WorldWideScience

Sample records for universal ip multicast

  1. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  2. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  3. Real-time video streaming system for LHD experiment using IP multicast

    International Nuclear Information System (INIS)

    Emoto, Masahiko; Yamamoto, Takashi; Yoshida, Masanobu; Nagayama, Yoshio; Hasegawa, Makoto

    2009-01-01

    In order to accomplish smooth cooperation research, remote participation plays an important role. For this purpose, the authors have been developing various applications for remote participation for the LHD (Large Helical Device) experiments, such as Web interface for visualization of acquired data. The video streaming system is one of them. It is useful to grasp the status of the ongoing experiment remotely, and we provide the video images displayed in the control room to the remote users. However, usual streaming servers cannot send video images without delay. The delay changes depending on how to send the images, but even a little delay might become critical if the researchers use the images to adjust the diagnostic devices. One of the main causes of delay is the procedure of compressing and decompressing the images. Furthermore, commonly used video compression method is lossy; it removes less important information to reduce the size. However, lossy images cannot be used for physical analysis because the original information is lost. Therefore, video images for remote participation should be sent without compression in order to minimize the delay and to supply high quality images durable for physical analysis. However, sending uncompressed video images requires large network bandwidth. For example, sending 5 frames of 16bit color SXGA images a second requires 100Mbps. Furthermore, the video images must be sent to several remote sites simultaneously. It is hard for a server PC to handle such a large data. To cope with this problem, the authors adopted IP multicast to send video images to several remote sites at once. Because IP multicast packets are sent only to the network on which the clients want the data; the load of the server does not depend on the number of clients and the network load is reduced. In this paper, the authors discuss the feasibility of high bandwidth video streaming system using IP multicast. (author)

  4. An efficient mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2014-08-01

    This paper proposes an efficient overlay multicast provisioning (OMP) mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks. To facilitate request provisioning, OMP jointly utilizes a data learning (DL) scheme on the IP/MPLS layer for logical link cost estimation, and a lightpath fragmentation (LPF) based method on the WDM layer for improving resource sharing in grooming process. Extensive simulations are carried out to evaluate the performance of OMP mechanism under different traffic loads, with either limited or unlimited port resources. Simulation results demonstrate that OMP significantly outperforms the existing methods. To evaluate the respective influences of the DL scheme and the LPF method on OMP performance, provisioning mechanisms only utilizing either the IP/MPLS layer DL scheme or the WDM layer LPF method are also devised. Comparison results show that both DL and LPF methods help improve OMP blocking performance, and contribution from the DL scheme is more significant when the fixed routing and first-fit wavelength assignment (RWA) strategy is adopted on the WDM layer. Effects of a few other factors, including definition of connection cost to be reported by the WDM layer to the IP/MPLS layer and WDM-layer routing method, on OMP performance are also evaluated.

  5. The MIM web gateway to IP multicast e-meetings

    Science.gov (United States)

    Parviainen, Roland; Parnes, Peter

    2003-12-01

    As video conferencing and e-meeting systems are used more and more on the Internet and in businesses it becomes increasingly important to be able to participate from any computer at any location. Often this is impossible, since these systems requires often special software that are not available everywhere or impossible to install for administrative reasons. Many locations also lack the necessary network infrastructure such as IP multicast. This paper presents a WWW gateway system that enables users to participate using only a standard web browser. The design and architecture of the system are described and performance tests that show the scalability of the system are also presented.

  6. High Performance Computing Multicast

    Science.gov (United States)

    2012-02-01

    A History of the Virtual Synchrony Replication Model,” in Replication: Theory and Practice, Charron-Bost, B., Pedone, F., and Schiper, A. (Eds...Performance Computing IP / IPv4 Internet Protocol (version 4.0) IPMC Internet Protocol MultiCast LAN Local Area Network MCMD Dr. Multicast MPI

  7. IMPLEMENTASI IP V 6 MULTICAST DALAM JARINGAN WIRELESS

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi Prasetyo

    2015-04-01

    Full Text Available Teleconferencing is a media technology to create a long-distance communication of audio data and video can also be data. With teleconferencing you can perform a communication with another person that much with a relatively low cost. At this time the use of computers in a network more complex. Some time ago has developed a new network protocol, the IPv6 is a solution to overcome the deficiencies found on previous generation protocol is IPv4 Multicast is a communication mechanism of one-to-many, or point-to-multipoint. In IPv6 technology, multicast is a basic feature and has become the standard specification of every router. In the implementation is done using IPv6 multicast teleconferencing application on the LAN network topology. At the teleconference has been observed with the amount of traffic parameters that occurred during the last teleconference. Used in this study SDR and RAT teleconferencing applications. SDR (Session Directory Tool and RAT (Robust Audio Tool used for teleconferencing, which is part of the MBone tools. Protocol MLD (Multicast Listener Directory is also used in this study for multicast signaling can run well.

  8. Development of a real-time monitoring system and integration of different computer system in LHD experiments using IP multicast

    International Nuclear Information System (INIS)

    Emoto, Masahiko; Nakamura, Yukio; Teramachi, Yasuaki; Okumura, Haruhiko; Yamaguchi, Satarou

    2002-01-01

    There are several different computer systems in LHD (Large Helical Device) experiment, and therefore the coalition of these computers is a key to perform the experiment. Real-time monitoring system is also important because the long discharge is needed in the LHD experiment. In order to achieve these two requirements, the technique of IP multicast is adopted. The authors have developed three new systems, the first one is the real-time monitoring system, the next one is the delivery system of the shot number and the last one is the real-time notification system of the plasma data registration. The first system can deliver the real-time monitoring data to the LHD experimental LAN through the firewall of the LHD control LAN in NIFS. The other two systems are used to realize high coalition of the different computers in the LHD plasma experiment. We can conclude that IP multicast is very useful both in the LHD experiment and a future large plasma experiment from various experiences. (author)

  9. Reliable multicast for the Grid: a case study in experimental computer science.

    Science.gov (United States)

    Nekovee, Maziar; Barcellos, Marinho P; Daw, Michael

    2005-08-15

    In its simplest form, multicast communication is the process of sending data packets from a source to multiple destinations in the same logical multicast group. IP multicast allows the efficient transport of data through wide-area networks, and its potentially great value for the Grid has been highlighted recently by a number of research groups. In this paper, we focus on the use of IP multicast in Grid applications, which require high-throughput reliable multicast. These include Grid-enabled computational steering and collaborative visualization applications, and wide-area distributed computing. We describe the results of our extensive evaluation studies of state-of-the-art reliable-multicast protocols, which were performed on the UK's high-speed academic networks. Based on these studies, we examine the ability of current reliable multicast technology to meet the Grid's requirements and discuss future directions.

  10. Multi-area layered multicast scheme for MPLS networks

    Science.gov (United States)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  11. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  12. Optical multicast system for data center networks.

    Science.gov (United States)

    Samadi, Payman; Gupta, Varun; Xu, Junjie; Wang, Howard; Zussman, Gil; Bergman, Keren

    2015-08-24

    We present the design and experimental evaluation of an Optical Multicast System for Data Center Networks, a hardware-software system architecture that uniquely integrates passive optical splitters in a hybrid network architecture for faster and simpler delivery of multicast traffic flows. An application-driven control plane manages the integrated optical and electronic switched traffic routing in the data plane layer. The control plane includes a resource allocation algorithm to optimally assign optical splitters to the flows. The hardware architecture is built on a hybrid network with both Electronic Packet Switching (EPS) and Optical Circuit Switching (OCS) networks to aggregate Top-of-Rack switches. The OCS is also the connectivity substrate of splitters to the optical network. The optical multicast system implementation requires only commodity optical components. We built a prototype and developed a simulation environment to evaluate the performance of the system for bulk multicasting. Experimental and numerical results show simultaneous delivery of multicast flows to all receivers with steady throughput. Compared to IP multicast that is the electronic counterpart, optical multicast performs with less protocol complexity and reduced energy consumption. Compared to peer-to-peer multicast methods, it achieves at minimum an order of magnitude higher throughput for flows under 250 MB with significantly less connection overheads. Furthermore, for delivering 20 TB of data containing only 15% multicast flows, it reduces the total delivery energy consumption by 50% and improves latency by 55% compared to a data center with a sole non-blocking EPS network.

  13. Optimización multiobjetivo para enrutamiento multicast en overlay networks utilizando algoritmos evolutivos Multiobjective Optimization for Multicast Routing in Overlay Networks using Evolutionary Algorithms

    Directory of Open Access Journals (Sweden)

    Juan Carlos Montoya M.

