja siirtyi lopulta OpenVPN:n vastuulle. Tästä syystä käytössä olevalle VPN-yhdyskäytävälle tarvittiin korvaava ratkaisu. Tavoitteena oli tutustua erilaisiin VPN-yhdyskäytäväratkaisuihin ja valita ympäristöön parhaiten soveltuva tuote s...

  4. UCB-NE-107 user's manual

    International Nuclear Information System (INIS)

    Lee, W.W.L.

    1989-03-01

    The purpose of this manual is to provide users of UCB-NE-107 with the information necessary to use UCB-NE-107 effectively. UCB-NE-107 is a computer code for calculating the fractional rate of readily soluble radionuclides that are released from nuclear waste emplaced in water-saturated porous media. Waste placed in such environments will gradually dissolve. For many species such as actinides and rare earths, the process of dissolution is governed by the exterior flow field, and the chemical reaction rate or leaching rate. However, for readily soluble species such as 135 Cs, 137 Cs, and 129 I, it has been observed that their dissolution rates are rapid. UCB-NE-107 is a code for calculating the release rate at the waste/rock interface, to check compliance with the US Nuclear Regulatory Commission's (USNRC) subsystem performance objective. It is an implementation of the analytic solution given below. 5 refs., 2 figs

  5. Virtual private network (VPN)

    International Nuclear Information System (INIS)

    Caskey, Susan

    2006-01-01

    A virtual private network (VPN) is the essential security feature that allows remote monitoring systems to take advantage of the low communications cost of the internet. This paper introduces the VPN concept and summarizes the networking and security principles. The mechanics of security, for example, types of encryption and protocols for exchange of keys between partners, are explained. Important issues for partners in different countries include the interoperability and mutual accreditations of systems. (author)

  6. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  7. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  8. UCB-NE-101 user's manual

    International Nuclear Information System (INIS)

    Lee, W.W.L.

    1989-02-01

    The purpose of this manual is to provide users of UCB-NE-101 with the information necessary to use UCB-NE-101 effectively. UCB-NE-101 calculates the concentration of solubility-limited species as a function of space and time and its mass flux rates from a waste sphere buried in a nuclear waste repository in water-saturated rock. The waste is surrounded by one type of rock, and some distance away, there is another type of rock. The inner layer of rock can be a backfill around a nuclear waste package and the outer layer the natural rock. The mass flux calculated is at the interface of the two layers. The species concentration calculated is in the inner layer. A constant concentration of the species, usually the solubility, is specified at the waste sphere/inner layer interface. Dissolution and transport is governed by the solubility of the species, and diffusion in the porous media. 1 ref., 1 fig

  9. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  10. Open source system OpenVPN in a function of Virtual Private Network

    Science.gov (United States)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  11. Analisis Jaringan VPN Menggunakan PPTP dan L2TP

    Directory of Open Access Journals (Sweden)

    Syariful Ikhwan

    2017-08-01

    Full Text Available VPN adalah teknologi yang membuat jaringan private (pribadi dengan menggunakan jaringan publik agar proses pertukaran data menjadi aman. Teknologi VPN biasanya diterapkan untuk koneksi antara kantor pusat dan kantor cabang. Dinhubkominfo Kabupaten Banyumas sebagai tempat penelitian memiliki beberapa kantor cabang (SKPD. Data yang dipertukarkan antar kantor cabang pada Dinhubkominfo terdiri dari beberapa jenis, namun pada penelitian ini hanya difokuskan pada pertukaran layanan FTP. Teknologi vpn yang saat ini digunakan pada jaringan Dinhubkominfo adalah PPTP. Akan tetapi, penggunaan teknologi tersebut belum tersebut masih belum diketahui tingkat performansi jaringan dibandingkan dengan penggunaan teknologi vpn yang lain. Pada penelitian ini akan dibandingkan penggunaan dua teknologi vpn yang berbeda yaitu antara PPTP dan L2TP, dimana parameter yang digunakan adalah throughput, delay, jitter, dan packet loss. Proses pengambilan data dilakukan dengan menambahkan beban trafik sebesar 512 kbps, 1024 kbps, dan 2048 kbps. Dari hasil penelitian diperoleh data bahwa, rata-rata nilai Delay pada L2TP lebih besar hingga 41% dibanding saat menggunakan PPTP, rata-rata Throughput PPTP naik hingga 34% dibandingkan L2TP, Rata-rata Jitter pada PPTP lebih besar hingga 44% dibandingkan L2TP, sedangkan packet loss yang terjadi pada masing-masing layanan vpn adalah 0

  12. A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Directory of Open Access Journals (Sweden)

    Perta Vasile C.

    2015-04-01

    Full Text Available Commercial Virtual Private Network (VPN services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

  13. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  14. All-optical VPN utilizing DSP-based digital orthogonal filters access for PONs

    Science.gov (United States)

    Zhang, Xiaoling; Zhang, Chongfu; Chen, Chen; Jin, Wei; Qiu, Kun

    2018-04-01

    Utilizing digital filtering-enabled signal multiplexing and de-multiplexing, a cost-effective all-optical virtual private network (VPN) system is proposed, for the first time to our best knowledge, in digital filter multiple access passive optical networks (DFMA-PONs). Based on the DFMA technology, the proposed system can be easily designed to meet the requirements of next generation network's flexibility, elasticity, adaptability and compatibility. Through dynamic digital filter allocation and recycling, the proposed all-optical VPN system can provide dynamic establishments and cancellations of multiple VPN communications with arbitrary traffic volumes. More importantly, due to the employment of DFMA technology, the system is not limited to a fixed signal format and different signal formats such as pulse amplitude modulation (PAM), quadrature amplitude modulation (QAM) and orthogonal frequency division multiplexing (OFDM) can be used. Moreover, one transceiver is sufficient to simultaneously transmit upstream (US)/VPN data to optical line terminal (OLT) or other VPN optical network units (ONUs), thus leading to great reduction in network constructions and operation expenditures. The proposed all-optical VPN system is demonstrated with the transceiver incorporating the formats of QAM and OFDM, which can be made transparent to downstream (DS), US and VPN communications. The bit error rates (BERs) of DS, US and VPN for OFDM signals are below the forward-error-correction (FEC) limit of 3 . 8 × 10-3 when the received optical powers are about -16.8 dBm, -14.5 dBm and -15.7 dBm, respectively.

  15. The Difference Between Using Proxy Server and VPN

    Directory of Open Access Journals (Sweden)

    David Dwiputra Kurniadi

    2015-11-01

    For example, looking for software, game through internet. But sometimes, there are some websites that cannot be opened as they have Internet Positive notificatio. To solve that problem, hacker found the solution by creating Proxy Server or VPN. In this time internet is very modern and very easy to access and there are a lot of Proxy Server and VPN that can be easly used.

  16. Performance Evaluation of Software Routers with VPN Features

    Directory of Open Access Journals (Sweden)

    H. Redžović

    2017-11-01

    Full Text Available This paper presents implementation and analysis of the VPN software router which is based on Quagga and strongSwan open-source software tools. We validated the functionalities of strongSwan and Quagga in realistic environment which include scenarios with link failures. Also, we measured and analyzed the performance of encryption and hash algorithms supported by strongSwan software, in order to advise an optimal VPN configuration that provides the best performance.

  17. CONFIGURING AND USING OPEN VPN ON WINDOWS OS

    OpenAIRE

    Ngekeh, Prisca

    2016-01-01

    Hacking is becoming a more critical issue in the world of science and technology today, hence it is necessary to add more security devices to the network to ensure the security of information. Open virtual private network (OpenVPN) is one among the many ways companies use to securely connect in different locations or a remote user connecting to a company’s network. This thesis work describes how to configure and use OpenVPN with Windows operating system. The following paragraphs discusses wha...

  18. OpenVPN and Multipath TCP

    OpenAIRE

    Paulus, Aloïs

    2015-01-01

    Testing the performances of using Multipath TCP and OpenVPN on a consumer grade router to aggregate multiple Internet connections and provide a fast and reliable connection to individuals and small companies. Master [60] en sciences informatiques, Université catholique de Louvain, 2015

  19. Access to CERN from the Internet: termination of the VPN service

    CERN Multimedia

    2007-01-01

    Due to the continued incidents and growing security risks from the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued on Tuesday 29th January 2008. In addition, new registrations will no longer be accepted. Further information is linked from: http://cern.ch/security/vpn Users are requested to stop using VPN immediately and start using the recommended alternative methods for connecting to CERN from the Internet. These are outlined together with a set of FAQs at: http://cern.ch/security/Internet IT Department

  20. Vulnerability analysis on a VPN for a remote monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Soo; Kim, Jong Soo; Park, Il Jin; Min, Kyung Sik; Choi, Young Myung [KAERI, Taejon (Korea, Republic of)

    2004-08-01

    14 Pressurized Water Reactors(PWR) in Korea use a Remote Monitoring System(RMS), which have been in Korea Since 1998. A memorandum of understanding on remote monitoring, based on enhanced cooperation on PWRs, was signed at the 10th safeguards review meeting in October 2001 between the International Atomic Energy Agency(IAEA) and Ministry Of Science and Technology(MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an internet system for remote monitoring. According to the internet-based Virtual Private Network(VPN) applied to remote monitoring, the Korea Atomic Energy Research Institute(KAERI) came to an agreement with the IAEA, using a Member State Support Program(MSSP). Phase I is a lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated system(SDIS) server, IAEA server and TCNC(Technology Center for Nuclear Control) server. In each system, Virtual Private Network(VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS server and VPN; TCNC server and VPN; and IAEA server and VPN) via penetration testing.

  1. Vulnerability analysis on a VPN for a remote monitoring system

    International Nuclear Information System (INIS)

    Kim, Jung Soo; Kim, Jong Soo; Park, Il Jin; Min, Kyung Sik; Choi, Young Myung

    2004-01-01

    14 Pressurized Water Reactors(PWR) in Korea use a Remote Monitoring System(RMS), which have been in Korea Since 1998. A memorandum of understanding on remote monitoring, based on enhanced cooperation on PWRs, was signed at the 10th safeguards review meeting in October 2001 between the International Atomic Energy Agency(IAEA) and Ministry Of Science and Technology(MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an internet system for remote monitoring. According to the internet-based Virtual Private Network(VPN) applied to remote monitoring, the Korea Atomic Energy Research Institute(KAERI) came to an agreement with the IAEA, using a Member State Support Program(MSSP). Phase I is a lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated system(SDIS) server, IAEA server and TCNC(Technology Center for Nuclear Control) server. In each system, Virtual Private Network(VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS server and VPN; TCNC server and VPN; and IAEA server and VPN) via penetration testing

  2. VPN (Virtual Private Network) Performance Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Calderon, Calixto; Goncalves, Joao G.M.; Sequeira, Vitor [Joint Research Centre, Ispra (Italy). Inst. for the Protection and Security of the Citizen; Vandaele, Roland; Meylemans, Paul [European Commission, DG-TREN (Luxembourg)

    2003-05-01

    Virtual Private Networks (VPN) is an important technology allowing for secure communications through insecure transmission media (i.e., Internet) by adding authentication and encryption to the existing protocols. This paper describes some VPN performance indicators measured over international communication links. An ISDN based VPN link was established between the Joint Research Centre, Ispra site, Italy, and EURATOM Safeguards in Luxembourg. This link connected two EURATOM Safeguards FAST surveillance stations, and used different vendor solutions hardware (Cisco router 1720 and Nokia CC-500 Gateway). To authenticate and secure this international link, we have used several methods at the different levels of the seven-layered ISO network protocol stack (i.e., Callback feature, CHAP - Challenge Handshake Protocol - authentication protocol). The tests made involved the use of different encryption algorithms and the way session secret keys are periodically renewed, considering these elements influence significantly the transmission throughput. Future tests will include the use of a wide variety of wireless media transmission and terminal equipment technologies, in particular PDAs (Personal Digital Assistants) and Notebook PCs. These tests aim at characterising the functionality of VPNs whenever field inspectors wish to contact headquarters to access information from a central archive database or transmit local measurements or documents. These technologies cover wireless transmission needs at different geographical scales: roombased level Bluetooth, floor or building level Wi-Fi and region or country level GPRS.

  3. Access to CERN from the Internet: termination of the VPN service - Reminder

    CERN Multimedia

    IT Department

    2008-01-01

    Due to the continued incidents and growing security risks associated with the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued as of Tuesday, 29 January 2008. In addition, new registrations are no longer accepted. For further information see: http://cern.ch/security/vpn. Users are requested to stop using VPN immediately and to start to use the recommended alternative methods for connecting to CERN from the Internet. An outline of these methods and a set of FAQs are available at: http://cern.ch/security/Internet IT Department

  4. Assessment of SDN technology for an easy-to-use VPN service

    NARCIS (Netherlands)

    Pol, R. van der; Gijsen, B.M.M.; Zuraniewski, P.; Romão, D.F.C.; Kaat, M.

    2016-01-01

    This paper describes how state-of-the-art SDN technology can be used to create and validate a user configurable, on-demand VPN service. In the Community Connection (CoCo) project an architecture for the VPN service was designed and a prototype was developed based on the OpenFlow protocol and the

  5. Evaluación de redes MPLS/VPN/BGP con rutas reflejadas

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-06-01

    Full Text Available In this paper, we study and evaluate the MPLS/VPN/BGP backbone level according to RFC4364, focusing on connecting intranet systems. The algorithm evaluates BGP Route Reflectionscenarios for connecting routers CE (Customer Edge and PE (Provider Edge Network since the establishment of MPLS VRF (Virtual Routing and Forwarding and its performance in connection through the VPN.

  6. The EUVE Mission at UCB: Squeezing More From Less

    Science.gov (United States)

    Stroozas, B. A.; Cullison, J. L.; McDonald, K. E.; Nevitt, R.; Malina, R. F.

    2000-05-01

    With 8 years on orbit, and over three years in an outsourced mode at U.C. Berkeley (UCB), NASA's Extreme Ultraviolet Explorer (EUVE) continues to be a highly mature and productive scientific mission. The EUVE satellite is extremely stable and exhibits little degradation in its original scientific capabilities, and science data return continues to be at the >99% level. The Project's very small, dedicated, innovative, and relatively cheap ( \\$1 million/year) support team at UCB continues to validate the success of NASA's outsourcing "experiment" while providing a very high science-per-dollar return on NASA's investment with no significant additional risk to the flight systems. The EUVE mission still has much more to offer in terms of important and exciting scientific discoveries as well as mission operations innovations. To highlight this belief the EUVE team at UCB continues to find creative ways to do more with less -- to squeeze the maximum out of available funds -- in NASA's "cheaper, better, faster" environment. This paper provides an overview of the EUVE mission's past, current, and potential future efforts toward automating and integrating its multi-functional data processing systems in proposal management, observation planning, mission operations and engineering, and the processing, archival, and delivery of raw telemetry and science data products. The paper will also discuss the creative allocation of the Project's few remaining personnel resources who support both core mission functions and new innovations, while at the same time minimizing overall risk and stretching the available budget. This work is funded through NASA/UCB Cooperative Agreement NCC5-138.

  7. A reconfigurable all-optical VPN based on XGM effect of SOA in WDM PON

    Science.gov (United States)

    Hu, Xiaofeng; Zhang, Liang; Cao, Pan; Wang, Tao; Su, Yikai

    2010-12-01

    We propose and experimentally demonstrate a reconfigurable all-optical VPN scheme enabling intercommunications among different ONUs in a WDM PON. Reconfiguration is realized by dynamically setting wavelength conversion of optical VPN signal using a SOA in the OLT.

  8. [11C]UCB-A, a novel PET tracer for synaptic vesicle protein 2 A

    International Nuclear Information System (INIS)

    Estrada, Sergio; Lubberink, Mark; Thibblin, Alf; Sprycha, Margareta; Buchanan, Tim; Mestdagh, Nathalie; Kenda, Benoit; Mercier, Joel; Provins, Laurent; Gillard, Michel; Tytgat, Dominique; Antoni, Gunnar

    2016-01-01

    Introduction: Development of a selective and specific high affinity PET tracer, [ 11 C]UCB-A, for the in vivo study of SV2A expression in humans. Radiochemistry and preclinical studies in rats and pigs including development of a tracer kinetic model to determine V T . A method for the measurement of percent intact tracer in plasma was developed and the radiation dosimetry was determined in rats. Results: 3–5 GBq of [ 11 C]UCB-A could be produced with radiochemical purity exceeding 98% with a specific radioactivity of around 65 GBq/μmol. In vitro binding showed high selective binding towards SV2A. [ 11 C]UCB-A displayed a dose-dependent and reversible binding to SV2A as measured with PET in rats and pigs and the V T could be determined by Logan analysis. The dosimetry was favorable and low enough to allow multiple administrations of [ 11 C]UCB-A to healthy volunteers, and the metabolite analysis showed no sign of labeled metabolites in brain. Conclusions: We have developed the novel PET tracer, [ 11 C]UCB-A, that can be used to measure SV2A expression in vivo. The dosimetry allows up to 5 administrations of 400 MBq of [ 11 C]UCB-A in humans. Apart from measuring drug occupancy, as we have shown, the tracer can potentially be used to compare SV2A expression between individuals because of the rather narrow range of baseline V T values. This will have to be further validated in human studies.

  9. A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,in which the security-demanded transmission connections can switch smoothly among the multiple proxies by maintaining a coherent connection context. The mechanism is transparent to application programs and can support the building of VPN. With the cooperation of some other security components,the mechanism guarantees the resource availability and reliability of the end system against some attacks to the specific ports or hosts.

  10. Pembuatan Game Dengan Menerapkan Metode Decision Tree: UCB1, Untuk Menentukan Pemilihan Strategy Dalam AI.

    OpenAIRE

    Santoso, Erick; Budhi, Gregorius Satia; Intan, Rolly

    2017-01-01

    So that the aim of this research is to testing how good is UCB1 method when implemented into the main method that the game works.The test will test the UCB1 method work as the movement of enemy diffilcuty level. But with some rules that make this method become more flexible to use. So the enemy diffilcuty will adapt to player diffilcuties.The result of this research is the UCB1 method can be use to enemy diffilcuty level movement. This method can make the enemy become more adapt to the player.

  11. Implementace OpenVPN na platformě Windows CE

    OpenAIRE

    Ešner, Oldřich

    2008-01-01

    Motivací pro vznik této diplomové práce, která navazuje na stejnojmenný semestrální projekt, byl převod aplikace pro tvorbu virtuálních privátních sítí OpenVPN z operačního systému Windows XP na platformu Windows CE Embedded 6.0. Práce pojednává obecně o virtuálních privátních sítích, a podrobněji o jedné z jejich implementací - OpenVPN. Uvádí základní vlastnosti operačního systému Windows CE, dále popisuje princip ovladačů zařízení v operačních systémech na bázi Windows NT, používaný Windows...

  12. OCT4A contributes to the stemness and multi-potency of human umbilical cord blood-derived multipotent stem cells (hUCB-MSCs)

    International Nuclear Information System (INIS)

    Seo, Kwang-Won; Lee, Sae-Rom; Bhandari, Dilli Ram; Roh, Kyoung-Hwan; Park, Sang-Bum; So, Ah-Young; Jung, Ji-Won; Seo, Min-Soo; Kang, Soo-Kyung; Lee, Yong-Soon; Kang, Kyung-Sun

    2009-01-01

    The OCT4A gene, a POU homeodomain transcription factor, has been shown to be expressed in embryonic stem cells (ESC) as well as hUCB-MSCs. In this study, the roles played by OCT4A in hUCB-MSCs were determined by stably inhibiting OCT4A with lenti-viral vector-based small hairpin RNA (shRNA). A decreased rate of cell proliferation was observed in OCT4-inhibited hUCB-MSCs. Down-regulation of CCNA2 expression in OCT4-inhibited hUCB-MSCs was confirmed by RT-PCR and real-time RT-PCR analysis in three genetically independent hUCB-MSC clones. Adipogenic differentiation was also suppressed in OCT4-inhibited hUCB-MSCs. The up-regulation of DTX1 and down-regulation of HDAC1, 2, and 4 expressions may be related to this differentiation deformity. The expression of other transcription factors, including SOX2, REX1 and c-MYC, was also affected by OCT4 inhibition in hUCB-MSCs. In conclusion, these finding suggest that OCT4A performs functionally conserved roles in hUCB-MSCs, making its expression biologically important for ex vivo culture of hUCB-MSCs.

  13. OCT4A contributes to the stemness and multi-potency of human umbilical cord blood-derived multipotent stem cells (hUCB-MSCs)

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Kwang-Won; Lee, Sae-Rom; Bhandari, Dilli Ram; Roh, Kyoung-Hwan; Park, Sang-Bum; So, Ah-Young; Jung, Ji-Won; Seo, Min-Soo [Adult Stem Cell Research Center, College of Veterinary Medicine, Seoul National University 151-742, Seoul (Korea, Republic of); Laboratory of Stem Cell and Tumor Biology, Department of Veterinary Public Health, College of Veterinary Medicine, and BK21 Program for Veterinary Science, Seoul National University 151-742, Seoul (Korea, Republic of); Kang, Soo-Kyung [Adult Stem Cell Research Center, College of Veterinary Medicine, Seoul National University 151-742, Seoul (Korea, Republic of); Laboratory of Biotechnology, College of Veterinary Medicine, and BK21 Program for Veterinary Science, Seoul National University 151-742, Seoul (Korea, Republic of); Lee, Yong-Soon [Adult Stem Cell Research Center, College of Veterinary Medicine, Seoul National University 151-742, Seoul (Korea, Republic of); Laboratory of Stem Cell and Tumor Biology, Department of Veterinary Public Health, College of Veterinary Medicine, and BK21 Program for Veterinary Science, Seoul National University 151-742, Seoul (Korea, Republic of); Kang, Kyung-Sun, E-mail: kangpub@snu.ac.kr [Adult Stem Cell Research Center, College of Veterinary Medicine, Seoul National University 151-742, Seoul (Korea, Republic of); Laboratory of Stem Cell and Tumor Biology, Department of Veterinary Public Health, College of Veterinary Medicine, and BK21 Program for Veterinary Science, Seoul National University 151-742, Seoul (Korea, Republic of)

    2009-06-19

    The OCT4A gene, a POU homeodomain transcription factor, has been shown to be expressed in embryonic stem cells (ESC) as well as hUCB-MSCs. In this study, the roles played by OCT4A in hUCB-MSCs were determined by stably inhibiting OCT4A with lenti-viral vector-based small hairpin RNA (shRNA). A decreased rate of cell proliferation was observed in OCT4-inhibited hUCB-MSCs. Down-regulation of CCNA2 expression in OCT4-inhibited hUCB-MSCs was confirmed by RT-PCR and real-time RT-PCR analysis in three genetically independent hUCB-MSC clones. Adipogenic differentiation was also suppressed in OCT4-inhibited hUCB-MSCs. The up-regulation of DTX1 and down-regulation of HDAC1, 2, and 4 expressions may be related to this differentiation deformity. The expression of other transcription factors, including SOX2, REX1 and c-MYC, was also affected by OCT4 inhibition in hUCB-MSCs. In conclusion, these finding suggest that OCT4A performs functionally conserved roles in hUCB-MSCs, making its expression biologically important for ex vivo culture of hUCB-MSCs.

  14. A Model of Building Multi-campus Library Education Resourses Network Based on MPLS VPN

    Directory of Open Access Journals (Sweden)

    WANG Guang-ze

    2017-06-01

    Full Text Available For the problems of most merged schools that it is difficulty to integrate the original library education resources network due to scattered campus,and it is inconvenient to use teaching resources for outwork teachers and students,this paper puts forward the technology of using multi - protocol label switching virtual private network ( MPLS VPN to integrate education resources in multi - campus library. Through setting up security tunnel between the library education subnet,MPLS VPN ensure the safety of data transmission,so as achieve the goal of resource integration,optimization and share,implements the exclusive use for the electronic teaching business of library. Experimental data show that this model has advantages compared with traditional VPN networking.

  15. Banking Umbilical Cord Blood (UCB) Stem Cells: Awareness, Attitude and Expectations of Potential Donors from One of the Largest Potential Repository (India).

    Science.gov (United States)

    Pandey, Deeksha; Kaur, Simar; Kamath, Asha

    2016-01-01

    The concept of Umbilical Cord blood (UCB) stem cells is emerging as a non-invasive, efficacious alternative source of hematopoietic stem cells to treat a variety of blood and bone marrow diseases, blood cancers, metabolic disorders and immune deficiencies. Aim of the present study was to determine the level of awareness about banking UCB among pregnant women in India. We also assessed patient perception for banking of UCB and explored the patient expectations of banking UCB in future. This is the first study to assess current attitudes, in a sample population of potential donors from one of the largest potential UCB repository (India). Obtaining this information may help optimize recruitment efforts and improve patient education. Present explorative questionnaire based survey included 254 pregnant women in the final analysis. We established only 26.5% pregnant women in our study population knew what exactly is meant by UCB. A large proportion (55.1%) was undecided on whether they want to bank UCB or not. Women were more aware of the more advertised private cord blood banking compared to public banking. More than half of the pregnant women expected their obstetrician to inform them regarding UCB. One-third of the women in our population had undue expectations from banking of the UCB. Obstetricians should play a more active role in explaining the patients regarding pros and cons of UCB banking.

  16. Banking Umbilical Cord Blood (UCB Stem Cells: Awareness, Attitude and Expectations of Potential Donors from One of the Largest Potential Repository (India.

    Directory of Open Access Journals (Sweden)

    Deeksha Pandey

    Full Text Available The concept of Umbilical Cord blood (UCB stem cells is emerging as a non-invasive, efficacious alternative source of hematopoietic stem cells to treat a variety of blood and bone marrow diseases, blood cancers, metabolic disorders and immune deficiencies. Aim of the present study was to determine the level of awareness about banking UCB among pregnant women in India. We also assessed patient perception for banking of UCB and explored the patient expectations of banking UCB in future. This is the first study to assess current attitudes, in a sample population of potential donors from one of the largest potential UCB repository (India. Obtaining this information may help optimize recruitment efforts and improve patient education.Present explorative questionnaire based survey included 254 pregnant women in the final analysis.We established only 26.5% pregnant women in our study population knew what exactly is meant by UCB. A large proportion (55.1% was undecided on whether they want to bank UCB or not. Women were more aware of the more advertised private cord blood banking compared to public banking. More than half of the pregnant women expected their obstetrician to inform them regarding UCB. One-third of the women in our population had undue expectations from banking of the UCB.Obstetricians should play a more active role in explaining the patients regarding pros and cons of UCB banking.

  17. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    Science.gov (United States)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  18. Laboratorní úloha Virtuální sítě typu OpenVPN

    OpenAIRE

    Kortus, Jiří

    2012-01-01

    Tato práce v úvodu popisuje principy virtuálních privátních sítí (VPN) a stručně zmiňuje hlavní protokoly a přístupy pro jejich realizaci. Následně se podrobněji zaměřuje na seznámení čtenáře s charakterem a vlastnostmi sítí OpenVPN. Uvádí jednotlivé rysy a možnosti, diskutuje jejich výhody a nevýhody. Dále se věnuje návrhu laboratorní práce zaměřené na použití OpenVPN. Diskutuje možnosti návrhu práce zejména z technického a didaktického hlediska. Na jejich základě představuje koncept laborat...

  19. セキュア ナ VPN テキヨウ ムセン LAN ノ コウセイ ト トクセイ

    OpenAIRE

    塩田, 宏明

    2003-01-01

    This paper presents the wireless LAN using a VPN(Virtual Private Network).The wireless LAN is based on IEEE 802.11b standard. The wireless access point(AP)is connected to a VPN server,which is connected to the lnternet.The wireless station(STA)is a VPN remote access point.The wireless LAN using a VPN between an AP and a STA is based on the Point to Point Tunneling Protocol(PPTP).

  20. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  1. Adenovirus vector-mediated ex vivo gene transfer of brain-derived neurotrophic factor (BDNF) tohuman umbilical cord blood-derived mesenchymal stem cells (UCB-MSCs) promotescrush-injured rat sciatic nerve regeneration.

    Science.gov (United States)

    Hei, Wei-Hong; Almansoori, Akram A; Sung, Mi-Ae; Ju, Kyung-Won; Seo, Nari; Lee, Sung-Ho; Kim, Bong-Ju; Kim, Soung-Min; Jahng, Jeong Won; He, Hong; Lee, Jong-Ho

    2017-03-16

    This study was designed toinvestigate the efficacy of adenovirus vector-mediated brain-derived neurotrophic factor (BDNF) ex vivo gene transfer to human umbilical cord blood-derived mesenchymal stem cells (UCB-MSCs) in a rat sciatic nerve crush injury model. BDNF protein and mRNA expression after infection was checked through an enzyme-linked immunosorbent assay (ELISA) and quantitative real-time polymerase chain reaction (qRT-PCR). Male Sprague-Dawley rats (200-250g, 6 weeks old) were distributed into threegroups (n=20 each): the control group, UCB-MSC group, and BDNF-adenovirus infected UCB-MSC (BDNF-Ad+UCB-MSC) group. UCB-MSCs (1×10 6 cells/10μl/rat) or BDNF-Ad+UCB-MSCs (1×10 6 cells/10μl/rat)were transplantedinto the rats at the crush site immediately after sciatic nerve injury. Cell tracking was done with PKH26-labeled UCB-MSCs and BDNF-Ad+UCB-MSCs (1×10 6 cells/10μl/rat). The rats were monitored for 4 weeks post-surgery. Results showed that expression of BDNF at both the protein and mRNA levels was higher inthe BDNF-Ad+UCB-MSC group compared to theUCB-MSC group in vitro.Moreover, BDNF mRNA expression was higher in both UCB-MSC group and BDNF-Ad+ UCB-MSC group compared tothe control group, and BDNF mRNA expression in theBDNF-Ad+UCB-MSC group was higher than inboth other groups 5days after surgeryin vivo. Labeled neurons in the dorsal root ganglia (DRG), axon counts, axon density, and sciatic function index were significantly increased in the UCB-MSC and BDNF-Ad+ UCB-MSCgroupscompared to the controlgroup four weeksaftercell transplantation. Importantly,the BDNF-Ad+UCB-MSCgroup exhibited more peripheral nerve regeneration than the other two groups.Our results indicate thatboth UCB-MSCs and BDNF-Ad+UCB-MSCscan improve rat sciatic nerve regeneration, with BDNF-Ad+UCB-MSCsshowing a greater effectthan UCB-MSCs. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. PENGARUH TEPUNG DAUN GAMAL DAN DAUN KELOR DALAM UREA CASSAVA BLOK (UCB TERHADAP KECERNAAN, KADAR VFA, DAN NH3 IN-VITRO

    Directory of Open Access Journals (Sweden)

    N M. WITARIADI

    2012-09-01

    Full Text Available ABSTRAK Penelitian telah dilakukan dengan tujuan untuk mendapatkan informasi tentang pengaruh tepung daun gamal dan daun kelor sebagai sumber protein dalam urea cassava blok (UCB terhadap kecernaan bahan kering, bahan organik, kadar VFA, dan NH3 cairan rumen pakan jerami padi secara invitro. Penelitian dilaksanakan dengan mempergunakan rancangan acak lengkap (RAL dengan 3 perlakuan dan 5 ulangan. Sehingga secara keseluruhan terdapat 15 unit penelitian. Adapun ketiga perlakuan tersebut adalah: Perlakuan A (jerami padi + UCB yang ditambah tepung daun kelor; B (jerami padi + UCB yang ditambah tepung daun gamal, dan C (jerami padi + UCB yang ditambah tepung daun kelor dan daun gamal. Varibel yang diamati adalah kecernaan bahan kering (KCBK , kecernaan bahan organik (KCBO in-vitro, produksi vollatile fatty acid (VFA, produksi NH3, dan pH supernatan. Hasil penelitian mendapatkan bahwa KCBK, KCBO invitro, VFA, NH3, dan pH supernatan pada ketiga perlakuan berbeda nyata (P<0,05. Penggunaan daun gamal sebagai sumber protein pada UCB menghasilkan KCBK, KCBO, VFA, NH3, tertinggi dibandingkan dengan daun kelor maupun kombinasi antara daun gamal dan daun kelor. EFFECT OF USING GLIRICIDIA (Gliricidia sepium AND MORINGA (Moringa oleifera LEAVES MEALS IN UREA CASSAVA BLOCK (UCB ON DIGESTIBILITY, VOLLATILE FATTY ACID, AND NH3 IN-VITRO. ABSTRACT The experiment has been conducted in order to now the effect of Gliricidia sepium and Moringa oleifera leaves meal a source of protein in urea cassava block (UCB to the digestibility dray matter and organic matter , VFA and ammonia concentration with rice straw diet. The experiment set in completely randomized design using three treatment. The treatment are: A (rise straw + UCB with Moringa; B (rise straw + UCB with Gliricidia sepium, and C (rise straw + UCB with Moringa and Gliricidia sepium. The observed variable are: dry matter, organic matter digestibility, volatile fatty acid, ammonia concentration, and pH rumen juice

  3. QoS Parameters Evaluation in a VPN-MPLS Diffserv Network under a Complete Free Software Emulation Environment

    Directory of Open Access Journals (Sweden)

    Miroslava Aracely Zapata Rodríguez

    2017-12-01

    Full Text Available The use of Virtual Private Network – Multi Protocol Label Switching (VPN-MPLS networks has become very common inside enterprises thanks to their multiple advantages; such as, the private communication across a public network infrastructure between geographically diverse sites. This leads to a need for an efficient network in terms of Quality of Service (QoS to guarantee reliability and security of information. However, the implementation of a VPN-MPLS network is neither easy nor cheap for small and medium companies; hence, in most cases, it is required the use of emulators that are not free either. In this paper, we analyze a VPN-MPLS network in terms of QoS metrics: delay, jitter and packet loss. This evaluation was performed in a virtual environment using only free software tools under two test scenarios, with and without Differentiated Services (DiffServ. The results showed that a VPN-MPLS DiffServ network reduces the delay by approximately 96.78% in VoIP, 39.21% in Data and 66.83% in Streaming; furthermore, the jitter was reduced by approximately 27.88% in VoIP and 41.09% in Data.

  4. Impact of Implementing VPN to Secure Wireless LAN

    OpenAIRE

    H. Bourdoucen; A. Al Naamany; A. Al Kalbani

    2009-01-01

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) bein...

  5. Implementasi OpenVPN Mobile dan Mikrotik Dial Dengan Autentikasi via Remote Authentication Dial-In Service dan Active Radius

    OpenAIRE

    Wicaksono, Akbar Kurnia

    2018-01-01

    Abstrak -- Dalam menjalankan sebuah bisnis, perusahaan akan saling bertukar data baik internal maupun eksternal melalui internet. Data merupakan suatu hal yang sangat penting bagi sebuah perusahaan dan masih sering terjadi kebocoran data di Internet. Oleh karena itu dibutuhkan suatu cara untuk mencegah kebocoran data dengan cara menerapkan Virtual Private Network pada jaringan sebuah perusahaan. Dengan menggunakan VPN, dapat memberikan keamanan yang lebih untuk jaringan sebuah perusahaan. VPN...

  6. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  7. RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA

    Directory of Open Access Journals (Sweden)

    Devi Ruwaida

    2018-01-01

    Full Text Available File Transfer Protocol (FTP server merupakan jenis sistem yang menghubungkan hak pengakses (client dan penyedia (server dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna  yang akan di konfigurasi pada debian 9.1 dengan  di tambahnya pengaman sertifikat ssl , dengan harapan  melindungi proses dalam pengiriman data dapat dengan aman dan ditambahkannya sistem VPN PPTP pada mikrotik akan lebih memberikan keamanan yang lebih baik lagi, dimana pemanfaatan Point-to-Point Tunneling Protocol (PPTP suatu protokol jaringan yang bisa memungkinkan client dalam pengiriman data secara aman melalui remote client kepada server sekolah dibangunnya suatu virtual private network (VPN.

  8. Technical Report : ContikiMAC vs X-MAC performance analysis

    OpenAIRE

    Michel, Mathieu; Quoitin, Bruno

    2014-01-01

    This paper try to better understand the performance of ContikiMAC compared to X-MAC. ContikiMAC achieves a transmission by repeatedly transmitting a data packet until the reception of an ACK from the destination. While X-MAC uses a stream of small size strobes to advertise the destination of the incoming transmission. A priori, X-MAC is then less bandwidth consumptive. To better understand the efficiency of ContikiMAC, despite an intuitively more consumptive transmitting procedure, we have co...

  9. Comparison of the Ex Vivo Expansion of UCB-Derived CD34+ in 3D DBM/MBA Scaffolds with USSC as a Feeder Layer.

    Science.gov (United States)

    Sadat Hashemi, Zahra; Forouzandeh Moghadam, Mahdi; Soleimani, Masoud

    2013-10-01

    Ex vivo expansion of hematopoitic stem cells is an alternative way to increase umbilical cord blood (UCB)-CD34+ cells for bone marrow transplantation. For this purpose demineralized bone matrix (DBM) and mineralized bone allograft (MBA) as two scaffolds based on bone matrix and stem cell niche, were simultaneously used to enhance the effect of human mesenchymal progenitor cells (MPCs) - unrestricted somatic stem cells (USSCs) - as a feeder layer. USSCs were isolated and characterized by morphological and immunological analysis then seeded on both scaffolds as a feeder layer. UCB-CD34(+) were isolated by MACS method and were co-culture expanded by USSC in 3D and 2D environments. After 3 weeks expansion, cells were counted and were assessed by karyotype, flow cytometry, clonogenic activity, and long-term culture-initiating cells (LTC-IC). Co-culture expansion in DBM and MBA was 29.22-fold and 27.77-fold, no significant differences in colony and LTC-IC were obtained. Maximum number of colonies belonged to the day 14 with the 73% CFU-GM (Colony Forming Unit- Granulocyte/Macrophage) in contrast to the day 0 which was BFU-E/CFU-E (Burst/Colony Forming Unit-Erythroid). Flow cytometry indicated that the percentage of CD34+ marker was decreased in USSC co-culture and the highest percentage was observed in simple 2D culture. Because of acid extraction in the DBM production process, mineral materials were removed and the protein background that was more flexible was presented. Therefore these results suggest that USSC-DBM can be a suitable ex vivo mimicry niche by intensifying of surface/volume ratio and supporting the stem cell differentiation and expansion.

  10. Mac Bible

    CERN Document Server

    Spivey, Dwight

    2009-01-01

    This essential guide answers all your questions on using a Macintosh computer, whether you?re unpacking your very first Mac after switching from a PC or upgrading from an older Mac. You?ll walk through all pre-installed Mac applications, including using Mac OS X, browsing the Web using Safari, downloading music from the iTunes store, troubleshooting Mac-specific problems, organizing photos in iPhoto, organizing calendars in iCal, editing digital video in iMovie, and more.

  11. Macs for dummies

    CERN Document Server

    Baig, Edward C

    2014-01-01

    Get the most out of your Mac with this comprehensive guide Macs For Dummies, 13th Edition is the ultimate guide to your Mac, fully updated to include information about the latest updates. The book walks you through troubleshooting, syncing mobile devices, integrating Windows, and more, so you can take advantage of everything Macs have to offer. Whether you're a new user, a recent convert, or you just want to get the most out of your Mac, this book puts all the information you need in one place. Discover what makes Macs superior computing machines. Learn the basics, from mastering the Dock and

  12. Role of Delamination in Zeolite-Catalyzed Aromatic Alkylation: UCB-3 versus 3-D Al-SSZ-70

    Energy Technology Data Exchange (ETDEWEB)

    Runnebaum, Ron C.; Ouyang, Xiaoying; Edsinga, Jeffrey A.; Rea, Thomas; Arslan, Ilke; Hwang, Son-Jong; Zones, Stacey I.; Katz, Alexander

    2014-07-03

    Delaminated zeolite UCB-3 exhibits 2.4-fold greater catalytic activity relative to its three-dimensional (3D) zeolite counterpart, Al-SSZ-70, and 2.0-fold greater activity (per catalyst mass) when compared with industrial catalyst MCM-22, for the alkylation of toluene with propylene at 523 K. The former increase is nearly equal to the observed relative increase in external surface area and acid sites upon delamination. However, at 423 K for the same reaction, UCB-3 exhibits a 3.5-fold greater catalytic activity relative to 3D Al-SSZ-70. The higher relative rate enhancement for the delaminated material at lower temperature can be elucidated on the basis of increased contributions from internal acid sites. Evidence of possible contributions from such acid sites is obtained by performing catalysis after silanation treatment, which demonstrates that although virtually all catalysis in MCM-22 occurs on the external surface, catalysis also occurs on internal sites for 3D Al-SSZ-70. The additional observed enhancement at low temperatures can therefore be rationalized by greater access to internal active sites as a result of sheet breakage during delamination. Such breakage leads to shorter characteristic internal diffusion paths and was visualized using TEM comparisons of UCB-3 and 3D Al-SSZ-70.

  13. Clusterové řešení OpenVPN pro bezvýpadkový provoz

    OpenAIRE

    Dokoupil, Jiří

    2013-01-01

    Cílem této bakalářské práce je analyzovat možnosti běhu OpenVPN v clusteru a takové řešení implementovat. Nejprve se zabývá analýzou stávajících technologií, možnostmi přístupu k této problematice. Následně je pak rozvedeno navržené řešení, kde je následně popsána implementace. Nakonec jsou zhodnoceny dosažené výsledky, převážně formou testů implementovaného řešení. The aim of this bachelor's thesis is to analyze the possibilities for running the OpenVPN daemon in a cluster and to implemen...

  14. Mac Security Bible

    CERN Document Server

    Kissell, Joe

    2010-01-01

    Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  15. iMac portable genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    The most up-to-date coverage on the latest iMac advice, tools, and shortcuts Cool and useful tips, full-color screenshots, and savvy advice show you how to get the most out of your iMac. Fully updated to cover the iMac's latest features and capabilities, this guide is packed with indispensible information on iLife '09 and Mac OS X Snow Leopard, and shows you how to customize your iMac in a way that it will work best for you.Explores all the bells and whistles of the iMac, including the new Magic Mouse, iLife apps such as iPhoto and iMovie, and Mac OS X Snow LeopardShows yo

  16. MacBook for dummies

    CERN Document Server

    Chambers , Mark L

    2014-01-01

    Make friends with your MacBook the fun and easy way! Ultra-light, ultra-fast, and ultra-powerful, the MacBook is the coolest laptop in town, and longtime Mac guru Mark L. Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. Whether this is your first MacBook or your first laptop, period, you''ll learn to navigate the Mac desktop, c

  17. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  18. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2014-01-01

    Do it all with your iMac and this bestselling For Dummies guide! You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one computer. This updated edition of iMac For Dummies is the ideal way to learn the iMac fundamentals from setting up and personalizing your machine to importing files, making FaceTime video calls, surfing the web, using your favorite programs and apps, and everything in between. Trusted Mac guru Mark

  19. Mac at Work

    CERN Document Server

    Sparks, David

    2011-01-01

    Bridge the gap between using a Mac at home and at the office. Now that you love your Mac at home, you want to use one at the office without missing a beat of productivity or professionalism. This unique guide shows you how.  You'll find best Mac business practices for handling word processing, spreadsheet and presentation creation, task and project management, and graphics. The book also explores topics such as hardware maintenance, how to synchronize with multiple computers, data backup, and communication with Windows networks.: Covers the nuts and bolts of using a Mac at work, including sync

  20. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MAC...