    2008-06-01

    Full Text Available Multicast juega un papel muy importante para soportar una nueva generación de aplicaciones. En la actualidad y por diferentes razones, técnicas y no técnicas, multicast IP no ha sido totalmente adoptado en Internet. Durante los últimos a˜nos, un área de investigación activa es la de implementar este tipo de tráfico desde la perspectiva del nivel de aplicación, donde la funcionalidad de multicast no es responsabilidad de los enrutadores sino de los hosts, a lo que se le conoce como Multicast Overlay Network (MON. En este artículo se plantea el enrutamiento en MON como un problema de Optimización Multiobjetivo (MOP donde se optimizan dos funciones: 1 el retardo total extremo a extremo del árbol multicast, y 2 la máxima utilización de los enlaces. La optimización simultánea de estas dos funciones es un problema NP completo y para resolverlo se propone utilizar Algoritmos Evolutivos Multiobjetivos (MOEA, específicamente NSGAIMulticast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non–technical, multicast IP hasn’t yet been totally adopted for Internet. During recent years, an active area of research is that of implementing this kind of traffic in the application layer where the multicast functionality isn´t a responsibility of the routers but that of the hosts, which we know as Multicast Overlay Networks (MON. In this article, routing in an MON is put forward as a multiobjective optimization problem (MOP where two functions are optimized: 1 the total end to end delay of the multicast tree and 2 the maximum link utilization. The simultaneous optimization of these two functions is an NP–Complete problem and to solve this we suggest using Multiobjective Evolutionary Algorithms (MOEA, specifically NSGA–II.

  14. Design of an IPTV Multicast System for Internet Backbone Networks

    Directory of Open Access Journals (Sweden)

    T. H. Szymanski

    2010-01-01

    Full Text Available The design of an IPTV multicast system for the Internet backbone network is presented and explored through extensive simulations. In the proposed system, a resource reservation algorithm such as RSVP, IntServ, or DiffServ is used to reserve resources (i.e., bandwidth and buffer space in each router in an IP multicast tree. Each router uses an Input-Queued, Output-Queued, or Crosspoint-Queued switch architecture with unity speedup. A recently proposed Recursive Fair Stochastic Matrix Decomposition algorithm used to compute near-perfect transmission schedules for each IP router. The IPTV traffic is shaped at the sources using Application-Specific Token Bucker Traffic Shapers, to limit the burstiness of incoming network traffic. The IPTV traffic is shaped at the destinations using Application-Specific Playback Queues, to remove residual network jitter and reconstruct the original bursty IPTV video streams at each destination. All IPTV traffic flows are regenerated at the destinations with essentially zero delay jitter and essentially-perfect QoS. The destination nodes deliver the IPTV streams to the ultimate end users using the same IPTV multicast system over a regional Metropolitan Area Network. It is shown that all IPTV traffic is delivered with essentially-perfect end-to-end QoS, with deterministic bounds on the maximum delay and jitter on each video frame. Detailed simulations of an IPTV distribution system, multicasting several hundred high-definition IPTV video streams over several essentially saturated IP backbone networks are presented.

  15. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  16. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  17. QoS Supported IPTV Service Architecture over Hybrid-Tree-Based Explicit Routed Multicast Network

    Directory of Open Access Journals (Sweden)

    Chih-Chao Wen

    2012-01-01

    Full Text Available With the rapid advance in multimedia streaming and multicast transport technology, current IP multicast protocols, especially PIM-SM, become the major channel delivery mechanism for IPTV system over Internet. The goals for IPTV service are to provide two-way interactive services for viewers to select popular program channel with high quality for watching during fast channel surfing period. However, existing IP multicast protocol cannot meet above QoS requirements for IPTV applications between media server and subscribers. Therefore, we propose a cooperative scheme of hybrid-tree based on explicit routed multicast, called as HT-ERM to combine the advantages of shared tree and source tree for QoS-supported IPTV service. To increase network utilization, the constrained shortest path first (CSPF routing algorithm is designed for construction of hybrid tree to deliver the high-quality video stream over watching channel and standard quality over surfing channel. Furthermore, the Resource Reservation Protocol- Traffic Engineering (RSVP-TE is used as signaling mechanism to set up QoS path for multicast channel admission control. Our simulation results demonstrated that the proposed HT-ERM scheme outperforms other multicast QoS-based delivery scheme in terms of channel switching delay, resource utilization, and blocking ratio for IPTV service.

  18. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  19. IPTV multicast with peer-assisted lossy error control

    Science.gov (United States)

    Li, Zhi; Zhu, Xiaoqing; Begen, Ali C.; Girod, Bernd

    2010-07-01

    Emerging IPTV technology uses source-specific IP multicast to deliver television programs to end-users. To provide reliable IPTV services over the error-prone DSL access networks, a combination of multicast forward error correction (FEC) and unicast retransmissions is employed to mitigate the impulse noises in DSL links. In existing systems, the retransmission function is provided by the Retransmission Servers sitting at the edge of the core network. In this work, we propose an alternative distributed solution where the burden of packet loss repair is partially shifted to the peer IP set-top boxes. Through Peer-Assisted Repair (PAR) protocol, we demonstrate how the packet repairs can be delivered in a timely, reliable and decentralized manner using the combination of server-peer coordination and redundancy of repairs. We also show that this distributed protocol can be seamlessly integrated with an application-layer source-aware error protection mechanism called forward and retransmitted Systematic Lossy Error Protection (SLEP/SLEPr). Simulations show that this joint PARSLEP/ SLEPr framework not only effectively mitigates the bottleneck experienced by the Retransmission Servers, thus greatly enhancing the scalability of the system, but also efficiently improves the resistance to the impulse noise.

  20. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    Science.gov (United States)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  1. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  2. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  3. Application Layer Multicast

    Science.gov (United States)

    Allani, Mouna; Garbinato, Benoît; Pedone, Fernando

    An increasing number of Peer-to-Peer (P2P) Internet applications rely today on data dissemination as their cornerstone, e.g., audio or video streaming, multi-party games. These applications typically depend on some support for multicast communication, where peers interested in a given data stream can join a corresponding multicast group. As a consequence, the efficiency, scalability, and reliability guarantees of these applications are tightly coupled with that of the underlying multicast mechanism.

  4. Energy-efficient multicast traffic grooming strategy based on light-tree splitting for elastic optical networks

    Science.gov (United States)

    Liu, Huanlin; Yin, Yarui; Chen, Yong

    2017-07-01

    In order to address the problem of optimizing the spectrum resources and power consumption in elastic optical networks (EONs), we investigate the potential gains by jointly employing the light-tree splitting and traffic grooming for multicast requests. An energy-efficient multicast traffic grooming strategy based on light-tree splitting (EED-MTGS-LS) is proposed in this paper. Firstly, we design a traffic pre-processing mechanism to decide the multicast requests' routing order, which considers the request's bandwidth requirement and physical hops synthetically. Then, by dividing a light-tree to some sub-light-trees and grooming the request to these sub-light-trees, the light-tree sharing ratios of multicast requests can be improved. What's more, a priority scheduling vector is constructed, which aims to improve the success rate of spectrum assignment for grooming requests. Finally, a grooming strategy is designed to optimize the total power consumption by reducing the use of transponders and IP routers during routing. Simulation results show that the proposed strategy can significantly improve the spectrum utilization and save the power consumption.

  5. Protection switching for carrier ethernet multicast

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Berger, Michael Stübert

    2010-01-01

    This paper addresses network survivability for IPTV multicast transport in Carrier Ethernet networks. The impact of link failures is investigated and suggestions for intelligent multicast resilience schemes are proposed. In particular, functions of the multicast tree are integrated with the Carri...... recovery path length, recovery time, number of branch nodes and operational complexity. The integrated approach therefore shows significant potential to increase the QoE for IPTV users in case of network failures and recovery actions.......This paper addresses network survivability for IPTV multicast transport in Carrier Ethernet networks. The impact of link failures is investigated and suggestions for intelligent multicast resilience schemes are proposed. In particular, functions of the multicast tree are integrated with the Carrier...

  6. Exploiting the In-Network Capabilities of Multicast to Discover Proximate IPTV Channels

    Directory of Open Access Journals (Sweden)

    William Donnelly

    2010-09-01

    Full Text Available IPTV has become the next generation of television due, in part, to its ability to support features that have been lacking in conventional broadcasting—for example, end-user interactivity, personalisation and localisation. Providers are also searching for the most efficient delivery methods to provide the greatest amount of contents at the lowest cost. At present IPTV uses IP multicast to deliver live TV channels in an over-provisioned walled-garden network due to issues of deploying multicast and QoS challenges in the public Internet. However, IPTV is likely to shift into some parts of the public Internet in the future as a managed service. Multicast routing is performed on a per-session destination-address basis so each router maintains a table of all of the multicast addresses to which the content is being forwarded. We exploit this information to discover and join the in-progress channels of geographically proximate users and to create a new incentivised premium service in future IPTV networks called ProxyTV. This approach is expected to minimise network bandwidth requirements as it enables ISPs to optimise bandwidth on their edge networks. This becomes increasingly significant as TV content consumes more and more bandwidth, especially with the onset of HD and 3D capabilities. In this paper, we have presented in detail the concept with the results of a survey and an analysis of network traffic to justify the proposed approach.

  7. Adaptive live multicast video streaming of SVC with UEP FEC

    Science.gov (United States)

    Lev, Avram; Lasry, Amir; Loants, Maoz; Hadar, Ofer

    2014-09-01

    Ideally, video streaming systems should provide the best quality video a user's device can handle without compromising on downloading speed. In this article, an improved video transmission system is presented which dynamically enhances the video quality based on a user's current network state and repairs errors from data lost in the video transmission. The system incorporates three main components: Scalable Video Coding (SVC) with three layers, multicast based on Receiver Layered Multicast (RLM) and an UnEqual Forward Error Correction (FEC) algorithm. The SVC provides an efficient method for providing different levels of video quality, stored as enhancement layers. In the presented system, a proportional-integral-derivative (PID) controller was implemented to dynamically adjust the video quality, adding or subtracting quality layers as appropriate. In addition, an FEC algorithm was added to compensate for data lost in transmission. A two dimensional FEC was used. The FEC algorithm came from the Pro MPEG code of practice #3 release 2. Several bit errors scenarios were tested (step function, cosine wave) with different bandwidth size and error values were simulated. The suggested scheme which includes SVC video encoding with 3 layers over IP Multicast with Unequal FEC algorithm was investigated under different channel conditions, variable bandwidths and different bit error rates. The results indicate improvement of the video quality in terms of PSNR over previous transmission schemes.

  8. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  9. Multicast middleware for performance and topology analysis of multimedia grids

    Directory of Open Access Journals (Sweden)

    Jerry Z. Xie

    2017-04-01

    Full Text Available Since multicast reduces bandwidth consumption in multimedia grid computing, the middleware for monitoring the performance and topology of multicast communications is important to the design and management of multimedia grid applications. However, the current middleware technologies for multicast performance monitoring are still far from attaining the level of maturity and there lacks consistent approaches to obtain the evaluation data for multicast. In this study, to serve a clear guide for the design and implementation of the multicast middleware, two algorithms are developed for organising all constituents in multicast communications and analysing the multicast performance in two topologies – ‘multicast distribution tree’ and ‘clusters distribution’, and a definitive set of corresponding metrics that are comprehensive yet viable for evaluating multicast communications are also presented. Instead of using the inference data from unicast measurements, in the proposed middleware, the measuring data of multicast traffic are obtained directly from multicast protocols in real time. Moreover, this study makes a middleware implementation which is integrated into a real access grid multicast communication infrastructure. The results of the implementation demonstrate the substantial improvements in the accuracy and real time in evaluating the performance and topology of multicast network.

  10. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    Science.gov (United States)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  11. Dynamic Programming Optimization of Multi-rate Multicast Video-Streaming Services

    Directory of Open Access Journals (Sweden)

    Nestor Michael Caños Tiglao

    2010-06-01

    Full Text Available In large scale IP Television (IPTV and Mobile TV distributions, the video signal is typically encoded and transmitted using several quality streams, over IP Multicast channels, to several groups of receivers, which are classified in terms of their reception rate. As the number of video streams is usually constrained by both the number of TV channels and the maximum capacity of the content distribution network, it is necessary to find the selection of video stream transmission rates that maximizes the overall user satisfaction. In order to efficiently solve this problem, this paper proposes the Dynamic Programming Multi-rate Optimization (DPMO algorithm. The latter was comparatively evaluated considering several user distributions, featuring different access rate patterns. The experimental results reveal that DPMO is significantly more efficient than exhaustive search, while presenting slightly higher execution times than the non-optimal Multi-rate Step Search (MSS algorithm.

  12. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  13. Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast

    Directory of Open Access Journals (Sweden)

    Amr Mohamed

    2009-01-01

    Full Text Available Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session require service at different rates commensurate with their capabilities. In this paper, we address the problem of resource allocation for a set of heterogeneous multicast sessions over multihop wireless networks. We propose an iterative algorithm that achieves the optimal rates for a set of heterogeneous multicast sessions such that the aggregate utility for all sessions is maximized. We present the formulation of the multicast resource allocation problem as a nonlinear optimization model and highlight the cross-layer framework that can solve this problem in a distributed ad hoc network environment with asynchronous computations. Our simulations show that the algorithm achieves optimal resource utilization, guarantees fairness among multicast sessions, provides flexibility in allocating rates over different parts of the multicast sessions, and adapts to changing conditions such as dynamic channel capacity and node mobility. Our results show that the proposed algorithm not only provides flexibility in allocating resources across multicast sessions, but also increases the aggregate system utility and improves the overall system throughput by almost 30% compared to homogeneous multicast.

  14. Design of controllable multicast for IPTV over EPON

    Science.gov (United States)

    Zhang, Chuanhao; Liu, Deming; Zhang, Li; Wu, Guangsheng

    2007-11-01

    The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. In this paper we focus on security mechanisms that should be available to groups that specifically request it, and therefore are willing to pay the extra cost of implementing those mechanisms. We concentrate on two issues: how unauthorized multicast traffic can be prevented by means of multicast transit traffic control; how a group's susceptibility is likely to be reduced by means of multicast group access control. We have proposed a novel scheme that should be available to multicast groups that desire precautionary measures be taken to avert the threats of Invalid source and unauthorized access.

  15. Multicast traffic grooming in flexible optical WDM networks

    Science.gov (United States)

    Patel, Ankitkumar N.; Ji, Philip N.; Jue, Jason P.; Wang, Ting

    2012-12-01

    In Metropolitan Area Networks (MANs), point-to-multipoint applications, such as IPTV, video-on-demand, distance learning, and content distribution, can be efficiently supported through light-tree-based multicastcommunications instead of lightpath-based unicast-communications. The application of multicasting for such traffic is justified by its inherent benefits of reduced control and management overhead and elimination of redundant resource provisioning. Supporting such multicast traffic in Flexible optical WDM (FWDM) networks that can provision light-trees using optimum amount of spectrum within flexible channel spacing leads to higher wavelength and spectral efficiencies compared to the conventional ITU-T fixed grid networks. However, in spite of such flexibility, the residual channel capacity of stranded channels may not be utilized if the network does not offer channels with arbitrary line rates. Additionally, the spectrum allocated to guard bands used to isolate finer granularity channels remains unutilized. These limitations can be addressed by using traffic grooming in which low-rate multicast connections are aggregated and switched over high capacity light-trees. In this paper, we address the multicast traffic grooming problem in FWDM networks, and propose a novel auxiliary graph-based algorithm for the first time. The performance of multicast traffic grooming is evaluated in terms of spectral, cost, and energy efficiencies compared to lightpath-based transparent FWDM networks, lightpathbased traffic grooming-capable FWDM networks, multicast-enabled transparent FWDM networks, and multicast traffic grooming-capable fixed grid networks. Simulation results demonstrate that multicast traffic grooming in FWDM networks not only improves spectral efficiency, but also cost, and energy efficiencies compared to other multicast traffic provisioning approaches of FWDM and fixed grid networks.

  16. Implementing Resource-aware Multicast Forwarding in Software Defined Networks

    DEFF Research Database (Denmark)

    Poderys, Justas; Sunny, Anjusha; Soler, José

    2018-01-01

    Using multicast data transmissions, data can be eciently distributed to a high number of network users. However, in order to ef-ciently stream multimedia using multicast communication, multicast routing protocols must have knowledge of all network links and their available bandwidth. In Software...

  17. Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Rakesh Matam

    2016-01-01

    Full Text Available Multicast is an indispensable communication technique in wireless mesh network (WMN. Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.