  1. Phenotypic variation among trees in a population of a Pistacia atlantica X P. integerrima cross sold as UCB-1 rootstock for grafting P. vera (pistachio) cultivars

    Science.gov (United States)

    UCB-1 is widely used in California as a pistachio rootstock because of its Verticillium resistance, salt and cold tolerance, and vigor. It can grow in most locations in California. However, significant variation exists in the phenotypic performance of trees grafted to seedling UCB-1 rootstocks. In J...

  2. MacBook Teach Yourself VISUALLY

    CERN Document Server

    Miser, Brad

    2010-01-01

    Like the MacBook itself, Teach Yourself VISUALLY MacBook, Second Edition is designed to be visually appealing, while providing excellent functionality at the same time. By using this book, MacBook users will be empowered to do everyday tasks quickly and easily. From such basic steps as powering on or shutting down the MacBook, working on the Mac desktop with the Dashboard and its widgets to running Windows applications, Teach Yourself VISUALLY MacBook, Second Edition covers all the vital information and provides the help and support a reader needs—in many ways it's like having a Mac Genius at

  3. iMac pocket genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    If you want to get the very most out of your iMac, put this savvy Portable Genius guide to work. Want to make the most of the new Magic Mouse and the latest iLife apps? Set up a wireless network using your iMac's AirPort card? Watch television on your iMac, or show iMac videos and movies on your television? You'll find cool and useful Genius tips, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you time and let you enjoy your iMac to the max.

  4. Enterprise Mac Administrator's Guide

    CERN Document Server

    Edge, Charles; Hunter, Beau

    2009-01-01

    Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with "switcher" campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep cu

  5. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    The bestselling guide to the ultimate all-in-one computer—now updated and revised throughout! If you're looking for speed, performance, and power, the iMac is the ultimate all-in-one computer. From its superior performance, powerful operating system, and amazing applications, the iMac is one awesome machine, and the fun, friendly, and approachable style of iMac For Dummies is an ideal way to get started with the basics. You'll learn the fundamentals of the iMac including setting up and customizing your iMac and the software that comes with it, importing files from your old computer, send

  6. Macs For Dummies, Pocket Edition

    CERN Document Server

    Baig, Edward C

    2011-01-01

    The fun and easy way to make the most of your wonderful Mac. Simply Mac-nificent — all the cool things your Mac can do! This handy guide helps you figure out the nuts and bolts of your Mac. Navigate the Mac desktop, use the Safari Web browser to surf the Internet, e-mail photos to friends and family, create and print documents, rip audio CDs, and more. The fun begins right here!. Open the book and find: How to set up and configure your Mac; Tips for getting around on the Mac desktop; Steps for setting up an e-mail account and browsing the Internet; Details about the free programs that come wit

  7. Enterprise Mac administrators guide

    CERN Document Server

    Smith, William

    2015-01-01

    IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration.

  8. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  9. I-MAC: an incorporation MAC for wireless sensor networks

    Science.gov (United States)

    Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie

    2017-11-01

    This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.

  10. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  11. Gotcha! Macs lose their innocence

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still believe your Mac is secure because Microsoft PCs fall prey to viruses and worms but Macs don’t? Time to wake up! This year has seen the first major compromise of Macs worldwide*. How is yours doing?   The “Flashback” Trojan is affecting Apple’s own variant of Java and compromises Macs via so-called drive-by infections, i.e. when you visit an appropriately prepared (infected!) website - and this might not necessarily be a site with questionable contents, but could well be a popular, reputable one. Security Companies worldwide have been monitoring this particular Trojan for a while and have estimated that more than half a million Macs were compromised. Connected to a few central command and control servers, the compromised Macs were then supporting the malicious activity of the bad guys! Fortunately, the security companies have now been able to take over those command and control servers and stop their destructive drive. So, Mac users, face the f...

  12. The UCB particle monitor: A tool for logging frequency of smoking and the intensity of second-hand smoke concentrations in the home

    Energy Technology Data Exchange (ETDEWEB)

    Semple, Sean; Apsley, Andrew; Moir, Gill; Henderson, George; Ayres, Jon, E-mail: sean.semple@abdn.ac.u [Department of Environmental and Occupational Medicine, Liberty Safe Work Research Centre, University of Aberdeen, Foresterhill Road, Aberdeen AB25 2ZP (United Kingdom)

    2009-02-01

    Second-hand tobacco smoke (SHS) exposure generates a large public health burden. Recent legislation has moved to prohibit smoking in public places and there are concerns that this may lead to an increase in exposures in private homes. Measurement of SHS aerosol has tended to use active pumped samples or longer-term diffusive badges. Pumped methods are noisy and poorly tolerated in home settings while diffusive badges do not provide real-time data. The UCB particle monitor (UCB-PM) is a modified smoke-alarm device capable of logging changes in airborne particulate matter over extended periods and has been used successfully to measure biomass fuel smoke concentrations in developing world settings This study has examined the use of the UCB-PM to measure SHS aerosol in both controlled laboratory conditions and a pilot field trial over a 7 day period in a smoker's home. Comparisons with a pumped sampler (TSI Sidepak Personal Aerosol Monitor) indicate good agreement over a range of exposure concentrations but there is evidence of a threshold effect at approximately 0.5 mg/m{sup 3} of fine particulate measured as PM{sub 2.5}. While this threshold effect undermines the ability of the device to provide useful data on the time-weighted average SHS concentration, the field trial indicates that that the UCB-PM has a sensitivity of about 71% and a specificity of 98%. The device has many advantages including zero noise operation, low cost and long battery life and may be a useful tool in quitting and smoke-free home intervention studies.

  13. [18F]UCB-H BINDING QUANTIFICATION IN RAT BRAIN: FROM MODELLING TO SUV

    OpenAIRE

    Serrano Navacerrada, Maria Elisa; Bahri, Mohamed Ali; Becker, Guillaume; Warnier, Corentin; Mievis, Frédéric; Giacomelli, Fabrice; Lemaire, Christian; Luxen, André; Plenevaux, Alain

    2018-01-01

    Introduction Image quantification in Positron Emission Tomography (PET) is usually achieved through the invasive and sometimes infeasible arterial blood sampling [1, 2]. Alternative methods have been proposed, but a validation of their results is necessary [3, 4]. In the scope of improving the use of [18F]UCB-H, a specific biomarker for the Synaptic Vesicle protein 2A (SV2A) [5, 6, 7, 8], we have compared the distribution volume (VT) obtained through full kinetic modelling using a Pop...

  14. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter.

    Science.gov (United States)

    Modali, Sita D; Zgurskaya, Helen I

    2011-08-01

    Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.

  15. MPLS Unleashed: Remedy Using IPSEC over MPLS VPN

    Science.gov (United States)

    Shirazi, Syed Noor-Ul-Hassan; Asim, Muhammad; Irfan, Muhammad; Ikram, Nassar

    As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.

  16. Analisa dan Perancangan Jaringan Berbasis VPN Pada PT. Finroll

    Directory of Open Access Journals (Sweden)

    Johan Muliadi Kerta

    2010-12-01

    Full Text Available Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN, PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future. 

  17. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  18. Mycobacterium Avium Complex (MAC)

    Science.gov (United States)

    ... sweat, and saliva red-orange (may stain contact lenses); can interfere with birth control pills. Many drug interactions. CAN MAC BE PREVENTED? The bacteria that cause MAC are very common. It is ...

  19. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  20. Cognitive MAC designs for OSA networks

    CERN Document Server

    Derakhshani, Mahsa

    2014-01-01

    This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive M

  1. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter

    OpenAIRE

    Modali, Sita D.; Zgurskaya, Helen I.

    2011-01-01

    Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation o...

  2. Learn Excel 2011 for Mac

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Microsoft Excel 2011 for Mac OS X is a powerful application, but many of its most impressive features can be difficult to find. Learn Excel 2011 for Mac by Guy Hart-Davis is a practical, hands-on approach to learning all of the details of Excel 2011 in order to get work done efficiently on Mac OS X. From using formulas and functions to creating databases, from analyzing data to automating tasks, you'll learn everything you need to know to put this powerful application to use for a variety of tasks. What you'll learn * The secrets of the Excel for Mac interface! * How to create effective workbo

  3. Mac Programming for Absolute Beginners

    CERN Document Server

    Wang, Wallace

    2011-01-01

    Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs.

  4. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2007-01-01

    Thinking of making the switch from your PC to a Mac? Congratulations! You're in for a great, virus-free ride. And Switching to Mac For Dummies makes it smoother than you ever imagined. From buying the Mac that's right for you to transferring your files to breaking your old Windows habits and learning to do things the (much easier) Mac way, it makes the whole process practically effortless. Whether you've been using Windows XP, Vista, or even Linux, you'll find simple, straightforward ways to make your transition go smoothly. That will leave you plenty of time to get familiar with Mac'

  5. Enterprise Mac Managed Preferences

    CERN Document Server

    Marczak, Edward

    2010-01-01

    Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple's Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also be used in Windows environments or where no dedicated server exists at all. Enterprise Mac Managed Preferences is the definitive guide to Apple's Managed Client technology. With this book, you'll get the following: * An example-driven guide to Mac OS X Managed Pr

  6. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  7. Mac OS X Tiger for Unix Geeks

    CERN Document Server

    Jepson, Brian

    2005-01-01

    If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Gee

  8. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  9. AeroMACS system characterization and demonstrations

    Science.gov (United States)

    Kerczewski, R. J.; Apaza, R. D.; Dimond, R. P.

    This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  10. MacBook All-in-One For Dummies

    CERN Document Server

    Chambers, Mark L

    2011-01-01

    Get comfortable and confident with your MacBook! Combining the fun-but-straightforward content of nine minibooks, this new edition of MacBook All-in-One For Dummies delivers helpful coverage of the rich features and essential tools you need to know to use the MacBook to its fullest potential. You'll learn an array of MacBook basics while veteran author Mark Chambers walks you through setting up your MacBook, running programs, finding files with Finder, searching with Spotlight, keeping track with Address Book, enjoying music with iTunes, creating cool multimedia projects with iLife, and more.

  11. Mac OS X Lion Server For Dummies

    CERN Document Server

    Rizzo, John

    2011-01-01

    The perfect guide to help administrators set up Apple's Mac OS X Lion Server With the overwhelming popularity of the iPhone and iPad, more Macs are appearing in corporate settings. The newest version of Mac Server is the ideal way to administer a Mac network. This friendly guide explains to both Windows and Mac administrators how to set up and configure the server, including services such as iCal Server, Podcast Producer, Wiki Server, Spotlight Server, iChat Server, File Sharing, Mail Services, and support for iPhone and iPad. It explains how to secure, administer, and troubleshoot the networ

  12. Switching to the Mac The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls, inefficien

  13. Macs all-in-one for dummies

    CERN Document Server

    Hutsko, Joe

    2014-01-01

    Your all-in-one guide to unleashing your Mac's full potential It's a Mac world out there. But if you haven't read the instruction manual, you may be neglecting some of your computer's coolest features. Turn to Macs All-in-One For Dummies' jam-packed guide to access the incredible tools within your computer. With this fully updated reference, you will learn how to use Launchpad and Mission Control; protect your Mac; back up and restore data with Time Machine; sync across devices in iCloud; import, organize, and share photos; direct in iMovie; compose in GarageBand; and so much more. The possi

  14. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  15. Mac OS X ja tietoturva

    OpenAIRE

    Herranen, Joni

    2011-01-01

    Tämän opinnäytetyön tavoitteena on luoda kattava kokonaiskuva Mac OS X -käyttöjärjestelmän sisäänrakennetuista tietoturvaratkaisuista ja selvittää miten tietoturvaratkaisut toteuttavat tietoturvan kolmea perustavoitetta eli luottamuksellisuutta, eheyttä ja saatavuutta. Työn kohderyhmäksi on valittu edistyneemmät tietokoneenkäyttäjät, joilla ei ole aikaisempaa Mac-kokemusta. Teoriaosuudessa syvennytään aluksi Apple-yhtiöön sekä Mac OS X -järjestelmän teknisiin ominaisuuksiin. Osuuden pääta...

  16. Learn Mac OS X Snow Leopard

    CERN Document Server

    Meyers, Scott

    2009-01-01

    You're smart and savvy, but also busy. This comprehensive guide to Apple's Mac OS X 10.6, Snow Leopard, gives you everything you need to know to live a happy, productive Mac life. Learn Mac OS X Snow Leopard will have you up and connected lickity split. With a minimum of overhead and a maximum of useful information, you'll cover a lot of ground in the time it takes other books to get you plugged in. If this isn't your first experience with Mac OS X, skip right to the "What's New in Snow Leopard" sections. You may also find yourself using this book as a quick refresher course or a way

  17. Java and Mac OS X

    CERN Document Server

    Davis, T Gene

    2010-01-01

    Learn the guidelines of integrating Java with native Mac OS X applications with this Devloper Reference book. Java is used to create nearly every type of application that exists and is one of the most required skills of employers seeking computer programmers. Java code and its libraries can be integrated with Mac OS X features, and this book shows you how to do just that. You'll learn to write Java programs on OS X and you'll even discover how to integrate them with the Cocoa APIs.: Shows how Java programs can be integrated with any Mac OS X feature, such as NSView widgets or screen savers; Re

  18. Development of high yielding Soybean variety MACS 450 by using Kalitur mutant-MACS 111

    International Nuclear Information System (INIS)

    Raut, V.M.; Taware, S.P.; Halvankar, G.B.; Varghese, Philips

    2000-01-01

    A mutant variety -MACS 111 developed by treating seeds of indigenous black seeded 'Kalitur' variety with gamma irradiation + Ethyleneimine was used in development of high yielding varieties. MACS 450 a promising high yielding variety was selected from Bragg x MACS 111 cross by pedigree selection method. This variety gave the highest average seed yield in station trials (3422 kg/ha), coordinated breeding trials (2361 kg/ha) and varieties cum plant population trial (2215 kg/ha). On the basis of its performance in these trials it was released for commercial cultivation in Southern India. On all India basis, it also recorded the highest seed yield of 4076 kg/ha and 3582 kg/ha in Front line Demonstrations conducted on the farmers' field during 1998 and 1999 respectively. (author)

  19. Take control the Mac OS X lexicon

    CERN Document Server

    Zardetto, Sharon

    2009-01-01

    This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, fo

  20. MacA, a periplasmic membrane fusion protein of the macrolide transporter MacAB-TolC, binds lipopolysaccharide core specifically and with high affinity.

    Science.gov (United States)

    Lu, Shuo; Zgurskaya, Helen I

    2013-11-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.

  1. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2011-01-01

    Tips and techniques for forward-thinking MacBook Pro users Now that you have a MacBook Pro, you need just one more accessory, your very own copy of MacBook Pro Portable Genius, Third Edition. This handy, compact book lets you in on a wealth of tips and tricks, so you get the very most out of Apple's very popular notebook. Discover the latest on the most recent release of iLife, get the skinny on the new Intel Core i7 and i5 processors in the Pro, see how to go wireless in a smart way, and much more. The book is easy to navigate, doesn't skimp on the essentials, and helps you save time and avoi

  2. MacSelfService online tutorial

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Mac Self-Service is a functionality within the Mac Desktop Service built and maintained to empower CERN users by giving them easy access to applications and configurations through the Self-Service application. This tutorial (text attached to the event page) explains how to install Mac Self-Service and how to use it to install applications and printers. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  3. MAC reduction of isoflurane by sufentanil.

    Science.gov (United States)

    Brunner, M D; Braithwaite, P; Jhaveri, R; McEwan, A I; Goodman, D K; Smith, L R; Glass, P S

    1994-01-01

    We have shown previously that a plasma fentanyl concentration of 1.67 ng ml-1 reduced the MAC of isoflurane by 50%. By comparing equal degrees of MAC reduction by sufentanil, we may determine the potency ratio of these opioids. Seventy-six patients were allocated randomly to receive predetermined infusions of sufentanil, and end-tidal concentrations of isoflurane in oxygen. Blood samples were obtained 10 min after the start of the infusion, and just before and after skin incision. Any purposeful movement by the patient was recorded. The MAC reduction of isoflurane produced by sufentanil was obtained using a logistic regression model. A sufentanil plasma concentration of 0.145 ng ml-1 (95% confidence limits 0.04, 0.26 ng ml-1) resulted in a 50% reduction in the MAC of isoflurane. At a plasma concentration greater than 0.5 ng ml-1, sufentanil exhibited a ceiling effect.

  4. Automated sensitivity analysis of the radionuclide migration code UCB-NE-10.2

    International Nuclear Information System (INIS)

    Pin, F.G.; Worley, B.A.; Oblow, E.M.; Wright, R.Q.; Harper, W.V.

    1985-01-01

    The Salt Repository Project (SRP) of the U.S. Department of Energy is performing ongoing performance assessment analyses for the eventual licensing of an underground high-level nuclear waste repository in salt. As part of these studies, sensitivity and uncertainty analyses play a major role in the identification of important parameters, and in the identification of specific data needs for site characterization. Oak Ridge National Laboratory has supported the SRP in this effort resulting in thee development of an automated procedure for performing large scale sensitivity analysis using computer calculus. GRESS, GRadient Enhanced Software System, is a pre-compiler that can process FORTRAN computer codes and add derivative taking capabilities to the normal calculated results. The GRESS code is described and applied to the code UCB-NE-10.2 which simulates the migration through a sorption medium of the radionuclide members of a decay chain

  5. Office 2008 for Mac for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Office 2008 for Mac is here, with great new enhancements to all your favorite office productivity tools. Who better than "Dr. Mac, "Bob LeVitus, to show you how to load and use them all? From choosing the best version for your needs to managing your life with your online calendar, Office 2008 For Mac For Dummies covers what you need to know. It compares the Student/Teacher Edition, Standard Edition, and Professional Edition, then walks you through installing your preferred version and keeping it up to date. You'll find out all the things you can do with Word, Excel, PowerPoint, and Entourage,

  6. Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  7. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  8. A Mobile Automated Characterization System (MACS) for indoor floor characterization

    International Nuclear Information System (INIS)

    Richardson, B.S.; Haley, D.C.; Dudar, A.M.; Ward, C.R.

    1995-01-01

    The Savannah River Technology Center (SRTC) and Oak Ridge National Laboratory are developing an advanced Mobile Automated Characterization System (MACS) to characterize indoor contaminated floors. MACS is based upon Semi-Intelligent Mobile Observing Navigator (SIMON), an earlier floor characterization system developed at SRTC. MACS will feature enhanced navigation systems, operator interface, and an interface to simplify integration of additional sensors. The enhanced navigation system will provide the capability to survey large open areas much more accurately than is now possible with SIMON, which is better suited for hallways and corridors that provide the means for recalibrating position and heading. MACS operator interface is designed to facilitate MACS's use as a tool for health physicists, thus eliminating the need for additional training in the robot's control language. Initial implementation of MACS will use radiation detectors. Additional sensors, such as PCB sensors currently being developed, will be integrated on MACS in the future. Initial use of MACS will be focused toward obtaining comparative results with manual methods. Surveys will be conducted both manually and with MACS to compare relative costs and data quality. While clear cost benefits anticipated, data quality benefits should be even more significant

  9. Mac OS X for Unix Geeks (Leopard)

    CERN Document Server

    Rothman, Ernest E; Rosen, Rich

    2009-01-01

    If you've been lured to Mac OS X because of its Unix roots, this invaluable book serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. The new edition offers a complete tour of Mac OS X's Unix shell for Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities. Learn how to compile code, link to libraries, and port Unix software to Mac OS X and much more with this concise guide.

  10. Functional Implications of an Intermeshing Cogwheel-like Interaction between TolC and MacA in the Action of Macrolide-specific Efflux Pump MacAB-TolC*

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-01-01

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274

  11. Functional implications of an intermeshing cogwheel-like interaction between TolC and MacA in the action of macrolide-specific efflux pump MacAB-TolC.

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-04-15

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.

  12. Mac OS X Snow Leopard Server For Dummies

    CERN Document Server

    Rizzo, John

    2009-01-01

    Making Everything Easier!. Mac OS® X Snow Leopard Server for Dummies. Learn to::;. Set up and configure a Mac network with Snow Leopard Server;. Administer, secure, and troubleshoot the network;. Incorporate a Mac subnet into a Windows Active Directory® domain;. Take advantage of Unix® power and security. John Rizzo. Want to set up and administer a network even if you don't have an IT department? Read on!. Like everything Mac, Snow Leopard Server was designed to be easy to set up and use. Still, there are so many options and features that this book will save you heaps of time and effort. It wa

  13. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  14. iMac G3 Blueberry 350MHz

    CERN Multimedia

    2000-01-01

    The iMac G3 is an all-in-one personal computer, encompassing both the monitor and the computer in one package. It allowed to revitalize the Apple brand that was in decline and close to financial ruin. Originally released in striking bondi blue and later a range of other translucent plastic envelopes in bright colors. The iMac comes with a keyboard and mouse matching the color of the case. The iMac G3 was sold from 1998 to 2003 and has been updated many times.

  15. Una lectura interpretativa de Tras la virtud, de Alasdair MacIntyre - An Interpretive Reading of After Virtue, by Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Fernando Fernández-Llebrez

    2010-12-01

    Full Text Available This article centers on the thought of Alasdair MacIntyre, whose most prominente work, After Virtue, is considered a classic of political science. In contrast with other reviews, this article will examine After Virtue within the broader context of MacIntyre’s thinking and publications. An overview of MacIntyre’s literary corpus and the evolution of his thinking will shed light on the volume examined and trace certain ideas that are characteristic of this Scottish political philosopher. Matters that remained unsettled in After Virtue have become over time more defined in MacIntyre’s thinking, such as the influence exerted upon him by Thomas Aquinas.

  16. George MacDonald's Estimate of Childhood

    Science.gov (United States)

    Pridmore, John

    2007-01-01

    The nineteenth-century fantasy writer George MacDonald believed that "it is better to be a child in a green field than a knight of many orders." In this paper, I shall explore the bearing of this high estimate of childhood on spiritual education. MacDonald explores the spirituality of the child in his essay "A Sketch of Individual Development" and…

  17. Mac OS X : Tiger edition the missing manual

    CERN Document Server

    Pogue, David

    2005-01-01

    You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? Th

  18. Increased NMDA receptor inhibition at an increased Sevoflurane MAC

    Directory of Open Access Journals (Sweden)

    Brosnan Robert J

    2012-06-01

    Full Text Available Abstract Background Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Methods Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL plus 0.4 mg/mL dizocilpine (MK-801 was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Results Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P  Conclusions Glycine receptor antagonism increases NMDA receptor antagonism by sevoflurane at MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  19. MACS as a tool for international inspections

    Energy Technology Data Exchange (ETDEWEB)

    Curtiss, J.A.; Indusi, J.P.

    1995-08-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

  20. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites

  1. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  2. Learn Office 2011 for Mac OS X

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Office for Mac remains the leading productivity suite for Mac, with Apple's iWork and the free OpenOffice.org trailing far behind. And now it's being updated with a cleaner interface and more compatibility with Exchange and SharePoint. Learn Office 2011 for Mac OS X offers a practical, hands-on approach to using Office 2011 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts,

  3. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  4. Victor Bérard et la Macédoine

    Directory of Open Access Journals (Sweden)

    Ivan Savev

    2011-01-01

    Full Text Available Un helléniste convaincu, Victor Bérard, en vient, au début du XXe siècle à soutenir l’existence de « Macédoniens » et le slogan « la Macédoine aux Macédoniens”.Le Congrès de Berlin en 1878 avait laissé la Macédoine aux mains des Ottomans. La Grèce, la Serbie et la Bulgarie, parvenues à ses limites et prévoyant le retrait futur des Ottomans peaufinent les arguments linguistiques et historiques qui justifieront leurs revendications territoriales. Victor Bérard, un helléniste respecté et bon connaisseur de la région sud balkanique, effectue des enquêtes en Macédoine en 1896 et 1903 qu’il publie à Paris.Cette étude montre comment, dans le contexte de la propagande nationaliste des prétendants à la possession de la Macédoine, Victor Bérard en vient progressivement à affirmer qu’il existe une population autochtone, les Macédoniens. Il soutient leur programme pour la constitution d’une fédération ou confédération avec le slogan « la Macédoine aux Macédoniens » ce qui fait toute l’actualité de ses ouvrages.In 1878, the Congress of Berlin had left Macedonia in the hands of the Ottomans. Greece, Serbia and Bulgaria had reached its limits. Anticipating the Ottoman retreat, they polish language and historical arguments that will justify their territorial claims. Victor Bérard, a respected Hellenist and a good expert of the southern Balkans, is doing researches in Macedonia in 1896 and 1903. These will be later published in Paris.This study shows how, in the context of the nationalist propaganda build-up made by the candidates for the possession of Macedonia, Victor Bérard comes progressively to assert the existence of a native population: the Macedonians. He supports their program for the forming of a federation or confederation which slogan would be “Macedonia to Macedonians”. This makes his works very topical.

  5. Accuracy of the MacArthur competence assessment tool for clinical research (MacCAT-CR) for measuring children's competence to consent to clinical research.

    Science.gov (United States)

    Hein, Irma M; Troost, Pieter W; Lindeboom, Robert; Benninga, Marc A; Zwaan, C Michel; van Goudoever, Johannes B; Lindauer, Ramón J L

    2014-12-01

    An objective assessment of children's competence to consent to research participation is currently not possible. Age limits for asking children's consent vary considerably between countries, and, to our knowledge, the correlation between competence and children's age has never been systematically investigated. To test a standardized competence assessment instrument for children by modifying the MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR), to investigate its reliability and validity, and to examine the correlation of its assessment with age and estimate cutoff ages. This prospective study included children and adolescents aged 6 to 18 years in the inpatient and outpatient departments of allergology, gastroenterology, oncology, ophthalmology, and pulmonology from January 1, 2012, through January 1, 2014. Participants were eligible for clinical research studies, including observational studies and randomized clinical trials. Competence judgments by experts aware of the 4 relevant criteria-understanding, appreciation, reasoning, and choice-were used to establish the reference standard. The index test was the MacCAT-CR, which used a semistructured interview format. Interrater reliability, validity, and dimensionality of the MacCAT-CR and estimated cutoff ages for competence. Of 209 eligible patients, we included 161 (mean age, 10.6 years; 47.2% male). Good reproducibility of MacCAT-CR total and subscale scores was observed (intraclass correlation coefficient range, 0.68-0.92). We confirmed unidimensionality of the MacCAT-CR. By the reference standard, we judged 54 children (33.5%) to be incompetent; by the MacCAT-CR, 61 children (37.9%). Criterion-related validity of MacCAT-CR scores was supported by high overall accuracy in correctly classifying children as competent against the reference standard (area under the receiver operating characteristics curve, 0.78). Age was a good predictor of competence on the MacCAT-CR (area under the receiver

  6. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  7. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  8. QL-MAC : a Q-learning based MAC for wireless sensor networks

    NARCIS (Netherlands)

    Galzarano, S.; Liotta, A.; Fortino, G.; Aversa, R.; Kolodziej, J.; Zhang, J.; Amato, F.; Fortino, G.

    2013-01-01

    WSNs are becoming an increasingly attractive technology thanks to the significant benefits they can offer to a wide range of application domains. Extending the system lifetime while preserving good network performance is one of the main challenges in WSNs. In this paper, a novel MAC protocol

  9. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  10. Library Signage: Applications for the Apple Macintosh and MacPaint.

    Science.gov (United States)

    Diskin, Jill A.; FitzGerald, Patricia

    1984-01-01

    Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…

  11. MacRuby Ruby and Cocoa on OS X

    CERN Document Server

    Aimonetti, Matt

    2011-01-01

    Want to build native Mac OS X applications with a sleek, developer-friendly alternative to Objective-C? MacRuby is an ideal choice. This in-depth guide shows you how Apple's implementation of Ruby gives you access to all the features available to Objective-C programmers. You'll get clear, detailed explanations of MacRuby, including quick programming techniques such as prototyping. Perfect for programmers at any level, this book is packed with code samples and complete project examples. If you use Ruby, you can tap your skills to take advantage of Interface Builder, Cocoa libraries, the Objec

  12. MacBook Pro portable genius

    CERN Document Server

    Gruman, Galen

    2013-01-01

    Learn the skills, tools and shortcuts you need in order to make the most of your MacBook Pro This easy-to-use, compact guide skips the fluff and gets right to the essentials so that you can maximize all the latest features of the MacBook Pro. Packed with savvy insights and tips on key tools and shortcuts, this handy book aims to help you increase your productivity and save you time and hassle. From desktop sharing and wireless networking to running Windows applications and more, this book shows you what you want to know. Includes the latest version of OS X, iCloud, FaceTime, and moreCovers al

  13. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2012-01-01

    Discover loads of tips and techniques for the newest MacBook Pro You're already ahead of the game with a MacBook Pro. Now you can get even more out the popular Apple notebook with the new edition of this handy, compact book. Crammed with savvy insights and tips on key tools and shortcuts, this book will help you increase your productivity and keep your Apple digital lifestyle on track. From desktop sharing and wireless networking to running Windows applications, this book avoids fluff, doesn't skimp on the essentials, saves you time and hassle, and shows you what you most want to know. Include

  14. Learning Unix for Mac OS X Tiger Unlock the Power of Unix

    CERN Document Server

    Taylor, Dave

    2005-01-01

    Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price

  15. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  16. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  17. Douglas MacArthur- An Administrative Biography

    OpenAIRE

    Tehan III, William J.

    2002-01-01

    For more than a half century Douglas MacArthur was a servant of the United States. He is best remembered as a general and a soldier, especially for his leadership during World War II and the Korean War. MacArthur was also the Superintendent of West Point, Chief of Staff of the U.S. Army, Generalissimo ( Commander) of the Armed Forces and Military Advisor (Minister of Defense) to the President of the Commonwealth of the Philippines, and the Supreme Commander Allied Powers and the Military Gove...

  18. Turning the Big Mac Index into the Medical MAC Index | Wilson ...

    African Journals Online (AJOL)

    Objective: The purpose of this study was to create a global medical earnings index, called the Medical MAC Index, to enable a comparison of what medical specialists earn in the countries included in the study. Design: The study gathered data on the earnings of specialist anaesthetists employed in state hospitals with five ...

  19. Design of an autonomous decentralized MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dal Pont, L.; Havinga, Paul J.M.

    In this document the design of a MAC protocol for wireless sensor networks is discussed. The autonomous decentralized TDMA based MAC protocol minimizes power consumtion by efficiency implementing unicast/omnicast, scheduled rendezvous times and wakeup calls. The MAC protocol is an ongoing research

  20. Alistair William MacDonald.

    Science.gov (United States)

    Callegari, Angus

    2018-01-06

    A devoted family man and churchgoer, Alistair MacDonald was a meticulous vet with a great sense of humour. Having served in the RAF during the Second World War, he had plenty of stories to tell. British Veterinary Association.

  1. Office for iPad and Mac for dummies

    CERN Document Server

    Weverka, Peter

    2015-01-01

    The easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook-and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things a

  2. A Full-Duplex MAC Tailored for 5G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lucas de Melo Guimarães

    2018-01-01

    Full Text Available The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.

  3. Wound Healing in Mac-1 Deficient Mice

    Science.gov (United States)

    2017-05-01

    Dentistry, University of Illinois at Chicago, Chicago, IL, USA. 2 Department of Defense Biotechnology High Performance Computing Software...study, we used a commercially available Mac-1 deficient strain to examine whether this deficit 5 extends to slightly smaller wounds and incisional...levels of Collagen I and Collagen III in wounds from the two strains of mice at any time point. Unwounded skin from both WT and Mac-1 -/- mice contained

  4. Douglas MacArthur Upon Reflection

    National Research Council Canada - National Science Library

    Snitchler, Lowell

    1998-01-01

    .... This research recounts MacArthur's personality development from childhood, investigates his last military campaign, and, finally, applies the diagnosis of narcissistic personality disorder to the assembled data...

  5. Mammalian Synthetic Biology: Time for Big MACs.

    Science.gov (United States)

    Martella, Andrea; Pollard, Steven M; Dai, Junbiao; Cai, Yizhi

    2016-10-21

    The enabling technologies of synthetic biology are opening up new opportunities for engineering and enhancement of mammalian cells. This will stimulate diverse applications in many life science sectors such as regenerative medicine, development of biosensing cell lines, therapeutic protein production, and generation of new synthetic genetic regulatory circuits. Harnessing the full potential of these new engineering-based approaches requires the design and assembly of large DNA constructs-potentially up to chromosome scale-and the effective delivery of these large DNA payloads to the host cell. Random integration of large transgenes, encoding therapeutic proteins or genetic circuits into host chromosomes, has several drawbacks such as risks of insertional mutagenesis, lack of control over transgene copy-number and position-specific effects; these can compromise the intended functioning of genetic circuits. The development of a system orthogonal to the endogenous genome is therefore beneficial. Mammalian artificial chromosomes (MACs) are functional, add-on chromosomal elements, which behave as normal chromosomes-being replicating and portioned to daughter cells at each cell division. They are deployed as useful gene expression vectors as they remain independent from the host genome. MACs are maintained as a single-copy and can accommodate multiple gene expression cassettes of, in theory, unlimited DNA size (MACs up to 10 megabases have been constructed). MACs therefore enabled control over ectopic gene expression and represent an excellent platform to rapidly prototype and characterize novel synthetic gene circuits without recourse to engineering the host genome. This review describes the obstacles synthetic biologists face when working with mammalian systems and how the development of improved MACs can overcome these-particularly given the spectacular advances in DNA synthesis and assembly that are fuelling this research area.

  6. Florence Jessie Mac Williams

    Indian Academy of Sciences (India)

    CPMGIKAlBGE-340/2003-05. Resonance - January 2005. Licenced to post WPP No.6 RT Nagar Postoffice. Florence Jessie Mac Williams. (1917 - 1990). Registered with Registrar of Newspapers in India vide Regn. No. 66273/96. ISSN 0971-8044. Price per copy: Rs 40.

  7. Vehicle Health Management Communications Requirements for AeroMACS

    Science.gov (United States)

    Kerczewski, Robert J.; Clements, Donna J.; Apaza, Rafael D.

    2012-01-01

    As the development of standards for the aeronautical mobile airport communications system (AeroMACS) progresses, the process of identifying and quantifying appropriate uses for the system is progressing. In addition to defining important elements of AeroMACS standards, indentifying the systems uses impacts AeroMACS bandwidth requirements. Although an initial 59 MHz spectrum allocation for AeroMACS was established in 2007, the allocation may be inadequate; studies have indicated that 100 MHz or more of spectrum may be required to support airport surface communications. Hence additional spectrum allocations have been proposed. Vehicle health management (VHM) systems, which can produce large volumes of vehicle health data, were not considered in the original bandwidth requirements analyses, and are therefore of interest in supporting proposals for additional AeroMACS spectrum. VHM systems are an emerging development in air vehicle safety, and preliminary estimates of the amount of data that will be produced and transmitted off an aircraft, both in flight and on the ground, have been prepared based on estimates of data produced by on-board vehicle health sensors and initial concepts of data processing approaches. This allowed an initial estimate of VHM data transmission requirements for the airport surface. More recently, vehicle-level systems designed to process and analyze VHM data and draw conclusions on the current state of vehicle health have been undergoing testing and evaluation. These systems make use of vehicle system data that is mostly different from VHM data considered previously for airport surface transmission, and produce processed system outputs that will be also need to be archived, thus generating additional data load for AeroMACS. This paper provides an analysis of airport surface data transmission requirements resulting from the vehicle level reasoning systems, within the context of overall VHM data requirements.

  8. Enhanced Sleep Mode MAC Control for EPON

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler.......This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler....

  9. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  10. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  11. MAC calorimeters and applications

    International Nuclear Information System (INIS)

    MAC Collaboration.

    1982-03-01

    The MAC detector at PEP features a large solid-angle electromagnetic/hadronic calorimeter system, augmented by magnetic charged-particle tracking, muon analysis and scintillator triggering. Its implementation in the context of electron-positron annihilation physics is described, with emphasis on the utilization of calorimetry

  12. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    General acceptance of the challenge provision in the Chemical Weapons Convention has the potential for influence in other arms control areas. While most applications of the challenge inspection may be straightforward, there may be instances where access to the site by inspectors may be problematic. The MACS system described in this paper was developed to respond to these situations. Inspection and verification may be difficult when a host is unwilling,for valid reasons, to permit physical access to a site. We proposed a system of remote sensors which may be used to demonstrate compliance with Chemical Weapons Convention (CWC) challenge inspections even ff the inspector is physically excluded from a sensitive site. The system is based upon alternative-means-of-access provisions of the CWC. The Defense Nuclear Agency (DNA) funded design and construction of a system prototype, designated as MACS for Managed Access by Controlled Sensing. Features of the MACS design allow growth of the prototype into a versatile device for international monitoring of production facilities and other sites. MACS consists of instrumentation and communication equipment allowing site personnel to conduct a facility tour and perform acceptable measurements, while physically excluding the inspector from the facility. MACS consists of a base station used by the inspector, and a mobile unit used within the facility and manipulated by the facility staff. The base station and the mobile unit are at sign ed by a communication system, currently realized as a fiber optic cable. The mobile unit is equipped with television cameras and remote-reading distance-measuring equipment (DME) for use in verifying locations and dimensions. Global Positioning System receivers on the mobile unit provide both precise location and dead reckoning, suitable for tracking the mobile unit's position while within a building when satellite signals are not available

  13. Mac OS X Snow Leopard for Power Users Advanced Capabilities and Techniques

    CERN Document Server

    Granneman, Scott

    2010-01-01

    Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world's slickest and most elegant operating system, then this is the book for you. Written by Scott Granneman, an experienced teacher, developer, and consultant, Mac OS X for Power Users helps you push Mac OS X to the max, unveiling advanced techniques and options that you may have not known even existed. Create custom workflows and apps with Automa

  14. Macintosh Troubleshooting Pocket Guide for Mac OS

    CERN Document Server

    Lerner, David; Corporation, Tekserve

    2009-01-01

    The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

  15. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  16. MacIntyre's Moral Theory and Moral Relativism

    OpenAIRE

    Ali Abedi Renani

    2017-01-01

    In this paper, I seek to explain the similarity and disparity between MacIntyre’s moral theory and moral relativism. I will argue that MacIntyre’s moral theory can escape the charge of moral relativism because both his earlier social and his later metaphysical approaches appeal to some criteria, the human telos or universal human qualities respectively. The notion of telos is wider than the notion of function which is defined in social contexts. If there is a context-transcending notion of te...

  17. Design and FPGA implementation for MAC layer of Ethernet PON

    Science.gov (United States)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  18. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  19. Mr MacDonald's suitcase

    DEFF Research Database (Denmark)

    2017-01-01

    Undervisningsforløbet Mr. MacDonald’s suitcase beskriver læringsmålstyret undervisning i faget engelsk i 1. klasse, hvor der arbejdes med kompetenceområdet mundtlig kommunikation. Undervisningsforløbet er bygget op omkring en engelsk tøjdukke, der besøger klassen og fortæller små historier...

  20. Functional characterization of the copper transcription factor AfMac1 from Aspergillus fumigatus.

    Science.gov (United States)

    Park, Yong-Sung; Kim, Tae-Hyoung; Yun, Cheol-Won

    2017-07-03

    Although copper functions as a cofactor in many physiological processes, copper overload leads to harmful effects in living cells. Thus, copper homeostasis is tightly regulated. However, detailed copper metabolic pathways have not yet been identified in filamentous fungi. In this report, we investigated the copper transcription factor AfMac1 ( A spergillus f umigatus Mac1 homolog) and identified its regulatory mechanism in A. fumigatus AfMac1 has domains homologous to the DNA-binding and copper-binding domains of Mac1 from Saccharomyces cerevisiae , and AfMac1 efficiently complemented Mac1 in S. cerevisiae Expression of Afmac1 resulted in CTR1 up-regulation, and mutation of the DNA-binding domain of Afmac1 failed to activate CTR1 expression in S. cerevisiae The Afmac1 deletion strain of A. fumigatus failed to grow in copper-limited media, and its growth was restored by introducing ctrC We found that AfMac1 specifically bound to the promoter region of ctrC based on EMSA. The AfMac1-binding motif 5'-TGTGCTCA-3' was identified from the promoter region of ctrC , and the addition of mutant ctrC lacking the AfMac1-binding motif failed to up-regulate ctrC in A. fumigatus Furthermore, deletion of Afmac1 significantly reduced strain virulence and activated conidial killing activity by neutrophils and macrophages. Taken together, these results suggest that AfMac1 is a copper transcription factor that regulates cellular copper homeostasis in A. fumigatus . © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.

  1. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  2. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  3. Outside-In Signal Transmission by Conformational Changes in Integrin Mac-11

    Science.gov (United States)

    Lefort, Craig T.; Hyun, Young-Min; Schultz, Joanne B.; Law, Foon-Yee; Waugh, Richard E.; Knauf, Philip A.; Kim, Minsoo

    2010-01-01

    Intracellular signals associated with or triggered by integrin ligation can control cell survival, differentiation, proliferation, and migration. Despite accumulating evidence that conformational changes regulate integrin affinity to its ligands, how integrin structure regulates signal transmission from the outside to the inside of the cell remains elusive. Using fluorescence resonance energy transfer, we addressed whether conformational changes in integrin Mac-1 are sufficient to transmit outside-in signals in human neutrophils. Mac-1 conformational activation induced by ligand occupancy or activating Ab binding, but not integrin clustering, triggered similar patterns of intracellular protein tyrosine phosphorylation, including Akt phosphorylation, and inhibited spontaneous neutrophil apoptosis, indicating that global conformational changes are critical for Mac-1-dependent outside-in signal transduction. In neutrophils and myeloid K562 cells, ligand ICAM-1 or activating Ab binding promoted switchblade-like extension of the Mac-1 extracellular domain and separation of the αM and β2 subunit cytoplasmic tails, two structural hallmarks of integrin activation. These data suggest the primacy of global conformational changes in the generation of Mac-1 outside-in signals. PMID:19864611

  4. Mac OS X for Astronomy

    Science.gov (United States)

    Pierfederici, F.; Pirzkal, N.; Hook, R. N.