  18. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  19. Multicast Services of QoS-Aware Active Queue Management over IP Multimedia Applications

    Science.gov (United States)

    Hwang, I.-Shyan; Hwang, Bor-Jiunn; Chang, Pen-Ming

    2010-10-01

    Recently, the multimedia services such as IPTV, video conference emerges to be the main traffic source. When UDP coexists with TCP, it induces not only congestion collapse but also unfairness problem. In this paper, a new Active Queue Management (AQM) algorithm, called Traffic Sensitive Active Queue Management (TSAQM), is proposed for providing multimedia services. The TSAQM comprise Dynamic Weight Allocate Scheme (DWAS) and Service Guarantee Scheme (SGS), the purpose of DWAS is to allocate resource with fairness and high end-user utility, and the purpose of SGS is to determine the satisfactory threshold (TH) and threshold region (TR). Several objectives of this proposed scheme include achieving high end-user utility for video service, considering the multicast as well as unicast proprieties to meet inter-class fairness and achieving the QoS requirement by adjusting the thresholds adaptively based on traffic situations.

  20. Multicast Performance Analysis for High-Speed Torus Networks

    National Research Council Canada - National Science Library

    Oral, S; George, A

    2002-01-01

    ... for unicast-based and path-based multicast communication on high-speed torus networks. Software-based multicast performance results of selected algorithms on a 16-node Scalable Coherent Interface (SCI) torus are given...

  1. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  2. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  3. Implementing Resource-aware Multicast Forwarding in Software Defined Networks

    DEFF Research Database (Denmark)

    Poderys, Justas; Sunny, Anjusha; Soler, José

    2018-01-01

    Using multicast data transmissions, data can be eciently distributed to a high number of network users. However, in order to ef-ciently stream multimedia using multicast communication, multicast routing protocols must have knowledge of all network links and their available bandwidth. In Software......-Karp algorithm, by taking into account network topology and links load information. This paper presents the algorithm, implementation details, and an analysis of the testing results....

  4. Evaluating multicast resilience in carrier ethernet

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Zhang, Jiang

    2010-01-01

    This paper gives an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, we show how multicast traffic, which is essential for IPTV can be protected. We detail the ackground for resilience mechanisms and their control and e present Carrier Ethernet...... resilience methods for linear nd ring networks. By simulation we show that the vailability of a multicast connection can be significantly increased by applying protection methods....

  5. Multicast routing for wavelength-routed WDM networks with dynamic membership

    Science.gov (United States)

    Huang, Nen-Fu; Liu, Te-Lung; Wang, Yao-Tzung; Li, Bo

    2000-09-01

    Future broadband networks must support integrated services and offer flexible bandwidth usage. In our previous work, we explore the optical link control layer on the top of optical layer that enables the possibility of bandwidth on-demand service directly over wavelength division multiplexed (WDM) networks. Today, more and more applications and services such as video-conferencing software and Virtual LAN service require multicast support over the underlying networks. Currently, it is difficult to provide wavelength multicast over the optical switches without optical/electronic conversions although the conversion takes extra cost. In this paper, based on the proposed wavelength router architecture (equipped with ATM switches to offer O/E and E/O conversions when necessary), a dynamic multicast routing algorithm is proposed to furnish multicast services over WDM networks. The goal is to joint a new group member into the multicast tree so that the cost, including the link cost and the optical/electronic conversion cost, is kept as less as possible. The effectiveness of the proposed wavelength router architecture as well as the dynamic multicast algorithm is evaluated by simulation.

  6. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  7. Alcatel-Lucent Service Routing Architect (SRA) self-study guide preparing for the BGP, VPRN and Multicast exams

    CERN Document Server

    Warnock, Glenn; Shaheen, Ghassan

    2015-01-01

    A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (SRA) certification Networking professionals are taking note of Alcatel-Lucent and its quick ascent in the networking and telecom industries. IP networking professionals looking for a comprehensive guide to obtaining the Alcatel-Lucent Service Routing Architect (SRA) certification will be pleased to learn of this new publication, Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams. The book comprises approximately 2,600 pages of print a

  8. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  9. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    Science.gov (United States)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  10. Construction of Light-trees for WDM Multicasting under Splitting Capability Constraints

    DEFF Research Database (Denmark)

    Zsigri, Anikó; Guitton, A.; Molnár, M.

    2003-01-01

    Communication systems with all-optical multicasting have better performance than those using optical/electrical/optical conversion. Multicast protocols assume that all nodes in the network can forward the signal from one input to several outputs. Since fabrication of an optical switch with splitt......Communication systems with all-optical multicasting have better performance than those using optical/electrical/optical conversion. Multicast protocols assume that all nodes in the network can forward the signal from one input to several outputs. Since fabrication of an optical switch...

  11. A Multicast Sparse-Grooming Algorithm Based on Network Coding in WDM Networks

    Science.gov (United States)

    Zhang, Shengfeng; Peng, Han; Sui, Meng; Liu, Huanlin

    2015-03-01

    To improve the limited number of wavelength utilization and decrease the traffic blocking probability in sparse-grooming wavelength-division multiplexing (WDM) networks, a multicast sparse-grooming algorithm based on network coding (MCSA-NC) is put forward to solve the routing problem for dynamic multicast requests in this paper. In the proposed algorithm, a traffic partition strategy, that the coarse-granularity multicast request with grooming capability on the source node is split into several fine-granularity multicast requests, is designed so as to increase the probability for traffic grooming successfully in MCSA-NC. Besides considering that multiple destinations should receive the data from source of the multicast request at the same time, the traditional transmission mechanism is improved by constructing edge-disjoint paths for each split multicast request. Moreover, in order to reduce the number of wavelengths required and further decrease the traffic blocking probability, a light-tree reconfiguration mechanism is presented in the MCSA-NC, which can select a minimal cost light tree from the established edge-disjoint paths for a new multicast request.

  12. An Efficient SDN Multicast Architecture for Dynamic Industrial IoT Environments

    Directory of Open Access Journals (Sweden)

    Hyeong-Su Kim

    2018-01-01

    Full Text Available Large-scale industrial IoT services appear in smart factory domains such as factory clouds which integrate distributed small factories into a large virtual factory with dynamic combination based on orders of consumers. A smart factory has so many industrial elements including various sensors/actuators, gateways, controllers, application servers, and IoT clouds. Since there are complex connections and relations, it is hard to handle them in point-to-point manner. In addition, many duplicated traffics are exchanged between them through the Internet. Multicast is believed as an effective many-to-many communication mechanism by establishing multicast trees between sources and receivers. There are, however, some issues for adopting multicast to large-scale industrial IoT services in terms of QoS. In this paper, we propose a novel software-defined network multicast based on group shared tree which includes near-receiver rendezvous point selection algorithm and group shared tree switching mechanism. As a result, the proposed multicast mechanism can reduce the packet loss by 90% compared to the legacy methods under severe congestion condition. GST switching method obtains to decreased packet delay effect, respectively, 2%, 20% better than the previously studied multicast and the legacy SDN multicast.

  13. Deploying Next Generation Multicast-enabled Applications Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet

    CERN Document Server

    Joseph, Vinod

    2011-01-01

    The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicas

  14. Merging Network Coding with Feedback Management in Multicast Streaming

    DEFF Research Database (Denmark)

    Moreira, André; Almeida, Luis; Roetter, Daniel Enrique Lucani

    2015-01-01

    Reliable multicast over wireless poses interesting challenges arising from the unreliable nature of the wireless medium. Recovering lost packets is particularly challenging in multicast scenarios since different receivers lose different packets. For this reason, simply retransmitting packets does...

  15. Efficient round-robin multicast scheduling for input-queued switches

    DEFF Research Database (Denmark)

    Rasmussen, Anders; Yu, Hao; Ruepp, Sarah Renée

    2014-01-01

    The input-queued (IQ) switch architecture is favoured for designing multicast high-speed switches because of its scalability and low implementation complexity. However, using the first-in-first-out (FIFO) queueing discipline at each input of the switch may cause the head-of-line (HOL) blocking...... problem. Using a separate queue for each output port at an input to reduce the HOL blocking, that is, the virtual output queuing discipline, increases the implementation complexity, which limits the scalability. Given the increasing link speed and network capacity, a low-complexity yet efficient multicast...... by means of queue look-ahead. Simulation results demonstrate that this FIFO-based IQ multicast architecture is able to achieve significant improvements in terms of multicast latency requirements by searching through a small number of cells beyond the HOL cells in the input queues. Furthermore, hardware...