    Mac OS X is the new Unix based version of the Macintosh operating system. It combines a high performance DisplayPDF user interface with a standard BSD UNIX subsystem and provides users with simultaneous access to a broad range of applications which were not previously available on a single system such as Microsoft Office and Adobe Photoshop, as well as legacy X11-based scientific tools and packages like IRAF, SuperMongo, MIDAS, etc. The combination of a modern GUI layered on top of a familiar UNIX environment paves the way for new, more flexible and powerful astronomical tools to be developed while assuring compatibility with already existing, older programs. In this paper, we outline the strengths of the Mac OS X platform in a scientific environment, astronomy in particular, and point to the numerous astronomical software packages available for this platform; most notably the Scisoft collection which we have compiled.

  5. MacVEE - the intimate Macintosh-VME system

    International Nuclear Information System (INIS)

    Taylor, B.G.

    1986-01-01

    The marriage of a mass-produced personal computer with the versatile VMEbus and CAMAC systems creates a cost-effective solution to many laboratory small system requirements. This paper describes MacVEE (Microcomputer Applied to the Control of VME Electronic Equipment), a novel system in which an Apple Macintosh computer is equipped with a special interface which allows it direct memory-mapped access to single or multiple VME and CAMAC crates interconnected by a ribbon cable bus. The bus is driven by an electronics plinth called MacPlinth, which attaches to the computer and becomes an integral part of it. (Auth.)

  6. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    Science.gov (United States)

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (pimmobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. A MacWilliams Identity for Convolutional Codes : The General Case

    NARCIS (Netherlands)

    Gluesing-Luerssen, Heide; Schneider, Gert

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality

  8. Quicksilver Power Mac G4

    CERN Document Server

    2001-01-01

    A new generation with a reworked motherboard is launched on 2001 with however the same Graphite box. It also included a processor speed-bump, and brought the DVD-R "SuperDrive" to the mid-level model. The Quicksilver PowerMac was available in three configurations: The 733 MHz model, with 128 MB of RAM, a 40 GB hard drive, and a CD-RW drive, was 1,699 dollars, the 867 MHz configuration, with 128 MB of RAM, a 60 GB hard drive and a DVD-R drive, was 2,499 dollars, and the high-end dual-800 MHz model, with 256 MB of RAM, an 80 GB hard drive and a DVD-R drive, was 3,499 dollars. The 733 MHz model is the first personal computer to have a DVD burner, named SuperDrive at Apple. The design was updated on 2002 with 800 MHz, 933 MHz and dual 1 GHz configurations, becoming the first Mac to reach 1 GHz.

  9. Dolphin natures, human virtues: MacIntyre and ethical naturalism.

    Science.gov (United States)

    Glackin, Shane Nicholas

    2008-09-01

    Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.

  10. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  11. Interference Analysis Status and Plans for Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Kerczewski, Robert J.; Wilson, Jeffrey D.

    2010-01-01

    Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.

  12. Mac OS X Snow Leopard pocket guide

    CERN Document Server

    Seiblod, Chris

    2009-01-01

    Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly. This book goes right to the heart of Snow Leopard, with details on system preferences, built-in applications, and utilities. You'll also find configuration tips, keyboard shortcuts, guides for troubleshooting, lots of step-by-step instructions, and more. Learn about new features and changes s

  13. Evaluación del tiempo de recuperación de fallas para LSP L1VPN sobre redes GMPLS

    Directory of Open Access Journals (Sweden)

    Octavio Salcedo

    2012-12-01

    Full Text Available Nowadays network failure is a common problem that is caused, to certain extent, by various factors such as the number of devices involved in a link, the quality of these devices, their geographical location, and environmental conditions among others. There is a great deal of factors influencing network failure occurrence, which indicates that, whether expected or not, failure will always be present. However, the issue is not about having or avoiding failure but about how quickly can a network recover and restore its services. The present paper addresses the point of failure-recovery time of an L1VPN over GMPLS technology, where failure can be automatically overcome through routing protocols by redirecting packets to alternate routes.

  14. Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics

    Science.gov (United States)

    Wilson, Jeffrey D.

    2012-01-01

    AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.

  15. A MacWilliams Identity for Convolutional Codes: The General Case

    OpenAIRE

    Gluesing-Luerssen, Heide; Schneider, Gert

    2008-01-01

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality appearing in the literature on convolutional coding theory.

  16. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  17. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs

    Directory of Open Access Journals (Sweden)

    Dinesh Shetty

    2014-12-01

    Full Text Available Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs. A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria.

  18. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs)

    Science.gov (United States)

    Shetty, Dinesh; Kim, Yong Joon; Shim, Hyunsuk; Snyder, James P.

    2015-01-01

    Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs). A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK) profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria. PMID:25547726

  19. Disain Sistem SCADA jarak Jauh Menggunakan Layanan VPN 3G Untuk Penggerak Pompa pada Sistem Pengolahan Air

    Directory of Open Access Journals (Sweden)

    Asep Insani

    2013-03-01

    Full Text Available Dalam pengolahan air gambut menjadi air bersih yang menggunakan metode AOP dan RO ini, pengaturan tekanan pompa merupakan sesuatu yang sangat vital pada saat dilakukan suplay air yang akan diolah ke sistem. Sistem pengolahan air yang menggunakan pompa tersebut harus selalu dipastikan beroperasi dengan normal disesuaikan dengan peruntukannya. Manajemen terbaru sistem pengolahan air memerlukan teknologi yang terbaru pada peralatan remote control system, dan yang paling fundamental untuk hal ini adalah penggunaan layanan public untuk akusisi dan pengawasan dari data yang diambil dari peralatan kontrol. Untuk mewujudkan remote control untuk pompa dengan tekanan tertentu dengan PLC, didisain dengan kombinasi antara internet, arsitektur dan implementasi dari sistem SCADA, yang menggabungkan jaringan komputer, PLC, WinCC, dan teknologi VPN. Dalam melakukan disain, perlu diperhatikan poin-poin penting baik dari sisi server maupun sisi controller. Disain sistem SCADA remote dapat mengefisienkan waktu bagi operator dan pemantauan lebih lanjut untuk suplay air.

  20. Visualization of integrin Mac-1 in vivo.

    Science.gov (United States)

    Lim, Kihong; Hyun, Young-Min; Lambert-Emo, Kris; Topham, David J; Kim, Minsoo

    2015-11-01

    β2 integrins play critical roles in migration of immune cells and in the interaction with other cells, pathogens, and the extracellular matrix. Among the β2 integrins, Mac-1 (Macrophage antigen-1), composed of CD11b and CD18, is mainly expressed in innate immune cells and plays a major role in cell migration and trafficking. In order to image Mac-1-expressing cells both in live cells and mouse, we generated a knock-in (KI) mouse strain expressing CD11b conjugated with monomeric yellow fluorescent protein (mYFP). Expression of CD11b-mYFP protein was confirmed by Western blot and silver staining of CD11b-immunoprecipitates and total cell lysates from the mouse splenocytes. Mac-1-mediated functions of the KI neutrophils were comparable with those in WT cells. The fluorescence intensity of CD11b-mYFP was sufficient to image CD11b expressing cells in live mice using intravital two-photon microscopy. In vitro, dynamic changes in the intracellular localization of CD11b molecules could be measured by epifluorescent microscopy. Finally, CD11b-expressing immune cells from tissue were easily detected by flow cytometry without anti-CD11b antibody staining. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. MAC Version 3.2, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Conversion to 4.0 ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The test primarily concentrated on verifying that MAC and MBA software would run properly in the Paradox 4.0 environment. Changes in the MAC and MBA programs were basically limited to superficial items needed to accommodate the enhanced method of execution

  2. Geochemistry and petrography of the MacAlpine Hills lunar meteorites

    Science.gov (United States)

    Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.

    1991-01-01

    MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).

  3. Paradox applications integration ATP's for MAC and mass balance programs

    International Nuclear Information System (INIS)

    Russell, V.K.; Mullaney, J.E.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system were set up to run under one common applications program. This Acceptance Test Plan (ATP) describes how the code was to be tested to verify its correctness. The scope of the tests is minimal, since both MAC and MBA have already been tested in detail as stand-alone programs

  4. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  5. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  6. Detomidine reduces isoflurane anesthetic requirement (MAC) in horses.

    Science.gov (United States)

    Steffey, Eugene P; Pascoe, Peter J

    2002-10-01

    To quantitate the dose- and time-related magnitude of the anesthetic sparing effect of, and selected physiological responses to detomidine during isoflurane anesthesia in horses. Randomized cross-over study. Three, healthy, young adult horses weighing 485 ± 14 kg. Horses were anesthetized on two occasions to determine the minimum alveolar concentration (MAC) of isoflurane in O 2 and then to measure the anesthetic sparing effect (time-related MAC reduction) following IV detomidine (0.03 and 0.06 mg kg -1 ). Selected common measures of cardiopulmonary function, blood glucose and urinary output were also recorded. Isoflurane MAC was 1.44 ± 0.07% (mean ± SEM). This was reduced by 42.8 ± 5.4% and 44.8 ± 3.0% at 83 ± 23 and 125 ± 36 minutes, respectively, following 0.03 and 0.06 mg kg -1 , detomidine. The MAC reduction was detomidine dose- and time-dependent. There was a tendency for mild cardiovascular and respiratory depression, especially following the higher detomidine dose. Detomidine increased both blood glucose and urine flow; the magnitude of these changes was time- and dose-dependent CONCLUSIONS: Detomidine reduces anesthetic requirement for isoflurane and increases blood glucose concentration and urine flow in horses. These changes were dose- and time-related. The results imply potent anesthetic sparing actions by detomidine. The detomidine-related increased urine flow should be considered in designing anesthetic protocols for individual horses. Copyright © 2002 Association of Veterinary Anaesthetists and American College of Veterinary Anesthesia and Analgesia. Published by Elsevier Ltd. All rights reserved.

  7. An Interview with Peter MacDonald.

    Science.gov (United States)

    American Indian Journal, 1979

    1979-01-01

    Peter MacDonald, Chairman of the Navajo Nation, the largest tribe in the United States speaks to such issues as energy development/management, oil companies, Navajo-Hopi relocation legislation, traditionalism, and the role of the Council of Energy Resource Tribes. (RTS)

  8. Teaching a Classic for All Ages: Fairy Tales and Stories of George MacDonald.

    Science.gov (United States)

    Sadler, Glenn Edward

    1995-01-01

    Discusses the life and writings of George MacDonald (1824-1905). Suggests that the most striking feature of MacDonald's children's books is his sensitivity toward spiritual values and the power of change within the lives of his characters. Appends a list of questions to stimulate student response to MacDonald's writings. (RS)

  9. Are hamburgers harmless? : the Big Mac Index in the twenty-first century

    OpenAIRE

    Soo, Kwok Tong

    2016-01-01

    We make use of The Economist’s Big Mac Index (BMI) to investigate the Law of One Price (LOP) and whether the BMI can be used to predict future exchange rate and price changes. Deviations from Big Mac parity decay quickly, in approximately 1 year. The BMI is a better predictor of relative price changes than of exchange rate changes, and performs best when predicting a depreciation of a currency relative to the US dollar. Convergence to Big Mac parity occurs more rapidly for currencies with som...

  10. GENETIC FINGERPRINTING OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS ISOLATED FROM HOSPITAL PATIENTS AND THE ENVIRONMENT

    Science.gov (United States)

    A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...

  11. MacIntyre, Managerialism and Universities

    Science.gov (United States)

    Stolz, Steven A.

    2017-01-01

    MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…

  12. Millisecond timing on PCs and Macs.

    Science.gov (United States)

    MacInnes, W J; Taylor, T L

    2001-05-01

    A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.

  13. Biochemical and Parasitological Studies on the Effect of hUCB-Selected CD34+ Progenitor/Stem Cells in Mice Infected with Schistosoma mansoni

    Science.gov (United States)

    Abou-Zied, Akram M.; Soliman, Rasha H.; Hefila, Shorouk M.; Imam, Samir A.

    2014-01-01

    Background and Objectives: Placenta and blood that remained in the umbilical cord is routinely available as a discarded tissue after deliveries and it is free of any legal, moral, ethical or religious objections, providing a high number of multipotent CD34+ progenitor and stem cells. Using ex vivo isolated CD34+ cells from human umbilical cord blood (hUCB) have emerged as promising candidates to treat various diseases, including exogenous pathogenic infections. We have expanded to build a rational approach to study the effect of CD34+ cells after damaged liver tissues by the devastating human parasitic flatworm Schistosoma mansoni. Methods and Results: Experimental studies were conducted in the Department of Zoology, Faculty of Science and Departments of Parasitology and Physiology, Faculty of Medicine, SCU, Egypt. We have studied the impact of ex vivo preparation of CD34+ cells from hUCB on S. mansoni-induced liver fibrosis de novo, and treated for shorter and longer periods in vivo. Ova count, ALT and albumin were measured at specific time interval and histopathological examination of liver was conducted to confirm the biochemical results. The data obtained were statistically analyzed by ANOVA between groups. It was found that the administration of CD34+ cells have modestly reduced liver damage; reduced the S. mansoni infection associated elevation in serum levels of ALT; significantly improved serum levels of albumin and reduced egg granuloma diameter in the livers. Conclusions: We demonstrated that CD34+ cells can markedly ameliorated liver fibrosis in vivo and may be beneficial for therapy to recover organ structure and/or function of S. mansoni-infected mice. PMID:25473447

  14. MAP, MAC, and vortex-rings configurations in the Weinberg-Salam model

    Science.gov (United States)

    Teh, Rosy; Ng, Ban-Loong; Wong, Khai-Ming

    2015-11-01

    We report on the presence of new axially symmetric monopoles, antimonopoles and vortex-rings solutions of the SU(2)×U(1) Weinberg-Salam model of electromagnetic and weak interactions. When the ϕ-winding number n = 1, and 2, the configurations are monopole-antimonopole pair (MAP) and monopole-antimonopole chain (MAC) with poles of alternating sign magnetic charge arranged along the z-axis. Vortex-rings start to appear from the MAP and MAC configurations when the winding number n = 3. The MAP configurations possess zero net magnetic charge whereas the MAC configurations possess net magnetic charge of 4 πn / e. In the MAP configurations, the monopole-antimonopole pair is bounded by the Z0 field flux string and there is an electromagnetic current loop encircling it. The monopole and antimonopole possess magnetic charges ± 4πn/e sin2θW respectively. In the MAC configurations there is no string connecting the monopole and the adjacent antimonopole and they possess magnetic charges ± 4 πn/e respectively. The MAC configurations possess infinite total energy and zero magnetic dipole moment whereas the MAP configurations which are actually sphalerons possess finite total energy and magnetic dipole moment. The configurations were investigated for varying values of Higgs self-coupling constant 0 ≤ λ ≤ 40 at Weinberg angle θW = π/4.

  15. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  16. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  17. Windowsista Mac-maailmaan

    OpenAIRE

    Sirkiä, Noora-Maria

    2010-01-01

    Nykyään yhä useampi harkitsee erilaisista syistä käyttöjärjestelmän vaihtamista tutusta Windowsista johonkin muuhun käyttöjärjestelmään. Applen Macintosh-tietokoneiden mukana tuleva Mac OS X -käyttöjärjestelmä on hyvä vaihtoehto Windowsille. Ihmiset siirtyvät siihen mm. tietoturvaseikkojen, luotettavuuden, ohjelmiston sekä Applen koneiden ja käyttöjärjestelmän ulkomuodon takia. Microsoftin tuotteista ei myöskään tarvitse luopua kokonaan, sillä monista tutuista Microsoftin ohjelmista (esim. Mi...

  18. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  19. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  20. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  1. Mapping of MAC Address with Moving WiFi Scanner

    Directory of Open Access Journals (Sweden)

    Arief Hidayat

    2017-10-01

    Full Text Available Recently, Wifi is one of the most useful technologies that can be used for detecting and counting MAC Address. This paper described using of WiFi scanner which carried out seven times circulated the bus. The method used WiFi and GPS are to counting MAC address as raw data from the pedestrian smartphone, bus passenger or WiFi devices near from the bus as long as the bus going around the route. There are seven processes to make map WiFi data.

  2. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective

    Directory of Open Access Journals (Sweden)

    Nicholas P. Greene

    2018-05-01

    Full Text Available The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking.

  3. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective

    Science.gov (United States)

    Greene, Nicholas P.; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis

    2018-01-01

    The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking. PMID:29892271

  4. MacWilliams Identity for M-Spotty Weight Enumerator

    Science.gov (United States)

    Suzuki, Kazuyoshi; Fujiwara, Eiji

    M-spotty byte error control codes are very effective for correcting/detecting errors in semiconductor memory systems that employ recent high-density RAM chips with wide I/O data (e.g., 8, 16, or 32bits). In this case, the width of the I/O data is one byte. A spotty byte error is defined as random t-bit errors within a byte of length b bits, where 1 le t ≤ b. Then, an error is called an m-spotty byte error if at least one spotty byte error is present in a byte. M-spotty byte error control codes are characterized by the m-spotty distance, which includes the Hamming distance as a special case for t =1 or t = b. The MacWilliams identity provides the relationship between the weight distribution of a code and that of its dual code. The present paper presents the MacWilliams identity for the m-spotty weight enumerator of m-spotty byte error control codes. In addition, the present paper clarifies that the indicated identity includes the MacWilliams identity for the Hamming weight enumerator as a special case.

  5. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    Science.gov (United States)

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  6. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yugui Qu

    2011-02-01

    Full Text Available Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  7. TR-MAC: an energy-efficient MAC protocol for wireless sensor networks exploiting noise-based transmitted reference modulation

    NARCIS (Netherlands)

    Morshed, S.; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor net- works. The medium access control (MAC) protocol determines the time a sensor node transceiver spends listening or transmitting, and hence the energy consumption of the

  8. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    International Nuclear Information System (INIS)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul

    2008-01-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit

  9. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    Energy Technology Data Exchange (ETDEWEB)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul, E-mail: hnc@pusan.ac.kr [College of Pharmacy and Research Institute for Drug Development, Pusan National University, Jangjeon-dong, Geumjeong-gu, Busan 609-735 (Korea, Republic of)

    2008-05-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit.

  10. Public Relations as "Practice": Applying the Theory of Alasdair MacIntyre.

    Science.gov (United States)

    Leeper, Roy V.; Leeper, Kathie A.

    2001-01-01

    Considers how public relation's search for a unifying theory may be fulfilled through application of Alasdair MacIntyre's concept of a "practice," a very specific and value-laden concept. Explores what it would mean to be a public relations practice in MacIntyre's concept of the term and argues that such an approach to public relations…

  11. Improved b lifetime measurement from MAC

    International Nuclear Information System (INIS)

    Ford, W.T.

    1984-03-01

    Two recent publications, from the MAC and Mark II collaborations, have reported the somewhat surprising result that the lifetime of particles made up of b quarks is in the 1 to 2 picosecond range, or somewhat longer than the lifetimes of charm particles. Although the charm decays are favored transitions while those of b particles depend upon off-diagonal elements of the weak flavor mixing matrix, the smallness of the b decay rates in face of the large available phase space indicates that the off-diagonal elements are indeed very small. The possibility for complete determination of the mixing matrix was brought significantly nearer by the availability of the lifetime information; what is needed now is to reduce the uncertainty of the measurements, which was about 33% for both experiments. We describe here an extension of the b lifetime study with the MAC detector, incorporating some new data and improvements in the analysis. 12 references

  12. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  13. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  14. Essential Mac OS X panther server administration integrating Mac OS X server into heterogeneous networks

    CERN Document Server

    Bartosh, Michael

    2004-01-01

    If you've ever wondered how to safely manipulate Mac OS X Panther Server's many underlying configuration files or needed to explain AFP permission mapping--this book's for you. From the command line to Apple's graphical tools, the book provides insight into this powerful server software. Topics covered include installation, deployment, server management, web application services, data gathering, and more

  15. A Critique of MacIntyrean Morality From a Kantian Perspective

    OpenAIRE

    Krishna Mani Pathak

    2014-01-01

    This article is a critical examination of MacIntyre’s notion of morality in reference to Kant’s deontological moral theory. The examination shows that MacIntyre (a) criticizes Kant’s moral theory to defend virtue ethics or neo-Aristotelian ethics with a weak notion of morality; (b) favors the idea of local morality, which does not leave any room for moral assessment and reciprocity in an intercultural domain; and (c) f...

  16. Identifying The Purchasing Power Parity of Indonesia Rupiah (IDR based on BIG MAC Index

    Directory of Open Access Journals (Sweden)

    Tongam Sihol Nababan

    2016-12-01

    Full Text Available The aim of this study is to identify : (1 profile of exchange rate and purchasing power parity of IDR against US $ based on Big Mac Index compared to the exchange rate of other countries, and (2 the position of the Big Mac Affordability of  Indonesia compared to other ASEAN countries. The results showed that based on Big Mac index during the period April 1998 up to January 2015, IDR exchange rate tends to be undervalued against the USA dollar. The cause of the currency tends to be in a position of undervalued due to the components of non-tradable have not been included in Big Mac index. The index of Big Mac Affordability indicates that there is a great disparity of income between Singapore and five other ASEAN countries. The purchasing power of the real income of the people in Singapore is nearly five times the real income of the people in Indonesia.

  17. Results from the MAC Vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.N.

    1987-05-01

    The design, construction, and performance characteristics of a high precision gaseous drift chamber made of thin walled proportional tubes are described. The device achieved an average spatial resolution of 45 μm in use for physics analysis with the MAC detector. The B-lifetime result obtained with this chamber is discussed

  18. Microcrystallography, high-pressure cryocooling and BioSAXS at MacCHESS

    Energy Technology Data Exchange (ETDEWEB)

    Englich, Ulrich, E-mail: ue22@cornell.edu; Kriksunov, Irina A. [MacCHESS (Macromolecular Diffraction Facility at CHESS), Cornell University, Ithaca, NY 14853 (United States); Cerione, Richard A. [MacCHESS (Macromolecular Diffraction Facility at CHESS), Cornell University, Ithaca, NY 14853 (United States); Department of Chemistry and Chemical Biology, Cornell University, Ithaca, NY 14853 (United States); Cornell High Energy Synchrotron Source (CHESS), Cornell University, Ithaca, NY 14853 (United States); Cook, Michael J.; Gillilan, Richard [MacCHESS (Macromolecular Diffraction Facility at CHESS), Cornell University, Ithaca, NY 14853 (United States); Gruner, Sol M. [Field of Biophysics, Cornell University, Ithaca, NY 14853 (United States); Physics Department, Cornell University, Ithaca, NY 14853 (United States); Huang, Qingqui; Kim, Chae Un; Miller, William; Nielsen, Soren; Schuller, David; Smith, Scott; Szebenyi, Doletha M. E. [MacCHESS (Macromolecular Diffraction Facility at CHESS), Cornell University, Ithaca, NY 14853 (United States)

    2011-01-01

    Three research initiatives pursued by the Macromolecular Diffraction Facility at the Cornell High Energy Synchrotron Source (MacCHESS) are presented. The Macromolecular Diffraction Facility at the Cornell High Energy Synchrotron Source (MacCHESS) is a national research resource supported by the National Center for Research Resources of the US National Institutes of Health. MacCHESS is pursuing several research initiatives designed to benefit both CHESS users and the wider structural biology community. Three initiatives are presented in further detail: microcrystallography, which aims to improve the collection of diffraction data from crystals a few micrometers across, or small well diffracting regions of inhomogeneous crystals, so as to obtain high-resolution structures; pressure cryocooling, which can stabilize transient structures and reduce lattice damage during the cooling process; and BioSAXS (small-angle X-ray scattering on biological solutions), which can extract molecular shape and other structural information from macromolecules in solution.

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  20. MacMillan Pier Transportation Center Feasibility Study.

    Science.gov (United States)

    2006-06-01

    The MacMillan Pier Transportation Center Feasibility Study examines two potential sites (landside and waterside) for a transportation center that provides a range of tourist and traveler information. It would serve as a gateway for Provincetown and t...

  1. What are the key drivers of MAC curves? A partial-equilibrium modelling approach for the UK

    International Nuclear Information System (INIS)

    Kesicki, Fabian

    2013-01-01

    Marginal abatement cost (MAC) curves are widely used for the assessment of costs related to CO 2 emissions reduction in environmental economics, as well as domestic and international climate policy. Several meta-analyses and model comparisons have previously been performed that aim to identify the causes for the wide range of MAC curves. Most of these concentrate on general equilibrium models with a focus on aspects such as specific model type and technology learning, while other important aspects remain almost unconsidered, including the availability of abatement technologies and level of discount rates. This paper addresses the influence of several key parameters on MAC curves for the United Kingdom and the year 2030. A technology-rich energy system model, UK MARKAL, is used to derive the MAC curves. The results of this study show that MAC curves are robust even to extreme fossil fuel price changes, while uncertainty around the choice of the discount rate, the availability of key abatement technologies and the demand level were singled out as the most important influencing factors. By using a different model type and studying a wider range of influencing factors, this paper contributes to the debate on the sensitivity of MAC curves. - Highlights: ► A partial-equilibrium model is employed to test key sensitivities of MAC curves. ► MAC curves are found to be robust to wide-ranging changes in fossil fuel prices. ► Most influencing factors are the discount rate, availability of key technologies. ► Further important uncertainty in MAC curves is related to demand changes

  2. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  3. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  4. Florence Jessie Mac Williams (1917-1990)

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Florence Jessie Mac Williams (1917-1990). Featured Scientist Volume 10 Issue 1 January 2005 pp 98-98. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/010/01/0098-0098. Resonance ...

  5. Lifetime tests for MAC vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.N.

    1986-07-01

    A vertex chamber for MAC was proposed to increase precision in the measurement of the B hadron and tau lepton lifetimes. Thin-walled aluminized mylar drift tubes were used for detector elements. A study of radiation hardness was conducted under the conditions of the proposed design using different gases and different operating conditions

  6. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal.

    Science.gov (United States)

    Kim, Sungryul; Yoo, Younghwan

    2018-01-26

    Medium Access Control (MAC) delay which occurs between the anchor node's transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater.

  7. Detection of constitutive heterodimerization of the integrin Mac-1 subunits by fluorescence resonance energy transfer in living cells

    International Nuclear Information System (INIS)

    Fu Guo; Yang Huayan; Wang Chen; Zhang Feng; You Zhendong; Wang Guiying; He Cheng; Chen Yizhang; Xu Zhihan

    2006-01-01

    Macrophage differentiation antigen associated with complement three receptor function (Mac-1) belongs to β 2 subfamily of integrins that mediate important cell-cell and cell-extracellular matrix interactions. Biochemical studies have indicated that Mac-1 is a constitutive heterodimer in vitro. Here, we detected the heterodimerization of Mac-1 subunits in living cells by means of two fluorescence resonance energy transfer (FRET) techniques (fluorescence microscopy and fluorescence spectroscopy) and our results demonstrated that there is constitutive heterodimerization of the Mac-1 subunits and this constitutive heterodimerization of the Mac-1 subunits is cell-type independent. Through FRET imaging, we found that heterodimers of Mac-1 mainly localized in plasma membrane, perinuclear, and Golgi area in living cells. Furthermore, through analysis of the estimated physical distances between cyan fluorescent protein (CFP) and yellow fluorescent protein (YFP) fused to Mac-1 subunits, we suggested that the conformation of Mac-1 subunits is not affected by the fusion of CFP or YFP and inferred that Mac-1 subunits take different conformation when expressed in Chinese hamster ovary (CHO) and human embryonic kidney (HEK) 293T cells, respectively

  8. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  9. Installing Git under MacOS

    OpenAIRE

    Fitzpatrick, Benjamin

    2015-01-01

    Step by step guide to installing the version control software Git under the Macintosh Operating System MacOS X (and later). Includes a seqeunce of screenshots with hand drawn arrows ;-) These slides are part of the materials for an Introductory course on the R language and environment for statistial computing. Free and Open Source materials for this course hosted on GitHub: https://github.com/brfitzpatrick/Intro_to_R

  10. Burgernomics: a big MacT guide to purchasing power parity

    OpenAIRE

    Michael R. Pakko; Patricia S. Pollard

    2003-01-01

    The theory of purchasing power parity (PPP) has long been a staple of international economic analysis. Recent years have seen the rise in popularity of a tongue-in-cheek, fast-food version of PPP: The Big Mac™ index. In this article, Michael Pakko and Patricia Pollard describe how comparisons of Big Mac prices around the world contain the ingredients necessary to demonstrate the fundamental principles of PPP. They show that the Big Mac index does nearly as well as more comprehensive measures ...

  11. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  12. Performance analysis and improvement of WPAN MAC for home networks.

    Science.gov (United States)

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  13. Performance Analysis and Improvement of WPAN MAC for Home Networks

    Directory of Open Access Journals (Sweden)

    Saurabh Mehta

    2010-03-01

    Full Text Available The wireless personal area network (WPAN is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3 MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  14. The MacNew Heart Disease health-related quality of life instrument: A summary

    Directory of Open Access Journals (Sweden)

    Guyatt Gordon

    2004-01-01

    Full Text Available Abstract Background The measurement of health, the effects of disease, and the impact of health care include not only an indication of changes in disease frequency and severity but also an estimate of patients' perception of health status before and after treatment. One of the more important developments in health care in the past decade may be the recognition that the patient's perspective is as legitimate and valid as the clinician's in monitoring health care outcomes. This has lead to the development of instruments to quantify the patients' perception of their health status before and after treatment. Methods We review evidence supporting the measurement properties of the MacNew Heart Disease Health-related Quality of Life [MacNew] Questionnaire which was designed to evaluate how daily activities and physical, emotional, and social functioning are affected by coronary heart disease and its treatment. Results Reliability was demonstrated by using internal consistency and the intraclass correlation coefficients for the three domains in the Dutch, English, Farsi, German, and Spanish versions of the MacNew. With internal consistency and intraclass correlation coefficients =>0.73, reliability is high. Validity of the MacNew was examined with factor analysis and three core underlying factors, physical, emotional, and social, were identified, explaining 63.0 – 66.5% of the observed variance and replicated in the translations with psychometric data. Construct validity of the MacNew was further demonstrated by extensive substantiation of the logical relationships, defined a priori, between items and other comparison tools. The MacNew is responsive and sensitive to changes in HRQL following various interventions for patients with heart disease with 11 of 13 effect size statistics >0.80. Taking an average of 10 minutes or less to complete, the respondent-burden for the MacNew is low and its acceptability is demonstrated by response rates of over 90

  15. Big Mac arvestab raha ostujõudu / Harli Uljas

    Index Scriptorium Estoniae

    Uljas, Harli

    2005-01-01

    The Economist võrdleb maailma valuutade suhestamiseks Big Mac'i burgeri hindu 120 riigis, kuna see meetod võimaldab saada ülevaate riikide elanikkonna tegelikust ostujõust. Tabel: Hamburgeri standard

  16. Strategy, Operational Art and MacArthur in the Southwest Pacific 1944

    Science.gov (United States)

    2016-05-26

    Guinea Campaign.11 It studies the campaign exclusively from the February 1944 through October 1944. The choice in dates argues that the campaign...the Pacific. King continued to maintain that MacArthur’s line of operation in SWPA, toward the Philippines to the exclusion of the central Pacific...with Nimitz allowed MacArthur the rare luxury of aircraft carriers providing a protective bubble over both the Morotai and Palaus operations. Escort

  17. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  18. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B-MAC

  19. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    Science.gov (United States)

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  20. Florence Jessie MacWilliams (1917-1990)

    Indian Academy of Sciences (India)

    famous mathematician Oscar Zariski, well known for his work in algebraic geometry, at. Johns Hopkins University, following him to Harvard University to study with him for a year. There was a break in her studies for many years following her marriage in 1941 to. W al ter Mac Williams, an engineer, and the birth and raising of ...

  1. Matrix-assisted cocrystallization (MAC) simultaneous production and formulation of pharmaceutical cocrystals by hot-melt extrusion.

    Science.gov (United States)

    Boksa, Kevin; Otte, Andrew; Pinal, Rodolfo

    2014-09-01

    A novel method for the simultaneous production and formulation of pharmaceutical cocrystals, matrix-assisted cocrystallization (MAC), is presented. Hot-melt extrusion (HME) is used to create cocrystals by coprocessing the drug and coformer in the presence of a matrix material. Carbamazepine (CBZ), nicotinamide (NCT), and Soluplus were used as a model drug, coformer, and matrix, respectively. The MAC product containing 80:20 (w/w) cocrystal:matrix was characterized by differential scanning calorimetry, Fourier transform infrared spectroscopy, and powder X-ray diffraction. A partial least squares (PLS) regression model was developed for quantifying the efficiency of cocrystal formation. The MAC product was estimated to be 78% (w/w) cocrystal (theoretical 80%), with approximately 0.3% mixture of free (unreacted) CBZ and NCT, and 21.6% Soluplus (theoretical 20%) with the PLS model. A physical mixture (PM) of a reference cocrystal (RCC), prepared by precipitation from solution, and Soluplus resulted in faster dissolution relative to the pure RCC. However, the MAC product with the exact same composition resulted in considerably faster dissolution and higher maximum concentration (∼five-fold) than those of the PM. The MAC product consists of high-quality cocrystals embedded in a matrix. The processing aspect of MAC plays a major role on the faster dissolution observed. The MAC approach offers a scalable process, suitable for the continuous manufacturing and formulation of pharmaceutical cocrystals. © 2014 Wiley Periodicals, Inc. and the American Pharmacists Association.

  2. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  3. Mac-1 (CD11b/CD18) is essential for Fc receptor-mediated neutrophil cytotoxicity and immunologic synapse formation.

    Science.gov (United States)

    van Spriel, A B; Leusen, J H; van Egmond, M; Dijkman, H B; Assmann, K J; Mayadas, T N; van de Winkel, J G

    2001-04-15

    Receptors for human immunoglobulin (Ig)G and IgA initiate potent cytolysis of antibody (Ab)-coated targets by polymorphonuclear leukocytes (PMNs). Mac-1 (complement receptor type 3, CD11b/CD18) has previously been implicated in receptor cooperation with Fc receptors (FcRs). The role of Mac-1 in FcR-mediated lysis of tumor cells was characterized by studying normal human PMNs, Mac-1-deficient mouse PMNs, and mouse PMNs transgenic for human FcR. All PMNs efficiently phagocytosed Ab-coated particles. However, antibody-dependent cellular cytotoxicity (ADCC) was abrogated in Mac-1(-/-) PMNs and in human PMNs blocked with anti-Mac-1 monoclonal Ab (mAb). Mac-1(-/-) PMNs were unable to spread on Ab-opsonized target cells and other Ab-coated surfaces. Confocal laser scanning and electron microscopy revealed a striking difference in immunologic synapse formation between Mac-1(-/-) and wild-type PMNs. Also, respiratory burst activity could be measured outside membrane-enclosed compartments by using Mac-1(-/-) PMNs bound to Ab-coated tumor cells, in contrast to wild-type PMNs. In summary, these data document an absolute requirement of Mac-1 for FcR-mediated PMN cytotoxicity toward tumor targets. Mac-1(-/-) PMNs exhibit defective spreading on Ab-coated targets, impaired formation of immunologic synapses, and absent tumor cytolysis.

  4. High-contrast MacNeille-PBS-based LCOS projection systems

    Science.gov (United States)

    Chen, Jianmin; Robinson, Michael G.; Sharp, Gary D.

    2005-04-01

    Contrast limits are investigated for MacNeille PBS based LCOS projection systems that use retarder stack filters (RSF). The two contributing factors are considered separately; namely the color management system and the panel port. To enhance performance of the former, skew ray compensated RSFs are introduced. For the latter, a general methodology is presented to optimize contrast by compensating the LCOS panel. It is shown that the orientation of the LCOS panel and compensator, relative to the MacNeille PBS, is critical. The significant impact of AR coating performance on system contrast is also revealed. A high contrast architecture will be presented by way of example.

  5. Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

    Science.gov (United States)

    Yen, Chih-Ming; Chang, Chung-Ju; Chen, Yih-Shen; Huang, Ching Yao

    The paper proposes and analyzes an adaptive p-persistent-based (APP) medium access control (MAC) scheme for IEEE 802.11 WLAN. The APP MAC scheme intends to support delay fairness for every station in each access, denoting small delay variance. It differentiates permission probabilities of transmission for stations which are incurred with various packet delays. This permission probability is designed as a function of the numbers of retransmissions and re-backoffs so that stations with larger packet delay are endowed with higher permission probability. Also, the scheme is analyzed by a Markov-chain analysis, where the collision probability, the system throughput, and the average delay are successfully obtained. Numerical results show that the proposed APP MAC scheme can attain lower mean delay and higher mean throughput. In the mean time, simulation results are given to justify the validity of the analysis, and also show that the APP MAC scheme can achieve more delay fairness than conventional algorithms.

  6. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  7. A Critique of MacIntyrean Morality From a Kantian Perspective

    Directory of Open Access Journals (Sweden)

    Krishna Mani Pathak

    2014-04-01

    Full Text Available This article is a critical examination of MacIntyre’s notion of morality in reference to Kant’s deontological moral theory. The examination shows that MacIntyre (a criticizes Kant’s moral theory to defend virtue ethics or neo-Aristotelian ethics with a weak notion of morality; (b favors the idea of local morality, which does not leave any room for moral assessment and reciprocity in an intercultural domain; and (c fails to provide good arguments for his moral historicism and against Kant’s moral universalism.

  8. MacDUST - a powder diffraction package developed for the ''ADONE'' high resolution diffraction station

    International Nuclear Information System (INIS)

    Burattini, E.; Cappuccio, G.; Maistrelli, P.; Simeoni, S.

    1993-01-01

    A High Resolution Powder Diffraction Station (PO.DI.STA.) was installed at the beginning of 1991 on the ADONE-Wiggler magnet beam line. The station and the first powder diffraction spectra, collected with synchrotron radiation, were presented at the EPDIC-1 Conference. More details can also be found in. For this station, a very sophisticated software package ''MacDUST'' has been developed on an Apple Macintosh computer, using the Microsoft QuickBASIC compiler. It allows very easy and comfortable operations by means of a graphical user interface environment, typical of the Macintosh system. The package consists of five major programs. The main program, MacDIFF, performs all the graphic operations on the experimental data, including zooming, overlapping, cursor scanning and editing of patterns, control of output operations to printers and HPGL plotters. It also includes several analysis routines for data smoothing, a first derivative peak search algorithm, two background subtraction routines and two profile fitting programs: one based on the simplex method and the other on the Marquardt modification of a least-square algorithm. MacPDF and MacRIC are both dedicated to phase identification. The first program is an archive manager for searching, displaying and printing phase records; MacRIC is a graphic aided search-match program based on the Hanawalt algorithm. Mac3-DIM is a plot program, useful, e.g., for representing kinetics three dimensionally. MacRIET is a Macintosh version of the well known Rietveld refinement program. This version, besides conventional structure refinements, also allows the determination of micro structural parameters, i.e. micro strain and crystallite size. The program can also be used to simulate a pattern, once the structure of the compound is known. Taking advantage of the very intuitive Macintosh graphic user interface, through dialog and alert boxes, the program allows straightforward introduction and modification of the structure

  9. Alterações de linguagem em pacientes idosos portadores de demência avaliados com a Bateria MAC Language alterations in elderly patients with dementia assessed with the MAC Battery

    Directory of Open Access Journals (Sweden)

    Cristine Koehler

    2012-03-01

    Full Text Available OBJETIVO: Identificar as alterações de linguagem em um grupo de pacientes idosos portadores de demência nas tarefas de evocação lexical livre, com critério ortográfico e com critério semântico, interpretação de metáforas e discurso narrativo da Bateria Montreal de Avaliação da Comunicação - Bateria MAC, bem como, verificar a frequência de déficits. MÉTODOS: Participaram do estudo 13 pacientes com demência de grau leve a moderada, atendidos no Setor de Neurologia do Ambulatório de Distúrbios do Movimento e Demências do Hospital Santa Clara da Irmandade Santa Casa de Misericórdia de Porto Alegre (ISCMPA. O instrumento neuropsicológico de avaliação foi a Bateria MAC e a aplicação das tarefas seguiu a seguinte ordem: evocação lexical livre, evocação lexical com critério ortográfico, evocação lexical com critério semântico, interpretação de metáforas e discurso narrativo. RESULTADOS: O grupo de pacientes com demência apresentou desempenho deficitário em todas as tarefas da Bateria MAC que foram avaliadas, com diferença significativa. Além disso, os participantes apresentaram maior frequência de déficits, em ordem decrescente, nas tarefas de reconto parcial do discurso narrativo (informações essenciais e presentes, seguidas pelas tarefas de evocação lexical com critério ortográfico e com critério semântico, e reconto integral do discurso narrativo. Pelo menos dois pacientes apresentaram alterações de desempenho em alguma das cinco tarefas realizadas da Bateria MAC. CONCLUSÃO: A avaliação de linguagem através da Bateria MAC permitiu a verificação de alterações do processamento linguístico em idosos com demência, o que caracteriza que tal instrumento também é aplicável para esta população clínica.PURPOSE: To identify language deficits in a group of elderly patients with dementia in tasks of free lexical retrieval, lexical retrieval with orthographic and semantic criteria

  10. Mac Leod's syndrome

    International Nuclear Information System (INIS)

    Schad, M.; Danesi, C.; Ricci, R.; Galluzzi, S.; Coviello, G.

    1988-01-01

    Mac Leod's syndrome is a rarely diagnosed disease; that is why an accurate differential diagnosis is needed by means of radiological imaging. This paper is aimed at discussing the differential diagnosis, with a special emphasis on the pathogenesis of the syndrome. The phenomenon of air trapping in absence of central bronchial lesions is a typical radiographic finding. Chest X-ray is performed in both inspiration and expiration. Posterior oblique tomography at 55 grade centigrade of the effected side is also performed. Diffuse bronchiolitis obliterans in infancy or early childhood ia widely accepted pathogenetic pattern. Pulmonary hypoventilation causes vasoconstriction and underdevelopment of pulmonary vessels, that are reduced in caliber. Differential diagnosis includes all the diseases resulting in pulmonary hyperlucency, i.e. pulmonary and pleural alterations, and skeletal anomalies

  11. Identifying The Purchasing Power Parity of Indonesia Rupiah (IDR) based on BIG MAC Index

    OpenAIRE

    Tongam Sihol Nababan

    2016-01-01

    The aim of this study is to identify : (1) profile of exchange rate and purchasing power parity of IDR against US $ based on Big Mac Index compared to the exchange rate of other countries, and (2) the position of the Big Mac Affordability of Indonesia compared to other ASEAN countries. The results showed that based on Big Mac index during the period April 1998 up to January 2015, IDR exchange rate tends to be undervalued against the USA dollar. The cause of the currency tends to be in a posi...

  12. Learn AppleScript The Comprehensive Guide to Scripting and Automation on MAC OS X

    CERN Document Server

    Rosenthal, Hanaan

    2009-01-01

    AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScriptable applications, performing tasks both large and small, complex and simple. Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problem-from the most mundane repetitive tasks to highly integrated workflows of complex systems. * Friendly enough for beginners, d

  13. MacA is a second cytochrome c peroxidase of Geobacter sulfurreducens.

    Science.gov (United States)

    Seidel, Julian; Hoffmann, Maren; Ellis, Katie E; Seidel, Antonia; Spatzal, Thomas; Gerhardt, Stefan; Elliott, Sean J; Einsle, Oliver

    2012-04-03

    The metal-reducing δ-proteobacterium Geobacter sulfurreducens produces a large number of c-type cytochromes, many of which have been implicated in the transfer of electrons to insoluble metal oxides. Among these, the dihemic MacA was assigned a central role. Here we have produced G. sulfurreducens MacA by recombinant expression in Escherichia coli and have solved its three-dimensional structure in three different oxidation states. Sequence comparisons group MacA into the family of diheme cytochrome c peroxidases, and the protein indeed showed hydrogen peroxide reductase activity with ABTS(-2) as an electron donor. The observed K(M) was 38.5 ± 3.7 μM H(2)O(2) and v(max) was 0.78 ± 0.03 μmol of H(2)O(2)·min(-1)·mg(-1), resulting in a turnover number k(cat) = 0.46 · s(-1). In contrast, no Fe(III) reductase activity was observed. MacA was found to display electrochemical properties similar to other bacterial diheme peroxidases, in addition to the ability to electrochemically mediate electron transfer to the soluble cytochrome PpcA. Differences in activity between CcpA and MacA can be rationalized with structural variations in one of the three loop regions, loop 2, that undergoes conformational changes during reductive activation of the enzyme. This loop is adjacent to the active site heme and forms an open loop structure rather than a more rigid helix as in CcpA. For the activation of the protein, the loop has to displace the distal ligand to the active site heme, H93, in loop 1. A H93G variant showed an unexpected formation of a helix in loop 2 and disorder in loop 1, while a M297H variant that altered the properties of the electron transfer heme abolished reductive activation.

  14. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  15. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  16. Short-term hydro generation scheduling of Three Gorges–Gezhouba cascaded hydropower plants using hybrid MACS-ADE approach

    International Nuclear Information System (INIS)

    Mo, Li; Lu, Peng; Wang, Chao; Zhou, Jianzhong

    2013-01-01

    Highlights: • MACS and ADE algorithms are hybridized as MACS-ADE method for solving STHGS problem. • An adaptive mutation is integrated into the proposed algorithm to avoid premature convergence. • MACS and ADE are run in parallel in search of better solution. • Several effective heuristic strategies are designed for dealing with various constraints of STHGS problem. - Abstract: Short-term hydro generation scheduling (STHGS) aims at determining optimal hydro generation scheduling to obtain minimum water consumption for one day or week while meeting various system constraints. In this paper, the STHGS problem is decomposed into two sub-problems: (i) unit commitment (UC) sub-problem; (ii) economic load dispatch (ELD) sub-problem. Then, we present a hybrid algorithm based on multi ant colony system (MACS) and differential evolution (DE) for solving the STHGS problem. First, MACS is used for dealing with UC sub-problem. A set of cooperating ant colonies cooperate to choose the unit state over the scheduled time horizon. Then, the adaptive differential evolution (ADE) is used to solve ELD sub-problem. MACS and ADE are run in parallel with adjusting their solutions in search of a better solution. Meanwhile, local and global pheromone updating rules in MACS and adaptive dynamic parameter adjusting strategy in DE are applied for enhancing the search ability of MACS-ADE. Finally, the proposed method is implemented to solve STHGS problem of Three Gorges–Gezhouba cascaded hydropower plants to verify the feasibility and effectiveness. Compared with other established methods, the simulation results reveal that the proposed MACS-ADE approach has the best convergence property, computational efficiency with less water consumption

  17. Poincaré-MacMillan Equations of Motion for a Nonlinear Nonholonomic Dynamical System

    Science.gov (United States)

    Amjad, Hussain; Syed Tauseef, Mohyud-Din; Ahmet, Yildirim

    2012-03-01

    MacMillan's equations are extended to Poincaré's formalism, and MacMillan's equations for nonlinear nonholonomic systems are obtained in terms of Poincaré parameters. The equivalence of the results obtained here with other forms of equations of motion is demonstrated. An illustrative example of the theory is provided as well.

  18. Macular telangiectasia type 2 (MacTel) in a 34-year-old patient.

    Science.gov (United States)

    Nicolai, Heleen; Wirix, Mieke; Spielberg, Leigh; Leys, Anita

    2014-09-23

    We report macular telangiectasia type 2 (MacTel) in a 34-year-old man, the youngest patient so far published with MacTel type 2. The patient presented with metamorphopsia and impaired reading ability. Diagnosis was based on bilateral abnormal macular autofluorescence, perifoveal telangiectasia with fluorescein angiographic hyperfluorescence without cystoid oedema, a small foveal avascular zone, asymmetric configuration of the foveal pit, disruptions in the inner segment/outer segment layer and hyper-reflective haze and spots in the outer nuclear layer. Although MacTel usually manifests with a slowly progressive decrease in visual acuity in the fifth to seventh decades of life, younger patients may occasionally be diagnosed with the disease. Awareness of subtle signs of the condition is essential for early diagnosis. 2014 BMJ Publishing Group Ltd.

  19. The Evaluation of the Effect of Multiwall Carbon Nano Tube (MWCNT) on In Vitro Proliferation and Shoot Tip Necrosis of Pistachio Rootstock UCB-1 (Pistacia integrima × P. atlantica)

    OpenAIRE

    Shahrzad Aghasi Kermani; Hossein Hokmabadi; Marzieh Ghanbari Jahromi

    2017-01-01

    UCB-1 (Pistacia atlantica × P. integrima) is a commercial rootstock for pistachio in some pistachio plantations across the world. This rootstock is very new in Iran and recently, it has been used commercially in some plantations due to its high growth. Propagation of this rootstock by tissue culture results in many limitations such as shoot tip necrosis (STN) and a low proliferation rate. Therefore, any process that leads to improve the proliferation rate and feature will be used in commercia...

  20. Integrated, Kerberized Login on MacOS X

    Science.gov (United States)

    Hotz, Henry B.

    2006-01-01

    Context for this information. MacOS X login process and available hooks. Authorization Services configuration. Authorization Services plug-in s. Kerberos plug-in s. Other bugs and recommendations. Authorization Services Called by loginwindow, screen saver and fast user switching. It calls Directory Services, Login Hook, and Login Items (System Preferences).

  1. Conformational stability analyses of alpha subunit I domain of LFA-1 and Mac-1.

    Directory of Open Access Journals (Sweden)

    Debin Mao

    Full Text Available β₂ integrin of lymphocyte function-associated antigen-1 (LFA-1 or macrophage-1 antigen (Mac-1 binds to their common ligand of intercellular adhesion molecule-1 (ICAM-1 and mediates leukocyte-endothelial cell (EC adhesions in inflammation cascade. Although the two integrins are known to have distinct functions, the corresponding micro-structural bases remain unclear. Here (steered-molecular dynamics simulations were employed to elucidate the conformational stability of α subunit I domains of LFA-1 and Mac-1 in different affinity states and relevant I domain-ICAM-1 interaction features. Compared with low affinity (LA Mac-1, the LA LFA-1 I domain was unstable in the presence or absence of ICAM-1 ligand, stemming from diverse orientations of its α₇-helix with different motifs of zipper-like hydrophobic junction between α₁- and α₇-helices. Meanwhile, spontaneous transition of LFA-1 I domain from LA state to intermediate affinity (IA state was first visualized. All the LA, IA, and high affinity (HA states of LFA-1 I domain and HA Mac-1 I domain were able to bind to ICAM-1 ligand effectively, while LA Mac-1 I domain was unfavorable for binding ligand presumably due to the specific orientation of S144 side-chain that capped the MIDAS ion. These results furthered our understanding in correlating the structural bases with their functions of LFA-1 and Mac-1 integrins from the viewpoint of I domain conformational stability and of the characteristics of I domain-ICAM-1 interactions.

  2. Manual Ability Classification System (MACS: reliability between therapists and parents in Brazil

    Directory of Open Access Journals (Sweden)

    Daniela B. R. Silva

    2015-02-01

    Full Text Available BACKGROUND: The Manual Ability Classification System (MACS has been widely used to describe the manual ability of children with cerebral palsy (CP; however its reliability has not been verified in Brazil. OBJECTIVE: To establish the inter- and intra-rater reliability of the Portuguese-Brazil version of the MACS by comparing the classifications given by therapists and parents of children with CP. METHOD: Data were obtained from 90 children with CP between the ages of 4 and 18 years, who were treated at the neurology and rehabilitation clinics of a Brazilian hospital. Therapists (an occupational therapist and a student classified manual ability (MACS through direct observation and information provided by parents. Therapists and parents used the Portuguese-Brazil version of the MACS. Intra- and inter-rater reliability was obtained using unweighted Kappa coefficient (k and intra-class correlation coefficient (ICC. The Chi-square test was used to identify the predominance of disagreements in the classification of parents and therapists. RESULTS: An almost perfect agreement resulted among therapists [K=0.90 (95% CI 0.83-0.97; ICC=0.97 (95%CI 0.96-0.98], as well as with intra-rater (therapists, with Kappa ranging between 0.83 and 0.95 and ICC between 0.96 and 0.99 for the evaluator with more and less experience in rehabilitation, respectively. The agreement between therapists and parents was fair [K=0.36 (95% CI 0.22-0.50; ICC=0.79 (95% CI 0.70-0.86]. CONCLUSIONS: The Portuguese version of the MACS is a reliable instrument to be used jointly by parents and therapists.

  3. [Spanish validation of the MacArthur Competence Assessment Tool for Treatment interview to assess patients competence to consent treatment].

    Science.gov (United States)

    Alvarez Marrodán, Ignacio; Baón Pérez, Beatriz; Navío Acosta, Mercedes; López-Antón, Raul; Lobo Escolar, Elena; Ventura Faci, Tirso

    2014-09-09

    To validate the MacArthur Competence Assessment Tool for Treatment (MacCAT-T) Spanish version, which assesses the mental capacity of patients to consent treatment, by examining 4 areas (Understanding, Appreciation, Reasoning and Expressing a choice). 160 subjects (80 Internal Medicine inpatients, 40 Psychiatric inpatients and 40 healthy controls). MacCAT-T, Mini-Mental Status Examination (MMSE). Feasibility study, reliability and validity calculations (against to gold standard of clinical expert). Mean duration of the MacCAT-T interview was 18min. Inter-rater reliability: Intraclass correlation coefficient for Understanding=0.98, Appreciation=0.97, Reasoning=0.98, Expressing a choice=0.91. Internal consistency (Cronbach's alpha): Understanding=0.87, for Appreciation=0.76, for Reasoning=0.86. Patients considered to be incapable (gold standard) scored lower in all the MacCAT-T areas. Poor performance on the MacCAT-T was related to cognitive impairment assessed by MMSE. Spanish version of the MacCAT-T is feasible, reliable, and valid for assessing the capacity of patients to consent treatment. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  4. MAC Version 3.3, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Code Cleanup ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The Acceptance Test results indicate that the MAC and MBA systems are ready for operation using the cleaned up code. The final codes were removed to the production space on the customer server on April 15th

  5. 76 FR 71797 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and...

    Science.gov (United States)

    2011-11-18

    ... diligence procedures that are required for investments, but we do not intend to change the fundamental... Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and Liquidity... Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and Liquidity Management AGENCY...

  6. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  7. Comparison of the C-MAC video laryngoscope to the Macintosh laryngoscope for intubation of blunt trauma patients in the ED

    Directory of Open Access Journals (Sweden)

    Erkan Goksu

    2016-06-01

    Full Text Available Objectives: We aimed to compare the performance of the C-MAC video laryngoscope (C-MAC to the Macintosh laryngoscope for intubation of blunt trauma patients in the ED. Material and methods: This was a prospective randomized study. The primary outcome measure is overall successful intubation. Secondary outcome measures are first attempt successful intubation, Cormack–Lehane (CL grade, and indicators of the reasons for unsuccessful intubation at the first attempt with each device. Adult patients who suffered from blunt trauma and required intubation were randomized to video laryngoscopy with C-MAC device or direct laryngoscopy (DL. Results: During a 17-month period, a total of 150 trauma intubations were performed using a C-MAC and DL. Baseline characteristics of patients were similar between the C-MAC and DL group. Overall success for the C-MAC was 69/75 (92%, 95% CI 0.83 to 0.96 while for the DL it was 72/75 (96%, 95% CI 0.88 to 0.98. First attempt success for the C-MAC was 47/75 (62.7%, 95% CI 0.51 to 0.72 while for the DL it was 44/75 patients (58.7%, 95% CI 0.47 to 0.69. The mean time to achieve successful intubation was 33.4 ± 2.5 s for the C-MAC versus 42.4 ± 5.1 s for the DL (p = 0.93. There was a statistically significant difference between the DL and C-MAC in terms of visualizing the glottic opening and esophageal intubation in favor of the C-MAC (p = 0.002 and p = 0.013 respectively. Discussion and conclusion: The overall success rates were similar. The C-MAC demonstrated improved glottic view and decrease in esophageal intubation rate. Keywords: Airway management, Emergency medicine, Video laryngoscope

  8. Microfabricated inserts for magic angle coil spinning (MACS wireless NMR spectroscopy.

    Directory of Open Access Journals (Sweden)

    Vlad Badilita

    Full Text Available This article describes the development and testing of the first automatically microfabricated probes to be used in conjunction with the magic angle coil spinning (MACS NMR technique. NMR spectroscopy is a versatile technique for a large range of applications, but its intrinsically low sensitivity poses significant difficulties in analyzing mass- and volume-limited samples. The combination of microfabrication technology and MACS addresses several well-known NMR issues in a concerted manner for the first time: (i reproducible wafer-scale fabrication of the first-in-kind on-chip LC microresonator for inductive coupling of the NMR signal and reliable exploitation of MACS capabilities; (ii improving the sensitivity and the spectral resolution by simultaneous spinning the detection microcoil together with the sample at the "magic angle" of 54.74° with respect to the direction of the magnetic field (magic angle spinning - MAS, accompanied by the wireless signal transmission between the microcoil and the primary circuit of the NMR spectrometer; (iii given the high spinning rates (tens of kHz involved in the MAS methodology, the microfabricated inserts exhibit a clear kinematic advantage over their previously demonstrated counterparts due to the inherent capability to produce small radius cylindrical geometries, thus tremendously reducing the mechanical stress and tearing forces on the sample. In order to demonstrate the versatility of the microfabrication technology, we have designed MACS probes for various Larmor frequencies (194, 500 and 700 MHz testing several samples such as water, Drosophila pupae, adamantane solid and LiCl at different magic angle spinning speeds.

  9. CoCoMac 2.0 and the future of tract-tracing databases

    OpenAIRE

    Rembrandt eBakker; Rembrandt eBakker; Rembrandt eBakker; Thomas eWachtler; Markus eDiesmann; Markus eDiesmann; Markus eDiesmann

    2012-01-01

    The CoCoMac database contains the results of published axonal tract-tracing studies in the macaque brain. The combined data are used to construct the macaque macro-connectome. We discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two resources that provide online access to raw tracing data in rodents, a connectome viewer for advanced 3d graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity...

  10. Current evidence for the use of C-MAC videolaryngoscope in adult airway management: a review of the literature

    Directory of Open Access Journals (Sweden)

    Xue FS

    2017-07-01

    Full Text Available Fu-Shan Xue, Hui-Xian Li, Ya-Yang Liu, Gui-Zhen Yang Department of Anesthesiology, Plastic Surgery Hospital, Chinese Academy of Medical Sciences and Peking Union Medical College, Beijing, People’s Republic of China Abstract: The C-MAC videolaryngoscope is the first Macintosh-typed videolaryngoscope. Since the advent of its original version video Macintosh system in 1999, this device has been modified several times. A unique feature of C-MAC device is its ability to provide the 2 options of direct and video laryngoscopy with the same device. The available evidence shows that in patients with normal airways, C-MAC videolaryngoscope compared with direct laryngoscopy can provide comparable or better laryngeal views and exerts less force on maxillary incisors, but does not offer conclusive benefits with regard to intubation time, intubation success, number of intubation attempts, the use of adjuncts, and hemodynamic responses to intubation. In patients with predicted or known difficult airways, C-MAC videolaryngoscope can achieve a better laryngeal view, a higher intubation success rate and a shorter intubation time than direct laryngoscopy. Furthermore, the option to perform direct and video laryngoscopy with the same device makes C-MAC videolaryngoscope exceptionally useful for emergency intubation. In addition, the C-MAC videolaryngoscope is a very good tool for tracheal intubation teaching. However, tracheal intubation with C-MAC videolaryngoscope may occasionally fail and introduction of C-MAC videolaryngoscope in clinical practice must be accompanied by formal training programs in normal and difficult airway managements. Keywords: videolaryngoscopy, direct laryngoscopy, airway management, tracheal intubation, patient safety

  11. MacCormack's technique-based pressure reconstruction approach for PIV data in compressible flows with shocks

    Science.gov (United States)

    Liu, Shun; Xu, Jinglei; Yu, Kaikai

    2017-06-01

    This paper proposes an improved approach for extraction of pressure fields from velocity data, such as obtained by particle image velocimetry (PIV), especially for steady compressible flows with strong shocks. The principle of this approach is derived from Navier-Stokes equations, assuming adiabatic condition and neglecting viscosity of flow field boundaries measured by PIV. The computing method is based on MacCormack's technique in computational fluid dynamics. Thus, this approach is called the MacCormack method. Moreover, the MacCormack method is compared with several approaches proposed in previous literature, including the isentropic method, the spatial integration and the Poisson method. The effects of velocity error level and PIV spatial resolution on these approaches are also quantified by using artificial velocity data containing shock waves. The results demonstrate that the MacCormack method has higher reconstruction accuracy than other approaches, and its advantages become more remarkable with shock strengthening. Furthermore, the performance of the MacCormack method is also validated by using synthetic PIV images with an oblique shock wave, confirming the feasibility and advantage of this approach in real PIV experiments. This work is highly significant for the studies on aerospace engineering, especially the outer flow fields of supersonic aircraft and the internal flow fields of ramjets.

  12. Global Mobile Satellite Service Interference Analysis for the AeroMACS

    Science.gov (United States)

    Wilson, Jeffrey D.; Apaza, Rafael D.; Hall, Ward; Phillips, Brent

    2013-01-01

    The AeroMACS (Aeronautical Mobile Airport Communications System), which is based on the IEEE 802.16-2009 mobile wireless standard, is envisioned as the wireless network which will cover all areas of airport surfaces for next generation air transportation. It is expected to be implemented in the 5091-5150 MHz frequency band which is also occupied by mobile satellite service uplinks. Thus the AeroMACS must be designed to avoid interference with this incumbent service. Simulations using Visualyse software were performed utilizing a global database of 6207 airports. Variations in base station and subscriber antenna distribution and gain pattern were examined. Based on these simulations, recommendations for global airport base station and subscriber antenna power transmission limitations are provided.

  13. Nora Tully MacAlvay--Her Life in the Theatre.

    Science.gov (United States)

    Webb, Dorothy

    1996-01-01

    Recounts the life and times of a pioneer children's theater playwright and fiction author, Nora Tully MacAlvay (1900-86). Points out that her interest in children's theater and children's literature was lifelong and intense. (PA)

  14. Learn Xcode Tools for Mac OS X and iPhone Development

    CERN Document Server

    Piper, I

    2010-01-01

    This book will give you a thorough grounding in the principal and supporting tools and technologies that make up the Xcode Developer Tools suite. Apple has provided a comprehensive collection of developer tools, and this is the first book to examine the complete Apple programming environment for both Mac OS X and iPhone. * Comprehensive coverage of all the Xcode developer tools * Additional coverage of useful third-party development tools* Not just a survey of features, but a serious examination of the complete development process for Mac OS X and iPhone applications What you'll learn* The boo

  15. The Big Mac Standard: A statistical Illustration

    OpenAIRE

    Yukinobu Kitamura; Hiroshi Fujiki

    2004-01-01

    We demonstrate a statistical procedure for selecting the most suitable empirical model to test an economic theory, using the example of the test for purchasing power parity based on the Big Mac Index. Our results show that supporting evidence for purchasing power parity, conditional on the Balassa-Samuelson effect, depends crucially on the selection of models, sample periods and economies used for estimations.

  16. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  17. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  18. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  19. Mechatronical Aided Concept (MAC) in Intelligent Transport Vehicles Design

    OpenAIRE

    Pavel Pavlasek

    2003-01-01

    This article deals with the principles of synergy effect of mechatronical aided concept (MAC) to the design of intelligent transport vehicles products applying CA technologies and virtual reality design methods. Also includes presentation of intelligent railway vehicle development.

  20. MAC mini acceptance test procedure, software Version 3.0

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) programs had some major improvements made to it to organize the main-tables by Location, Canister, and Material. This ATP describes how the code was to be tested to verify its correctness

  1. LFA-1 and Mac-1 integrins bind to the serine/threonine-rich domain of thrombomodulin

    Energy Technology Data Exchange (ETDEWEB)

    Kawamoto, Eiji [Department of Molecular Pathobiology and Cell Adhesion Biology, Mie University Graduate School of Medicine, 2-174 Edobashi, Tsu, Mie 514-8507 (Japan); Emergency and Critical Care Center, Mie University Hospital, 2-174 Edobashi, Tsu 514-8507 (Japan); Okamoto, Takayuki, E-mail: okamotot@doc.medic.mie-u.ac.jp [Department of Molecular Pathobiology and Cell Adhesion Biology, Mie University Graduate School of Medicine, 2-174 Edobashi, Tsu, Mie 514-8507 (Japan); Takagi, Yoshimi [Department of Molecular Pathobiology and Cell Adhesion Biology, Mie University Graduate School of Medicine, 2-174 Edobashi, Tsu, Mie 514-8507 (Japan); Honda, Goichi [Medical Affairs Department, Asahi Kasei Pharma Corporation, 1-105 Kanda Jinbo-cho, Chiyoda-ku, Tokyo 101-8101 (Japan); Suzuki, Koji [Faculty of Pharmaceutical Science, Suzuka University of Medical Science, 3500-3, Minamitamagaki-cho, Suzuka, Mie 513-8679 (Japan); Imai, Hiroshi [Emergency and Critical Care Center, Mie University Hospital, 2-174 Edobashi, Tsu 514-8507 (Japan); Shimaoka, Motomu, E-mail: shimaoka@doc.medic.mie-u.ac.jp [Department of Molecular Pathobiology and Cell Adhesion Biology, Mie University Graduate School of Medicine, 2-174 Edobashi, Tsu, Mie 514-8507 (Japan)

    2016-05-13

    LFA-1 (αLβ2) and Mac-1 (αMβ2) integrins regulate leukocyte trafficking in health and disease by binding primarily to IgSF ligand ICAM-1 and ICAM-2 on endothelial cells. Here we have shown that the anti-coagulant molecule thrombomodulin (TM), found on the surface of endothelial cells, functions as a potentially new ligand for leukocyte integrins. We generated a recombinant extracellular domain of human TM and Fc fusion protein (TM-domains 123-Fc), and showed that pheripheral blood mononuclear cells (PBMCs) bind to TM-domains 123-Fc dependent upon integrin activation. We then demonstrated that αL integrin-blocking mAb, αM integrin-blocking mAb, and β2 integrin-blocking mAb inhibited the binding of PBMCs to TM-domains 123-Fc. Furthermore, we show that the serine/threonine-rich domain (domain 3) of TM is required for the interaction with the LFA-1 (αLβ2) and Mac-1 (αMβ2) integrins to occur on PBMCs. These results demonstrate that the LFA-1 and Mac-1 integrins on leukocytes bind to TM, thereby establishing the molecular and structural basis underlying LFA-1 and Mac-1 integrin interaction with TM on endothelial cells. In fact, integrin-TM interactions might be involved in the dynamic regulation of leukocyte adhesion with endothelial cells. - Highlights: • LFA-1 and Mac-1 integrins bind to the anti-coagulant molecule thrombomodulin. • The serine/threonine-rich domain of thrombomodulin is essential to interact with the LFA-1 and Mac-1 integrins on PBMCs. • Integrin-TM interactions might be involved in the dynamic regulation of leukocyte adhesion with endothelial cells.

  2. Annie Marion MacLean: “the mother of contemporary etnography” and pioneer in sociology distance learning

    Directory of Open Access Journals (Sweden)

    Silvia García Dauder

    2008-05-01

    Full Text Available The article introduces Anne Marion MacLean into the United States' scientific sociology at its very origins (1892, when the Department of Sociology of the Chicago University was created. It also puts MacLean in a network called "Women's School of Chicago", and the forgotten contributions of these social sciences' pioneers, submitted to the American Journal of Sociology, are analyzed. Two MacLean's key contributions are highlighted: the correspondence courses in teaching sociology and her research by means of participant observation in workplaces focusing on women's work.

  3. 78 FR 5320 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Capital Planning

    Science.gov (United States)

    2013-01-25

    ... the business planning period a required discussion of how factors might impact Farmer Mac's current... discussion of any expected changes to Farmer Mac's business plan that are likely to have a material impact on... conditions that cause increases in delinquency rates caused by any variety of factors (e.g., widespread...

  4. Mechatronical Aided Concept (MAC in Intelligent Transport Vehicles Design

    Directory of Open Access Journals (Sweden)

    Pavel Pavlasek

    2003-01-01

    Full Text Available This article deals with the principles of synergy effect of mechatronical aided concept (MAC to the design of intelligent transport vehicles products applying CA technologies and virtual reality design methods. Also includes presentation of intelligent railway vehicle development.

  5. Make your own video with QuickTime on the Mac

    CERN Document Server

    CERN. Geneva

    2016-01-01

    A step-by-step video tutorial on how to do a screen recording using QuickTime player on a Mac. QuickTime is a multimedia framework, which is natively installed on most Mac computers. This tutorial explains how to do a screen recording using Quicktime and how to export the video. A pdf document on the subject is available as material from the indico event page. Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) http://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  6. The MacGyver effect: alive and well in health services research?

    Directory of Open Access Journals (Sweden)

    Moriarty Helen J

    2011-09-01

    Full Text Available Abstract Background In a manner similar to the television action hero MacGyver, health services researchers need to respond to the pressure of unpredictable demands and constrained time frames. The results are often both innovative and functional, with the creation of outputs that could not have been anticipated in the initial planning and design of the research. Discussion In the conduct of health services research many challenges to robust research processes are generated as a result of the interface between academic research, health policy and implementation agendas. Within a complex and rapidly evolving environment the task of the health services researcher is, therefore, to juggle sometimes contradictory pressures to produce valid results. Summary This paper identifies the MacGyver-type dilemmas which arise in health services research, wherein innovation may be called for, to maintain the intended scientific method and rigour. These 'MacGyver drivers' are framed as opposing issues from the perspective of both academic and public policy communities. The ideas expressed in this paper are illustrated by four examples from research projects positioned at the interface between public policy strategy and academia.

  7. La République de Macédoine dans la presse française

    Directory of Open Access Journals (Sweden)

    Toni Glamcevski

    2011-12-01

    Full Text Available Les médias français s'intéressent à la République de Macédoine quand la Grèce refuse de la reconnaître, mais souvent adoptent des positions progrecques.Malgré son nom illustre, la Macédoine est un pays très mal connu en France. Jusqu’en 1991, très peu de gens connaissaient l’existence de la République de Macédoine. Les médias français commencent à s’intéresser au pays lors du blocus de sa reconnaissance par la Grèce (1991. De nombreux articles, commentaires, interviews tentent alors d’éclaircir la situation du pays, mais il y a eu très peu d’interventions de la part des intellectuels et « experts ». Cette communication montre les grandes lignes des articles parus en France dans la période entre 1991 et 2009. Mais la presse française, en assimilant le peuple macédonien au terme « Slaves », voulait sans doute pendant le conflit du Kosovo et le conflit de 2001, éclaircir la situation, mais l’utilisation de ce terme est aussi comprise comme une tentative de négation de l’existence du peuple macédonien. Le nom de la République de Macédoine bloque le pays dans son passé, c'est aux Macédoniens de définir leur identité, pas à leurs voisins ni aux membres de l'UE.In spite of its famous name, Macedonia is not well-known in France. Till 1991, very few persons even knew the existence of a Republic of Macedonia. The French Medias began to get interested in it with the Greek blocus of Macedonia. A lot of papers, comments, interviews tried then to explain the main lines of the country's situation but with a very light participation of experts or intellectuals. One can find in this paper the main lines of the French press on Macedonia from spring 1999 to September 2001. The French papers, as a whole, assimilating the “Macedonian” people to “Slaves”, perhaps to make a clear difference when explaining the situation during the Kossovo crisis or later, during the crisis inside Macedonia, contributed

  8. Using The Economist’s Big Mac Index for Instruction

    OpenAIRE

    Stegelin, Forrest E.

    2012-01-01

    The Economist first launched the concept of the Big Mac Index in 1986 as a guide to whether currencies were at their correct exchange rate; it is not intended to be a precise predictor of currency movements around the globe, but simply a way to make exchange-rate theory and discussions a bit more digestible. First used as a humorous illustration, the term “burgernomics†was coined and the Big Mac index became an annual occurrence. It is based upon one of the oldest concepts in internationa...

  9. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  10. God, Sport Philosophy, Kinesiology: A MacIntyrean Examination

    Science.gov (United States)

    Twietmeyer, Gregg

    2015-01-01

    Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…

  11. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN—A Survey

    Directory of Open Access Journals (Sweden)

    Vignesh Raja Karuppiah Ramachandran

    2016-11-01

    Full Text Available With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS, the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN and Wireless Sensor Network (WSN. To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of Wu

  12. Mario Sironi nas chamadas Coleções Matarazzo do MAC USP

    Directory of Open Access Journals (Sweden)

    Andrea Ronqui

    Full Text Available O acervo de arte moderna italiana do MAC-USP pode ser considerado a maior coleção desse gênero fora da Itália e vem sendo objeto de estudo nos últimos anos. Das 71 obras italianas, seis são de autoria de Mario Sironi. Este artigo propõe uma apresentação do percurso do artista, com breve análise de sua evolução pictórica, a partir dos estudos já existentes, a fim de situar as obras sironianas do acervo do MAC no contexto de sua produção.

  13. Heroic Measures for an American Hero: Attempting to Save the Life of General Douglas MacArthur.

    Science.gov (United States)

    Pappas, Theodore N

    2017-12-01

    General Douglas MacArthur was a towering public figure on an international stage for the first half of the 20th century. He was healthy throughout his life but developed a series of medical problems when he entered his 80s. This article reviews the General's medical care during two separate life-threatening medical crises that required surgical intervention. The first episode occurred in 1960 when MacArthur presented with renal failure due to an obstructed prostate. Four years later after his 84th birthday, MacArthur developed bile duct obstruction from common duct stones. He underwent an uncomplicated cholecystectomy and common duct exploration but developed variceal bleeding requiring an emergent splenorenal shunt. His terminal event was precipitated by strangulated bowel in long-ignored very large inguinal hernias. MacArthur died, despite state-of-the-art surgical intervention, due to renal failure and hepatic coma.

  14. Are Rural Costs of Living Lower? Evidence from a Big Mac Index Approach

    OpenAIRE

    Scott Loveridge; Dusan Paredes

    2015-01-01

    Rural leaders can point to low housing costs as a reason that their area should be competitive for business attraction. To what extent do rural housing costs offset transportation and other locational disadvantages in costs structures? The US lacks information to systematically answer the question. We adapt a strategy employed by The Economist in exploring purchasing power parity: the Big Mac Index. We gather information on Big Mac prices with a random sample of restaurants across the contigu...

  15. Evaluation of the MacDonald scabbler for highway use.

    Science.gov (United States)

    1975-01-01

    The MacDonald Scabbler is a small, hand held machine suitable for use in cleaning and roughening concrete surfaces, It weighs 308 pounds (140 kg), has 11 cutting heads, and, as a power source, requires a compressor capable of delivering 365 cubic foo...

  16. MAC mini acceptance test procedures, software Version 3.3

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) programs had some improvements made to it to to change slightly the access authorized users had to the modification of critical data. This ATP describes how the code was to be tested to verify its correctness

  17. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  18. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  19. The Big Mac Index: A Shortcut To Inflation And Exchange Rate Dynamics? Price Tracking And Predictive Properties

    OpenAIRE

    Luis San Vicente Portes; Vidya Atal

    2014-01-01

    The Economist magazine has been publishing the Big Mac Index using it as a rule of thumb to determine the over- or under-valuation of international currencies based on the theory of Purchasing Power Parity since 1986. According to the theory, using the Big Mac as a tradable single-good basket, the Dollar-value of the hamburger should be equalized around the world due to arbitrage. The popularity and following of the Big Mac Index led the authors to the following two questions: 1) How effectiv...

  20. La question macédonienne pendant la guerre civile grecque

    Directory of Open Access Journals (Sweden)

    Christina Alexopoulos

    2012-05-01

    Full Text Available Le traitement de la question macédonienne durant la guerre civile grecque interroge la mémoire du conflit entre oubli, déni et instrumentalisation politique. Le Parti communiste grec essaya de concilier la politique nationale avec la géopolitique internationale, en tenant compte des revendications macédoniennes et de la stratégie de Tito. L’engagement des Macédoniens slavophones de Grèce à la résistance communiste et à la guerre civile exprima une lutte identitaire et sociale. La propagande gouvernementale transforma la question macédonienne en « preuve suprême » d’une   trahison nationale » des communistes devant « le danger slave » et occulta le collaborationnisme dont les milices nationalistes se rendirent coupables. Malgré la démocratisation du pays et le travail de l’historiographie contemporaine, le traitement actuel de la question dans les discours politiques et journalistiques montre la vivacité du nationalisme d’antan au sein de la société civile.Treating the Macedonian question during Greek civil war means dealing with the memory of the conflict, somewhere between oblivion, denial and political instrumentation. The Greek Communist Party tried to reconcile national politics with international geopolitics in its consideration of the Macedonian demands and Tito’s strategy. On the other hand the engagement of slavophone Macedonians of Greece, in the communist resistance and the civil war, expressed a social struggle and an identity conflict. The governmental propaganda transformed the Macedonian question into the “ultimate proof” of the communists committing “national treason” with regard to the “Slavic danger” and did its best to hide the collaborationism, of which, the nationalist militia was guilty of. Despite the return of Democracy in the country, the way the question is actually being treated in politics and by the media is revelatory of the nationalism reigning in the past and still

  1. Web Development with the Mac

    CERN Document Server

    Vegh, Aaron

    2010-01-01

    Learn Web development the Apple way and build a business. With a focus on both coding and creative development, this in-depth guide thoroughly covers what you need to know to build winning websites for clients — from what it takes to bring a business online to how to make your site interactive to how to run a freelance web business. In between, you'll master the technical tools of the trade — such as HTML, CSS, JavaScript, PHP, and Ruby on Rails — and learn how to create beautiful interfaces using Photoshop . This book covers everything a fledgling web developer working on a Mac needs to launc

  2. Teach yourself visually Mac Mini

    CERN Document Server

    Hart-Davis, Guy

    2012-01-01

    The perfect how-to guide for visual learners Apple?s Mac Mini packs a powerful punch is in a small package, including both HDMI and Thunderbolt ports plus the acclaimed OS X. But if you want to get the very most from all this power and versatility, be sure to get this practical visual guide. With full-color, step-by-step instructions as well as screenshots and illustrations on every page, it clearly shows you how to accomplish tasks rather than burying you in pages of text. Discover helpful visuals and how-tos on the OS, hardware specs, Launchpad, the App Store, multimedia capabilities (such

  3. Multiple lupus-associated ITGAM variants alter Mac-1 functions on neutrophils.

    Science.gov (United States)

    Zhou, Yebin; Wu, Jianming; Kucik, Dennis F; White, Nathan B; Redden, David T; Szalai, Alexander J; Bullard, Daniel C; Edberg, Jeffrey C

    2013-11-01

    Multiple studies have demonstrated that single-nucleotide polymorphisms (SNPs) in the ITGAM locus (including the nonsynonymous SNPs rs1143679, rs1143678, and rs1143683) are associated with systemic lupus erythematosus (SLE). ITGAM encodes the protein CD11b, a subunit of the β2 integrin Mac-1. The purpose of this study was to determine the effects of ITGAM genetic variation on the biologic functions of neutrophil Mac-1. Neutrophils from ITGAM-genotyped and -sequenced healthy donors were isolated for functional studies. The phagocytic capacity of neutrophil ITGAM variants was probed with complement-coated erythrocytes, serum-treated zymosan, heat-treated zymosan, and IgG-coated erythrocytes. The adhesion capacity of ITGAM variants, in adhering to either purified intercellular adhesion molecule 1 or tumor necrosis factor α-stimulated endothelial cells, was assessed in a flow chamber. Expression levels of total CD11b and activation of CD11b were assessed by flow cytometry. Mac-1-mediated neutrophil phagocytosis, determined in cultures with 2 different complement-coated particles, was significantly reduced in individuals with nonsynonymous variant alleles of ITGAM. This reduction in phagocytosis was related to variation at either rs1143679 (in the β-propeller region) or rs1143678/rs1143683 (highly linked SNPs in the cytoplasmic/calf-1 regions). Phagocytosis mediated by Fcγ receptors was also significantly reduced in donors with variant ITGAM alleles. Similarly, firm adhesion of neutrophils was significantly reduced in individuals with variant ITGAM alleles. These functional alterations were not attributable to differences in total receptor expression or activation. The nonsynonymous ITGAM variants rs1143679 and rs1143678/rs113683 contribute to altered Mac-1 function on neutrophils. These results underscore the need to consider multiple nonsynonymous SNPs when assessing the functional consequences of ITGAM variation on immune cell processes and the risk of SLE

  4. Application of the MacCormack scheme to overland flow routing for high-spatial resolution distributed hydrological model

    Science.gov (United States)

    Zhang, Ling; Nan, Zhuotong; Liang, Xu; Xu, Yi; Hernández, Felipe; Li, Lianxia

    2018-03-01

    Although process-based distributed hydrological models (PDHMs) are evolving rapidly over the last few decades, their extensive applications are still challenged by the computational expenses. This study attempted, for the first time, to apply the numerically efficient MacCormack algorithm to overland flow routing in a representative high-spatial resolution PDHM, i.e., the distributed hydrology-soil-vegetation model (DHSVM), in order to improve its computational efficiency. The analytical verification indicates that both the semi and full versions of the MacCormack schemes exhibit robust numerical stability and are more computationally efficient than the conventional explicit linear scheme. The full-version outperforms the semi-version in terms of simulation accuracy when a same time step is adopted. The semi-MacCormack scheme was implemented into DHSVM (version 3.1.2) to solve the kinematic wave equations for overland flow routing. The performance and practicality of the enhanced DHSVM-MacCormack model was assessed by performing two groups of modeling experiments in the Mercer Creek watershed, a small urban catchment near Bellevue, Washington. The experiments show that DHSVM-MacCormack can considerably improve the computational efficiency without compromising the simulation accuracy of the original DHSVM model. More specifically, with the same computational environment and model settings, the computational time required by DHSVM-MacCormack can be reduced to several dozen minutes for a simulation period of three months (in contrast with one day and a half by the original DHSVM model) without noticeable sacrifice of the accuracy. The MacCormack scheme proves to be applicable to overland flow routing in DHSVM, which implies that it can be coupled into other PHDMs for watershed routing to either significantly improve their computational efficiency or to make the kinematic wave routing for high resolution modeling computational feasible.

  5. PaleoMac: A Macintosh™ application for treating paleomagnetic data and making plate reconstructions

    Science.gov (United States)

    Cogné, J. P.

    2003-01-01

    This brief note provides an overview of a new Macintosh™ application, PaleoMac, (MacOS 8.0 or later, 15Mb RAM required) which permits rapid processing of paleomagnetic data, from the demagnetization data acquired in the laboratory, to the treatment of paleomagnetic poles, plate reconstructions, finite rotation computations on a sphere, and characterization of relative plate motions. Capabilities of PaleoMac include (1) high interactivity between the user and data displayed on screen which provides a fast and easy way to handle, add and remove data or contours, perform computations on subsets of points, change projections, sizes, etc.; (2) performance of all standard principal component analysis and statistical processing on a sphere [, 1953] etc.); (3) output of high quality plots, compatible with graphic programs such as Adobe Illustrator, and output of numerical results as ASCII files. Beyond its usefulness in treating paleomagnetic data, its ability to handle plate motion computations should be of large interest to the Earth science community.

  6. Increasing the permeability of Escherichia coli using MAC13243

    DEFF Research Database (Denmark)

    Muheim, Claudio; Götzke, Hansjörg; Eriksson, Anna U.

    2017-01-01

    molecules that make the outer membrane of Escherichia coli more permeable. We identified MAC13243, an inhibitor of the periplasmic chaperone LolA that traffics lipoproteins from the inner to the outer membrane. We observed that cells were (1) more permeable to the fluorescent probe 1-N...

  7. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    International Nuclear Information System (INIS)

    Zacharias, Sven; Newe, Thomas

    2011-01-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  8. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Energy Technology Data Exchange (ETDEWEB)

    Zacharias, Sven; Newe, Thomas, E-mail: Sven.Zacharias@ul.ie [University of Limerick (Ireland)

    2011-08-17

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  9. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  10. C-MAC videolaryngoscope versus Macintosh laryngoscope for tracheal intubation: A systematic review and meta-analysis with trial sequential analysis.