  16. Experimental characterization of a new multicasting node architecture based on space splitters and wavelength converters

    Science.gov (United States)

    He, Hao; Su, Yikai; Hu, Peigang; Hu, Weisheng

    2005-11-01

    IPTV-based broadband services such as interactive multimedia and video conferencing are considered as promising revenue-adding services, and multicast is proven to be a good supplier to support these applications for its reduced consumption of network bandwidth. Generally there are two approaches to implement optical layer multicast. One is space-domain multicast using space-splitter which is low cost but has wavelength continuity constraint, the other is frequency-domain multicast using wavelength converter which resolves the wavelength continuity but with high costs. A new multicasting node which adopts both space-domain multicast and frequency-domain multicast is recently discussed. In this paper we present an experimental demonstration of the new multicasting node architecture based on space splitters and wavelength converters, measurements to characterize such a node are provided.

  17. Dynamic multicast routing scheme in WDM optical network

    Science.gov (United States)

    Zhu, Yonghua; Dong, Zhiling; Yao, Hong; Yang, Jianyong; Liu, Yibin

    2007-11-01

    During the information era, the Internet and the service of World Wide Web develop rapidly. Therefore, the wider and wider bandwidth is required with the lower and lower cost. The demand of operation turns out to be diversified. Data, images, videos and other special transmission demands share the challenge and opportunity with the service providers. Simultaneously, the electrical equipment has approached their limit. So the optical communication based on the wavelength division multiplexing (WDM) and the optical cross-connects (OXCs) shows great potentials and brilliant future to build an optical network based on the unique technical advantage and multi-wavelength characteristic. In this paper, we propose a multi-layered graph model with inter-path between layers to solve the problem of multicast routing wavelength assignment (RWA) contemporarily by employing an efficient graph theoretic formulation. And at the same time, an efficient dynamic multicast algorithm named Distributed Message Copying Multicast (DMCM) mechanism is also proposed. The multicast tree with minimum hops can be constructed dynamically according to this proposed scheme.

  18. Hybrid monitoring scheme for end-to-end performance enhancement of multicast-based real-time media

    Science.gov (United States)

    Park, Ju-Won; Kim, JongWon

    2004-10-01

    As real-time media applications based on IP multicast networks spread widely, end-to-end QoS (quality of service) provisioning for these applications have become very important. To guarantee the end-to-end QoS of multi-party media applications, it is essential to monitor the time-varying status of both network metrics (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In this paper, targeting the multicast-enabled AG (Access Grid) a next-generation group collaboration tool based on multi-party media services, the applicability of hybrid monitoring scheme that combines active and passive monitoring is investigated. The active monitoring measures network-layer metrics (i.e., network condition) with probe packets while the passive monitoring checks both application-layer metrics (i.e., user traffic condition by analyzing RTCP packets) and system metrics. By comparing these hybrid results, we attempt to pinpoint the causes of performance degradation and explore corresponding reactions to improve the end-to-end performance. The experimental results show that the proposed hybrid monitoring can provide useful information to coordinate the performance improvement of multi-party real-time media applications.

  19. Maximization Network Throughput Based on Improved Genetic Algorithm and Network Coding for Optical Multicast Networks

    Science.gov (United States)

    Wei, Chengying; Xiong, Cuilian; Liu, Huanlin

    2017-12-01

    Maximal multicast stream algorithm based on network coding (NC) can improve the network's throughput for wavelength-division multiplexing (WDM) networks, which however is far less than the network's maximal throughput in terms of theory. And the existing multicast stream algorithms do not give the information distribution pattern and routing in the meantime. In the paper, an improved genetic algorithm is brought forward to maximize the optical multicast throughput by NC and to determine the multicast stream distribution by hybrid chromosomes construction for multicast with single source and multiple destinations. The proposed hybrid chromosomes are constructed by the binary chromosomes and integer chromosomes, while the binary chromosomes represent optical multicast routing and the integer chromosomes indicate the multicast stream distribution. A fitness function is designed to guarantee that each destination can receive the maximum number of decoding multicast streams. The simulation results showed that the proposed method is far superior over the typical maximal multicast stream algorithms based on NC in terms of network throughput in WDM networks.

  20. Many-to-Many Multicast Routing Schemes under a Fixed Topology

    Directory of Open Access Journals (Sweden)

    Wei Ding

    2013-01-01

    Full Text Available Many-to-many multicast routing can be extensively applied in computer or communication networks supporting various continuous multimedia applications. The paper focuses on the case where all users share a common communication channel while each user is both a sender and a receiver of messages in multicasting as well as an end user. In this case, the multicast tree appears as a terminal Steiner tree (TeST. The problem of finding a TeST with a quality-of-service (QoS optimization is frequently NP-hard. However, we discover that it is a good idea to find a many-to-many multicast tree with QoS optimization under a fixed topology. In this paper, we are concerned with three kinds of QoS optimization objectives of multicast tree, that is, the minimum cost, minimum diameter, and maximum reliability. All of three optimization problems are distributed into two types, the centralized and decentralized version. This paper uses the dynamic programming method to devise an exact algorithm, respectively, for the centralized and decentralized versions of each optimization problem.

  1. Stateless multicast switching in software defined networks

    OpenAIRE

    Reed, Martin J.; Al-Naday, Mays; Thomos, Nikolaos; Trossen, Dirk; Petropoulos, George; Spirou, Spiros

    2016-01-01

    Multicast data delivery can significantly reduce traffic in operators' networks, but has been limited in deployment due to concerns such as the scalability of state management. This paper shows how multicast can be implemented in contemporary software defined networking (SDN) switches, with less state than existing unicast switching strategies, by utilising a Bloom Filter (BF) based switching technique. Furthermore, the proposed mechanism uses only proactive rule insertion, and thus, is not l...

  2. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  3. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad

    2012-08-01

    Relay-based multicasting for the purpose of cooperative content distribution is studied. Optimized relay selection is performed with the objective of minimizing the energy consumption or the content distribution delay within a cluster of cooperating mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles that were not able to receive the multicast data. Both schemes show significant superiority compared to the non-cooperative scenarios, in terms of energy consumption and delay reduction. © 2012 IEEE.

  4. Simultaneous multichannel wavelength multicasting and XOR logic gate multicasting for three DPSK signals based on four-wave mixing in quantum-dot semiconductor optical amplifier.

    Science.gov (United States)

    Qin, Jun; Lu, Guo-Wei; Sakamoto, Takahide; Akahane, Kouichi; Yamamoto, Naokatsu; Wang, Danshi; Wang, Cheng; Wang, Hongxiang; Zhang, Min; Kawanishi, Tetsuya; Ji, Yuefeng

    2014-12-01

    In this paper, we experimentally demonstrate simultaneous multichannel wavelength multicasting (MWM) and exclusive-OR logic gate multicasting (XOR-LGM) for three 10Gbps non-return-to-zero differential phase-shift-keying (NRZ-DPSK) signals in quantum-dot semiconductor optical amplifier (QD-SOA) by exploiting the four-wave mixing (FWM) process. No additional pump is needed in the scheme. Through the interaction of the input three 10Gbps DPSK signal lights in QD-SOA, each channel is successfully multicasted to three wavelengths (1-to-3 for each), totally 3-to-9 MWM, and at the same time, three-output XOR-LGM is obtained at three different wavelengths. All the new generated channels are with a power penalty less than 1.2dB at a BER of 10(-9). Degenerate and non-degenerate FWM components are fully used in the experiment for data and logic multicasting.

  5. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  6. A novel WDM passive optical network architecture supporting two independent multicast data streams

    Science.gov (United States)

    Qiu, Yang; Chan, Chun-Kit

    2012-01-01

    We propose a novel scheme to perform optical multicast overlay of two independent multicast data streams on a wavelength-division-multiplexed (WDM) passive optical network. By controlling a sinusoidal clock signal and shifting the wavelength at the optical line terminal (OLT), the delivery of the two multicast data, being carried by the generated optical tones, can be independently and flexibly controlled. Simultaneous transmission of 10-Gb/s unicast downstream and upstream data as well as two independent 10-Gb/s multicast data was successfully demonstrated.

  7. An efficient mechanism for dynamic survivable multicast traffic grooming

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2015-06-01

    Recent advances in wavelength division multiplexing (WDM) networks have helped enhance the popularity of multicasting services. However, as a single network failure may disrupt the information transmission to multiple end-users, protecting multicast requests against network failures becomes an important issue in network operation. This paper investigates the sub-wavelength level protection for dynamic multicast traffic grooming. A new method named lightpath-fragmentation based segment shared protection (LF-SSP) scheme is proposed. By carefully splitting primary/backup lightpaths into segments to improve resource sharing for both traffic grooming and protection, LF-SSP aims to minimize the network resources allocated for request protection. Extensive simulations are carried out to compare the performance of LF-SSP to some existing approaches, on sub-wavelength-level as well as wavelength-level multicast protections in different cases. Results show that LF-SSP steadily outperforms these existing methods as long as the network resources are not too limited. Influences of the add/drop port resources and the average number of destinations per connection request on the LF-SSP performance are also evaluated.