    Science.gov (United States)

    Hoshijima, Hiroshi; Mihara, Takahiro; Maruyama, Koichi; Denawa, Yohei; Mizuta, Kentaro; Shiga, Toshiya; Nagasaka, Hiroshi

    2018-06-09

    The C-MAC laryngoscope (C-MAC) is a videolaryngoscope that uses a modified Macintosh blade. Although several anecdotal reports exist, it remains unclear whether the C-MAC is superior to the Macintosh laryngoscope for tracheal intubation in the adult population. Systematic review, meta-analysis. Operating room, intensive care unit. For inclusion in our analysis, studies had to be prospective randomised trials which compared the C-MAC with the Macintosh laryngoscope for tracheal intubation in the adult population. Data on success rates, intubation time, glottic visualisation and incidence of external laryngeal manipulations (ELM) during tracheal intubation were extracted from the identified studies. In subgroup analysis, we separated those parameters to assess the influence of the airway condition (normal or difficult) and laryngoscopists (novice or experienced). We conducted a trial sequential analysis (TSA). Sixteen articles with 18 trials met the inclusion criteria. The C-MAC provided better glottic visualisation compared to the Macintosh (RR, 1.08; 95% CI, 1.03-1.14). TSA corrected the CI to 1.01-1.19; thus, total sample size reached the required information size (RIS). Success rates and intubation time did not differ significantly between the laryngoscopes. TSA showed that total sample size reached the RIS for success rates. The TSA Z curve surpassed the futility boundary. The C-MAC required less ELM compared to the Macintosh (RR, 0.83; 95% CI, 0.72-0.96). TSA corrected the CI to 0.67-1.03; 52.3% of the RIS was achieved. In difficult airways, the C-MAC showed superior success rates, glottic visualisation, and less ELM compared to the Macintosh. Among experienced laryngoscopists, the C-MAC offered better glottic visualisation with less ELM than the Macintosh. The C-MAC provided better glottic visualisation and less ELM (GRADE: Very Low or Moderate), with improved success rates, glottic visualisation, and less ELM in difficult airways. Copyright © 2018 Elsevier

  11. Is Kyoto Fatally Flawed? An Analysis with MacGEM

    International Nuclear Information System (INIS)

    Eyckmans, J.; Van Regemorter, D.; Van Steenberghe, V.

    2002-06-01

    In this paper we present some numerical simulations with the MacGEM model to evaluate the consequences of the recent Marrakesh agreements and the defection of the USA for the Kyoto Protocol. MacGEM is a global marginal abatement cost model for carbon emissions from fossil fuel use based on the GEM-E3-World general equilibrium. Nonparticipation of the USA causes the equilibrium carbon price in Annex B countries to fall by approximately 50% since an important share of permit demand falls out. Carbon sinks enhancement activities enable Parties to fulfil their reduction commitment at lower compliance costs and cause the equilibrium permit price to decrease by 40%. Finally, it is shown that the former Soviet Union and central European countries have substantial monopoly power in the Kyoto carbon permit market. We conclude that the recent accords have eroded completely the Kyoto Protocol's emission targets but that they have the merit to have saved the international climate change negotiation framework

  12. Standardization of the Korean version of Mini-Mental Adjustment to Cancer (K-Mini-MAC) scale: factor structure, reliability and validity.

    Science.gov (United States)

    Kang, Jee In; Chung, Hyun Cheol; Kim, Se Joo; Choi, Hye Jin; Ahn, Joong Bae; Jeung, Hei-Cheul; Namkoong, Kee

    2008-06-01

    Mental adjustment and coping affect the physical outcome and survival as well as quality of life in cancer patients. The Mini-Mental Adjustment to Cancer (Mini-MAC) scale is a new refined, economical and reliable self-rating instrument measuring cognitive and behavioral responses to cancer. The aim of this study was to evaluate the psychometric properties of the Mini-MAC in Korean cancer patients. A total of 208 cancer patients recruited from the Yonsei Cancer Center were assessed with the Mini-MAC and the Hospital Anxiety and Depression Scale (HADS). Principal component analysis with varimax rotation for the Korean version of Mini-MAC (K-Mini-MAC) confirmed four factors. Three had psychometric properties similar to Helpless-Hopeless (HH), Anxious Preoccupation (AP) and Cognitive Avoidance (CA) of the original Mini-MAC. A novel factor, named Positive Attitude, included items of both Fatalism (FA) and Fighting Spirit (FS) from the original version. The five subscales from the original version (AP, HH, FS, FA and CA) and Positive Attitude had acceptable internal reliabilities in our sample (Cronbach's alpha coefficient 0.50-0.86; correlation coefficient of test-retest 0.68-0.88). For the validity, significant interscale correlation was observed in the original five subscales and Positive Attitude. Each subscale including Positive Attitude was also significantly related to Depression and Anxiety of HADS. As a whole, the K-Mini-MAC was a reliable, valid and acceptable tool for Korean cancer patients. These findings can provide information about the cross-cultural validity of Mini-MAC scale's factor structure. Cultural differences were also discussed.

  13. Deformation, Failure, and Fatigue Life of SiC/Ti-15-3 Laminates Accurately Predicted by MAC/GMC

    Science.gov (United States)

    Bednarcyk, Brett A.; Arnold, Steven M.

    2002-01-01

    NASA Glenn Research Center's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) (ref.1) has been extended to enable fully coupled macro-micro deformation, failure, and fatigue life predictions for advanced metal matrix, ceramic matrix, and polymer matrix composites. Because of the multiaxial nature of the code's underlying micromechanics model, GMC--which allows the incorporation of complex local inelastic constitutive models--MAC/GMC finds its most important application in metal matrix composites, like the SiC/Ti-15-3 composite examined here. Furthermore, since GMC predicts the microscale fields within each constituent of the composite material, submodels for local effects such as fiber breakage, interfacial debonding, and matrix fatigue damage can and have been built into MAC/GMC. The present application of MAC/GMC highlights the combination of these features, which has enabled the accurate modeling of the deformation, failure, and life of titanium matrix composites.

  14. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal Saud Yousef; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2011-01-01

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended

  15. Medicinal, Aromatic and Cosmetic (MAC) plants for community health and bio-cultural diversity conservation in Bali, Indonesia

    NARCIS (Netherlands)

    Leurs, Liesbeth Nathalie

    2010-01-01

    The general aim of this ethno-botanical study is to document, describe and analyse the Balinese community members’ knowledge, belief and practices with regard to medicinal, aromatic and cosmetic (MAC) plants in relation to community health and bio-cultural diversity conservation of MAC plants. This

  16. An Application of MacLaury's Vantage Theory to Abstract Categories: Identity and the Process of Categorisation

    Science.gov (United States)

    Fabiszak, Malgorzata

    2010-01-01

    This paper is an application of Robert E. MacLaury's Vantage Theory (VT) to the analysis of real life spoken discourse. It utilizes Dennis R. Preston's (1994) modification of MacLaury's VT. It elucidates how cognitive processes of coordinate selection and combination contribute to the on-line construction of category membership in the abstract…

  17. Side channel analysis of some hash based MACs:A response to SHA-3 requirements

    DEFF Research Database (Denmark)

    The forthcoming NIST's Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash...... function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card...... implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC...

  18. Education for Personal Life: John MacMurray on Why Learning to Be Human Requires Emotional Discipline

    Science.gov (United States)

    MacAllister, James

    2014-01-01

    In this article I discuss the philosophy of John MacMurray, and in particular, his little-examined writings on discipline and emotion education. It is argued that discipline is a vital element in the emotion education MacMurray thought central to learning to be human, because for him it takes concerted effort to overcome the human tendency toward…

  19. Not the Sum of Its Parts: A Critical Review of the MacDonald Triad.

    Science.gov (United States)

    Parfitt, Charlotte Hannah; Alleyne, Emma

    2018-01-01

    The MacDonald triad posits that animal cruelty, fire setting, and bed wetting in childhood is indicative of later aggressive and violent behavior in adults. Researchers refer to this phenomenon as a precursor to later antisocial behaviors including serial and sexual murder; while practitioners cite the triad in clinical formulations and risk assessments. However, there is yet to be a critical review and consolidation of the literature that establishes whether there is empirical support. This article explores the validity of the triad. We conducted a narrative review of the relevant studies examining the MacDonald triad and its individual constituents. There is evidence that any one of the triad behaviors could predict future violent offending, but it is very rare to find all three behaviors together as predictors. Thus, the empirical research on the MacDonald triad does not fully substantiate its premise. Rather, it would appear that the triad, or its individual constituents, is better used as an indicator of dysfunctional home environments, or poor coping skills in children. Future research is needed with robust and rigorous methodologies (e.g., adequate control groups, longitudinal designs) to fully establish the MacDonald triad's validity. Finally, further consideration is needed as to whether the triad behaviors are more indicative of other problematic outcomes (e.g., maladaptive coping to life stressors).

  20. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Alexandr M. Kuzminskiy

    2007-10-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  1. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Kuzminskiy Alexandr M

    2007-01-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  2. « À la recherche des Macédoniens » : le regard des cartes, 1840-1918

    Directory of Open Access Journals (Sweden)

    Joëlle Dalègre

    2011-12-01

    Full Text Available Comment peu à peu les cartes ethnographiques découvrent et signalent, en Macédoine, à l’aube du XXe siècle, des « Macédoniens slaves »L’expression « péninsule balkanique » est employée pour la première fois en 1808 par August Zeune, en 1821, un autre Allemand, d’Oetzel, dessine la première carte des populations européennes. Les cartes se multiplient jusqu’en 1920. Peu à peu se précisent les techniques, la connaissance des régions et des populations ; les cartes deviennent une arme de propagande, attribuant, selon le concepteur, le territoire macédonien aux Grecs, aux Serbes et majoritairement aux Bulgares. Le Serbe Cvijic, en 1906, le premier, situe sur une carte, des « macédoslaves ». Cette communication présente les étapes principales de cette évolution cartographique qui aboutit à découvrir des « Macédoniens » en… Macédoine.The expression ’Balkan peninsula’ was first employed in 1808 by August Zeune. In 1821 another German, d’Oetzel, drew the first map of the European populations. The maps continued multiplying until 1920. Little by little the techniques as well as the knowledge of the various regions and populations became more precise. The maps became a propaganda tool, in as much as they attributed—depending on the cartographer—Macedonian territory to the Greeks, the Serbs or, most often, the Bulgarians. In 1906, the Serb Cvijic, the first, situated on a map, the “macédoslaves”. This communication outlines the principal stages of this cartographic evolution, which eventually situated the “Macedonians” in none other than… Macedonia.

  3. Lifetime tests for MAC vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.

    1986-01-01

    A vertex chamber for MAC was proposed in fall 1983 to increase precision in the measurement of the B hadron and tau lepton lifetimes. The chamber had to be placed within the existing central drift chamber, making access for repairs difficult and costly. Therefore for detector elements thin-walled aluminized mylar drift tubes (straws) were used because of their simplicity and robustness. The diameter of the drift tubes was 6.9 mm. The radial extent of the proposed chamber was from 3 cm to 10 cm, the inner wall of the central drift. It was clear that radiation levels, from synchrotron x-rays and overfocussed electrons, were potentially high. Since the drift distance is short in the straws, it was desirable to operate them at the highest possible gas gain, to achieve the best spatial resolution. There was a likelihood of drawing large currents in the chamber and thus causing radiation damage. Therefore a study of radiation hardness under the conditions of their proposed design was undertaken. In tests, argon-hydrocarbon mixtures consistently became unusable at ∼0.05 C/cm collected charge, due to anode buildup. Argon-CO 2 mixtures, while underquenched, were operational to 0.25 C/cm, at which point loss of cathode material became intolerable. Argon-xenon-CO 2 proved to be quenched as well as argon-hydrocarbons, but was limited by cathode damage. The MAC vertex chamber has operated at a distance of 4.6 cm from the e + e - interaction point at PEP for two years and has shown no aging effects

  4. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  5. LHC@home online tutorial for Mac users - recording

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial about LHC@home for Mac users by Alexandre Racine. It contains detailed instructions on how-to-join this volunteer computing project.  There are 3 screen capture videos with the real installation process accelerated attached to the event page. This 5' video is linked from http://lhcathome.web.cern.ch/join-us Also from the CDS e-learning category.

  6. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  7. One of the First Portable Macs

    CERN Multimedia

    1989-01-01

    It was one of the first portable macs released. The Portable had many new advances in mobile computing : The display was crispy clear, and looked beautiful when used in daylight ; The Portable came with a Lead-acid gel/cell battery that could run a anywhere from 6 -12 hours ; It supported to internal hard drives, and an external one. The reaction to the laptop was weak because it was slow, it had no capacity for expansion, it weighed heavily, its price was expensive. It has been stayed 1 year and half on the market.

  8. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  9. Learning Microsoft Excel 2011 for Mac video training DVD

    CERN Document Server

    Vaccaro, Guy

    2011-01-01

    In this video tutorial for Microsoft Excel 2011 For Mac, expert author Guy Vaccaro teaches you to effectively utilize the features and functions of Excel through project based learning. You will complete various projects, and along they way learn to leverage the power of the most important features Excel 2011 has to offer the Mac user. Starting your training course with the creation of a spreadsheet to record and monitor sales data, you will learn the basics of what you can do with a spreadsheet. You will then move on to creating a Profit and Loss report, learning formulas along the way. Moving to score sheets for a sports day, you will discover conditional based formatting, lookups, and more. You then create a functional expense claim form, advancing your Excel expertise. Moving on to a sales contact management sheet, you will discover how you can manipulate text, and even create mail merges from Excel. Finally, you will utilize all your knowledge thus far to create a sales report, including charts, pivot ta...

  10. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue

  11. Obtaining porous silicon suitable for sensor technology using MacEtch nonelectrolytic etching

    Directory of Open Access Journals (Sweden)

    Iatsunskyi I. R.

    2013-12-01

    Full Text Available The author suggests to use the etching method MacEtch (metal-assisted chemical etching for production of micro- and nanostructures of porous silicon. The paper presents research results on the morphology structures obtained at different parameters of deposition and etching processes. The research has shown that, depending on the parameters of deposition of silver particles and silicon wafers etching, the obtained surface morphology may be different. There may be both individual crater-like pores and developed porous or macroporous surface. These results indicate that the MacEtch etching is a promising method for obtaining micro-porous silicon nanostructures suitable for effective use in gas sensors and biological object sensors.

  12. Objective-C for Absolute Beginners iPhone and Mac Programming Made Easy

    CERN Document Server

    Bennett, Gary; Fisher, Mitchell

    2010-01-01

    It seems as if everyone is writing applications for Apple's iPhone and iPad, but how do they all do it? It's best to learn Objective-C, the native language of both the iOS and Mac OS X, but where to begin? Right here, even if you've never programmed before! Objective-C for Absolute Beginners will teach you how to write software for your Mac, iPhone,or iPad using Objective-C, an elegant and powerful language with a rich set of developer tools. Using a hands-on approach, you'll learn to think in programming terms, how to use Objective-C to build program logic, and how to write your own applicati

  13. Profile of a leader. Alena Jean MacMaster: administrator, educator, professional activist and community advocate.

    Science.gov (United States)

    Gautreau, G; Winans, P

    1999-01-01

    This paper profiles Alena Jean MacMaster, an extraordinary nurse leader, activist, visionary and humanitarian from New Brunswick. Her determination and drive were instrumental in fostering the development and progression of health care, nursing education and nursing services at the local, provincial, federal and international levels. "First, loyalty to the institution in which you serve. The patient is the most important person in the entire institution," was Miss MacMaster's guiding principle throughout her career.

  14. CoCoMac 2.0 and the future of tract-tracing databases

    Science.gov (United States)

    Bakker, Rembrandt; Wachtler, Thomas; Diesmann, Markus

    2012-01-01

    The CoCoMac database contains the results of several hundred published axonal tract-tracing studies in the macaque monkey brain. The combined results are used for constructing the macaque macro-connectome. Here we discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two online resources that provide full access to raw tracing data in rodents, a connectome viewer for advanced 3D graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity matrices, and a software package that covers the complete pipeline from connectivity data to large-scale brain simulations. The second edition of CoCoMac features many enhancements over the original. For example, a search wizard is provided for full access to all tables and their nested dependencies. Connectivity matrices can be computed on demand in a user-selected nomenclature. A new data entry system is available as a preview, and is to become a generic solution for community-driven data entry in manually collated databases. We conclude with the question whether neuronal tracing will remain the gold standard to uncover the wiring of brains, thereby highlighting developments in human connectome construction, tracer substances, polarized light imaging, and serial block-face scanning electron microscopy. PMID:23293600

  15. CoCoMac 2.0 and the future of tract-tracing databases

    Directory of Open Access Journals (Sweden)

    Rembrandt eBakker

    2012-12-01

    Full Text Available The CoCoMac database contains the results of published axonal tract-tracing studies in the macaque brain. The combined data are used to construct the macaque macro-connectome. We discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two resources that provide online access to raw tracing data in rodents, a connectome viewer for advanced 3d graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity matrices, and a software package that covers the complete pipeline from connectivity data to large scale brain simulations.The 2nd edition of CoCoMac features many enhancements over the original. For example, a search wizard is provided for full access to all tables. Connectivity matrices are computed on demand in a user selected nomenclature. An online data entry system is available as a preview, and is to become a generic solution for community-driven manual data entry.We end with the question whether tract-tracing will remain the gold standard to uncover the wiring of brains, thereby mentioning developments in human connectome construction, tracer substances, polarized light imaging and serial block face scanning electron microscopy.

  16. CoCoMac 2.0 and the future of tract-tracing databases.

    Science.gov (United States)

    Bakker, Rembrandt; Wachtler, Thomas; Diesmann, Markus

    2012-01-01

    The CoCoMac database contains the results of several hundred published axonal tract-tracing studies in the macaque monkey brain. The combined results are used for constructing the macaque macro-connectome. Here we discuss the redevelopment of CoCoMac and compare it to six connectome-related projects: two online resources that provide full access to raw tracing data in rodents, a connectome viewer for advanced 3D graphics, a partial but highly detailed rat connectome, a brain data management system that generates custom connectivity matrices, and a software package that covers the complete pipeline from connectivity data to large-scale brain simulations. The second edition of CoCoMac features many enhancements over the original. For example, a search wizard is provided for full access to all tables and their nested dependencies. Connectivity matrices can be computed on demand in a user-selected nomenclature. A new data entry system is available as a preview, and is to become a generic solution for community-driven data entry in manually collated databases. We conclude with the question whether neuronal tracing will remain the gold standard to uncover the wiring of brains, thereby highlighting developments in human connectome construction, tracer substances, polarized light imaging, and serial block-face scanning electron microscopy.

  17. Validity and Reliability of the MacNew Heart Disease Health-Related Quality of Life Questionnaire in Patients with Heart Failure: The Persian Version

    Directory of Open Access Journals (Sweden)

    Mohammad Abbasi

    2017-12-01

    Full Text Available Background: Heart failure due to changes in the lungs, circulation, and skeletal muscle adversely influences the quality of life. Objectives: The objective of the present study is to assess the reliability and validity of the Persian version of the MacNew in patients with heart failure. Patients and Methods: The 200 Iranian patients who referred to Shahid Beheshti hospital in Qom were recruited by convenience sampling. All the patients filled out the MacNew HRQL questionnaire, the hospital anxiety and depression scale (HADS, the Short Form- 36 and socio-demographic and clinical characteristics. The reliability of the MacNew was assessed by internal consistency and test-retest reliability. Construct validity was assessed by factor analysis, convergent validity and discriminant validity. Discriminant validity of MacNew was assessed by the known-groups approach. All analyses were done through SPSS, version 20, and level of significance was considered at P < 0.05. Results: The mean MacNew Global score was 3.6 ± 0.82. Our results demonstrated that internal consistency (α = 0.94 and reproducibility (ICC = 0.84 of the Persian version of the MacNew were confirmed. The Factor analysis confirmed three factors as the original MacNew. Convergent and divergent validity of the MacNew was confirmed by its correlation pattern with physical and mental components of the SF-36. Discriminative validity was confirmed statistically and clinically for the differences in the MacNew scores on the Global scale and each subscale between Iranian patients with and without anxiety and depression. Conclusions: The Persian version of the MacNew HRQL questionnaire can be applied as a reliable and valid tool in the clinical research for Iranian patients with heart failure.

  18. The use of the MacCormack scheme in computational hydraulics

    International Nuclear Information System (INIS)

    Garcia, R.; Zhang, H.; Kahawita, R.

    1985-01-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  19. Mutational screening of CHX10, GDF6, OTX2, RAX and SOX2 genes in 50 unrelated microphthalmia-anophthalmia-coloboma (MAC) spectrum cases.

    Science.gov (United States)

    Gonzalez-Rodriguez, J; Pelcastre, E L; Tovilla-Canales, J L; Garcia-Ortiz, J E; Amato-Almanza, M; Villanueva-Mendoza, C; Espinosa-Mattar, Z; Zenteno, J C

    2010-08-01

    Microphthalmia-anophthalmia-coloboma (MAC) are congenital eye malformations causing a significant percentage of visually impairments in children. Although these anomalies can arise from prenatal exposure to teratogens, mutations in well-defined genes originate potentially heritable forms of MAC. Mutations in genes such as CHX10, GDF6, RAX, SOX2 and OTX2, among others, have been recognised in dominant or recessive MAC. SOX2 and OTX2 are the two most commonly mutated genes in monogenic MAC. However, as more numerous samples of MAC subjects would be analysed, a better estimation of the actual involvement of specific MAC-genes could be made. Here, a comprehensive mutational analysis of the CHX10, GDF6, RAX, SOX2 and OTX2 genes was performed in 50 MAC subjects. PCR amplification and direct automated DNA sequencing of all five genes in 50 unrelated subjects. Eight mutations (16% prevalence) were recognised, including four GDF6 mutations (one novel), two novel RAX mutations, one novel OTX2 mutation and one SOX2 mutation. Anophthalmia and nanophthalmia, not previously associated with GDF6 mutations, were observed in two subjects carrying defects in this gene, expanding the spectrum of GDF6-linked ocular anomalies. Our study underscores the importance of genotyping large groups of patients from distinct ethnic origins for improving the estimation of the global involvement of particular MAC-causing genes.

  20. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  1. The impact of HAART on the respiratory complications of HIV infection: longitudinal trends in the MACS and WIHS cohorts.

    Directory of Open Access Journals (Sweden)

    Matthew R Gingo

    Full Text Available To review the incidence of respiratory conditions and their effect on mortality in HIV-infected and uninfected individuals prior to and during the era of highly active antiretroviral therapy (HAART.Two large observational cohorts of HIV-infected and HIV-uninfected men (Multicenter AIDS Cohort Study [MACS] and women (Women's Interagency HIV Study [WIHS], followed since 1984 and 1994, respectively.Adjusted odds or hazards ratios for incident respiratory infections or non-infectious respiratory diagnoses, respectively, in HIV-infected compared to HIV-uninfected individuals in both the pre-HAART (MACS only and HAART eras; and adjusted Cox proportional hazard ratios for mortality in HIV-infected persons with lung disease during the HAART era.Compared to HIV-uninfected participants, HIV-infected individuals had more incident respiratory infections both pre-HAART (MACS, odds ratio [adjusted-OR], 2.4; 95% confidence interval [CI], 2.2-2.7; p<0.001 and after HAART availability (MACS, adjusted-OR, 1.5; 95%CI 1.3-1.7; p<0.001; WIHS adjusted-OR, 2.2; 95%CI 1.8-2.7; p<0.001. Chronic obstructive pulmonary disease was more common in MACS HIV-infected vs. HIV-uninfected participants pre-HAART (hazard ratio [adjusted-HR] 2.9; 95%CI, 1.02-8.4; p = 0.046. After HAART availability, non-infectious lung diseases were not significantly more common in HIV-infected participants in either MACS or WIHS participants. HIV-infected participants in the HAART era with respiratory infections had an increased risk of death compared to those without infections (MACS adjusted-HR, 1.5; 95%CI, 1.3-1.7; p<0.001; WIHS adjusted-HR, 1.9; 95%CI, 1.5-2.4; p<0.001.HIV infection remained a significant risk for infectious respiratory diseases after the introduction of HAART, and infectious respiratory diseases were associated with an increased risk of mortality.

  2. TLR4-mediated expression of Mac-1 in monocytes plays a pivotal role in monocyte adhesion to vascular endothelium.

    Directory of Open Access Journals (Sweden)

    Seung Jin Lee

    Full Text Available Toll-like receptor 4 (TLR4 is known to mediate monocyte adhesion to endothelial cells, however, its role on the expression of monocyte adhesion molecules is unclear. In the present study, we investigated the role of TLR4 on the expression of monocyte adhesion molecules, and determined the functional role of TLR4-induced adhesion molecules on monocyte adhesion to endothelial cells. When THP-1 monocytes were stimulated with Kdo2-Lipid A (KLA, a specific TLR4 agonist, Mac-1 expression was markedly increased in association with an increased adhesion of monocytes to endothelial cells. These were attenuated by anti-Mac-1 antibody, suggesting a functional role of TLR4-induced Mac-1 on monocyte adhesion to endothelial cells. In monocytes treated with MK886, a 5-lipoxygenase (LO inhibitor, both Mac-1 expression and monocyte adhesion to endothelial cells induced by KLA were markedly attenuated. Moreover, KLA increased the expression of mRNA and protein of 5-LO, suggesting a pivotal role of 5-LO on these processes. In in vivo studies, KLA increased monocyte adhesion to aortic endothelium of wild-type (WT mice, which was attenuated in WT mice treated with anti-Mac-1 antibody as well as in TLR4-deficient mice. Taken together, TLR4-mediated expression of Mac-1 in monocytes plays a pivotal role on monocyte adhesion to vascular endothelium, leading to increased foam cell formation in the development of atherosclerosis.

  3. Ex Vivo Expansion of Functional Human UCB-HSCs/HPCs by Coculture with AFT024-hkirre Cells

    Directory of Open Access Journals (Sweden)

    Muti ur Rehman Khan

    2014-01-01

    Full Text Available Kiaa1867 (human Kirre, hKirre has a critical role in brain development and/or maintenance of the glomerular slit diaphragm in kidneys. Murine homolog of this gene, mKirre expressed in OP9 and AFT024 cells could support hematopoietic stem cells/hematopoietic progenitor cells (HSC/HPC expansion in vitro. HKirre is also expressed in human FBMOB-hTERT cell line and fetal liver fibroblast-like cells but its function has remained unclear. In this paper, we cloned a hKirre gene from human fetal liver fibroblast-like cells and established a stably overexpressing hKirre-AFT024 cell line. Resultant cells could promote self-renewal and ex vivo expansion of HSCs/HPCs significantly higher than AFT024-control cells transformed with mock plasmid. The Expanded human umbilical cord blood (hUCB CD34+ cells retained the capacity of multipotent differentiation as long as 8 weeks and successfully repopulated the bone marrow of sublethally irradiated NOD/SCID mice, which demonstrated the expansion of long-term primitive transplantable HSCs/HPCs. Importantly, hkirre could upregulate the expressions of Wnt-5A, BMP4, and SDF-1 and downregulate TGF-β with other hematopoietic growth factors. By SDS-PAGE and Western Blot analysis, a ~89 kDa protein in total lysate of AFT024-hKirre was identified. Supernatants from AFT024-hkirre could also support CD34+CD38− cells expansion. These results demonstrated that the AFT024-hKirre cells have the ability to efficiently expand HSCs/HPCs.

  4. In-Network Processing on Low-Cost IOT Nodes for Maritime Surveillance

    Science.gov (United States)

    2017-03-01

    Paho-MQTT is the Python library used to interface with the Mosquitto client software [29]. To enable VPN connectivity for each node, the OpenVPN ...back online. 2. VPN Server The VPN server is created using PiVPN, an adaptation of OpenVPN developed for ease of implementation on a Raspberry Pi [30...node, as well as the system controller, is loaded with unique OpenVPN configuration files allowing connections to the server. This enables a wider

  5. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  6. Evaluation of Fucosylated Haptoglobin and Mac-2 Binding Protein as Serum Biomarkers to Estimate Liver Fibrosis in Patients with Chronic Hepatitis C.

    Directory of Open Access Journals (Sweden)

    Seiichi Tawara

    Full Text Available Fucosylated haptoglobin (Fuc-Hpt and Mac-2 binding protein (Mac-2 bp are identified as cancer biomarkers, based on the results from a glyco-proteomic analysis. Recently, we reported that these glyco-biomarkers were associated with liver fibrosis and/or ballooning hepatocytes in patients with nonalcoholic fatty liver disease (NAFLD. We evaluated the ability of these glycoproteins to estimate liver fibrosis in 317 patients with chronic hepatitis C. We measured the serum Fuc-Hpt and Mac-2 bp levels using a lectin-antibody ELISA and ELISA, respectively. The serum levels of both Fuc-Hpt and Mac-2 bp increased with the progression of liver fibrosis. The multivariate analysis revealed that Mac-2 bp was an independent factor associated with moderate liver fibrosis (F ≥ 2. In contrast, Fuc-Hpt was an independent factor associated with advanced liver fibrosis (F ≥ 3. In terms of evaluating liver fibrosis, the serum levels of these glycomarkers were correlated with well-known liver fibrosis indexes, such as the aspartate aminotransferase to platelet ratio index (APRI and Fibrosis-4 (FIB4 index. An assay that combined the APRI or FIB4 index and the Fuc-Hpt or Mac-2 bp levels increased the AUC value for diagnosing hepatic fibrosis. Interestingly, the cumulative incidence of hepatocellular carcinoma (HCC was significantly higher in the patients with elevated serum levels of Fuc-Hpt and Mac-2 bp. In conclusion, both Fuc-Hpt and Mac-2 bp could be useful glyco-biomarkers of liver fibrosis and predictors of HCC in patients with chronic hepatitis C.

  7. THE ISOLATION AND IDENTIFICATION OF MYCOBACTERIUM AVIUM COMPLEX (MAC) RECOVERED FROM LOS ANGELES POTABLE WATER, A POSSIBLE SOURCE OF INFECTION IN AIDS PATIENTS

    Science.gov (United States)

    Los Angeles water was investigated as a possible source of Mycobacterium avium complex (MAC) infection in patients with AIDS. MAC consists of M.avium (MA), M. intracellulare (MI) and Mycobacterium X (MX)(positive for MAC by DNA probe but not MA or MI). The study included 13 reser...

  8. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  9. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  10. A Selective-Awakening MAC Protocol for Energy-Efficient Data Forwarding in Linear Sensor Networks

    Directory of Open Access Journals (Sweden)

    Iclia Villordo-Jimenez

    2018-01-01

    Full Text Available We introduce the Selective-Awakening MAC (SA-MAC protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs. In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize the performance of the proposed protocol, we present a Discrete-Time Markov Chain-based analysis that is validated through extensive discrete-event simulations. Our results show that SA-MAC significantly outperforms previous proposals in terms of energy consumption, throughput, and packet loss probability. This is particularly true under high node density and high traffic load conditions, which are expected to be common scenarios in the context of IoT applications. We also present an analysis by grade (i.e., the number of hops to the sink, which is located at one end of the LSN that reveals that LSNs exhibit heterogeneous performance depending on the nodes’ grade. Such results can be used as a design guideline for future LSN implementations.

  11. MacMS: A Mass Spectrometer Simulator: Abstract of Issue 9906M

    Science.gov (United States)

    Bigger, Stephen W.; Craig, Robert A.

    1999-10-01

    MacMS is a program for Mac-OS compatible computers that simulates a magnetic sector mass spectrometer (1-4) designed to operate in the mass-to-charge (m/z) ratio range of 1-200 amu. MacMS has two operational modules. The first module (see Figure 1) is called the "Path" module and enables the user to quantitatively examine the trajectory of an ion of given m/z ratio in the electric and magnetic fields of the simulated "instrument". By systematically measuring a series of trajectories of different ions under different electric and magnetic field conditions, the user can determine how the resolution of the "instrument" is affected by these experimentally variable parameters. The user can thus choose suitable instrumental conditions for scanning a given m/z ratio range with good separation between the peaks. The second module (see Figure 2) is called as the "Spectrometer" module and enables the user to record, under any chosen instrumental conditions, the mass spectrum of (i) the instrumental background, (ii) neon, (iii) methane, or (iv) the parent ion of carbon tetrachloride. Both voltage scanning and magnetic scanning are possible (5). A hard copy of any mass spectrum that has been recorded can also be obtained. MacMS can read ASCII data files containing mass spectral information of compounds other than those that are "built-in" to the simulator. The appropriate format for creating such data files is described in the program documentation. There are a number of instructional exercises that can be conducted using the mass spectral information contained within the simulator. These are included in the program documentation. For example, the intensities of the 20Ne+, 21Ne+, and 22Ne+ species can be determined from hard copies of mass spectra of neon that are obtained under different instrumental sensitivities. The relative abundances of the three isotopes of neon can thus be calculated and compared with the literature values (6). The simulator also includes adjustable

  12. Mycobacterium avium complex (MAC isolated from AIDS patients and the criteria required for its implication in disease Complexo Mycobacterium avium (MAC isolado de pacientes com AIDS e os critérios exigidos para sua implicação em doença

    Directory of Open Access Journals (Sweden)

    David Jamil Hadad

    1995-10-01

    Full Text Available Before the AIDS pandemia, the Mycobacterium avium complex (MAC was responsible in most cases for the pneumopathies that attack patients with basic chronic pulmonary diseases such as emphysema and chronic bronchitis36. In 1981, with the advent of the acquired immunodeficiency syndrome (AIDS, MAC started to represent one of the most frequent bacterial diseases among AIDS patients, with the disseminated form of the disease being the major clinical manifestation of the infection8. Between January 1989 and February 1991, the Section of Mycobacteria of the Adolfo Lutz Institute, São Paulo, isolated MAC from 103 patients by culturing different sterile and no-sterile processed specimens collected from 2304 patients seen at the AIDS Reference and Training Center and/or Emilio Ribas Infectology Institute. Disseminated disease was diagnosed in 29 of those patients on the basis of MAC isolation from blood and/or bone marrow aspirate. The other 74 patients were divided into categories highly (5, moderately (26 and little suggestive of disease (43 according to the criteria of DAVIDSON (198910. The various criteria for MAC isolation from sterile and non-sterile specimens are discussed.Anterior a pandemia de AIDS, o Complexo Mycobacterium avium (MAC era responsável pela maioria das vezes, por pneumopatias acometendo pacientes com doença pulmonar crônica de base como enfisema e bronquite crônica36. Em 1981, com o advento da síndrome de imunodeficiência adquirida (SIDA, o MAC passou a representar uma das doenças bacterianas mais frequentes em pacientes com esta síndrome, sendo a doença disseminada a principal forma de manifestação clínica da infecção8. Entre Janeiro de 1989 e Fevereiro de 1991, no Setor de Micobactérias do Instituto Adolfo Lutz em São Paulo, o MAC foi isolado de 103 pacientes a partir do cultivo de diferentes espécimes estéreis e não estéreis processados, coletados de 2.304 pacientes atendidos no Centro de Referência e

  13. Multi-attribute compositional voting advice applications (MacVAAs) : a methodology for educating and assisting voters and eliciting their preferences

    NARCIS (Netherlands)

    Korthals, R.A.; Levels, M.

    2016-01-01

    This paper introduces a technique to elicit voter preferences, by integrating multiattribute compositional analyses (Macs) with a voting advice application (VAA). The technique requires users to make trade-offs between different positions on a single issue, and between different issues. MacVAAs more

  14. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  15. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  16. Pulsed electromagnetic field affects intrinsic and endoplasmatic reticulum apoptosis induction pathways in MonoMac6 cell line culture.

    Science.gov (United States)

    Kaszuba-Zwoinska, J; Chorobik, P; Juszczak, K; Zaraska, W; Thor, P J

    2012-10-01

    Current studies were aimed to elucidate influence of pulsed electromagnetic field stimulation on cell viability and apoptosis induction pathways. For the experimental model we have chosen monocytic cell line MonoMac6 and several apoptosis inducers with different mechanism of death induction like puromycin, colchicine, cyclophosphamide, minocycline and hydrogen peroxide. MonoMac6 cell line was grown at density 1x10(5) cells/well in 96-well culture plates. To induce cell death cell cultures were treated with different apoptosis inducers like puromycin, colchicine, cyclophosphamide, minocycline, hydrogen peroxide and at the same time with pulsed electromagnetic field 50 Hz, 45±5 mT (PEMF) for 4 hour per each stimulation, three times, in 24 hours intervals. Afterwards, cells were harvested for flow cytometry analysis of cell viability measured by annexin V-APC labeled and propidium iodide staining. Expression of apoptosis related genes was evaluated by semi quantitative reverse transcription (RT)-PCR assay. NuPAGE Novex Western blot analysis was carried out for apoptosis inducing factor (AIF) abundance in cytosolic and nuclear extracts of MonoMac6 cells. Puromycin, colchicine and minocycline activated cells and simultaneously treated with PEMF have shown out diminished percentage of annexinV positive (AnV+) cells comparing to controls without PEMF stimulation. MonaMac6 cells puromycin/colchicyne and PEMF treated were to a higher extent double stained (AnV+,PI+), which means increased late apoptotic as well as necrotic (PI+) cells, than non-stimulated controls. On the other hand, minocycline activated cells prior to PEMF treatment showed diminished amount of apoptotic and necrotic (annexin V, annexin V and propidium iodide, propidium iodide positive staining) cells. The opposite effect of PEMF on the percentage of annexin V positively stained cells has been achieved after treatment of MonoMac6 culture with cyclophoshamide and hydrogen peroxide. PEMF enhanced early

  17. ITER management advisory committee (MAC) meeting in Naka

    International Nuclear Information System (INIS)

    Yoshikawa, M.

    2000-01-01

    The ITER Management Advisory Committee (MAC) Meeting was held on 28 June 2000 in Moskow, Russia. The main topics were the consideration of the report by the director on the ITER EDA status, the review of the work program, the review of the joint fund, the review of a schedule of ITER meetings and initial discussion and consideration on the disposition of R and D hardware and facilities and other dispositions relating to the termination of the EDA

  18. MAC/FAC: A Model of Similarity-Based Retrieval

    Science.gov (United States)

    1994-10-01

    Grapes (0.28) 327 Sour Grapes, analog The Taming of the Shrew (0.22), Merry Wives 251 (0.18), S[11 stories], Sour Grapes (-0.19) Sour Grapes, literal... The Institute for the 0 1 Learning Sciences Northwestern University CD• 00 MAC/FAC: A MODEL OF SIMILARITY-BASED RETRIEVAL Kenneth D. Forbus Dedre...Gentner Keith Law Technical Report #59 • October 1994 94-35188 wit Establisthed in 1989 with the support of Andersen Consulting Form Approved REPORT

  19. Le meurtre du prêtre comme violence inaugurale (Bulgarie 1872, Macédoine 1900)

    OpenAIRE

    Lory, Bernard

    2010-01-01

    Quand la violence révolutionnaire se retourne-t-elle contre la communauté qu'elle prétend promouvoir ? Enquêtant sur les premiers Bulgares exécutés par le Comité Central Révolutionnaire Bulgare et les premiers Macédoniens exécutés par l'Organisation Révolutionnaire Intérieure Macédonienne, cet article analyse deux épisodes qui présentent des analogies frappantes. En 1872, le diacre Paisij est assassiné à Orhanie dans des circonstances troublantes, puisque ce meurtre a été annoncé par deux rêv...

  20. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Halkes, G.P.; Langendoen, K.G.

    2010-01-01

    The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover,

  1. The cognitive based approach of capacity assessment in psychiatry: a philosophical critique of the MacCAT-T.

    Science.gov (United States)

    Breden, Torsten Marcus; Vollmann, Jochen

    2004-12-01

    This article gives a brief introduction to the MacArthur Competence Assessment Tool-Treatment (MacCAT-T) and critically examines its theoretical presuppositions. On the basis of empirical, methodological and ethical critique it is emphasised that the cognitive bias that underlies the MacCAT-T assessment needs to be modified. On the one hand it has to be admitted that the operationalisation of competence in terms of value-free categories, e.g. rational decision abilities, guarantees objectivity to a great extent; but on the other hand it bears severe problems. Firstly, the cognitive focus is in itself a normative convention in the process of anthropological value-attribution. Secondly, it misses the complexity of the decision process in real life. It is therefore suggested that values, emotions and other biographic and context specific aspects should be considered when interpreting the cognitive standards according to the MacArthur model. To fill the gap between cognitive and non-cognitive approaches the phenomenological theory of personal constructs is briefly introduced. In conclusion some main demands for further research to develop a multi-step model of competence assessment are outlined.

  2. Quiebra de Fannie Mae y Freddie Mac desde la experiencia latinoamericana

    Directory of Open Access Journals (Sweden)

    Wesley Marshall

    2008-09-01

    Full Text Available Conforme al deterioro de la posición financiera de los bancos semi públicos, Fannie Mae y Freddie Mac, durante los últimos meses, el debate sobre su viabilidad actual y su futuro en el sistema financiero estadounidense se ha intensificado. Si bien el debate ha abarcado diversas posiciones dentro de círculos financieros y académicos, en los Estados Unidos, no se han tomado en cuenta las experiencias históricas de la banca pública latinoamericana durante la crisis financiera, y que al parecer ambas compartan muchos elementos con la dinámica que está detrás del debate actual sobre Fannie Mae and Freddie Mac. En América Latina, tales momentos han ofrecido la oportunidad para transferir activos financieros del sector privado de decreciente valor a la banca pública, y también para la reducción drástica de la actividad de la banca pública, permitiendo así la expansión de actores del sector privado a costa de la banca pública. Tales experiencias son de relevancia particular al futuro de Fannie Mae and Freddie Mac, dado que los mismos grupos que gestionaron estas crisis son los mismos que actualmente están administrando la crisis financiera de los Estados Unidos. Como se argumentará, las mismas estrategias usadas en América Latina para minimizar el papel del Estado en el sector financiero actualmente están siendo empleadas en los Estados Unidos.

  3. Determination of the optimal stylet strategy for the C-MAC videolaryngoscope.

    LENUS (Irish Health Repository)

    McElwain, J

    2010-04-01

    The C-MAC videolaryngoscope is a novel intubation device that incorporates a camera system at the end of its blade, thereby facilitating obtaining a view of the glottis without alignment of the oral, pharyngeal and tracheal axes. It retains the traditional Macintosh blade shape and can be used as a direct or indirect laryngoscope. We wished to determine the optimal stylet strategy for use with the C-MAC. Ten anaesthetists were allowed up to three attempts to intubate the trachea in one easy and three progressively more difficult laryngoscopy scenarios in a SimMan manikin with four tracheal tube stylet strategies: no stylet; stylet; directional stylet (Parker Flex-It); and hockey-stick stylet. The use of a stylet conferred no advantage in the easy laryngoscopy scenario. In the difficult scenarios, the directional and hockey-stick stylets performed best. In the most difficult scenario, the median (IQR [range]) duration of the successful intubation attempt was lowest with the hockey-stick stylet; 18 s (15-22 [12-43]) s, highest with the unstyletted tracheal tube; 60 s (60-60 [60, 60]) s and styletted tracheal tube 60 s (29-60 [18-60]) s, and intermediate with the directional stylet 21 s (15-60 [8-60]) s. The use of a stylet alone does not confer benefit in the setting of easy laryngoscopy. However, in more difficult laryngoscopy scenarios, the C-MAC videolaryngoscope performs best when used with a stylet that angulates the distal tracheal tube. The hockey-stick stylet configuration performed best in the scenarios tested.

  4. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  5. The use of the MacCormack scheme in computational hydraulics

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, R. [Universidad Central de Venezuela, Inst. de Mecanica de Fluidos, Caracas (Venezuela); Zhang, H.; Kahawita, R. [Ecole Polytechnique, Dept. of Civil Engineering, Montreal, Quebec (Canada)

    1985-07-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  6. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  7. Beyond MACS: A Snapshot Survey of the Most Massive Clusters of Galaxies at z>0.5

    Science.gov (United States)

    Ebeling, Harald

    2017-08-01

    Truly massive galaxy clusters play a pivotal role for a wealth of extragalactic and cosmological research topics, and SNAPshot observations of these systems are ideally suited to identify the most promising cluster targets for further, in-depth study. The power of this approach was demonstrated by ACS/WFC3 SNAPshots of X-ray selected MACS and eMACS clusters at z>0.3 obtained by us in previous Cycles (44 of them in all of F606W, F814W, F110W, and F140W). Based on these data, the CLASH MCT program selected 16 out of 25 of their targets to be MACS clusters. Similarly, all but one of the six most powerful cluster lenses selected for in-depth study by the HST Frontier Fields initiative are MACS detections, and so are 16 of the 29 z>0.3 clusters targeted by the RELICS legacy program.We propose to extend our spectacularly successful SNAPshot survey of the most X-ray luminous distant clusters to a redshift-mass regime that is poorly sampled by any other project. Targeting only extremely massive clusters at z>0.5 from the X-ray selected eMACS sample (median velocity dispersion: 1180 km/s), the proposed program will (a) identify the most powerful gravitational telescopes at yet higher redshift for the next generation of in-depth studies of the distant Universe with HST and JWST, (b) provide constraints on the mass distribution within these extreme systems, (c) help improve our understanding of the physical nature of galaxy-galaxy and galaxy-gas interactions in cluster cores, and (d) unveil Balmer Break Galaxies at z 2 and Lyman-break galaxies at z>6 as F814W dropouts.Acknowledging the broad community interest in our sample we waive our data rights for these observations.

  8. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  9. Design and Implementation of an Enhanced 802.11 MAC Architecture for Single-Hop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ralph Bernasconi

    2007-01-01

    Full Text Available Due to its extreme simplicity and flexibility, the IEEE 802.11 standard is the dominant technology to implement both infrastructure-based WLANs and single-hop ad hoc networks. In spite of its popularity, there is a vast literature demonstrating the shortcomings of using the 802.11 technology in such environments, such as dramatic degradation of network capacity as contention increases and vulnerability to external interferences. Therefore, the design of enhancements and optimizations for the original 802.11 MAC protocol has been a very active research area in the last years. However, all these modifications to the 802.11 MAC protocol were validated only through simulations and/or analytical investigations. In this paper, we present a very unique work as we have designed a flexible hardware/software platform, fully compatible with current implementations of the IEEE 802.11 technology, which we have used to concretely implement and test an enhanced 802.11 backoff algorithm. Our experimental results clearly show that the enhanced mechanism outperforms the standard 802.11 MAC protocol in real scenarios.

  10. The Talloires Network and the MacJannet Prize for Global Citizenship: Explorations on sustainable and innovative leadership

    Directory of Open Access Journals (Sweden)

    Brianda Hernandez Cavalcanti

    2017-06-01

    Full Text Available Higher education does not exist in a vacuum. Institutions of higher learning should serve as vibrant and dynamic anchors to their communities and to society. Civic engagement and community service should be inextricable from research, teaching and learning. The Talloires Network is an international coalition of higher education institutions founded on such a vision. It is because of this vision that the MacJannet Foundation approached the Talloires Network in 2009 to establish the MacJannet Prize for Global Citizenship. Following in the footsteps of founders Donald and Charlotte MacJannet, the international Foundation is dedicated to providing pathways for individuals and institutions to use their skills for the good of their communities. The MacJannet Prize recognizes exceptional student community engagement initiatives at Talloires Network member universities and contributes financially to their ongoing public service efforts. This special edition journal of Gateways: International Journal of Community Research and Engagement features articles from five first-place MacJannet Prize winners and one second-place winner. The articles offer a glimpse of university civic engagement projects in six countries created to help marginalised and vulnerable communities. They highlight the complexity of civic engagement efforts in different institutional environments and regions of the world and provide insight into the pedagogy and practice of engagement. Further, the articles highlight the many challenges associated with this type of work, not only with scaling up the initiatives but with institutionalising them. Finally, these accounts serve as a reminder of the critical importance higher education institutions have in the success of these initiatives and the dedication of the individuals who lead them.

  11. Review of Sustainable Energy -- Without the Hot Air by David MacKay (2009

    Directory of Open Access Journals (Sweden)

    Kira Hamman

    2016-07-01

    Full Text Available David MacKay. Sustainable Energy: Without the hot air. (Cambridge, England: UIT Cambridge Ltd., 2009. 384 pp. ISBN 978-0954452933 (also available as a free e-book. Physicist David MacKay transforms what has historically been a debate fraught with skepticism and hysteria into an informed conversation. He does this by providing clear, accurate quantitative information on energy production and consumption in a form that allows comparison and invites thoughtful analysis. By recalibrating power into kilowatt-hours per day per person, he makes the numbers meaningful on an individual level. He then meticulously estimates the productive capacity of various renewable energy sources, explores alternative energy solutions, and ends with an array of concrete plans to get the planet off fossil fuels for good.

  12. Comparison of TGFbR2 down-regulation in expanded HSCs on MBA/DBM scaffolds coated by UCB stromal cells.

    Science.gov (United States)

    Hashemi, Zahra Sadat; Moghadam, Mehdi Forouzandeh; Soleimani, Masoud

    2015-05-01

    Bone marrow transplants (BMTs) are mainly limited by a low number of CD34(+) cells. The transforming growth factor-beta (TGF-β) pathway downregulation is a key factor that increases cell self-renewal. In nature, hematopoietic stem cells (HSCs) are in a microenvironment, surrounded by cells in a three-dimensional (3D) configuration. The aim of this study is to investigate the association between a 3D culture and the delivery ratio of downregulation. Demineralized bone matrix (DBM) and mineralized bone allograft (MBA) scaffolds were coated using unrestricted somatic stem cells (USSCs) as the feeder layer. Umbilical cord blood (UCB)-CD34(+) cells were then ex vivo expanded in them and transfected by small interfering RNA (siRNA) against TGFbR2, a type 2 receptor in the TGF-β pathway. Finally, quantitative real-time PCR, flow cytometry, and clonogenic assay were performed. In a global comparison, we observed that the highest expansion ratio, lowest expression level, and the highest CD34 marker belonged to the simple 2D culture transfected group. This suggests that TGFbR2 downregulation in a 2D culture can be done more effectively. The siRNA delivery system and the transfection ratio in an ex vivo environment, which mimicks in vivo conditions, have low efficiency. Genetic modification of the cells needs free 3D spaces to enable better transfection.

  13. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  14. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  15. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  16. Fiverr MacGyver

    Science.gov (United States)

    Hut, Rolf; van de Giesen, Nick; Larson, Martha

    2014-05-01

    Crowdsourcing has become popular over the past years, also for scientific endeavors. There are many Citizen Science projects and crowdfunding platforms, such as Kickstarter, that are make helpful contributions to moving environmental science forward. An interesting underused source of useful crowd-derived contributions to research is the website Fiverr.com. On this platform, thousands of people, acting as small-scale freelance contractors, offer their skills in the form of services. The platform offers a chance for people to take a hobby, skill, or pastime and make it something more by reaching out to a wider audience and by receiving a payment in return for services. As is typical of other crowdsourcing platforms, the tasks are small and usually self contained. As the name Fiverr suggests, offers start at US5 to provide a particular service. Services offered range from graphic design, to messages sung or spoken with various styles or accents, to complete apps for Android or iPhone. Skill providers on the platform can accept a range of variation of definition in the tasks, some can be described in general terms, for others it is more appropriate to provide examples. Fiverr provides a central location for those offering skills and those needing services to find each other, it makes it possible to communicate and exchange files, to make payments, and it provides support for resolving disputes. In all cases, it is important to keep expectations aligned with the nature of the platform: quality can and will vary. Ultimately, the critical contribution of Fiverr is not to replace professional services or otherwise save money, but rather to provide access to a large group of people with specialized skills who are able to make a contribution on short notice. In the context of this session, it can be considered a pool of people with MacGyver skills lying in wait of a MacGyyer task to attack. There are many ways in which Fiverr tasks, which are called 'gigs', can be useful in

  17. Patients with MAC Lung Disease Have a Low Visceral Fat Area and Low Nutrient Intake

    Directory of Open Access Journals (Sweden)

    Kentaro Wakamatsu

    2015-01-01

    Full Text Available Objective. This study aimed to examine the nutritional status and nutrient intake of patients with MAC lung disease with a focus on visceral fat area. Patients and Methods. Among 116 patients of our hospital with nontuberculous mycobacteriosis who were registered between May 2010 and August 2011, 103 patients with MAC lung disease were included in this study. In all patients, nutritional status and nutrient intake were prospectively examined. Results. Patients were 23 men and 80 women (mean age, 72.3±10.9 years. BMI (kg/m2 at the time of registration was 20.4±2.7 in men and 19.2±2.9 in women. Visceral fat area (cm2 was significantly lower in women (35.7±26.6 than in men (57.5±47.4 (p=0.0111. The comparison with general healthy adults according to age revealed a markedly reduced visceral fat area among patients with MAC lung disease. With respect to nutrient intake, energy adequacy (86.1±15.7%, protein adequacy (82.4±18.2%, lipid adequacy (78.1±21.8%, and carbohydrate adequacy (89.6±19.2% ratios were all low at the time of registration. BMI was significantly correlated with protein adequacy (p=0.0397 and lipid adequacy (p=0.0214 ratios, while no association was found between visceral fat area and nutrient intake. Conclusion. Patients with MAC lung disease had a low visceral fat area and low nutrient intake.

  18. Stochastic simulation of climate change impacts on ice road operations, MacKenzie River, Northwest Territories

    International Nuclear Information System (INIS)

    Woo, Mingko; Lonergan, S.

    1990-01-01

    Winter roads constitute an important part of the transportation network in the MacKenzie Delta, the Yellowknife area, and between the MacKenzie Highway and the Canol Road. Climatic changes in the MacKenzie Valley will alter the probabilities of ice cover thickness and duration, impacting on the periods when ice road river crossings are viable. Stochastic models were developed to generate air temperature and precipitation data to analyze climate impacts on when ice road crossing of the MacKenzie River at Norman Wells is feasible. The data were employed to simulate river ice growth and decay. Several general circulation models were employed to determine the impacts of climatic change on the ice regime. For precipitation simulation, the occurrence of wet or dry days was determined from Markov chain transition probabilities. In general, the Goddard Institute of Space Studies (GISS) model predicted the largest increase in monthly precipitation and the Oregon State University (OSU) model predicted the least changes. The various scenarios indicated that the duration for vehicular traffic over ice will be significantly reduced, compared to present day Norman Wells ice crossing operation. For 20 tonne vehicles, the current duration for safe crossing averages 169±14.6 days per year, while for the OSU scenario it will be reduced to 148±14.7 days, is further reduced to 127±24.9 days for the GISS scenario, and drops to 122±21.7 days for the GFDL (General Fluid Dynamics Laboratory) scenario. 5 refs., 1 fig

  19. +Psychometric evaluation of the MacDQoL individualised measure of the impact of macular degeneration on quality of life

    Directory of Open Access Journals (Sweden)

    ffytche Timothy

    2005-04-01

    Full Text Available Abstract Background The MacDQoL is an individualised measure of the impact of macular degeneration (MD on quality of life (QoL. There is preliminary evidence of its psychometric properties and sensitivity to severity of MD. The aim of this study was to carry out further psychometric evaluation with a larger sample and investigate the measure's sensitivity to MD severity. Methods Patients with MD (n = 156: 99 women, 57 men, mean age 79 ± 13 years, recruited from eye clinics (one NHS, one private completed the MacDQoL by telephone interview and later underwent a clinic vision assessment including near and distance visual acuity (VA, comfortable near VA, contrast sensitivity, colour recognition, recovery from glare and presence or absence of distortion or scotoma in the central 10° of the visual field. Results The completion rate for the MacDQoL items was 99.8%. Of the 26 items, three were dropped from the measure due to redundancy. A fourth was retained in the questionnaire but excluded when computing the scale score. Principal components analysis and Cronbach's alpha (0.944 supported combining the remaining 22 items in a single scale. Lower MacDQoL scores, indicating more negative impact of MD on QoL, were associated with poorer distance VA (better eye r = -0.431 p Conclusion The MacDQoL 22-item scale has excellent internal consistency reliability and a single-factor structure. The measure is acceptable to respondents and the generic QoL item, MD-specific QoL item and average weighted impact score are related to several measures of vision. The MacDQoL demonstrates that MD has considerable negative impact on many aspects of QoL, particularly independence, leisure activities, dealing with personal affairs and mobility. The measure may be valuable for use in clinical trials and routine clinical care.

  20. Four Unknown Prison Poems by H. C. Bosman | MacKenzie ...

    African Journals Online (AJOL)

    Four Unknown Prison Poems by H. C. Bosman. C MacKenzie. Abstract. No Abstract. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/eia.v40i2.1 · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  1. C-Band Airport Surface Communications System Standards Development. Phase II Final Report. Volume 2: Test Bed Performance Evaluation and Final AeroMACS Recommendations

    Science.gov (United States)

    Hall, Edward; Magner, James

    2011-01-01

    This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II (this document) describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.

  2. Modeling a content-aware LTE MAC downlink scheduler with heterogeneous traffic

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2013-01-01

    The scheduling policy adopted in the LTE (Long Term Evolution) MAC layer is the most valuable degree of freedom left from the 3GPP (3rd Generation Partnership Project) consortium to the industry and the research community . This paper presents an OPNET model of the downlink scheduling in a one...

  3. Pulmonary symptoms and diagnoses are associated with HIV in the MACS and WIHS cohorts.

    Science.gov (United States)

    Gingo, Matthew R; Balasubramani, Goundappa K; Rice, Thomas B; Kingsley, Lawrence; Kleerup, Eric C; Detels, Roger; Seaberg, Eric C; Greenblatt, Ruth M; Holman, Susan; Huang, Laurence; Sutton, Sarah H; Bertolet, Marnie; Morris, Alison

    2014-04-30

    Several lung diseases are increasingly recognized as comorbidities with HIV; however, few data exist related to the spectrum of respiratory symptoms, diagnostic testing, and diagnoses in the current HIV era. The objective of the study is to determine the impact of HIV on prevalence and incidence of respiratory disease in the current era of effective antiretroviral treatment. A pulmonary-specific questionnaire was administered yearly for three years to participants in the Multicenter AIDS Cohort Study (MACS) and Women's Interagency HIV Study (WIHS). Adjusted prevalence ratios for respiratory symptoms, testing, or diagnoses and adjusted incidence rate ratios for diagnoses in HIV-infected compared to HIV-uninfected participants were determined. Risk factors for outcomes in HIV-infected individuals were modeled. Baseline pulmonary questionnaires were completed by 907 HIV-infected and 989 HIV-uninfected participants in the MACS cohort and by 1405 HIV-infected and 571 HIV-uninfected participants in the WIHS cohort. In MACS, dyspnea, cough, wheezing, sleep apnea, and incident chronic obstructive pulmonary disease (COPD) were more common in HIV-infected participants. In WIHS, wheezing and sleep apnea were more common in HIV-infected participants. Smoking (MACS and WIHS) and greater body mass index (WIHS) were associated with more respiratory symptoms and diagnoses. While sputum studies, bronchoscopies, and chest computed tomography scans were more likely to be performed in HIV-infected participants, pulmonary function tests were no more common in HIV-infected individuals. Respiratory symptoms in HIV-infected individuals were associated with history of pneumonia, cardiovascular disease, or use of HAART. A diagnosis of asthma or COPD was associated with previous pneumonia. In these two cohorts, HIV is an independent risk factor for several respiratory symptoms and pulmonary diseases including COPD and sleep apnea. Despite a higher prevalence of chronic respiratory symptoms

  4. MACS, Lattice Vibrations Structure Factors for Thermal Neutron Scattering in Moderators

    International Nuclear Information System (INIS)

    McMurry, H.L.; Suitt, W.J.; Worlton, T.G.; Martin, R.M.

    1974-01-01

    1 - Description of problem or function: This package of seven related codes is basically aimed at giving maximum capability for calculating slow-neutron scattering by moderators. MACS-C computes crystal vibrations when the potential energy is a sum of parts arising from short-range forces and long-range Coulomb interactions. It also obtains Jacobian matrices for determining adjustments in force constants and ionic charge which can lead to improved agreement with data. Structure factors for neutron inelastic scattering can also be calculated. MACS-J computes the dynamical matrix for the harmonic oscillations of a crystal, its eigenvalues and eigenvectors, the corresponding structure factors for coherent single-phonon scattering of neutrons, and Jacobian matrices for use in adjusting force constants to fit calculated to observed dispersion curves. REVISED-D calculates valance coordinates in terms of mass adjusted atom displacements, together with coordinates which define rigid group rotations. REVISED-MVFC constructs force constant matrices for use in valance force potential functions which are used in other programs dealing with molecular and crystal vibrations. ADJUSTER is a force adjuster program to obtain a least squares fit to observed frequencies of molecules and crystals. DIPOLE-SUM calculates dipole sums for an arbitrary crystal. MODEL-PI calculates crystal vibrations when the potential energy is a sum of short-range and long- or intermediate-range terms in the dipole coordinate approximation. It also obtains Jacobian matrices for use in adjusting input parameters. 2 - Method of solution: In MACS-C, ADJUSTER, and REVISED-D, matrix manipulations are applied to matrices which describe physical conditions. In MACS-J, first-order difference equations are substituted for partial differential equations for Jacobian elements. In MVFC the user employs a set of criteria for defining different types of interactions to prepare by hand the input to the program. For

  5. Planeamiento Estratégico para Rímac Seguros

    OpenAIRE

    Alvitez Muñoz, Julio César; Esquivel Porras, César Augusto; Slocovich Salcedo, Erick Rodolfo

    2005-01-01

    El presente trabajo desarrolla una propuesta de valor en el ámbito del mercado de seguros de vida para ser implementada en Rímac Seguros, permitiendo asegurar a la empresa la sostenibilidad de su liderazgo a través del incremento de su participación en el mercado y la fidelización de sus clientes. Las condiciones en las que se desarrolla la industria de seguros en el mundo y en el Perú en particular, como la séptima en volumen de primas a nivel latinoamericano ofrece un mercado reducido ba...

  6. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  7. Affordability of cataract surgery using the Big Mac prices

    OpenAIRE

    Van C. Lansingh; Marissa J. Carter; Kristen A. Eckert; Kevin L. Winthrop; João M. Furtado; Serge Resnikoff

    2015-01-01

    Purpose: One barrier to cataract surgery is its high price in some countries. This study aims to understand to what extent the price of cataract surgery is over- or undervalued and whether it varies in relation to GDP using The Economist newspaper Big Mac Index (BMcI) methodology, which measures the purchasing power parity between different currencies. Methods: Peer-reviewed articles containing information on cataract surgery prices were searched from 1993 to June 2012 in databases. Ophtha...

  8. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  9. Virtuelne privatne mreže - moguće rešenje pouzdanih komunikacija / Virtual private networks: Possible solution of reliable communications

    Directory of Open Access Journals (Sweden)

    Marinko Smiljanić

    2008-04-01

    Full Text Available U radu su prikazane osnovne karakteristike virtuelnih privatnih mreža (VPN - Virtual Private Networks. Analizirane su VPN mreže na drugom i trećem sloju sistema otvorenog za povezivanje (OSI - Open System Interconnection. Objašnjena je realizacija internet protokola (IP - Internet Protocol VPN mreže i VPN mreže u okruženju višestruke komutacije labela (MPLS - Multi-Protocol Label Switching. Posebna pažnja posvećena je sigurnosti MPLS VPN mreža, naročito sa stanovišta upotrebe u funkcionalnim sistemima veza, kao što je sistem veza Vojske. / In this paper the basic characteristics of the VPN networks are presented. The VPN networks on the second and the third level of the OSI reference model are analyzed. The realization of the IP VPN and VPN networks within MPLS environment is presented as well. Security in MPLS networks is one of the most important characteristics, especially in military communication systems, which is shown in the second part of this paper.

  10. The baby has not come: obstructed labour | MacKeith | South Sudan ...

    African Journals Online (AJOL)

    The baby has not come: obstructed labour. Nancy MacKeith, Wal Bichiok Wur. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's ...

  11. MacSyFinder: a program to mine genomes for molecular systems with an application to CRISPR-Cas systems.

    Directory of Open Access Journals (Sweden)

    Sophie S Abby

    Full Text Available Biologists often wish to use their knowledge on a few experimental models of a given molecular system to identify homologs in genomic data. We developed a generic tool for this purpose.Macromolecular System Finder (MacSyFinder provides a flexible framework to model the properties of molecular systems (cellular machinery or pathway including their components, evolutionary associations with other systems and genetic architecture. Modelled features also include functional analogs, and the multiple uses of a same component by different systems. Models are used to search for molecular systems in complete genomes or in unstructured data like metagenomes. The components of the systems are searched by sequence similarity using Hidden Markov model (HMM protein profiles. The assignment of hits to a given system is decided based on compliance with the content and organization of the system model. A graphical interface, MacSyView, facilitates the analysis of the results by showing overviews of component content and genomic context. To exemplify the use of MacSyFinder we built models to detect and class CRISPR-Cas systems following a previously established classification. We show that MacSyFinder allows to easily define an accurate "Cas-finder" using publicly available protein profiles.MacSyFinder is a standalone application implemented in Python. It requires Python 2.7, Hmmer and makeblastdb (version 2.2.28 or higher. It is freely available with its source code under a GPLv3 license at https://github.com/gem-pasteur/macsyfinder. It is compatible with all platforms supporting Python and Hmmer/makeblastdb. The "Cas-finder" (models and HMM profiles is distributed as a compressed tarball archive as Supporting Information.

  12. Styles of coping with cancer: the Italian version of the Mini-Mental Adjustment to Cancer (Mini-MAC) scale.

    Science.gov (United States)

    Grassi, Luigi; Buda, Patrizia; Cavana, Laura; Annunziata, Maria Antonietta; Torta, Riccardo; Varetto, Antonella

    2005-02-01

    Mental adjustment to cancer has been explored in a large body of the literature by using the Mental Adjustment to Cancer (MAC) scale. Problems in the factor structure of the scale and the need for refining the instrument have determined the development of the Mini-MAC. The aim of this study was to validate, according to a test-oriented approach, the Italian version of the Mini-MAC. Four hundred and thirty cancer patients in five centres in Northern Italy completed the Mini-MAC and the Brief Symptom Inventory (BSI). A subgroup of 153 patients filled out the instruments again within 3 months of the first assessment. The five original subscales (Fighting Spirit, Hopeless, Fatalism, Anxious Preoccupation and Cognitive Avoidance) showed acceptable levels of reliability (Cronbach alpha coefficients ranging from 0.55 to 0.80) although alphas were lower for the scales Fighting Spirit and Fatalism. Factor analysis (Varimax rotation) identified the same five factors with minor variations from the original version. Again, alpha coefficients were less robust for the factors Fighting Sprit and Fatalism. Hopeless and Anxious Preoccupation were significantly related to all the BSI psychological stress symptoms, including the Global Stress Index (GSI). Test-retest reliability showed no differences in the sub-scales scores between assessments. Copyright (c) 2004 John Wiley & Sons, Ltd.

  13. A Reconfigurable Design and Architecture of the Ethernet and HomePNA3.0 MAC

    Science.gov (United States)

    Khalilydermany, M.; Hosseinghadiry, M.

    In this paper a reconfigurable architecture for Ethernet and HomePNA MAC is presented. By using this new architecture, Ethernet and HomePNA reconfigurable network card can be produced. This architecture has been implemented using VHDL language and after that synthesized on a chip. The differences between HomePNA (synchronized and unsynchronized mode) and Ethernet in collision detection mechanism and priority access to media have caused the need to separate architectures for Ethernet and HomePNA, but by using similarities of them, both the Ethernet and the HomePNA can be implemented in a single chip with a little extra hardware. The number of logical elements of the proposed architecture is increased by 19% in compare to when only an Ethernet MAC is implemented

  14. Application of the implicit MacCormack scheme to the parabolized Navier-Stokes equations

    Science.gov (United States)

    Lawrence, J. L.; Tannehill, J. C.; Chaussee, D. S.

    1984-01-01

    MacCormack's implicit finite-difference scheme was used to solve the two-dimensional parabolized Navier-Stokes (PNS) equations. This method for solving the PNS equations does not require the inversion of block tridiagonal systems of algebraic equations and permits the original explicit MacCormack scheme to be employed in those regions where implicit treatment is not needed. The advantages and disadvantages of the present adaptation are discussed in relation to those of the conventional Beam-Warming scheme for a flat plate boundary layer test case. Comparisons are made for accuracy, stability, computer time, computer storage, and ease of implementation. The present method was also applied to a second test case of hypersonic laminar flow over a 15% compression corner. The computed results compare favorably with experiment and a numerical solution of the complete Navier-Stokes equations.

  15. A comparative study of upwind and MacCormack schemes for CAA benchmark problems

    Science.gov (United States)

    Viswanathan, K.; Sankar, L. N.

    1995-01-01

    In this study, upwind schemes and MacCormack schemes are evaluated as to their suitability for aeroacoustic applications. The governing equations are cast in a curvilinear coordinate system and discretized using finite volume concepts. A flux splitting procedure is used for the upwind schemes, where the signals crossing the cell faces are grouped into two categories: signals that bring information from outside into the cell, and signals that leave the cell. These signals may be computed in several ways, with the desired spatial and temporal accuracy achieved by choosing appropriate interpolating polynomials. The classical MacCormack schemes employed here are fourth order accurate in time and space. Results for categories 1, 4, and 6 of the workshop's benchmark problems are presented. Comparisons are also made with the exact solutions, where available. The main conclusions of this study are finally presented.

  16. Differentiation potential of human CD133 positive hematopoietic stem cells into motor neuron- like cells, in vitro.

    Science.gov (United States)

    Moghaddam, Sepideh Alavi; Yousefi, Behnam; Sanooghi, Davood; Faghihi, Faezeh; Hayati Roodbari, Nasim; Bana, Nikoo; Joghataei, Mohammad Taghi; Pooyan, Paria; Arjmand, Babak

    2017-12-01

    Spinal cord injuries and motor neuron-related disorders impact on life of many patients around the world. Since pharmacotherapy and surgical approaches were not efficient to regenerate these types of defects; stem cell therapy as a good strategy to restore the lost cells has become the focus of interest among the scientists. Umbilical cord blood CD133 + hematopoietic stem cells (UCB- CD133 + HSCs) with self- renewal property and neural lineage differentiation capacity are ethically approved cell candidate for use in regenerative medicine. In this regard the aim of this study was to quantitatively evaluate the capability of these cells to differentiate into motor neuron-like cells (MNL), in vitro. CD133 + HSCs were isolated from human UCB using MACS system. After cell characterization using flow cytometry, the cells were treated with a combination of Retinoic acid, Sonic hedgehog, Brain derived neurotrophic factor, and B27 through a 2- step procedure for two weeks. The expression of MN-specific markers was examined using qRT- PCR, flow cytometry and immunocytochemistry. By the end of the two-week differentiation protocol, CD133 + cells acquired unipolar MNL morphology with thin and long neurites. The expression of Isl-1(62.15%), AChE (41.83%), SMI-32 (21.55%) and Nestin (17.46%) was detected using flow cytometry and immunocytochemistry. The analysis of the expression of PAX6, ISL-1, ACHE, CHAT and SMI-32 revealed that MNLs present these neural markers at levels comparable with undifferentiated cells. In Conclusion Human UCB- CD133 + HSCs are remarkably potent cell candidates to transdifferentiate into motor neuron-like cells, in vitro. Copyright © 2017. Published by Elsevier B.V.

  17. The Virtues of Scientific Practice: MacIntyre,

    Science.gov (United States)

    Hicks, Daniel J; Stapleford, Thomas A

    2016-09-01

    “Practice” has become a ubiquitous term in the history of science, and yet historians have not always reflected on its philosophical import and in particular on its potential connections with ethics. This essay draws on the work of the virtue ethicist Alasdair MacIntyre to develop a theory of “communal practices” and explore how such an approach can inform the history of science, including allegations about the corruption of science by wealth or power, consideration of scientific ethics or “moral economies,” the role of values in science, the ethical distinctiveness (or not) of scientific vocations, and the relationship between history of science and the practice of science itself.

  18. MACS low-background doubly focusing neutron monochromator

    CERN Document Server

    Smee, S A; Scharfstein, G A; Qiu, Y; Brand, P C; Anand, D K; Broholm, C L

    2002-01-01

    A novel doubly focusing neutron monochromator has been developed as part of the Multi-Analyzer Crystal Spectrometer (MACS) at the NIST Center for Neutron Research. The instrument utilizes a unique vertical focusing element that enables active vertical and horizontal focusing with a large, 357-crystal (1428 cm sup 2), array. The design significantly reduces the amount of structural material in the beam path as compared to similar instruments. Optical measurements verify the excellent focal performance of the device. Analytical and Monte Carlo simulations predict that, when mounted at the NIST cold-neutron source, the device should produce a monochromatic beam (DELTA E=0.2 meV) with flux phi>10 sup 8 n/cm sup 2 s. (orig.)

  19. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  20. Interaction between maropitant and carprofen on sparing of the minimum alveolar concentration for blunting adrenergic response (MAC-BAR) of sevoflurane in dogs.

    Science.gov (United States)

    Fukui, Sho; Ooyama, Norihiko; Tamura, Jun; Umar, Mohammed Ahmed; Ishizuka, Tomohito; Itami, Takaharu; Miyoshi, Kenjiro; Sano, Tadashi; Yamashita, Kazuto

    2017-03-18

    Maropitant, a neurokinin-1 receptor antagonist, may provide analgesic effects by blocking pharmacological action of substance P. Carprofen is a non-steroidal anti-inflammatory drug commonly used for pain control in dogs. The purpose of this study was to evaluate the effect of a combination of maropitant and carprofen on the minimum alveolar concentration for blunting adrenergic response (MAC-BAR) of sevoflurane in dogs. Six healthy adult beagle dogs were anesthetized with sevoflurane four times with a minimum of 7-day washout period. On each occasion, maropitant (1 mg/kg) alone, carprofen (4 mg/kg) alone, a combination of maropitant (1 mg/kg) and carprofen (4 mg/kg), or saline (0.1 ml/kg) was subcutaneously administered at 1 hr prior to the first electrical stimulation for the sevoflurane MAC-BAR determination. The sevoflurane MAC-BAR was significantly reduced by maropitant alone (2.88 ± 0.73%, P=0.010), carprofen alone (2.96 ± 0.38%, P=0.016) and the combination (2.81 ± 0.51%, P=0.0003), compared with saline (3.37 ± 0.56%). There was no significant difference in the percentage of MAC-BAR reductions between maropitant alone, carprofen alone and the combination. The administration of maropitant alone and carprofen alone produced clinically significant sparing effects on the sevoflurane MAC-BAR in dogs. However, the combination of maropitant and carprofen did not produce any additive effect on the sevoflurane MAC-BAR reduction. Anesthetic premedication with a combination of maropitant and carprofen may not provide any further sparing effect on anesthetic requirement in dogs.

  1. Mac configuration management at the Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Marcus, Allan B [Los Alamos National Laboratory

    2010-01-01

    The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

  2. NF-κB is involved in the LPS-mediated proliferation and apoptosis of MAC-T epithelial cells as part of the subacute ruminal acidosis response in cows.

    Science.gov (United States)

    Fan, Wen-Jie; Li, He-Ping; Zhu, He-Shui; Sui, Shi-Ping; Chen, Pei-Ge; Deng, Yue; Sui, Tong-Ming; Wang, Yue-Ying

    2016-11-01

    To determine the effect of NF-κB on cell proliferation and apoptosis, we investigate the expression of inflammation and apoptosis-related factors in the bovine mammary epithelial cell line, MAC-T. MAC-T cells were cultured in vitro and MTT and LDH assays used to determine the effects of lipopolysaccharide (LPS) on proliferation and cytotoxicity respectively. RT-PCR and western blotting were used to evaluate the effect of LPS and NF-κB inhibition [pyrrolidine dithiocarbamate (PDTC) treatment] on the expression of inflammation and apoptosis-related factors. LPS significantly inhibited MAC-T cell proliferation in a dose- and time-dependent manner. Furthermore, LPS promoted apoptosis while the NF-кB inhibitor PDTC attenuated this effect. After LPS treatment, the NF-кB signaling pathway was activated, and the expression of inflammation and apoptosis-related factors increased. When PDTC blocked NF-кB signaling, the expression of inflammation and apoptosis-related factors were decreased in MAC-T cells. LPS activates the TLR4/NF-κB signaling pathway, inhibits proliferation and promotes apoptosis in MAC-T cells. NF-кB inhibition attenuates MAC-T cell apoptosis and TLR4/NF-κB signaling pathway. NF-кB inhibitor alleviating MAC-T cell apoptosis is presumably modulated by NF-кB.

  3. Detection of Legionella, L. pneumophila and Mycobacterium avium complex (MAC) along potable water distribution pipelines.

    Science.gov (United States)

    Whiley, Harriet; Keegan, Alexandra; Fallowfield, Howard; Bentham, Richard

    2014-07-18

    Inhalation of potable water presents a potential route of exposure to opportunistic pathogens and hence warrants significant public health concern. This study used qPCR to detect opportunistic pathogens Legionella spp., L. pneumophila and MAC at multiple points along two potable water distribution pipelines. One used chlorine disinfection and the other chloramine disinfection. Samples were collected four times over the year to provide seasonal variation and the chlorine or chloramine residual was measured during collection. Legionella spp., L. pneumophila and MAC were detected in both distribution systems throughout the year and were all detected at a maximum concentration of 103 copies/mL in the chlorine disinfected system and 106, 103 and 104 copies/mL respectively in the chloramine disinfected system. The concentrations of these opportunistic pathogens were primarily controlled throughout the distribution network through the maintenance of disinfection residuals. At a dead-end and when the disinfection residual was not maintained significant (p pipeline and sampling period. Total coliforms were not present in any water sample collected. This study demonstrates the ability of Legionella spp., L. pneumophila and MAC to survive the potable water disinfection process and highlights the need for greater measures to control these organisms along the distribution pipeline and at point of use.

  4. Performance of MAC protocols in beaconing Mobile Adhoc Multibroadcast Networks

    OpenAIRE

    Rico García, Cristina; Lehner, Andreas; Robertson, Patrick; Strang, Thomas

    2010-01-01

    The investigation of infrastructureless safety applications in dierent transportation systems is a hot research topic. The nodes in thevnetwork are designed to advertise to the rest of the nodes informationabout the current traffic situation by means of short beacon messages containing speed, direction, positions and other relevant safety information. The scheduling should be organized by the MAC layer so that the transmitted messages arrive successfully as soon as possible at the recei...

  5. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  6. A Novel Spectrally Efficient Asynchronous Multi-Channel MAC Using a Half-Duplex Transceiver for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abdullah Devendiran

    2018-01-01

    Full Text Available Multi-channel medium access control (MAC protocols maximize network performance by enabling concurrent wireless transmissions over non-interfering channels. Despite physical layer advancements, the underlying IEEE 802.11 MAC standard cannot fully exploit features and support high-performance applications. In this work, we propose the novel spectrally efficient asynchronous multi-channel MAC (SA-MMAC protocol for wireless networks using a single half-duplex transceiver. A full-duplex mode of operation on data channels reduces the signaling overhead and boosts the spectrum efficiency. A revamped contention mechanism of IEEE 802.11 addresses the multi-channel hidden terminal problem, and a jamming signal from the receiver addresses the collisions in control signals. Furthermore, the control channel is used for data transmissions to increase the bandwidth utilization but under a restricted half-duplex mode to avoid causing a bottleneck situation. The simulator is tested for correctness. The results suggest that the protocol can work well on 3, 4, or 12 concurrent channels with high node density, providing about 12.5 times more throughput than IEEE 802.11 and 18% to 95% more throughput than its multi-channel variants under saturated traffic conditions.

  7. Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

    Directory of Open Access Journals (Sweden)

    Pieter Robyns

    2017-01-01

    Full Text Available We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11 enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construct a fingerprint of the transmitter that is 80.0 to 67.6 percent unique for 50 to 100 observed devices and 33.0 to 15.1 percent unique for 1,000 to 10,000 observed devices. We show how existing mitigation strategies such as MAC address randomization can be circumvented using only this fingerprint and temporal information. Our second technique leverages peer-to-peer 802.11u Generic Advertisement Service (GAS requests and 802.11e Block Acknowledgement (BA requests to instigate transmissions on demand from devices that support these protocols. We validate these techniques using two datasets, one of which was recorded at a music festival containing 28,048 unique devices and the other at our research lab containing 138 unique devices. Finally, we discuss a number of countermeasures that can be put in place by mobile device vendors in order to prevent noncooperative tracking through the discussed techniques.

  8. Plan maestro del proyecto de restauración del río Rímac: informe final

    OpenAIRE

    Autoridad Nacional del Agua; K-water. Korea Water Resources Corporation; Yooshin Engineering; Pyunghwa Engineering Consultants

    2015-01-01

    Presenta un documento elaborado en el marco de cooperación entre Corea del Sur y el Perú, en el cual se proponen diversas medidas y planes para recuperar el río Rímac utilizando como modelo las experiencias de la República de Corea en proyectos de recuperación de ríos y otras prácticas de gestión de los recursos hídricos. Este Plan Maestro para la recuperación del río Rímac tiene componentes sobre el mejoramiento de la calidad de agua, el desarrollo de los recursos hídricos de la zona y el me...

  9. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  10. 78 FR 26711 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-05-08

    ... Funding and Fiscal Affairs; Farmer Mac Liquidity Management ACTION: Proposed rule; reopening of comment... proposed rule that would amend its liquidity management regulations for the Federal Agricultural Mortgage... comment on the proposed liquidity regulations. [[Page 26712

  11. Endotoxin testing of proteins for parenteral administration using the Mono Mac 6 assay

    DEFF Research Database (Denmark)

    Moesby, Lise; Hansen, E W; Christensen, J D

    2000-01-01

    Pharmaceutical products containing proteins cause problems in testing for endotoxin and pyrogens. Many proteins interfere with the LAL test and the proteins are immunogenic in rabbits. The monocytic cell line Mono Mac 6 is an alternative assay for detection of endotoxin and other pyrogens....

  12. Detecting DIF in Polytomous Items Using MACS, IRT and Ordinal Logistic Regression

    Science.gov (United States)

    Elosua, Paula; Wells, Craig

    2013-01-01

    The purpose of the present study was to compare the Type I error rate and power of two model-based procedures, the mean and covariance structure model (MACS) and the item response theory (IRT), and an observed-score based procedure, ordinal logistic regression, for detecting differential item functioning (DIF) in polytomous items. A simulation…

  13. Scalable Video Streaming Adaptive to Time-Varying IEEE 802.11 MAC Parameters

    Science.gov (United States)

    Lee, Kyung-Jun; Suh, Doug-Young; Park, Gwang-Hoon; Huh, Jae-Doo

    This letter proposes a QoS control method for video streaming service over wireless networks. Based on statistical analysis, the time-varying MAC parameters highly related to channel condition are selected to predict available bitrate. Adaptive bitrate control of scalably-encoded video guarantees continuity in streaming service even if the channel condition changes abruptly.

  14. The Long-Run Value of Currencies: A Big Mac Perspective

    OpenAIRE

    Yihui Lan

    2001-01-01

    Purchasing Power Parity (PPP), the link between exchange rates and prices, is a fundamental building block of international finance, one which has been attracting increasing research interest during the past three decades. The Big Mac Index (BMI), invented by 'The Economist' magazine in 1986, has played a major role in popularising PPP and bringing its practical implications to the attention of financial markets. The aim of this paper is to derive long-run equilibrium values of currencies usi...

  15. Stochastic generation of MAC waves and implications for convection in Earth's core

    Science.gov (United States)

    Buffett, Bruce; Knezek, Nicholas

    2018-03-01

    Convection in Earth's core can sustain magnetic-Archemedes-Coriolis (MAC) waves through a variety of mechanisms. Buoyancy and Lorentz forces are viable sources for wave motion, together with the effects of magnetic induction. We develop a quantitative description for zonal MAC waves and assess the source mechanisms using a numerical dynamo model. The largest sources at conditions accessible to the dynamo model are due to buoyancy forces and magnetic induction. However, when these sources are extrapolated to conditions expected in Earth's core, the Lorentz force emerges as the dominant generation mechanism. This source is expected to produce wave velocities of roughly 2 km yr-1 when the internal magnetic field is characterized by a dimensionless Elsasser number of roughly Λ ≈ 10 and the root-mean-square convective velocity defines a magnetic Reynolds number of Rm ≈ 103. Our preferred model has a radially varying stratification and a constant (radial) background magnetic field. It predicts a broad power spectrum for the wave velocity with most power distributed across periods from 30 to 100 yr.

  16. All-optical virtual private network and ONUs communication in optical OFDM-based PON system.

    Science.gov (United States)

    Zhang, Chongfu; Huang, Jian; Chen, Chen; Qiu, Kun

    2011-11-21

    We propose and demonstrate a novel scheme, which enables all-optical virtual private network (VPN) and all-optical optical network units (ONUs) inter-communications in optical orthogonal frequency-division multiplexing-based passive optical network (OFDM-PON) system using the subcarrier bands allocation for the first time (to our knowledge). We consider the intra-VPN and inter-VPN communications which correspond to two different cases: VPN communication among ONUs in one group and in different groups. The proposed scheme can provide the enhanced security and a more flexible configuration for VPN users compared to the VPN in WDM-PON or TDM-PON systems. The all-optical VPN and inter-ONU communications at 10-Gbit/s with 16 quadrature amplitude modulation (16 QAM) for the proposed optical OFDM-PON system are demonstrated. These results verify that the proposed scheme is feasible. © 2011 Optical Society of America

  17. C-Band Airport Surface Communications System Standards Development. Phase II Final Report. Volume 1: Concepts of Use, Initial System Requirements, Architecture, and AeroMACS Design Considerations

    Science.gov (United States)

    Hall, Edward; Isaacs, James; Henriksen, Steve; Zelkin, Natalie

    2011-01-01

    This report is provided as part of ITT s NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: New ATM Requirements-Future Communications, C-Band and L-Band Communications Standard Development and was based on direction provided by FAA project-level agreements for New ATM Requirements-Future Communications. Task 7 included two subtasks. Subtask 7-1 addressed C-band (5091- to 5150-MHz) airport surface data communications standards development, systems engineering, test bed and prototype development, and tests and demonstrations to establish operational capability for the Aeronautical Mobile Airport Communications System (AeroMACS). Subtask 7-2 focused on systems engineering and development support of the L-band digital aeronautical communications system (L-DACS). Subtask 7-1 consisted of two phases. Phase I included development of AeroMACS concepts of use, requirements, architecture, and initial high-level safety risk assessment. Phase II builds on Phase I results and is presented in two volumes. Volume I (this document) is devoted to concepts of use, system requirements, and architecture, including AeroMACS design considerations. Volume II describes an AeroMACS prototype evaluation and presents final AeroMACS recommendations. This report also describes airport categorization and channelization methodologies. The purposes of the airport categorization task were (1) to facilitate initial AeroMACS architecture designs and enable budgetary projections by creating a set of airport categories based on common airport characteristics and design objectives, and (2) to offer high-level guidance to potential AeroMACS technology and policy development sponsors and service providers. A channelization plan methodology was developed because a common global methodology is needed to assure seamless interoperability among diverse AeroMACS services potentially supplied by multiple service providers.