  8. A multicast tree aggregation algorithm in wavelength-routed WDM networks

    Science.gov (United States)

    Cheng, Hsu-Chen; Kuo, Chin-Chun; Lin, Frank Y.

    2005-02-01

    Wavelength division multiplexing (WDM) has been considered a promising transmission technology in optical communication networks. With the continuous advance in optical technology, WDM network will play an important role in wide area backbone networks. Optical wavelength switching, compared with optical packet switching, is a more mature and more cost-effective choice for optical switching technologies. Besides, the technology of time division multiplexing in optical communication networks has been working smoothly for a long time. In the proposed research, the problem of multicast groups aggregation and multicast routing and wavelength assignment in wavelength-routed WDM network is studied. The optical cross connect switches in the problem are assumed to have limited optical multicast/splitting and TDM functionalities. Given the physical network topology and capacity, the objective is to maximize the total revenue by means of utmost merging multicast groups into larger macro-groups. The groups in the same macro-group will share a multicast tree to conduct data transmission. The problem is formulated as an optimization problem, where the objective function is to maximize the total revenue subject to capacity constraints of components in the optical network, wavelength continuity constraints, and tree topology constraints. The decision variables in the formulations include the merging results between groups, multicast tree routing assignment and wavelength assignment. The basic approach to the algorithm development for this model is Lagrangean relaxation in conjunction with a number of optimization techniques. In computational experiments, the proposed algorithms are evaluated on different network topologies and perform efficiently and effectively according to the experiment results.

  9. Integration of look-ahead multicast and unicast scheduling for input-queued cell switches

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2012-01-01

    This paper presents an integration of multicast and unicast traffic scheduling algorithms for input-queued cell switches. The multi-level round-robin multicast scheduling (ML-RRMS) algorithm with the look-ahead (LA) mechanism provides a highly scalable architecture and is able to reduce the head...... module that filters out the conflicting requests to ensure fairness. Simulation results show that comparing with the scheme using WBA for the multicast scheduling, the scheme proposed in this paper reduces the HOL blocking problem for multicast traffic and provides a significant improvement in terms...

  10. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  11. A Scalable and Fault-Tolerant Architecture for Internet Multicasting Using Meshes

    National Research Council Canada - National Science Library

    Garcia-Luna-Aceves, J. J; Balasubramaniyan, Saravanan; Balakrishnan, Ramesh

    2002-01-01

    ... communication within a group. A new protocol is presented for the creation and management of multicast meshes that substitute for the traditional multicast trees as the underlying routing structure for multipoint communication within groups...

  12. A Novel OBDD-Based Reliability Evaluation Algorithm for Wireless Sensor Networks on the Multicast Model

    Directory of Open Access Journals (Sweden)

    Zongshuai Yan

    2015-01-01

    Full Text Available The two-terminal reliability calculation for wireless sensor networks (WSNs is a #P-hard problem. The reliability calculation of WSNs on the multicast model provides an even worse combinatorial explosion of node states with respect to the calculation of WSNs on the unicast model; many real WSNs require the multicast model to deliver information. This research first provides a formal definition for the WSN on the multicast model. Next, a symbolic OBDD_Multicast algorithm is proposed to evaluate the reliability of WSNs on the multicast model. Furthermore, our research on OBDD_Multicast construction avoids the problem of invalid expansion, which reduces the number of subnetworks by identifying the redundant paths of two adjacent nodes and s-t unconnected paths. Experiments show that the OBDD_Multicast both reduces the complexity of the WSN reliability analysis and has a lower running time than Xing’s OBDD- (ordered binary decision diagram- based algorithm.

  13. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  14. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  15. Pseudo-Cycle-Based Multicast Routing in Wormhole-Routed Networks

    Institute of Scientific and Technical Information of China (English)

    SONG JianPing (宋建平); HOU ZiFeng (侯紫峰); XU Ming (许铭)

    2003-01-01

    This paper addresses the problem of fault-tolerant multicast routing in wormholerouted multicomputers. A new pseudo-cycle-based routing method is presented for constructing deadlock-free multicast routing algorithms. With at most two virtual channels this technique can be applied to any connected networks with arbitrary topologies. Simulation results show that this technique results in negligible performance degradation even in the presence of a large number of faulty nodes.

  16. Multisites Coordination in Shared Multicast Trees

    National Research Council Canada - National Science Library

    Dommel, H-P; Garcia-Luna-Aceves, J. J

    1999-01-01

    .... The protocol supports Internet-wide coordination for large and highly interactive groupwork, relying on transmission of coordination directives between group members across a shared end-to-end multicast tree...

  17. Demonstration of flexible multicasting and aggregation functionality for TWDM-PON

    Science.gov (United States)

    Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Zhu, Jinglong; Tian, Yu; Wu, Zhongying; Peng, Huangfa; Xu, Yongchi; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan

    2017-06-01

    The time- and wavelength-division multiplexed passive optical network (TWDM-PON) has been recognized as an attractive solution to provide broadband access for the next-generation networks. In this paper, we propose flexible service multicasting and aggregation functionality for TWDM-PON utilizing multiple-pump four-wave-mixing (FWM) and cyclic arrayed waveguide grating (AWG). With the proposed scheme, multiple TWDM-PON links share a single optical line terminal (OLT), which can greatly reduce the network deployment expense and achieve efficient network resource utilization by load balancing among different optical distribution networks (ODNs). The proposed scheme is compatible with existing TDM-PON infrastructure with fixed-wavelength OLT transmitter, thus smooth service upgrade can be achieved. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment with 10-Gb/s OOK and 10-Gb/s QPSK orthogonal frequency division multiplexing (OFDM) signal multicasting and aggregating to seven PON links. Compared with back-to-back (BTB) channel, the newly generated multicasting OOK signal and OFDM signal have power penalty of 1.6 dB and 2 dB at the BER of 10-3, respectively. For the aggregation of multiple channels, no obvious power penalty is observed. What is more, to verify the flexibility of the proposed scheme, we reconfigure the wavelength selective switch (WSS) and adjust the number of pumps to realize flexible multicasting functionality. One to three, one to seven, one to thirteen and one to twenty-one multicasting are achieved without modifying OLT structure.

  18. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  19. Out-of-Sequence Preventative Cell Dispatching for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes two out-of-sequence (OOS) preventative cell dispatching algorithms for the multicast input-queued space-memory-memory (IQ-SMM) Clos-network switch architecture, i.e. the multicast flow-based DSRR (MF-DSRR) and the multicast flow-based round-robin (MFRR). Treating each cell...

  20. Using IGMP V3 for controllable multicast over EPON

    Science.gov (United States)

    Zhang, Chuanhao; Liu, Deming; Zhang, Li; Wu, Guangsheng

    2008-11-01

    The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. The document proposed a novel scheme, based on the former research for controllable multicast over EPON system, mainly considering system security and maintainability. It can both control the IPTV program source's and the receiver's validity, improving the efficiency and precision. The processing of the two configurations mode is given in detail.

  1. Increase in Multicast OFDM Data Rate in PLC Network using Adaptive LP-OFDM

    OpenAIRE

    Maiga , Ali; Baudais , Jean-Yves; Hélard , Jean-François

    2009-01-01

    ISBN: 978-1-4244-3523-4; International audience; Linear precoding (LP) technique applied to OFDM systems has already proved its ability to significantly increase the system throughput in a powerline communication (PLC) context. In this paper, we propose resource allocation algorithms based on the LP technique to increase the multicast OFDM systems bit rate. The conventional multicast capacity is limited by the user which experiences the worst channel conditions. To increase the multicast bit ...