  18. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  19. Huachipa-Jicamarca: cronología y desarrollo sociopolítico en el Rímac

    Directory of Open Access Journals (Sweden)

    1997-01-01

    Full Text Available HUACHIPA-JICAMARCA : CHRONOLOGIE ET DÉVELOPPEMENT SOCIO-POLITIQUE DANS LA VALLÉE DU RÍMAC. Cet article analyse la période Formative (environ 1700-100 A.C. dans la vallée du Rímac à partir d’une fouille stratigraphique réalisée à Huachipa. Il présente deux intérêts liés entre eux. Le premier concerne la chronologie de la poterie à Huachipa. Une séquence culturelle est proposée, qui commence au Formatif Moyen (environ 1100 A.C. et prend fin au Formatif Récent (environ 100 A.C. avec le style “Blanc sur Rouge”. Selon cette séquence, les régions basses et moyennes du Rímac étaient en contact à preuve, dans les villages et les centres cérémoniels, la présence de poteries de styles similaires. En outre, l'apparition d'un style composé, dénommé Huachipa-Jicamarca C, est tout à fait remarquable en ce qu'il révèle l'existence de liens avec les traditions culturelles de Topará (Chincha et Ocucaje (Ica, probablement aux alentours de 200-100 A.C. De tels liens semblent indiquer que les relations entre la côte centrale et Ica ne furent pas nécessairement sporadiques. Le second intérêt de cet article concerne le type d'occupation humaine et les caractéristiques socio-politiques dans le moyen et le bas Rímac pendant cette période. Au cours de cette étape, me semble-t-il, se développe le village comme modèle d'installation, de même que se développe la construction d'édifices publics, signes, ces derniers, d'organisations socio-politiques similaires aux chefferies et dont le trait le plus remarquable est l'apparition d'une complexe structure sociale religieuse. D'autre part, l'existence d'un temple en U (San Antonio, proche du lieu de peuplement de Huachipa, suggère que village et lieu de culte constituaient un système politiquement intégré. Este artículo examina el período Formativo (circa 1700-100 A.C., en el valle del Rímac, a partir de una muestra estratigráfica excavada en Huachipa y comprende dos

  20. The Big Mac and Teaching about Japan. Footnotes. Volume 8, Number 5

    Science.gov (United States)

    Ellington, Lucien

    2003-01-01

    The Big Mac can be effective tool in helping students achieve a better understanding of Japan. It can defeat Orientalist stereotypes about the Japanese--and also challenge young people who might have oversimplified notions of what exactly occurs when U.S. fast food chains take root in another culture. Many deride McDonald's as a villain…

  1. Assessment of mental capacity to consent to treatment in anorexia nervosa: A comparison of clinical judgment and MacCAT-T and consequences for clinical practice.

    Science.gov (United States)

    Elzakkers, Isis F F M; Danner, Unna N; Grisso, Thomas; Hoek, Hans W; van Elburg, Annemarie A

    Informed consent requires adequate mental capacity to consent to treatment. Mental capacity (MC) to consent to treatment refers to the ability to make medical decisions. MC is assessed in a general psychiatric interview, but this clinical assessment is known to overestimate mental capacity in patients and the inter rater reliability is low. The MacArthur Competence Assessment Tool for Treatment (MacCAT-T) has emerged as the gold standard to assess mental capacity to consent to treatment. The MacCAT-T is a semi-structured interview designed to aid clinicians in this assessment and has shown good inter rater reliability in patients with schizophrenia and other mental disorders, but has hardly been studied in patients with anorexia nervosa. Patients with anorexia nervosa (AN) regularly avoid treatment, even when severely ill and discussion includes assessing MC to consent to treatment. The aim of this study is to compare clinical judgment and the MacCAT-T in evaluating MC in patients with AN which in turn may influence use of the MacCAT-T in daily practice. In a sample of 70 consecutively referred severely ill patients with AN with a mean BMI of 15.5 kg/m 2 and a mean duration of illness of 8.6 years, clinical assessment of MC by experienced psychiatrists and the outcome of the MacCAT-T interview were compared. Agreement (κ-value) was calculated. Agreement between clinical assessment and outcome of the MacCAT-T was questionable (κ 0.23). Unlike in other psychiatric populations, clinicians judged a high proportion of patients with AN as having diminished MC. The MacCAT-T can be useful in assessing MC in AN when used in addition to clinical judgment to aid clinicians in complex cases. Why clinicians judge a relatively high proportion of patients with AN as having diminished MC, in contrast to lower proportions in other psychiatric disorders, is an area in need of further research. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Detection of Legionella, L. pneumophila and Mycobacterium Avium Complex (MAC) along Potable Water Distribution Pipelines

    Science.gov (United States)

    Whiley, Harriet; Keegan, Alexandra; Fallowfield, Howard; Bentham, Richard

    2014-01-01

    Inhalation of potable water presents a potential route of exposure to opportunistic pathogens and hence warrants significant public health concern. This study used qPCR to detect opportunistic pathogens Legionella spp., L. pneumophila and MAC at multiple points along two potable water distribution pipelines. One used chlorine disinfection and the other chloramine disinfection. Samples were collected four times over the year to provide seasonal variation and the chlorine or chloramine residual was measured during collection. Legionella spp., L. pneumophila and MAC were detected in both distribution systems throughout the year and were all detected at a maximum concentration of 103 copies/mL in the chlorine disinfected system and 106, 103 and 104 copies/mL respectively in the chloramine disinfected system. The concentrations of these opportunistic pathogens were primarily controlled throughout the distribution network through the maintenance of disinfection residuals. At a dead-end and when the disinfection residual was not maintained significant (p < 0.05) increases in concentration were observed when compared to the concentration measured closest to the processing plant in the same pipeline and sampling period. Total coliforms were not present in any water sample collected. This study demonstrates the ability of Legionella spp., L. pneumophila and MAC to survive the potable water disinfection process and highlights the need for greater measures to control these organisms along the distribution pipeline and at point of use. PMID:25046636

  3. Debating Inclusion in Synecdoche, New York: A Response to Gresham and MacMillan.

    Science.gov (United States)

    Ferguson, Dianne L.; Ferguson, Philip M.

    1997-01-01

    A comprehensive review of the debate over the inclusion of children with disabilities in educational programs needs to explore research and issues beyond those considered by F. Gresham and D. MacMillan. Some of those issues are reviewed, focusing on a shift away from the medical deficit model. (SLD)

  4. The Control Packet Collision Avoidance Algorithm for the Underwater Multichannel MAC Protocols via Time-Frequency Masking

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2016-01-01

    Full Text Available Establishing high-speed and reliable underwater acoustic networks among multiunmanned underwater vehicles (UUVs is basic to realize cooperative and intelligent control among different UUVs. Nevertheless, different from terrestrial network, the propagation speed of the underwater acoustic network is 1500 m/s, which makes the design of the underwater acoustic network MAC protocols a big challenge. In accordance with multichannel MAC protocols, data packets and control packets are transferred through different channels, which lowers the adverse effect of acoustic network and gradually becomes the popular issues of underwater acoustic networks MAC protocol research. In this paper, we proposed a control packet collision avoidance algorithm utilizing time-frequency masking to deal with the control packets collision in the control channel. This algorithm is based on the scarcity of the noncoherent underwater acoustic communication signals, which regards collision avoiding as separation of the mixtures of communication signals from different nodes. We first measure the W-Disjoint Orthogonality of the MFSK signals and the simulation result demonstrates that there exists time-frequency mask which can separate the source signals from the mixture of the communication signals. Then we present a pairwise hydrophones separation system based on deep networks and the location information of the nodes. Consequently, the time-frequency mask can be estimated.

  5. The Making Assessment Count (MAC consortium maximising assessment and feedback design by working together

    Directory of Open Access Journals (Sweden)

    Mark JP Kerrigan

    2011-02-01

    Full Text Available The Making Assessment Count (MAC project started at the University of Westminster in 2008. It sought to align staff and student expectations of feedback and support greater use of feed-forward approaches. A baseline analysis of staff views in the School of Life Sciences suggested that students did not make strategic use of the feedback they received. A similar analysis of the student position revealed that as a group they felt that the feedback provided to them was often insufficiently helpful. To address this dichotomy, a MAC process was developed in the School of Life Sciences and trialled with a cohort of about 350 first year undergraduate students. The process was based on a student-centred, three-stage model of feedback: Subject specific, Operational, and Strategic (SOS model. The student uses the subject tutor's feedback on an assignment to complete an online self-review questionnaire delivered by a simple tool. The student answers are processed by a web application called e-Reflect to generate a further feedback report. Contained within this report are personalised graphical representations of performance, time management, satisfaction and other operational feedback designed to help the student reflect on their approach to preparation and completion of future work. The student then writes in an online learning journal, which is shared with their personal tutor to support the personal tutorial process and the student's own development plan (PDP. Since the initial development and implementation of the MAC process within Life Sciences at Westminster, a consortium of universities has worked together to maximise the benefits of the project outcomes and collaboratively explore how the SOS model and e-Reflect can be exploited in different institutional and subject contexts. This paper presents and discusses an evaluation of the use of the MAC process within Life Sciences at Westminster from both staff and student perspective. In addition, the

  6. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  7. Nuclear power history calculation for subcritical systems using Euler-MacLaurin formula

    International Nuclear Information System (INIS)

    Henrice Junior, Edson; Goncalves, Alessandro da Cruz

    2013-01-01

    This paper presents an efficient method for calculating the reactivity using inverse point kinetic equation for subcritical systems by applying the Euler-MacLaurin summation formula to calculate the nuclear power history. In accordance with the accuracy of the numerical results, this method does not require a large number of points for calculation, providing accurate results with low computational cost. (author)

  8. Pregnant women's perspectives on umbilical cord blood banking.

    Science.gov (United States)

    Sugarman, J; Kaplan, L; Cogswell, B; Olson, J

    1998-08-01

    Promising clinical results suggest that umbilical cord blood (UCB) collected after delivery of a child may have many advantages over bone marrow for transplantation. As there are an increasing number of options regarding the collection of UCB, including private and public banking, more pregnant women are likely to be asked to make decisions about UCB collection. We conducted three focus groups with pregnant women to learn about their perspectives on this emerging technology. All the women in these focus groups indicated that they would choose to have UCB collected. Reasons leading to this choice were that the UCB would otherwise be discarded and altruism. Participants indicated that possible reasons to decide not to have UCB collected include concerns about the safety of the mother and neonate, beliefs about the placenta, threats against confidentiality, rejection of UCB, and the influence of fathers. While feeling confident in making an anticipatory decision about UCB collection, women expressed a clear desire to learn much more about the collection, storage (including distinctions between public and private banking), and use of UCB. In addition, they believed that recruitment for UCB collection should occur after sufficient education about UCB and certainly not after delivery and collection. These data will be useful in guiding efforts to help women make decisions about having UCB collected and in developing an appropriate recruitment and informed consent process for donating UCB to a public bank.

  9. Elevated levels of homocysteine increase IL-6 production in monocytic Mono Mac 6 cells

    NARCIS (Netherlands)

    van Aken, B. E.; Jansen, J.; van Deventer, S. J.; Reitsma, P. H.

    2000-01-01

    Hyperhomocysteinemia is a risk factor for atherosclerosis and thrombosis. The aim of this study was to analyze if exposure of monocytic cells to increased levels of homocysteine (HCY) induces the accumulation of inflammatory mediators. Interleukin (IL)-6 production by monocytic cell line Mono Mac 6

  10. Curative or pre-emptive adenovirus-specific T cell transfer from matched unrelated or third party haploidentical donors after HSCT, including UCB transplantations: a successful phase I/II multicenter clinical trial

    Directory of Open Access Journals (Sweden)

    Chongsheng Qian

    2017-05-01

    Full Text Available Abstract Background Allogeneic hematopoietic stem cell transplantation (HSCT, the most widely used potentially curable cellular immunotherapeutic approach in the treatment of hematological malignancies, is limited by life-threatening complications: graft versus host disease (GVHD and infections especially viral infections refractory to antiviral drugs. Adoptive transfer of virus-specific T cells is becoming an alternative treatment for infections following HSCT. We report here the results of a phase I/II multicenter study which includes a series of adenovirus-specific T cell (ADV-VST infusion either from the HSCT donor or from a third party haploidentical donor for patients transplanted with umbilical cord blood (UCB. Methods Fourteen patients were eligible and 11 patients received infusions of ADV-VST generated by interferon (IFN-γ-based immunomagnetic isolation from a leukapheresis from their original donor (42.9% or a third party haploidentical donor (57.1%. One patient resolved ADV infection before infusion, and ADV-VST could not reach release or infusion criteria for two patients. Two patients received cellular immunotherapy alone without antiviral drugs as a pre-emptive treatment. Results One patient with adenovirus infection and ten with adenovirus disease were infused with ADV-VST (mean 5.83 ± 8.23 × 103 CD3+IFN-γ+ cells/kg up to 9 months after transplantation. The 11 patients showed in vivo expansion of specific T cells up to 60 days post-infusion, associated with adenovirus load clearance in ten of the patients (91%. Neither de novo GVHD nor side effects were observed during the first month post-infusion, but GVHD reactivations occurred in three patients, irrespective of the type of leukapheresis donor. For two of these patients, GVHD reactivation was controlled by immunosuppressive treatment. Four patients died during follow-up, one due to refractory ADV disease. Conclusions Adoptive transfer of rapidly isolated ADV

  11. Modeling C-Band Co-Channel Interference From AeroMACS Omni-Directional Antennas to Mobile Satellite Service Feeder Uplinks

    Science.gov (United States)

    Wilson, Jeffrey D.

    2011-01-01

    A new C-band (5091 to 5150 MHz) airport communications system designated as Aeronautical Mobile Airport Communications System (AeroMACS) is being planned under the Federal Aviation Administration s NextGen program. An interference analysis software program, Visualyse Professional (Transfinite Systems Ltd), is being utilized to provide guidelines on limitations for AeroMACS transmitters to avoid interference with other systems. A scenario consisting of a single omni-directional transmitting antenna at each of the major contiguous United States airports is modeled and the steps required to build the model are reported. The results are shown to agree very well with a previous study.

  12. Reliability and cross-cultural validation of the Turkish version of Manual Ability Classification System (MACS) for children with cerebral palsy.

    Science.gov (United States)

    Akpinar, Pinar; Tezel, Canan G; Eliasson, Ann-Christin; Icagasioglu, Afitap

    2010-01-01

    To determine the reliability and cross-cultural validation of the Turkish translation of the Manual Ability Classification System (MACS) for children with cerebral palsy (CP) and to investigate the relation to gross motor function and other comorbidities. After the forward and backward translation procedures, inter-rater and test-retest reliability was assessed between parents, physiotherapists and physicians using the intra-class correlation coefficient (ICC). Children (N = 118, 4 to 18 years, mean age 9 years 4 months; 68 boys, 50 girls) with various types of CP were classified. Additional data on the Gross Motor Function Classification System (GMFCS), intellectual delay, visual acuity, and epilepsy were collected. The inter-rater reliability was high; the ICC ranged from 0.89 to 0.96 among different professionals and parents. Between two persons of the same profession it ranged from 0.97 to 0.98. For the test-retest reliability it ranged from 0.91 to 0.98. Total agreement between the GMFCS and the MACS occurred in only 45% of the children. The level of the MACS was found to correlate with the accompanying comorbidities, namely intellectual delay and epilepsy. The Turkish version of the MACS is found to be valid and reliable, and is suggested to be appropriate for the assessment of manual ability within the Turkish population.

  13. MAC-sparing effect of nitrous oxide in sevoflurane anesthetized sheep and its reversal with systemic atipamezole administration

    Science.gov (United States)

    Scanu, Antonio; Melosu, Valentino; Careddu, Giovanni Mario; Sotgiu, Giovanni

    2018-01-01

    Introduction Nitrous oxide (N2O) is an anesthetic gas with antinociceptive properties and reduces the minimum alveolar concentration (MAC) for volatile anesthetic agents, potentially through mechanisms involving central alpha2-adrenoceptors. We hypothesized that 70% N2O in the inspired gas will significantly reduce the MAC of sevoflurane (MACSEVO) in sheep, and that this effect can be reversed by systemic atipamezole. Materials and methods Animals were initially anesthetized with SEVO in oxygen (O2) and exposed to an electrical current as supramaximal noxious stimulus in order to determine MACSEVO (in duplicates). Thereafter, 70% N2O was added to the inspired gas and the MAC re-determined in the presence of N2O (MACSN). A subgroup of sheep were anesthetized a second time with SEVO/N2O for re-determination of MACSN, after which atipamezole (0.2 mg kg-1, IV) was administered for MACSNA determinations. Sheep were anesthetized a third time, initially with only SEVO/O2 to re-determine MACSEVO, after which atipamezole (0.2 mg kg-1, IV) was administered for determination of MACSA. Results MACSEVO was 2.7 (0.3)% [mean (standard deviation)]. Addition of N2O resulted in a 37% reduction of MACSEVO to MACSN of 1.7 (0.2)% (p <0.0001). Atipamezole reversed this effect, producing a MACSNA of 3.1 (0.7)%, which did not differ from MACSEVO (p = 0.12). MACSEVO did not differ from MACSA (p = 0.69). Cardiorespiratory variables were not different among experimental groups except a lower ETCO2 in animals exposed to SEVO/N2O. Conclusions N2O produces significant MACSEVO-reduction in sheep; this effect is completely reversed by IV atipamezole confirming the involvement of alpha2-adrenoreceptors in the MAC-sparing action of N2O. PMID:29315308

  14. An Optimized Virtual Scheme for Reducing Collisions in MAC Layer

    OpenAIRE

    M. Sivakumar; S. Saravanan

    2015-01-01

    The main function of Medium Access Control (MAC) is to share the channel efficiently between all nodes. In the real-time scenario, there will be certain amount of wastage in bandwidth due to back-off periods. More bandwidth will be wasted in idle state if the back-off period is very high and collision may occur if the back-off period is small. So, an optimization is needed for this problem. The main objective of the work is to reduce delay due to back-off period thereby reducing collision and...

  15. ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

    OpenAIRE

    Younas Khan; Sheeraz Ahmed; Fakhri Alam Khan; Imran Ahmad; Saqib Shahid Rahim; M. Irfan Khattak

    2016-01-01

    Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no da...

  16. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Science.gov (United States)

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  17. Assessment of manual material handling using Iranian MMH regulations and comparison with NIOSH equation and MAC method in one of the metal casting industries in Tehran, 2011

    Directory of Open Access Journals (Sweden)

    2013-08-01

    Result: Results showed an acceptable agreement between Iranian regulation and MAC method as well as Iranian regulation and NIOSH equation. However, no acceptable agreement was observed between MAC method and NIOSH equation.

  18. Optimization of hybrid token-CDMA MAC system using cross-layer information

    CSIR Research Space (South Africa)

    Liu, I-S

    2007-08-01

    Full Text Available The hybrid MAC scheme is capable to implement in either ad hoc or wireless mesh networks (WMN). For WMN configuration, stations are served as access networks utilizing non-mobile relaying nodes to provide wireless backbone services for nomadic users... University and a PhD degree from University of Cambridge, United Kingdom. His research interests are in the general areas of adaptive signal processing, digital and wireless communications and data networks. Co-author: Professor Hong-Jun Xu...

  19. A Camac-VME-MacIntosh data acquisition system for nuclear experiments

    International Nuclear Information System (INIS)

    Anzalone, A.; Giustolisi, F.

    1989-01-01

    A multiprocessor system for data acquisition and analysis in low energy nuclear physics has been realized at the Laboratorio Nazionale del Sud. the system is built around Camac, VME-bus and MacIntosh PC. A multiprocessor software has been developed, using RTF, Macsys and Cern cross-software. The execution of several programs which run on several VME-CPU's and on an external PC, is coordinated by a mail box protocol. No operating system is used on the VME-CPU's

  20. Simulating Global AeroMACS Airport Ground Station Antenna Power Transmission Limits to Avoid Interference With Mobile Satellite Service Feeder Uplinks

    Science.gov (United States)

    Wilson, Jeffrey D.

    2013-01-01

    The Aeronautical Mobile Airport Communications System (AeroMACS), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low Earth orbit from transmitters at global airports was simulated with the Visualyse Professional software. The dependence of the interference power on antenna distribution, gain patterns, duty cycle, and antenna tilt was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power from global airports required to maintain the cumulative interference power under the established threshold.

  1. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  2. Implantable Body Sensor Network MAC Protocols Using Wake-up Radio – Evaluation in Animal Tissue

    NARCIS (Netherlands)

    Karuppiah Ramachandran, Vignesh Raja; van der Zwaag, B.J.; Meratnia, Nirvana; Havinga, Paul J.M.

    Applications of implantable sensor networks in the health-care industry have increased tremendously over the last decade. There are different types of medium access control (MAC) protocols that are designed for implantable body sensor networks, using different physical layer technologies such as

  3. Muusikamaailm : James Levine 25 aastat Metis. Taveneri ja MacMillani millenniumiteosed. Avafestival Sydneys / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2000-01-01

    J. Harbisoni ooperi "The Great Gatsby" esmalavastusega tähistab New Yorgi Metropolitan Opera oma 25-aastast koostööd J. Levine'iga. J. Taveneri uudisteosest "The Fall and Resurrection", J. MacMillani millenniumiteose "Magnificat" maailmaesiettekandest. 5.-26. jaan. toimuvast Sydney muusikafestivalist

  4. 78 FR 65541 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-11-01

    ... attention issues and concerns that they believe warrant further or heightened FCA scrutiny. The second...; Divide the 90-day liquidity reserve into three tiers so Farmer Mac has a sufficient amount of cash and... that can be traded at fair value and an explicit public backstop.'' From the FCA's perspective, whether...

  5. Umbilical cord blood donation: public or private?

    Science.gov (United States)

    Ballen, K K; Verter, F; Kurtzberg, J

    2015-10-01

    Umbilical cord blood (UCB) is a graft source for patients with malignant or genetic diseases who can be cured by allogeneic hematopoietic cell transplantation (HCT), but who do not have an appropriately HLA-matched family or volunteer unrelated adult donor. Starting in the 1990s, unrelated UCB banks were established, accepting donations from term deliveries and storing UCB units for public use. An estimated 730 000 UCB units have been donated and stored to date and ~35 000 UCB transplants have been performed worldwide. Over the past 20 years, private and family banks have grown rapidly, storing ~4 million UCB units for a particular patient or family, usually charging an up-front and yearly storage fee; therefore, these banks are able to be financially sustainable without releasing UCB units. Private banks are not obligated to fulfill the same regulatory requirements of the public banks. The public banks have released ~30 times more UCB units for therapy. Some countries have transitioned to an integrated banking model, a hybrid of public and family banking. Today, pregnant women, their families, obstetrical providers and pediatricians are faced with multiple choices about the disposition of their newborn's cord blood. In this commentary, we review the progress of UCB banking technology; we also analyze the current data on pediatric and adult unrelated UCB, including the recent expansion of interest in transplantation for hemoglobinopathies, and discuss emerging studies on the use of autologous UCB for neurologic diseases and regenerative medicine. We will review worldwide approaches to UCB banking, ethical considerations, criteria for public and family banking, integrated banking ideas and future strategies for UCB banking.

  6. Estimation of Physiological Cost Index as an Energy Expenditure Index using MacGregor’s Equation

    Directory of Open Access Journals (Sweden)

    Binaya SJB Rana

    2015-09-01

    Full Text Available Introduction: Physical activity and energy expenditure can be quantified by measuring heart rate, oxygen uptake and respiratory quotient. The Physiological Cost Index (PCI proposed by MacGregor is a simple and straightforward method to estimate the energy expenditure index. Here, we aim to estimate the energy expenditure among young Asian population using MacGregor’s equation. Methods: A total of 50 young randomly selected healthy females performed 50m, 100m and 150m walking test at their self-selected preferred speed. The physiological cost index values for 100 m walk at speeds slower and faster than the preferred speed were also obtained. The physiological cost index during exercise was calculated using MacGregor’s equation considering heart rate and speed of walking over the varying distances. Results: The PCI values on three different distances are consistent during self selected preferred speed. The PCI estimation on second and third tests for all three distances walked consistently reproducible. However for each distance walked, the first test the PCI was significantly higher than the second and third test values. The PCI values increased significantly when subjects walked either slower (p = 0.02 or faster (p = 0.001 than their normal preferred speed. Conclusion: The physiological cost index values were similar for varying distances walks. The PCI was the least at the preferred speed of walking and increased when the subjects either walked slower or faster than the preferred speed. The first estimation was higher than subsequent estimations. Keywords: energy expenditure index; exercise; physiological cost index. | PubMed

  7. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  8. Knowledge, beliefs, and decisions of pregnant Australian women concerning donation and storage of umbilical cord blood: a population-based survey.

    Science.gov (United States)

    Jordens, Christopher F C; Kerridge, Ian H; Stewart, Cameron L; O'Brien, Tracey A; Samuel, Gabrielle; Porter, Maree; O'Connor, Michelle A C; Nassar, Natasha

    2014-12-01

    Many women giving birth in Australian hospitals can choose to donate their child's umbilical cord blood to a public cord blood bank or pay to store it privately. We conducted a survey to determine the proportion and characteristics of pregnant women who are aware of umbilical cord blood (UCB) banking and who have considered and decided about this option. The survey also sought to ascertain information sources, knowledge, and beliefs about UCB banking, and the effect of basic information about UCB on decisions. Researchers and hospital maternity staff distributed a survey with basic information about UCB banking to 1,873 women of at least 24 weeks' gestation who were attending antenatal classes and hospital clinics in 14 public and private maternity hospitals in New South Wales. Most respondents (70.7%) were aware of UCB banking. Their main information sources were leaflets from hospital clinics, print media, antenatal classes, TV, radio, friends, and relatives. Knowledge about UCB banking was patchy, and respondents overestimated the likelihood their child would need or benefit from UCB. Women who were undecided about UCB banking were younger, less educated, or from ethnic or rural backgrounds. After providing basic information about UCB banking, the proportion of respondents who indicated they had decided whether or not to donate or store UCB more than doubled from 30.0 to 67.7 percent. Basic information for parents about UCB banking can affect planned decisions about UCB banking. Information should be accurate and balanced, should counter misconceptions, and should target specific groups. © 2014 Wiley Periodicals, Inc.

  9. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  10. Magnetically assisted chemical separation (MACS) process: Preparation and optimization of particles for removal of transuranic elements

    International Nuclear Information System (INIS)

    Nunez, L.; Kaminski, M.; Bradley, C.; Buchholz, B.A.; Aase, S.B.; Tuazon, H.E.; Vandegrift, G.F.; Landsberger, S.

    1995-05-01

    The Magnetically Assisted Chemical Separation (MACS) process combines the selectivity afforded by solvent extractants with magnetic separation by using specially coated magnetic particles to provide a more efficient chemical separation of transuranic (TRU) elements, other radionuclides, and heavy metals from waste streams. Development of the MACS process uses chemical and physical techniques to elucidate the properties of particle coatings and the extent of radiolytic and chemical damage to the particles, and to optimize the stages of loading, extraction, and particle regeneration. This report describes the development of a separation process for TRU elements from various high-level waste streams. Polymer-coated ferromagnetic particles with an adsorbed layer of octyl(phenyl)-N,N-diisobutylcarbamoylmethylphosphine oxide (CMPO) diluted with tributyl phosphate (TBP) were evaluated for use in the separation and recovery of americium and plutonium from nuclear waste solutions. Due to their chemical nature, these extractants selectively complex americium and plutonium contaminants onto the particles, which can then be recovered from the solution by using a magnet. The partition coefficients were larger than those expected based on liquid[liquid extractions, and the extraction proceeded with rapid kinetics. Extractants were stripped from the particles with alcohols and 400-fold volume reductions were achieved. Particles were more sensitive to acid hydrolysis than to radiolysis. Overall, the optimization of a suitable NMCS particle for TRU separation was achieved under simulant conditions, and a MACS unit is currently being designed for an in-lab demonstration

  11. Conceptualizing ¬the Abstractions of Earthquakes Through an Instructional Sequence Using SeisMac and the Rapid Earthquake Viewer

    Science.gov (United States)

    Taber, J.; Hubenthal, M.; Wysession, M.

    2007-12-01

    Newsworthy earthquakes provide an engaging hook for students in Earth science classes, particularly when discussing their effects on people and the landscape. However, engaging students in an analysis of earthquakes that extends beyond death and damage, is frequently hampered by the abstraction of recorded ground motion data in the form of raw seismograms and the inability of most students to personally relate to ground accelerations. To overcome these challenges, an educational sequence has been developed using two software tools: SeisMac by Daniel Griscom, and the Rapid Earthquake Viewer (REV) developed by the University of South Carolina in collaboration with IRIS and DLESE. This sequence presents a unique opportunity for Earth Science teachers to "create" foundational experiences for students as they construction a framework of understanding of abstract concepts. The first activity is designed to introduce the concept of a three-component seismogram and to directly address the very abstract nature of seismograms through a kinesthetic experience. Students first learn to take the pulse of their classroom through a guided exploration of SeisMac, which displays the output of the laptop's built-in Sudden Motion Sensor (a 3-component accelerometer). This exploration allows students to view a 3-component seismogram as they move or tap the laptop and encourages them to propose and carry out experiments to explain the meaning of the 3-component seismogram. Once completed students are then asked to apply this new knowledge to a real 3-component seismogram printed from REV. Next the activity guides students through the process of identifying P and S waves and using SeisMac to connect the physical motion of the laptop to the "wiggles" they see on the SeisMac display and then comparing those to the "wiggles" they see on their seismogram. At this point students are more fully prepared to engage in an S-P location exercise such as those included in many state standards

  12. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  13. Donating umbilical cord blood to a public bank or storing it in a private bank: knowledge and preference of blood donors and of pregnant women.

    Science.gov (United States)

    Screnci, Maria; Murgi, Emilia; Pirrè, Guglielma; Valente, Elisabetta; Gesuiti, Paola; Corona, Francesca; Girelli, Gabriella

    2012-07-01

    Umbilical cord blood (UCB) is a source of stem cells for allogeneic haematopoietic transplantation in paediatric and adult patients with haematological malignancies and other indications. Voluntary donation is the basis for the success of unrelated UCB transplantation programmes. In the last few years a growing number of private banks offer their services to expectant parents, to store UCB for future use. The debate concerning UCB donation and private preservation has been ongoing for several years. The aims of this single centre study were to explore knowledge about UCB stem cells and attitudes towards voluntary UCB donation or private UCB preservation among both blood donors and pregnant women. This study was conducted at the "Sapienza" University of Rome. Two types of anonymous questionnaires were prepared: one type was administered to 1,000 blood donors while the other type was distributed to 300 pregnant women. Most blood donors as well as the majority of pregnant women had some general knowledge about UCB (89% and 93%, respectively) and were aware of the possibility of donating it (82% and 95%). However, the level of knowledge regarding current therapeutic use resulted generally low, only 91 (10%) among informed blood donors and 69 (31%) among informed pregnant women gave a correct answer. The survey revealed a preference for voluntary donation both among blood donors (76%) and among pregnant woman (55%). Indeed, a minority of blood donors (6.5%) and of pregnant women (9%) would opt to store UCB for private use. The study raises the following considerations: (i) the large support for UCB donation expressed by blood donors and by pregnant women suggests that UCB preservation does not represent an obstacle to the expansion of UCB donation and to development of unrelated transplantation programmes; (ii) information about UCB donation and preservation should be carefully given by professionals and institutions.

  14. Towards a simple characterization of the Chern-Schwartz-MacPherson class

    OpenAIRE

    Fullwood, James; Wang, Dongxu

    2016-01-01

    For a large class of possibly singular complete intersections we prove a formula for their Chern-Schwartz-MacPherson classes in terms of a single blowup along a scheme supported on the singular loci of such varieties. In the hypersurface case our formula recovers a formula of Aluffi proven in 1996. As our formula is in no way tailored to the complete intersection hypothesis, we conjecture that it holds for all closed subschemes of a smooth variety. If in fact true, such a formula would provid...

  15. The Big Mac Index 21 Years On: An Evaluation of Burgereconomics

    OpenAIRE

    Kenneth W. Clements; Yihui Lan; Shi Pei Seah

    2007-01-01

    The Big Mac Index, introduced by The Economist magazine 21 years ago, claims to provide the “true value” of a large number of currencies. This paper assesses the economic value of this index. We show that (i) the index suffers from a substantial bias; (ii) once the bias is allowed for, the index tracks exchange rates reasonably well over the medium to longer term in accordance with relative purchasing power parity theory; (iii) the index is at least as good as the industry standard, the rando...

  16. National study of microphthalmia, anophthalmia, and coloboma (MAC) in Scotland: investigation of genetic aetiology

    Science.gov (United States)

    Morrison, D; FitzPatrick, D; Hanson, I; Williamson, K; van Heyningen, V; Fleck, B; Jones, I; Chalmers, J; Campbell, H

    2002-01-01

    We report an epidemiological and genetic study attempting complete ascertainment of subjects with microphthalmia, anophthalmia, and coloboma (MAC) born in Scotland during a 16 year period beginning on 1 January 1981. A total of 198 cases were confirmed giving a minimum live birth prevalence of 19 per 100 000. One hundred and twenty-two MAC cases (61.6%) from 115 different families were clinically examined and detailed pregnancy, medical, and family histories obtained. A simple, rational, and apparently robust classification of the eye phenotype was developed based on the presence or absence of a defect in closure of the optic (choroidal) fissure. A total of 85/122 (69.7%) of cases had optic fissure closure defects (OFCD), 12/122 (9.8%) had non-OFCD, and 25/122 (20.5%) had defects that were unclassifiable owing to the severity of the corneal or anterior chamber abnormality. Segregation analysis assuming single and multiple incomplete ascertainment, respectively, returned a sib recurrence risk of 6% and 10% in the whole group and 8.1% and 13.3% in the OFCD subgroup. Significant recurrence risks were found in both unilateral and bilateral disease. In four families, one parent had an OFCD, two of which were new diagnoses in asymptomatic subjects. All recurrences in first degree relatives occurred in the OFCD group with a single first cousin recurrence seen in the non-OFCD group. A total of 84/122 of the MAC cases were screened for mutations in the coding regions of PAX6, CHX10, and SIX3. No pathogenic mutations were identified in the OFCD cases. A single PAX6 homeodomain missense mutation was identified in a subject with partial aniridia that had been initially misclassified as coloboma. PMID:11826019

  17. 78 FR 65145 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Capital Planning

    Science.gov (United States)

    2013-10-31

    ... capital adequacy and capital planning. \\4\\ Bank for International Settlements, Basel Committee on Banking....60--Corporate Business Planning The Farm Credit Council commented that our reference to ``goals and.... 652.60 to read as follows: Sec. 652.60 Corporate business planning. (a) Farmer Mac's board of...

  18. Effect of a therapeutic maximum allowable cost (MAC) program on the cost and utilization of proton pump inhibitors in an employer-sponsored drug plan in Canada.

    Science.gov (United States)

    Mabasa, Vincent H; Ma, Johnny

    2006-06-01

    Therapeutic maximum allowable cost (MAC) is a managed care intervention that uses reference pricing in a therapeutic class or category of drugs or an indication (e.g., heartburn). Therapeutic MAC has not been studied in Canada or the United States. The proton pump inhibitor (PPI) rabeprazole was used as the reference drug in this therapeutic MAC program based on prices for PPIs in the province of Ontario. No PPI is available over the counter in Canada. To evaluate the utilization and anticipated drug cost savings for PPIs in an employer-sponsored drug plan in Canada that implemented a therapeutic MAC program for PPIs. An employer group with an average of 6,300 covered members, which adopted the MAC program for PPIs in June 2003, was compared with a comparison group comprising the book of business throughout Canada (approximately 5 million lives) without a PPI MAC program (non-MAC group). Pharmacy claims for PPIs were identified using the first 6 characters of the generic product identifier (GPI 492700) for a 36-month period from June 1, 2002, through May 31, 2005. The primary comparison was the year prior to the intervention (from June 1, 2002, through May 31, 2003) and the first full year following the intervention (June 1, 2004, through May 31, 2005). Drug utilization was evaluated by comparing the market share of each of the PPIs for the 2 time periods and by the days of PPI therapy per patient per year (PPPY) and days of therapy per prescription (Rx). Drug cost was defined as the cost of the drug (ingredient cost), including allowable provincial pharmacy markup but excluding pharmacy dispense fee. Cost savings were calculated from the allowed drug cost per claim, allowed cost per day, and allowed cost PPPY. (All amounts are in Canadian dollars.) The MAC intervention group experienced an 11.7% reduction in the average cost per day of PPI drug therapy, from 2.14 US dollars in the preperiod to 1.89 US dollars in the postperiod, compared with a 3.7% reduction in

  19. A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast

    Institute of Scientific and Technical Information of China (English)

    ZHAO Anjun; LU Xiangli; GUO Lei

    2006-01-01

    A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

  20. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  1. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chongqing Zhang

    2017-05-01

    Full Text Available Wireless body area networks (WBANs are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic.

  2. Intra Cluster Light properties in the CLASH-VLT cluster MACS J1206.2-0847

    CERN Document Server

    Presotto, V; Nonino, M; Mercurio, A; Grillo, C; Rosati, P; Biviano, A; Annunziatella, M; Balestra, I; Cui, W; Sartoris, B; Lemze, D; Ascaso, B; Moustakas, J; Ford, H; Fritz, A; Czoske, O; Ettori, S; Kuchner, U; Lombardi, M; Maier, C; Medezinski, E; Molino, A; Scodeggio, M; Strazzullo, V; Tozzi, P; Ziegler, B; Bartelmann, M; Benitez, N; Bradley, L; Brescia, M; Broadhurst, T; Coe, D; Donahue, M; Gobat, R; Graves, G; Kelson, D; Koekemoer, A; Melchior, P; Meneghetti, M; Merten, J; Moustakas, L; Munari, E; Postman, M; Regős, E; Seitz, S; Umetsu, K; Zheng, W; Zitrin, A

    2014-01-01

    We aim at constraining the assembly history of clusters by studying the intra cluster light (ICL) properties, estimating its contribution to the fraction of baryons in stars, f*, and understanding possible systematics/bias using different ICL detection techniques. We developed an automated method, GALtoICL, based on the software GALAPAGOS to obtain a refined version of typical BCG+ICL maps. We applied this method to our test case MACS J1206.2-0847, a massive cluster located at z=0.44, that is part of the CLASH sample. Using deep multi-band SUBARU images, we extracted the surface brightness (SB) profile of the BCG+ICL and we studied the ICL morphology, color, and contribution to f* out to R500. We repeated the same analysis using a different definition of the ICL, SBlimit method, i.e. a SB cut-off level, to compare the results. The most peculiar feature of the ICL in MACS1206 is its asymmetric radial distribution, with an excess in the SE direction and extending towards the 2nd brightest cluster galaxy which i...

  3. Functional classifications for cerebral palsy: correlations between the gross motor function classification system (GMFCS), the manual ability classification system (MACS) and the communication function classification system (CFCS).