  2. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  3. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  4. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  5. WDM Multicast Tree Construction Algorithms and Their Comparative Evaluations

    Science.gov (United States)

    Makabe, Tsutomu; Mikoshi, Taiju; Takenaka, Toyofumi

    We propose novel tree construction algorithms for multicast communication in photonic networks. Since multicast communications consume many more link resources than unicast communications, effective algorithms for route selection and wavelength assignment are required. We propose a novel tree construction algorithm, called the Weighted Steiner Tree (WST) algorithm and a variation of the WST algorithm, called the Composite Weighted Steiner Tree (CWST) algorithm. Because these algorithms are based on the Steiner Tree algorithm, link resources among source and destination pairs tend to be commonly used and link utilization ratios are improved. Because of this, these algorithms can accept many more multicast requests than other multicast tree construction algorithms based on the Dijkstra algorithm. However, under certain delay constraints, the blocking characteristics of the proposed Weighted Steiner Tree algorithm deteriorate since some light paths between source and destinations use many hops and cannot satisfy the delay constraint. In order to adapt the approach to the delay-sensitive environments, we have devised the Composite Weighted Steiner Tree algorithm comprising the Weighted Steiner Tree algorithm and the Dijkstra algorithm for use in a delay constrained environment such as an IPTV application. In this paper, we also give the results of simulation experiments which demonstrate the superiority of the proposed Composite Weighted Steiner Tree algorithm compared with the Distributed Minimum Hop Tree (DMHT) algorithm, from the viewpoint of the light-tree request blocking.

  6. Delay Bounded Multi-Source Multicast in Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Thabo Semong

    2018-01-01

    Full Text Available Software-Defined Networking (SDN is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple destinations. The current traffic engineering in SDN focuses mainly on unicast, however, multicast can effectively reduce network resource consumption by serving multiple clients. This paper studies a novel delay-bounded multi-source multicast SDN problem, in which among the set of potential sources, we select a source to build the multicast-tree, under the constraint that the transmission delay for every destination is bounded. This problem is more difficult than the traditional Steiner minimum tree (SMT problem, since it needs to find a source from the set of all potential sources. We model the problem as a mixed-integer linear programming (MILP and prove its NP-Hardness. To solve the problem, a delay bounded multi-source (DBMS scheme is proposed, which includes a DBMS algorithm to build a minimum delay cost DBMS-Forest. Through a MATLAB experiment, we demonstrate that DBMS is significantly more efficient and outperforms other existing algorithms in the literature.

  7. Optimization of multicast optical networks with genetic algorithm

    Science.gov (United States)

    Lv, Bo; Mao, Xiangqiao; Zhang, Feng; Qin, Xi; Lu, Dan; Chen, Ming; Chen, Yong; Cao, Jihong; Jian, Shuisheng

    2007-11-01

    In this letter, aiming to obtain the best multicast performance of optical network in which the video conference information is carried by specified wavelength, we extend the solutions of matrix games with the network coding theory and devise a new method to solve the complex problems of multicast network switching. In addition, an experimental optical network has been testified with best switching strategies by employing the novel numerical solution designed with an effective way of genetic algorithm. The result shows that optimal solutions with genetic algorithm are accordance with the ones with the traditional fictitious play method.

  8. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  9. Enhanced first-in-first-out-based round-robin multicast scheduling algorithm for input-queued switches

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This study focuses on the multicast scheduling for M × N input-queued switches. An enhanced first-in-first-out -based round-robin multicast scheduling algorithm is proposed with a function of searching deeper into queues to reduce the head-of-line (HOL) blocking problem and thereby the multicast...... out on the decision matrix to reduce the number of transmission for each cell. To reduce the HOL blocking problem, a complement matrix is constructed based on the traffic matrix and the decision matrix, and a process of searching deeper into the queues is carried out to find cells that can be sent...... to the idle outputs. Simulation results show that the proposed function of searching deeper into the queues can alleviate the HOL blocking and as a result reduce the multicast latency significantly. Under both balanced and unbalanced multicast traffic, the proposed algorithm is able to maintain a stable...

  10. Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective

    Directory of Open Access Journals (Sweden)

    Fan Jiang

    2017-01-01

    Full Text Available In this paper, by utilizing the social relationships among mobile users, we present a framework of energy-efficient cluster formation and resource allocation for multicast D2D transmission. In particular, we first deal with D2D multicast cluster/group formation strategy from both physical distance and social trust level. Then we aim to maximize the overall energy-efficiency of D2D multicast groups through resource allocation and power control scheme, which considers the quality-of-service (QoS requirements of both cellular user equipment and D2D groups. A heuristic algorithm is proposed to solve above energy-efficiency problem with less complexity. After that, considering the limited battery capacity of mobile users, we propose an energy and social aware cluster head update algorithm, which incorporates both the energy constraint and social centrality measurement. Numerical results indicate that the proposed social-tie based D2D multicast group formation and update algorithm form a multicast group in an energy efficient way. Moreover, the proposed resource and power allocation scheme achieves better energy efficiency in terms of throughput per energy consumption. These results show that, by exploiting social domain information, underlay D2D multicast transmission has high practical potential in saving the source on wireless links and in the backhaul.

  11. Preventing Out-of-Sequence for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes an out-of-sequence (OOS) preventative cell dispatching algorithm, the multicast flow-based round robin (MFRR), for multicast input-queued space-memory-memory (IQ-SMM) Clos-network architecture. Independently treating each incoming cell, such as the desynchronized static round...

  12. A Multicast Protocol Utilizing On-demand Routing Strategy for MPRN

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper proposes a multicast protocol utilizing ondemand routing strategy for mobile packet radio network. It does not maintain permanent route tables with full topological views. Instead, multicast senders apply on-demand procedures to dynamically discover routes and build forwarding group in this protocol. The data packets are propagated by each forwarding group member via scoped flooding, so the protocol can reduce network bandwidth overhead and avoid the propagation of potentially large routing updates throughout the network.

  13. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Science.gov (United States)

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  14. QoS and QoE Aware N-Screen Multicast Service

    Directory of Open Access Journals (Sweden)

    Ghulam Sarwar

    2016-01-01

    Full Text Available The paper focuses on ensuring the quality-of-service (QoS and quality-of-experience (QoE requirements of users having heterogeneous devices in a multicast session. QoS parameters such as bit rate, delays, and packet losses are good indicators for optimizing network services but fall short in characterizing user perception (QoE. In N-Screen service, the users have different devices with heterogeneous attributes like screen size, resolution, and access network interface, and the users have different QoE on N-Screen devices with the same QoS parameters. We formulate the objective function of the N-Screen multicast grouping to ensure the minimum user’s QoE with smaller bandwidth requirement. We propose a dynamic user reassignment scheme to maintain and satisfy the QoE by adapting the user’s membership to the varying network conditions. The proposed schemes combine the available bandwidth and multimedia visual quality to ensure the QoS and QoE. In the network architecture, we introduce the functions of the QoS and QoE aware multicast group management and the estimation schemes for the QoS and QoE parameters. The simulation results show that the proposed multicast service ensures the network QoS and guarantees the QoE of users in the varying network conditions.

  15. Polarization Insensitive One-to-Six WDM Multicasting in a Silicon Nanowire

    DEFF Research Database (Denmark)

    Pu, Minhao; Hu, Hao; Peucheret, Christophe

    2012-01-01

    We present polarization insensitive one-to-six WDM multicasting based on nondegenerate four-wave mixing in a silicon nanowire with angled-pump scheme. Bit-error rate measurements are performed and error-free operation is achieved.......We present polarization insensitive one-to-six WDM multicasting based on nondegenerate four-wave mixing in a silicon nanowire with angled-pump scheme. Bit-error rate measurements are performed and error-free operation is achieved....

  16. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2017-01-01

    , this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore......, a first objective of this work is to assess the operating regions where employing cooperation results in higher throughput and/or energy savings. We consider multicast scenarios with network coded mechanisms employing Random Linear Network Coding (RLNC). However, although RLNC is good for low amount...... of transmissions in multicast, it has an inherent overhead from extreme high or low field related caveats. Thus, as a second objective, we review and propose the application of new network codes that posses low overhead for multicasting, by having a short representation and low dependence probability. We provide...

  17. Near-field self-interference cancellation and quality of service multicast beamforming in full-duplex

    Science.gov (United States)

    Wu, Fei; Shao, Shihai; Tang, Youxi

    2016-10-01

    To enable simultaneous multicast downlink transmit and receive operations on the same frequency band, also known as full-duplex links between an access point and mobile users. The problem of minimizing the total power of multicast transmit beamforming is considered from the viewpoint of ensuring the suppression amount of near-field line-of-sight self-interference and guaranteeing prescribed minimum signal-to-interference-plus-noise-ratio (SINR) at each receiver of the multicast groups. Based on earlier results for multicast groups beamforming, the joint problem is easily shown to be NP-hard. A semidefinite relaxation (SDR) technique with linear program power adjust method is proposed to solve the NP-hard problem. Simulation shows that the proposed method is feasible even when the local receive antenna in nearfield and the mobile user in far-filed are in the same direction.