    Science.gov (United States)

    Compagnone, Eliana; Maniglio, Jlenia; Camposeo, Serena; Vespino, Teresa; Losito, Luciana; De Rinaldis, Marta; Gennaro, Leonarda; Trabacca, Antonio

    2014-11-01

    This study aimed to investigate a possible correlation between the gross motor function classification system-expanded and revised (GMFCS-E&R), the manual abilities classification system (MACS) and the communication function classification system (CFCS) functional levels in children with cerebral palsy (CP) by CP subtype. It was also geared to verify whether there is a correlation between these classification systems and intellectual functioning (IF) and parental socio-economic status (SES). A total of 87 children (47 males and 40 females, age range 4-18 years, mean age 8.9±4.2) were included in the study. A strong correlation was found between the three classifications: Level V of the GMFCS-E&R corresponds to Level V of the MACS (rs=0.67, p=0.001); the same relationship was found for the CFCS and the MACS (rs=0.73, p<0.001) and for the GMFCS-E&R and the CFCS (rs=0.61, p=0.001). The correlations between the IQ and the global functional disability profile were strong or moderate (GMFCS and IQ: rs=0.66, p=0.001; MACS and IQ: rs=0.58, p=0.001; CFCS and MACS: rs=0.65, p=0.001). The Kruskal-Wallis test was used to determine if there were differences between the GMFCS-E&R, the CFCS and the MACS by CP type. CP types showed different scores for the IQ level (Chi-square=8.59, df=2, p=0.014), the GMFCS-E&R (Chi-square=36.46, df=2, p<0.001), the CFCS (Chi-square=12.87, df=2, p=0.002), and the MACS Level (Chi-square=13.96, df=2, p<0.001) but no significant differences emerged for the SES (Chi-square=1.19, df=2, p=0.554). This study shows how the three functional classifications (GMFCS-E&R, CFCS and MACS) complement each other to provide a better description of the functional profile of CP. The systematic evaluation of the IQ can provide useful information about a possible future outcome for every functional level. The SES does not appear to affect functional profiles. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Human Umbilical Cord Blood Serum Has Higher Potential in Inducing Proliferation of Fibroblast than Fetal Bovine Serum

    Directory of Open Access Journals (Sweden)

    Ferry Sandra

    2017-09-01

    Full Text Available Background: Cytokines and growth factors were reported to play an important role in stimulating fibroblast proliferation. In vitro culture, fibroblast is mostly culture in medium containing fetal bovine serum (FBS.  Human umbilical cord blood (hUCB has been reported to have low immunogenic property and potential in wound healing, so therefore hUCB serum (hUCBS could be potential and were investigated in current study. Materials and Methods: Five hUCBs were collected from healthy volunteers with normal delivering procedure. hUCB was ex utero immediately collected from umbilical vein in vacutainers and processed. NIH3T3 cells were cultured in DMEM with 10% FBS or 5-20% hUCBS for 48 hours. Cells were then quantified using MTT assay. Protein concentration of FBS and hUCBS were quantified using Bradford assay. Results: NIH3T3 cells density grown in DMEM with 10% FBS was the lowest. NIH3T3 cells densities were increased along with the increment of hUCBS concentrations. MTT results showed that average number of NIH3T3 cells grown in DMEM with 10% FBS was 6,185±1,243. Meanwhile average numbers of NIH3T3 cells grown in DMEM with 5%, 10% and 20% hUCBS were 8,126±628, 9,685±313 and 12,200±304, respectively. Average numbers of NIH3T3 cells grown in DMEM with 5% hUCBS were significantly higher than the ones with 10% FBS (p=0.000. Bradford results showed that concentration of hUCBS was significantly higher than the one of FBS (p=0.000. Conclusion: hUCBS could induce higher proliferation rate of NIH3T3 cells than FBS. Hence hUCBS could be suggested as an alternate of FBS in inducing fibroblast. Keywords: NIH3T3, fibroblast, UCB, serum, FBS, proliferation

  5. The activation of autophagy protects neurons and astrocytes against bilirubin-induced cytotoxicity.

    Science.gov (United States)

    Qaisiya, Mohammed; Mardešić, Paula; Pastore, Beatrice; Tiribelli, Claudio; Bellarosa, Cristina

    2017-11-20

    Unconjugated bilirubin (UCB) neurotoxicity involves oxidative stress, calcium signaling and ER-stress. The same insults can also induce autophagy, a process of "self-eating", with both a pro-survival or a pro-apoptotic role. Our aim was to study the outcome of autophagy activation by UCB in the highly sensitive neuronal SH-SY5Y cells and in the resistant astrocytoma U87 cells. Upon treatment with a toxic dose of UCB, the conversion of LC3-I to LC3-II was detected in both cell lines. Inhibition of autophagy by E64d before UCB treatment increased SH-SY5Y cell mortality and made U87 cells sensitive to UCB. In SH-SY5Y autophagy related genes ATG8 (5 folds), ATG18 (5 folds), p62 (3 folds) and FAM 129A (4.5 folds) were induced 8h after UCB treatment while DDIT4 upregulation (13 folds) started at 4h. mTORC1 inactivation by UCB was confirmed by phosphorylation of 4EBP1. UCB induced LC3-II conversion was completely prevented by pretreating cells with the calcium chelator BAPTA and reduced by 65% using the ER-stress inhibitor 4-PBA. Pretreatment with the PKC inhibitor reduced LC3 mRNA by 70% as compared to cells exposed to UCB alone. Finally, autophagy induction by Trifluoroperazine (TFP) increased the cell viability of rat hippocampal primary neurons upon UCB treatment from 60% to 80%. In SH-SY5Y cells, TFP pretreatment blocked the UCB-induced cleaved caspase-3 protein expression, decreased LDH release from 50% to 23%, reduced the UCB-induction of HO1, CHOP and IL-8 mRNAs by 85%, 70% and 97%. Collectively these data indicate that the activation of autophagy protects neuronal cells from UCB cytotoxicity. The mechanisms of autophagy activation by UCB involves mTOR/ER-stress/PKC/calcium signaling. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. The Superconvergence Phenomenon and Proof of the MAC Scheme for the Stokes Equations on Non-uniform Rectangular Meshes

    KAUST Repository

    Li, Jichun

    2014-12-02

    For decades, the widely used finite difference method on staggered grids, also known as the marker and cell (MAC) method, has been one of the simplest and most effective numerical schemes for solving the Stokes equations and Navier–Stokes equations. Its superconvergence on uniform meshes has been observed by Nicolaides (SIAM J Numer Anal 29(6):1579–1591, 1992), but the rigorous proof is never given. Its behavior on non-uniform grids is not well studied, since most publications only consider uniform grids. In this work, we develop the MAC scheme on non-uniform rectangular meshes, and for the first time we theoretically prove that the superconvergence phenomenon (i.e., second order convergence in the (Formula presented.) norm for both velocity and pressure) holds true for the MAC method on non-uniform rectangular meshes. With a careful and accurate analysis of various sources of errors, we observe that even though the local truncation errors are only first order in terms of mesh size, the global errors after summation are second order due to the amazing cancellation of local errors. This observation leads to the elegant superconvergence analysis even with non-uniform meshes. Numerical results are given to verify our theoretical analysis.

  7. The role of MAC1 in diesel exhaust particle-induced microglial activation and loss of dopaminergic neuron function.

    Science.gov (United States)

    Levesque, Shannon; Taetzsch, Thomas; Lull, Melinda E; Johnson, Jo Anne; McGraw, Constance; Block, Michelle L

    2013-06-01

    Increasing reports support that air pollution causes neuroinflammation and is linked to central nervous system (CNS) disease/damage. Diesel exhaust particles (DEP) are a major component of urban air pollution, which has been linked to microglial activation and Parkinson's disease-like pathology. To begin to address how DEP may exert CNS effects, microglia and neuron-glia cultures were treated with either nanometer-sized DEP (neuron function was assessed. All three treatments showed enhanced ameboid microglia morphology, increased H2 O2 production, and decreased DA uptake. Mechanistic inquiry revealed that the scavenger receptor inhibitor fucoidan blocked DEP internalization in microglia, but failed to alter DEP-induced H2 O2 production in microglia. However, pre-treatment with the MAC1/CD11b inhibitor antibody blocked microglial H2 O2 production in response to DEP. MAC1(-/-) mesencephalic neuron-glia cultures were protected from DEP-induced loss of DA neuron function, as measured by DA uptake. These findings support that DEP may activate microglia through multiple mechanisms, where scavenger receptors regulate internalization of DEP and the MAC1 receptor is mandatory for both DEP-induced microglial H2 O2 production and loss of DA neuron function. © 2013 International Society for Neurochemistry.

  8. Infecting Windows, Linux & Mac in one go

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  9. Comparison of the force applied on oral structures during intubation attempts by novice physicians between the Macintosh direct laryngoscope, Airway Scope and C-MAC PM: a high-fidelity simulator-based study.

    Science.gov (United States)

    Nakanishi, Taizo; Shiga, Takashi; Homma, Yosuke; Koyama, Yasuaki; Goto, Tadahiro

    2016-05-23

    We examined whether the use of Airway Scope (AWS) and C-MAC PM (C-MAC) decreased the force applied on oral structures during intubation attempts as compared with the force applied with the use of Macintosh direct laryngoscope (DL). Prospective cross-over study. A total of 35 novice physicians participated. We used 6 simulation scenarios based on the difficulty of intubation and intubation devices. Our primary outcome measures were the maximum force applied on the maxillary incisors and tongue during intubation attempts, measured by a high-fidelity simulator. The maximum force applied on maxillary incisors was higher with the use of the C-MAC than with the DL and AWS in the normal airway scenario (DL, 26 Newton (N); AWS, 18 N; C-MAC, 52 N; p<0.01) and the difficult airway scenario (DL, 42 N; AWS, 24 N; C-MAC, 68 N; p<0.01). In contrast, the maximum force applied on the tongue was higher with the use of the DL than with the AWS and C-MAC in both airway scenarios (DL, 16 N; AWS, 1 N; C-MAC, 7 N; p<0.01 in the normal airway scenario; DL, 12 N; AWS, 4 N; C-MAC, 7 N; p<0.01 in the difficult airway scenario). The use of C-MAC, compared with the DL and AWS, was associated with the higher maximum force applied on maxillary incisors during intubation attempts. In contrast, the use of video laryngoscopes was associated with the lower force applied on the tongue in both airway scenarios, compared with the DL. Our study was a simulation-based study, and further research on living patients would be warranted. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  10. Gene expression profiles of cryopreserved CD34{sup +} human umbilical cord blood cells are related to their bone marrow reconstitution abilities in mouse xenografts

    Energy Technology Data Exchange (ETDEWEB)

    Sudo, Kazuhiro [Cell Engineering Division, RIKEN BioResource Center, Tsukuba (Japan); Yasuda, Jun, E-mail: yasuda-jun@umin.ac.jp [Omics Science Center, RIKEN, Yokohama (Japan); Department of Cell Biology, The JFCR-Cancer Institute (Japan); Nakamura, Yukio, E-mail: yukionak@brc.riken.jp [Cell Engineering Division, RIKEN BioResource Center, Tsukuba (Japan)

    2010-07-09

    Human umbilical cord blood (UCB) cells are an alternative source of hematopoietic stem cells for treatment of leukemia and other diseases. It is very difficult to assess the quality of UCB cells in the clinical situation. Here, we sought to assess the quality of UCB cells by transplantation to immunodeficient mice. Cryopreserved CD34{sup +} UCB cells from twelve different human donors were transplanted into sublethally irradiated NOD/shi-scid Jic mice. In parallel, the gene expression profiles of the UCB cells were determined from oligonucleotide microarrays. UCB cells from three donors failed to establish an engraftment in the host mice, while the other nine succeeded to various extents. Gene expression profiling indicated that 71 genes, including HOXB4, C/EBP-{beta}, and ETS2, were specifically overexpressed and 23 genes were suppressed more than 2-fold in the successful UCB cells compared to those that failed. Functional annotation revealed that cell growth and cell cycle regulators were more abundant in the successful UCB cells. Our results suggest that hematopoietic ability may vary among cryopreserved UCB cells and that this ability can be distinguished by profiling expression of certain sets of genes.

  11. Ultrasonication of pyrogenic microorganisms improves the detection of pyrogens in the Mono Mac 6 assay

    DEFF Research Database (Denmark)

    Moesby, Lise; Hansen, E W; Christensen, J D

    2000-01-01

    The monocytic cell line Mono Mac 6 is sensitive to pyrogens. When exposed to pyrogens secretion of interleukin-6 is induced. However, some eukaryotic pyrogenic microorganisms are not detectable. The aim of this study is to introduce a pretreatment of samples to expand the detection range of the a...

  12. Mac-1low early myeloid cells in the bone marrow-derived SP fraction migrate into injured skeletal muscle and participate in muscle regeneration

    International Nuclear Information System (INIS)

    Ojima, Koichi; Uezumi, Akiyoshi; Miyoshi, Hiroyuki; Masuda, Satoru; Morita, Yohei; Fukase, Akiko; Hattori, Akihito; Nakauchi, Hiromitsu; Miyagoe-Suzuki, Yuko; Takeda, Shin'ichi

    2004-01-01

    Recent studies have shown that bone marrow (BM) cells, including the BM side population (BM-SP) cells that enrich hematopoietic stem cells (HSCs), are incorporated into skeletal muscle during regeneration, but it is not clear how and what kinds of BM cells contribute to muscle fiber regeneration. We found that a large number of SP cells migrated from BM to muscles following injury in BM-transplanted mice. These BM-derived SP cells in regenerating muscles expressed different surface markers from those of HSCs and could not reconstitute the mouse blood system. BM-derived SP/Mac-1 low cells increased in number in regenerating muscles following injury. Importantly, our co-culture studies with activated satellite cells revealed that this fraction carried significant potential for myogenic differentiation. By contrast, mature inflammatory (Mac-1 high ) cells showed negligible myogenic activities. Further, these BM-derived SP/Mac-1 low cells gave rise to mononucleate myocytes, indicating that their myogenesis was not caused by stochastic fusion with host myogenic cells, although they required cell-to-cell contact with myogenic cells for muscle differentiation. Taken together, our data suggest that neither HSCs nor mature inflammatory cells, but Mac-1 low early myeloid cells in the BM-derived SP fraction, play an important role in regenerating skeletal muscles

  13. Dove sta andando l'analisi musicale? Riflessioni sul VII EuroMac

    Directory of Open Access Journals (Sweden)

    Mario Baroni

    2014-01-01

    Full Text Available Come tutti i lettori della Rivista ormai sapranno, si è svolto a Roma dal 29 settembre al 2 ottobre di quest’anno, presso il Conservatorio di S. Cecilia, il settimo convegno europeo di analisi musicale (VII European Music Analysis Conference ossia VII EuroMac. Nel convegno, organizzato dal GATM e diretto da Giorgio Sanguinetti, sono state presentate 197 relazioni e svolti otto laboratori. Tutti i materiali sono stati riassunti in un volume (Programme and Abstract Book, Iter Edizioni di Subiaco curato da Egidio Pozzi e Antonio Cascelli.

  14. Swyer- James -MacLeod syndrome presenting as hemoptysis in an adult

    Directory of Open Access Journals (Sweden)

    Santosh Kumar

    2012-01-01

    Full Text Available Swyer-James/MacLeod syndrome is an uncommon disease with characteristic radiological feature of unilateral hyperlucency due to loss of pulmonary vasculature and air trapping. Typically, this disorder is diagnosed in childhood during evaluations for recurrent respiratory infections. Here, we report a case in a 30-year-old adult female who presented with dyspnoea, cough with expectoration and recurrent hemoptysis due to associated bronchiectasis. This case highlights the importance of computed tomography in the diagnostic workup of recurrent hemoptysis in pulmonary tuberculosis epidemic countries like India

  15. Cord Blood Banking and Transplantation in China: A Ten Years Experience of a Single Public Bank.

    Science.gov (United States)

    Liu, Jinhui; He, Ji; Chen, Shu; Qin, Fei; Wang, Fang; Xu, Gang; Zhu, Faming; Lv, Hangjun; Yan, Lixing

    2012-02-01

    BACKGROUND: Umbilical cord blood (UCB) has successfully used for transplantation to treat hematologic malignancies and genetic diseases. Herein, we describe the experience generated in a single public UCB bank at Zhejiang Province in China. METHODS: Good manufacturing practice and standard operating procedures were used to address donor selection as well as UCB collection, processing, and cryopreservation. Total nucleated cells (TNCs), cellular viability, CD34+ cells, and colony-forming units were determined, and infectious diseases screening test, sterility test, and HLA typing for UCB units were done. RESULTS: Only 18.51% of all collected UCB units met storage criteria, and 7,056 UCB units were cryopreserved in 10 years. The volume of UCB units was 95.0 ± 22.0 ml. The number of TNCs before and after processing was 13.32 ± 3.63 × 10(8) and 10.63 ± 2.80 × 10(8), respectively, and the recovery rate was 80.71 ± 11.26%. 0.4344 ± 0.1874% of the TNCs were CD34+ cells. The CFU-GM was 32.1 ± 28.0 colonies per 1 × 10(5) nucleated cells. Based mainly on HLA and nucleated cell content, 26 UCB units were released for transplantation. CONCLUSIONS: A public UCB bank was successfully established in China; collection and processing of UCB units should be optimized in order to gain maximum volume and cell count.

  16. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  17. Numerical Simulation of the Dynamical Conductivity of One-Dimensional Disordered Systems by MacKinnon’s Method

    Science.gov (United States)

    Saso, Tetsuro; Kim, C. I.; Kasuya, Tadao

    1983-06-01

    Report is given on a computer simulation of the dynamical conductivity σ(ω) of one-dimensional disordered systems with up to 106 sites by MacKinnon’s method. A comparison is made with the asymptotically exact solution valid for weak disorder by Berezinskii.

  18. Assessing the effectiveness of low-pressure ultraviolet light for inactivating Mycobacterium avium complex (MAC) micro-organisms

    Science.gov (United States)

    Aims: To assess low-pressure ultraviolet light (LP-UV) inactivation kinetics of Mycobacterium avium complex (MAC) strains in a water matrix using collimated beam apparatus. Methods and Results: Strains of M. avium (n = 3) and Mycobacterium intracellulare (n = 2) were exposed t...

  19. Análisis de decisiones de inversión utilizando el criterio valor presente neto en riesgo (VPN en riesgo

    Directory of Open Access Journals (Sweden)

    Diego Fernando Manotas Duque

    2009-01-01

    Full Text Available Las decisiones estratégicas de inversión son actividades cruciales para el desarrollo de una organización. Los proyectos de inversión se encuentran expuestos a diversos tipos de riesgo: financiero, político, de mercado, entre otros. Aunque se pueden mencionar varios tipos de metodologías de medición que intentan incluir el riesgo en la valoración de proyectos, la mayoría de ellas tiene falencias, que en todo caso pueden ser abordadas para dar lugar a mejores indicadores de bondad económica y financiera. El presente trabajo aborda el problema de valoración económica de proyectos, y en particular, los problemas del indicador de utilidad económica, Valor Presente Neto (VPN cuando se calcula sobre un único escenario estático del proyecto. Mediante una combinación del cálculo del costo promedio ponderado de capital (CPPC -Weighted Average Cost of Capital (WACC- y el uso de métodos de valoración de riesgo que tienen en cuenta la relación entre riesgo- retorno esperado, el resultado principal que se obtiene en este trabajo es un método de evaluación de proyectos, con aplicación principalmente en decisiones estratégicas del sector real, que incluye explícitamente la valoración del riesgo inherente a tales decisiones. Para ilustrar el criterio propuesto, se presentan dos casos de aplicación, el primero sobre selección de tecnología y el segundo sobre decisiones de renovación de cultivos de caña de azúcar.

  20. A randomized controlled trial comparing C Mac D Blade and Macintosh laryngoscope for nasotracheal intubation in patients undergoing surgeries for head and neck cancer.

    Science.gov (United States)

    Hazarika, Hrishikesh; Saxena, Anudeep; Meshram, Pradeep; Kumar Bhargava, Ajay

    2018-01-01

    Several devices are available to take care of difficult airway, but C-MAC D-Blade has scant evidence of its use in nasotracheal intubation in a difficult airway scenario. We compared the C-MAC D-Blade videolaryngoscope ™ , and the standard Macintosh laryngoscope for nasal intubation in patients with difficult airways selected by El-Ganzouri risk index using parameters of time and attempts required for intubation, glottic view in terms of Cormack-Lehane grade, ease of intubation, success rate, use of accessory maneuvers, incidence of complications, and hemodynamic changes. One hundred American Society of Anesthesiologists (ASA) I-III patients aged 20-70 years with EGRI score 1-≤7 scheduled for head and neck surgery requiring nasal intubation. ASA IV patients, patients with mouth opening <2.5 cm, patients difficult to mask ventilate, and patients with hyperkalemia and history of malignant hyperthermia were excluded from the study. Primary outcome was time taken to intubation, and secondary outcomes were a number of attempts, glottic view in terms of C/L grade, use of accessory maneuvers, success rate, incidence of trauma, ease of intubation, and hemodynamic changes before and after intubation. Time required for intubation was less (39.56 ± 15.65 s) in Group C than in Group M (50.34 ± 15.65 s). Cormack-Lehane Grade I and II view were more in C-MAC D-Blade group ( P < 0.05). Success rate and ease of intubation were found to be more in C-MAC D-Blade group than in Macintosh group ( P < 0.05). A number of attempts and incidence of complications such as trauma, bleeding, and failed intubation were greater in Macintosh group than in C-MAC D-Blade group. Hemodynamic changes were observed to be comparable in both the groups. C-MAC D-Blade videolaryngoscope ™ is a better tool in anesthetic management of difficult airway for nasal intubation compared to conventional Macintosh laryngoscope.

  1. [Pulmonary Mycobacterium Avium-Complex (MAC) Disease Differentially Diagnosed from Metastasis of Testicular Cancer : A Case Report].

    Science.gov (United States)

    Mori, Kohei; Teranishi, Jyn-Ichi; Yoneyama, Shuko; Ishida, Hiroaki; Hattori, Yusuke; Yumura, Yasushi; Miyoshi, Yasuhide; Kondo, Keiichi; Uemura, Hiroji; Noguchi, Kazumi

    2017-01-01

    A 45 year-old-man was admitted to our hospital because of discomfort in his left scrotum. He had a left testicular tumor. We performed high orchiectomy and pathological findings revealed testicular cancer. He was treated with bleomycin, etoposide and cisplatin. Computed tomography showed a new mass in the left lung after 3 cycles of the chemotherapy. Because of its rapid growth, the tumor was thought to be a metastasis lesion of testicular cancer or pulmonary infection. Transbronchial lung biopsy showed an invasion of multinucleated giant cells and granuloma. The culture and polymerase chain reaction of the bronchial sputum were positive for myobacterium avium-complex (MAC). From these findings, the left lung tumor was diagnosed as pulmonary MAC disease. He received partial resection of the left lung and the lesion was diagnosed as granuloma. There was no recurrence of testicular cancer or pulmonary disease after the surgery.

  2. Antimoulting Activity of Eremanthus erythropappus (DC. MacLeisch

    Directory of Open Access Journals (Sweden)

    Danielle Barbosa

    2012-06-01

    Resumo. Os extratos e metabólitos secundários de plantas podem agir como agentes tóxicos e inibidores do da alimentação e do desenvolvimento em insetos. Neste estudo foi utilizado Oncopeltus fasciatus (Dallas (Hemiptera como modelo experimental a fim de avaliar as atividades do extrato etanólico bruto e frações obtidos das flores ou caules de Eremanthus erythropappus (DC. MacLeisch (Asteraceae, na mortalidade e sobre o desenvolvimento do inseto. A fração butanólica obtida do extrato etanólico mostrou toxidade sobre as ninfas de O. fasciatus, bem como atividade de inibição do crescimento. Os resultados sugerem que a fração butanólica de E. erythropappus possui substâncias ativas sobre a fisiologia, crescimento e desenvolvimento de insetos.

  3. 76 FR 35138 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Risk-Based...

    Science.gov (United States)

    2011-06-16

    ... Funding and Fiscal Affairs; Farmer Mac Risk-Based Capital Stress Test, Version 5.0 AGENCY: Farm Credit... credit rating agency) in regulations addressing the Risk-Based Capital Stress Test (RBCST or stress test...) (repealing and replacing Pub. L. 110-234). B. Risk-Based Capital and Credit Ratings Under our rules, Farmer...

  4. The MacNuclide nuclear data environment

    International Nuclear Information System (INIS)

    Stone, C.A.

    1992-01-01

    Advance in technology have produced intriguing tools that can be applied to problems in nuclear science. Information management in nuclear science is an example of how technology is not quickly exploited. The U.S. Department of Energy supports an extensive program to evaluate published nuclear properties and store them in an electronic data base. Much of the evaluation effort has focused on producing the journal Nuclear Data Sheets and the publication Table of Isotopes. Although the electronic data base can itself be a valuable source of information, the software used to access is was designed using decades-old technologies. The authors of this paper have developed a novel data-base management system for nuclear properties. The application is known as MacNuclide. It is a nuclear data-base environment that uses the highly interactive and intuitive windowing environmentsof desk-top computers. The environment is designed around that image of the chart of nuclides. Questions are posed to the data base by placing constraints on properties and defining collections of nuclides to be used in data-base seraches. Results are displayed either as a simple list of nuclides that meet the imposed constraints or as a color chart of nuclides

  5. Reasons for exclusion of 6820 umbilical cord blood donations in a public cord blood bank.

    Science.gov (United States)

    Wang, Tso-Fu; Wen, Shu-Hui; Yang, Kuo-Liang; Yang, Shang-Hsien; Yang, Yun-Fan; Chang, Chu-Yu; Wu, Yi-Feng; Chen, Shu-Huey

    2014-01-01

    To provide information for umbilical cord blood (UCB) banks to adopt optimal collection strategies and to make UCB banks operate efficiently, we investigated the reasons for exclusion of UCB units in a 3-year recruitment period. We analyzed records of the reasons for exclusion of the potential UCB donation from 2004 to 2006 in the Tzu-Chi Cord Blood Bank and compared the results over 3 years. We grouped these reasons for exclusion into five phases, before collection, during delivery, before processing, during processing, and after freezing according to the time sequence and analyzed the reasons at each phase. Between 2004 and 2006, there were 10,685 deliveries with the intention of UCB donation. In total, 41.2% of the UCB units were considered eligible for transplantation. The exclusion rates were 93.1, 48.4, and 54.1% in 2004, 2005, and 2006, respectively. We excluded 612 donations from women before their child birth, 133 UCB units during delivery, 80 units before processing, 5010 units during processing, and 421 units after freezing. There were 24 UCB units with unknown reasons of ineligibility. Low UCB weight and low cell count were the first two leading causes of exclusion (48.6 and 30.9%). The prevalence of artificial errors, holiday or transportation problem, low weight, and infant problems decreased year after year. The exclusion rate was high at the beginning of our study as in previous studies. Understanding the reasons for UCB exclusion may help to improve the efficiency of UCB banking programs in the future. © 2013 American Association of Blood Banks.

  6. The Evaluation of the Effect of Multiwall Carbon Nano Tube (MWCNT on In Vitro Proliferation and Shoot Tip Necrosis of Pistachio Rootstock UCB-1 (Pistacia integrima × P. atlantica

    Directory of Open Access Journals (Sweden)

    Shahrzad Aghasi Kermani

    2017-05-01

    Full Text Available UCB-1 (Pistacia atlantica × P. integrima is a commercial rootstock for pistachio in some pistachio plantations across the world. This rootstock is very new in Iran and recently, it has been used commercially in some plantations due to its high growth. Propagation of this rootstock by tissue culture results in many limitations such as shoot tip necrosis (STN and a low proliferation rate. Therefore, any process that leads to improve the proliferation rate and feature will be used in commercial propagation of this rootstock. Nanotubes are widely used in in vitro cultures. For this reason, we used different concentrations of carbon nanotubes (0, 50, 100, 150, 200 µg/l and benzyladenine (0, 0.5, 1, 1.5 and 2 mg/l to improve the proliferation rate and qualitative indices. The results showed that using carbon nanotubes concentration of 200 µg/l with 2mg/l of benzyladenine (BA led to maximum proliferation (4 microshoots per explant, maximum shoot length (3.68 cm and minimum STN (8% and vitrification (this isn’t a word? (0 % percentage.

  7. Percy MacKaye’s Civic Theatre: a Pioneer in Theatre Animation and the Pedagogy of Leisure

    Directory of Open Access Journals (Sweden)

    Manuel F. Vieites

    2015-12-01

    Full Text Available In the first two decades of the 20th century the career of Percy MacKaye becomes especially relevant. As a brilliant American scholar and playwright, he formulated a plan for the organization of the theatre that aimed at promoting the social, cultural and educational potential of a theatrical praxis based on the active participation of people, linked to community development. In this paper, born of a critical reading of his theoretical work, we show how the educational, cultural and artistic uses of theatrical practice promoting a constructive leisure, have in MacKaye’s essays a precedent on theoretical and practical grounds. His proposals are still relevant considering today’s challenges, among which it stands out the creation of spaces for meeting and interaction where the community may meet, recognize and recreate itself. His essays become even more significant considering old problems such as the «arrangement of the theatres» and the status of theater education, formulated by enlightened thinkers such as Jovellanos or Moratín, which two centuries later still await an appropriate solution. We close the paper with a set of conclusions where specific proposals concerning those old issues are made. How to reference this article Vieites, M. F. (2016. El teatro cívico de Percy MacKaye: un pionero en la animación teatral y la pedagogía del ocio. Espacio, Tiempo y Educación, 3(1, 421-442. doi: http://dx.doi.org/10.14516/ete.2016.003.001.20

  8. Review: Bilirubin pKa studies; new models and theories indicate high pKa values in water, dimethylformamide and DMSO

    Directory of Open Access Journals (Sweden)

    Ostrow J

    2010-03-01

    Full Text Available Abstract Background Correct aqueous pKa values of unconjugated bilirubin (UCB, a poorly-soluble, unstable substance, are essential for understanding its functions. Our prior solvent partition studies, of unlabeled and [14C] UCB, indicated pKa values above 8.0. These high values were attributed to effects of internal H-bonding in UCB. Many earlier and subsequent studies have reported lower pKa values, some even below 5.0, which are often used to describe the behavior of UCB. We here review 18 published studies that assessed aqueous pKa values of UCB, critically evaluating their methodologies in relation to essential preconditions for valid pKa measurements (short-duration experiments with purified UCB below saturation and accounting for self-association of UCB. Results These re-assessments identified major deficiencies that invalidate the results of all but our partition studies. New theoretical modeling of UCB titrations shows remarkable, unexpected effects of self-association, yielding falsely low pKa estimates, and provides some rationalization of the titration anomalies. The titration behavior reported for a soluble thioether conjugate of UCB at high aqueous concentrations is shown to be highly anomalous. Theoretical re-interpretations of data in DMSO and dimethylformamide show that those indirectly-derived aqueous pKa values are unacceptable, and indicate new, high average pKa values for UCB in non-aqueous media (>11 in DMSO and, probably, >10 in dimethylformamide. Conclusions No reliable aqueous pKa values of UCB are available for comparison with our partition-derived results. A companion paper shows that only the high pKa values can explain the pH-dependence of UCB binding to phospholipids, cyclodextrins, and alkyl-glycoside and bile salt micelles.

  9. The Evolving Landscape of Neurotoxicity by Unconjugated Bilirubin: Role of Glial Cells and Inflammation

    Directory of Open Access Journals (Sweden)

    Dora eBrites

    2012-05-01

    Full Text Available Unconjugated hyperbilirubinemia is a common condition in the first week of postnatal life. Although generally harmless, some neonates may develop very high levels of unconjugated bilirubin (UCB, which may surpass the protective mechanisms of the brain at preventing UCB accumulation. In this case, both short-term and long-term neurodevelopmental disabilities, such as acute and chronic UCB encephalopathy, known as kernicterus, or more subtle alterations designed as bilirubin-induced neurological dysfunction (BIND may be produced. There is a tremendous variability in babies’ vulnerability towards UCB for reasons not yet explained, but preterm birth, sepsis, hypoxia and haemolytic disease are comprised as risk factors. Therefore, UCB levels and neurological abnormalities are not strictly correlated. Even nowadays, the mechanisms of UCB neurotoxicity are still unclear, as are specific biomarkers, and little is known about lasting sequelae attributable to hyperbilirubinemia. On autopsy, UCB was shown to be within neurons, neuronal processes and microglia, and to produce loss of neurons, demyelination and gliosis. In isolated cell cultures, UCB was shown to impair neuronal arborization and to induce the release of proinflammatory cytokines from microglia and astrocytes. However, cell dependent-sensitivity to UCB toxicity and the role of each nerve cell type remain understood. This review provides a comprehensive insight into cell susceptibilities and molecular targets of UCB in neurons, astrocytes, and oligodendrocytes, and on phenotypic and functional responses of microglia to UCB. Interplay among glia elements and cross-talk with neurons, with a special emphasis in the UCB-induced immunostimulation, and the role of sepsis in BIND pathogenesis are highlighted. New and interesting data on the anti-inflammatory and antioxidant activities of different pharmacological agents are also presented, as novel and promising additional therapeutic approaches to

  10. Controversies in hybrid banking: attitudes of Swiss public umbilical cord blood donors toward private and public banking.

    Science.gov (United States)

    Manegold, Gwendolin; Meyer-Monard, Sandrine; Tichelli, André; Granado, Christina; Hösli, Irene; Troeger, Carolyn

    2011-07-01

    Umbilical cord blood (UCB) stored in public inventories has become an alternative stem cell source for allogeneic stem cell transplantation. The potential use of autologous UCB from private banks is a matter of debate. In the face of the limited resources of public inventories, a discussion on "hybrid" public and private UCB banking has evolved. We aimed to explore the attitudes of the donating parents toward public and private UCB banking. A standardized, anonymous questionnaire was sent to the most recent 621 public UCB donors including items regarding satisfaction with recruitment process, the need for a second consent before release of the UCB unit for stem cell transplantation, and the donors' views on public and private UCB banking. Furthermore, we asked about their views on UCB research. Of the questionnaires, 48% were returned, and 16% were lost due to mail contact. Of our donors, 95% would donate to the public bank again. As much as 35% of them were convinced that public banking was useful. Whereas 27% had never heard about private UCB banking, 34% discussed both options. Nearly 70% of donors opted for public banking due to altruism and the high costs of private banking. Of our public UCB donors, 81% stated that they did not need a re-consent before UCB release for stem cell transplantation. In case of sample rejection, 53.5% wanted to know details about the particular research project. A total of 9% would not consent. Almost all donors would choose public banking again due to altruism and the high costs of private banking. Shortly after donation, mail contact with former UCB donors was difficult. This might be a relevant issue in any sequential hybrid banking.

  11. A new energy-efficient MAC protocol with noise-based transmitted-reference modulation for wireless sensor network

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert; Meijerink, Arjan; Ye, D.; van der Zee, Ronan A.R.; Bentum, Marinus Jan

    2013-01-01

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor networks. The medium access control (MAC) protocol determines to a large extent the time a sensor node transceiver spends listening or transmitting, and hence the energy

  12. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars

    1998-01-01

    The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both...

  13. Conditioned Media from Human Umbilical Cord Blood-Derived Mesenchymal Stem Cells Inhibits Melanogenesis by Promoting Proteasomal Degradation of MITF.

    Directory of Open Access Journals (Sweden)

    Eun Sung Kim

    Full Text Available Human umbilical cord blood-derived mesenchymal stem cells (hUCB-MSCs secrete various beneficial molecules, which have anti-apoptotic activity and cell proliferation. However, the effect of hUCB-MSCs in melanogenesis is largely unclear. In this study, we show that conditioned media (CM derived from hUCB-MSCs inhibit melanogenesis by regulating microphthalmia-associated transcription factor (MITF expression via the ERK signalling pathway. Treatment of hUCB-MSC-CM strongly inhibited the alpha-melanocyte stimulating hormone-induced hyperpigmentation in melanoma cells as well as melanocytes. Treatment of hUCB-MSC-CM induced ERK1/2 activation in melanocytes. In addition, inhibition of ERK1/2 suppressed the anti-pigmentation activity of the hUCB-MSC-CM in melanocytes and in vitro artificial skin models. We also found that the expression of MITF was appreciably diminished while expression of phosphorylated MITF, which leads to its proteasomal degradation, was increased in cells treated with hUCB-MSC-CM. These results suggested that hUCB-MSC-CM significantly suppresses melanin synthesis via MITF degradation by the ERK pathway activation.

  14. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    pp. 329 – 336. 87. World IPv6 Launch (2012) http://www.worldipv6launch.org. 88. Feilner, M. (2006) OpenVPN : Building and Integrating Virtual Private...traditionally based on IPsec, OpenVPN is actually a TLS-based VPN solution [88]. A.3 Conclusions This case study has demonstrated the ease with which an

  15. Knowledge, Power, and Social Policy: John M. MacEachran and Alberta's 1928 Sexual Sterilization Act

    Science.gov (United States)

    Puplampu, Korbla P.

    2008-01-01

    This article examines how academic knowledge and power have shaped the discourse on human classification and how political authorities use academic knowledge producers to legitimize public policy. Specifically, the article draws on the role of John M. MacEachran, a former academic at the University of Alberta, in the implementation of the Alberta…

  16. TM6SF2 and MAC30, new enzyme homologues in sterol metabolism and common metabolic disease.

    Directory of Open Access Journals (Sweden)

    Luis eSanchez-Pulido

    2014-12-01

    Full Text Available Carriers of the Glu167Lys coding variant in the TM6SF2 gene have recently been identified as being more susceptible to non-alcoholic fatty liver disease (NAFLD, yet exhibit lower levels of circulating lipids and hence are protected against cardiovascular disease. Despite the physiological importance of these observations, the molecular function of TM6SF2 remains unknown, and no sequence similarity with functionally characterised proteins has been identified. In order to trace its evolutionary history and to identify functional domains, we embarked on a computational protein sequence analysis of TM6SF2. We identified a new domain, the EXPERA domain, which is conserved among TM6SF, MAC30/TMEM97 and EBP (D8,D7 sterol isomerase protein families. EBP mutations are the cause of chondrodysplasia punctata 2 X-linked dominant (CDPX2, also known as Conradi-Hünermann-Happle syndrome, a defective cholesterol biosynthesis disorder. Our analysis of evolutionary conservation among EXPERA domain-containing families and the previously suggested catalytic mechanism for the EBP enzyme, indicate that TM6SF and MAC30/TMEM97 families are both highly likely to possess, as for the EBP family, catalytic activity as sterol isomerases. This unexpected prediction of enzymatic functions for TM6SF and MAC30/TMEM97 is important because it now permits detailed experiments to investigate the function of these key proteins in various human pathologies, from cardiovascular disease to cancer.

  17. Crude mortality and loss of life expectancy of patients diagnosed with urothelial carcinoma of the urinary bladder in Norway.

    Science.gov (United States)

    Andreassen, Bettina K; Myklebust, Tor Å; Haug, Erik S

    2017-02-01

    Reports from cancer registries often lack clinically relevant information, which would be useful in estimating the prognosis of individual patients with urothelial carcinoma of the urinary bladder (UCB). This article presents estimates of crude probabilities of death due to UCB and the expected loss of lifetime stratified for patient characteristics. In Norway, 10,332 patients were diagnosed with UCB between 2001 and 2010. The crude probabilities of death due to UCB were estimated, stratified by gender, age and T stage, using flexible parametric survival models. Based on these models, the loss in expectation of lifetime due to UCB was also estimated for the different strata. There is large variation in the estimated crude probabilities of death due to UCB (from 0.03 to 0.76 within 10 years since diagnosis) depending on age, gender and T stage. Furthermore, the expected loss of life expectancy is more than a decade for younger patients with muscle-invasive UCB and between a few months and 5 years for nonmuscle-invasive UCB. The suggested framework leads to clinically relevant prognostic risk estimates for individual patients diagnosed with UCB and the consequence in terms of loss of lifetime expectation. The published probability tables can be used in clinical praxis for risk communication.

  18. Factors That Influence a Mother's Willingness to Preserve Umbilical Cord Blood: A Survey of 5120 Chinese Mothers.

    Directory of Open Access Journals (Sweden)

    Haiyan Lu

    Full Text Available Umbilical Cord blood (UCB, which contains a substantive number of stem cells, could be widely used in transplants to treat a variety of oncologic, genetic, hematologic, and immunodeficiency disorders. However, only a small portion of mothers preserve or donate their UCB in China. The limited availability of UCB has hampered stem cell research and therapy nowadays. To date, no systemic investigations regarding factors that influence a mother's willingness to preserve UCB have been performed in China. In the current study, we are trying to determine those factors which will provide useful information for national health policy development and will raise awareness of the importance of UCB preservation.During 2011 to 2013, 5120 mothers with the average age of 26.1±8.4 years were included in this study. Those mothers participated in a standardized survey. The information gathered consisted of delivery time, occupation, level of education, knowledge of preservation of UCB, willingness to store UCB, and related concerns. The results have been analyzed with SPSS 16.0.The results showed that first-time mothers showed a greater willingness to preserve their UCB (73.3% compared to those having their second (48.9% or third child (40.3%. Mothers who were employed at Government Agencies and Organizations were more willing to preserve their UCB (87.3% than those employed at factories (62.0%, and those who were unemployed (27.3%. Mothers holding master's or college degrees were more willing to preserve their UCB (72.5% and 71.1%, respectively than mothers with high school diplomas (48.7% or those who only went to preliminary school or middle school (40.7%. The two strongest factors that influenced an unwillingness to preserve UCB were the high cost and concerns regarding the safety of the preservation.The results showed that mothers with higher education or those having better occupations are more likely to preserve their UCB in China. These mothers have

  19. Factors That Influence a Mother's Willingness to Preserve Umbilical Cord Blood: A Survey of 5120 Chinese Mothers.

    Science.gov (United States)

    Lu, Haiyan; Chen, Yanwen; Lan, Qiaofen; Liao, Huanjin; Wu, Jing; Xiao, Haiyan; Dickerson, Carol A; Wu, Ping; Pan, Qingjun

    2015-01-01

    Umbilical Cord blood (UCB), which contains a substantive number of stem cells, could be widely used in transplants to treat a variety of oncologic, genetic, hematologic, and immunodeficiency disorders. However, only a small portion of mothers preserve or donate their UCB in China. The limited availability of UCB has hampered stem cell research and therapy nowadays. To date, no systemic investigations regarding factors that influence a mother's willingness to preserve UCB have been performed in China. In the current study, we are trying to determine those factors which will provide useful information for national health policy development and will raise awareness of the importance of UCB preservation. During 2011 to 2013, 5120 mothers with the average age of 26.1±8.4 years were included in this study. Those mothers participated in a standardized survey. The information gathered consisted of delivery time, occupation, level of education, knowledge of preservation of UCB, willingness to store UCB, and related concerns. The results have been analyzed with SPSS 16.0. The results showed that first-time mothers showed a greater willingness to preserve their UCB (73.3%) compared to those having their second (48.9%) or third child (40.3%). Mothers who were employed at Government Agencies and Organizations were more willing to preserve their UCB (87.3%) than those employed at factories (62.0%), and those who were unemployed (27.3%). Mothers holding master's or college degrees were more willing to preserve their UCB (72.5% and 71.1%, respectively) than mothers with high school diplomas (48.7%) or those who only went to preliminary school or middle school (40.7%). The two strongest factors that influenced an unwillingness to preserve UCB were the high cost and concerns regarding the safety of the preservation. The results showed that mothers with higher education or those having better occupations are more likely to preserve their UCB in China. These mothers have related

  20. Metastable and equilibrium phase diagrams of unconjugated bilirubin IXα as functions of pH in model bile systems: Implications for pigment gallstone formation

    Science.gov (United States)

    Berman, Marvin D.

    2014-01-01

    Metastable and equilibrium phase diagrams for unconjugated bilirubin IXα (UCB) in bile are yet to be determined for understanding the physical chemistry of pigment gallstone formation. Also, UCB is a molecule of considerable biomedical importance because it is a potent antioxidant and an inhibitor of atherogenesis. We employed principally a titrimetric approach to obtain metastable and equilibrium UCB solubilities in model bile systems composed of taurine-conjugated bile salts, egg yolk lecithin (mixed long-chain phosphatidylcholines), and cholesterol as functions of total lipid concentration, biliary pH values, and CaCl2 plus NaCl concentrations. Metastable and equilibrium precipitation pH values were obtained, and average pKa values of the two carboxyl groups of UCB were calculated. Added lecithin and increased temperature decreased UCB solubility markedly, whereas increases in bile salt concentrations and molar levels of urea augmented solubility. A wide range of NaCl and cholesterol concentrations resulted in no specific effects, whereas added CaCl2 produced large decreases in UCB solubilities at alkaline pH values only. UV-visible absorption spectra were consistent with both hydrophobic and hydrophilic interactions between UCB and bile salts that were strongly influenced by pH. Reliable literature values for UCB compositions of native gallbladder biles revealed that biles from hemolytic mice and humans with black pigment gallstones are markedly supersaturated with UCB and exhibit more acidic pH values, whereas biles from nonstone control animals and patients with cholesterol gallstone are unsaturated with UCB. PMID:25359538