  18. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  19. Scalable Multicasting over Next-Generation Internet Design, Analysis and Applications

    CERN Document Server

    Tian, Xiaohua

    2013-01-01

    Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity to good use in designing a scalable multicast  protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet’s next incarnation is a research hot-spot in the computer communications field.   The methodical presentation deals with the key questions in turn: from the mechanics of multicast protocols to current state-of-the-art designs, and from methods of theoretical analysis of these protocols to applying them in the ns2 network simulator, known for being hard to extend. The authors’ years of research in the field inform this thorough treatment, which covers details such as applying AOM (application-oriented multicast) protocol to IPTV provision and resolving...

  20. Link importance incorporated failure probability measuring solution for multicast light-trees in elastic optical networks

    Science.gov (United States)

    Li, Xin; Zhang, Lu; Tang, Ying; Huang, Shanguo

    2018-03-01

    The light-tree-based optical multicasting (LT-OM) scheme provides a spectrum- and energy-efficient method to accommodate emerging multicast services. Some studies focus on the survivability technologies for LTs against a fixed number of link failures, such as single-link failure. However, a few studies involve failure probability constraints when building LTs. It is worth noting that each link of an LT plays different important roles under failure scenarios. When calculating the failure probability of an LT, the importance of its every link should be considered. We design a link importance incorporated failure probability measuring solution (LIFPMS) for multicast LTs under independent failure model and shared risk link group failure model. Based on the LIFPMS, we put forward the minimum failure probability (MFP) problem for the LT-OM scheme. Heuristic approaches are developed to address the MFP problem in elastic optical networks. Numerical results show that the LIFPMS provides an accurate metric for calculating the failure probability of multicast LTs and enhances the reliability of the LT-OM scheme while accommodating multicast services.

  1. Bit rate maximization for multicast LP-OFDM systems in PLC context

    OpenAIRE

    Maiga , Ali; Baudais , Jean-Yves; Hélard , Jean-François

    2009-01-01

    ISBN: 978-88-900984-8-2.; International audience; In this paper, we propose a new resource allocation algorithm based on linear precoding technique for multicast OFDM systems. Linear precoding technique applied to OFDM systems has already proved its ability to significantly increase the system throughput in a powerline communication (PLC) context. Simulations through PLC channels show that this algorithm outperforms the classical multicast method (up to 7.3% bit rate gain) and gives better pe...

  2. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  3. [Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University].

    Science.gov (United States)

    Karpishchenko, S A

    This article is designed to report the results of the analysis ofacademic, scientific, and clinical activities of the Department of Otorhinolaryngology of the I.P. Pavlov Saint-Peterburg First State Medical University.

  4. History-based Adaptive Modulation for a Downlink Multicast Channel in OFDMA systems

    DEFF Research Database (Denmark)

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2008-01-01

    In this paper we investigated the adaptive modulation strategies for Multicast service in orthogonal frequency division multiple access systems. We defined a Reward function as the performance optimization target and developed adaptive modulation strategies to maximize this Reward function....... The proposed optimization algorithm varied the instantaneous BER constraint of each mobile Multicast receiver according to its individual cumulated BER, which resulted in a significant Reward gain....

  5. A Grooming Nodes Optimal Allocation Method for Multicast in WDM Networks

    Directory of Open Access Journals (Sweden)

    Chengying Wei

    2016-01-01

    Full Text Available The grooming node has the capability of grooming multicast traffic with the small granularity into established light at high cost of complexity and node architecture. In the paper, a grooming nodes optimal allocation (GNOA method is proposed to optimize the allocation of the grooming nodes constraint by the blocking probability for multicast traffic in sparse WDM networks. In the proposed GNOA method, the location of each grooming node is determined by the SCLD strategy. The improved smallest cost largest degree (SCLD strategy is designed to select the nongrooming nodes in the proposed GNOA method. The simulation results show that the proposed GNOA method can reduce the required number of grooming nodes and decrease the cost of constructing a network to guarantee a certain request blocking probability when the wavelengths per fiber and transmitter/receiver ports per node are sufficient for the optical multicast in WDM networks.

  6. Empirical Evaluation of Superposition Coded Multicasting for Scalable Video

    KAUST Repository

    Chun Pong Lau

    2013-03-01

    In this paper we investigate cross-layer superposition coded multicast (SCM). Previous studies have proven its effectiveness in exploiting better channel capacity and service granularities via both analytical and simulation approaches. However, it has never been practically implemented using a commercial 4G system. This paper demonstrates our prototype in achieving the SCM using a standard 802.16 based testbed for scalable video transmissions. In particular, to implement the superposition coded (SPC) modulation, we take advantage a novel software approach, namely logical SPC (L-SPC), which aims to mimic the physical layer superposition coded modulation. The emulation results show improved throughput comparing with generic multicast method.

  7. Multicast backup reprovisioning problem for Hamiltonian cycle-based protection on WDM networks

    Science.gov (United States)

    Din, Der-Rong; Huang, Jen-Shen

    2014-03-01

    As networks grow in size and complexity, the chance and the impact of failures increase dramatically. The pre-allocated backup resources cannot provide 100% protection guarantee when continuous failures occur in a network. In this paper, the multicast backup re-provisioning problem (MBRP) for Hamiltonian cycle (HC)-based protection on WDM networks for the link-failure case is studied. We focus on how to recover the protecting capabilities of Hamiltonian cycle against the subsequent link-failures on WDM networks for multicast transmissions, after recovering the multicast trees affected by the previous link-failure. Since this problem is a hard problem, an algorithm, which consists of several heuristics and a genetic algorithm (GA), is proposed to solve it. The simulation results of the proposed method are also given. Experimental results indicate that the proposed algorithm can solve this problem efficiently.

  8. Providing resilience for carrier ethernet multicast traffic

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Zhang, Jiang

    2009-01-01

    This paper presents an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, we detail how multicast traffic, which is essential for e.g. IPTV can be protected. We present Carrier Ethernet resilience methods for linear and ring networks and show by simulation...

  9. On-Chip SDM Switching for Unicast, Multicast and Traffic Grooming in Data Center Networks

    DEFF Research Database (Denmark)

    Kamchevska, Valerija; Ding, Yunhong; Dalgaard, Kjeld

    2017-01-01

    This paper reports on the use of a novel photonic integrated circuit that facilitates multicast and grooming in an optical data center architecture. The circuit allows for on-chip spatial multiplexing and demultiplexing as well as fiber core switching. Using this device, we experimentally verify...... that multicast and/or grooming can be successfully performed along the full range of output ports, for different group size and different power ratio. Moreover, we experimentally demonstrate SDM transmission and 5 Tbit/s switching using the on-chip fiber switch with integrated fan-in/fan-out devices and achieve...... errorfree performance (BER≤10-9) for a network scenario including simultaneous unicast/multicast switching and traffic grooming....

  10. Analysis and Optimization of Sparse Random Linear Network Coding for Reliable Multicast Services

    DEFF Research Database (Denmark)

    Tassi, Andrea; Chatzigeorgiou, Ioannis; Roetter, Daniel Enrique Lucani

    2016-01-01

    Point-to-multipoint communications are expected to play a pivotal role in next-generation networks. This paper refers to a cellular system transmitting layered multicast services to a multicast group of users. Reliability of communications is ensured via different random linear network coding (RLNC......) techniques. We deal with a fundamental problem: the computational complexity of the RLNC decoder. The higher the number of decoding operations is, the more the user's computational overhead grows and, consequently, the faster the battery of mobile devices drains. By referring to several sparse RLNC...... techniques, and without any assumption on the implementation of the RLNC decoder in use, we provide an efficient way to characterize the performance of users targeted by ultra-reliable layered multicast services. The proposed modeling allows to efficiently derive the average number of coded packet...

  11. Optimal multicasting in a multi-line-rate ethernet-over-WDM network

    Science.gov (United States)

    Harve, Shruthi; Batayneh, Marwan; Mukherjee, Biswanath

    2009-11-01

    Ethernet is the dominant transport technology for Local Area Networks. Efforts are now under way to use carrier-grade Ethernet in backbone networks of different service providers. With the advent of applications such as IPTV and Videoon- Demand, there is need for techniques to route multicast traffic over the Ethernet backbone networks. Here, we address the problem of Routing and Wavelength Assignment (RWA) of a set of multicast requests in a Multi-Line-Rate Ethernet backbone network with the objective of minimizing the cost of setting up the network, in terms of the Service Provider's Capital Expenditure (CAPEX). We present an Auxiliary Graph based heuristic algorithm that routes each multicast request on a light-tree structure, and assigns minimum cost wavelengths along the route. We compare the properties of the algorithm to the optimal solution given by a mathematical model formulated as an Integer Linear Program (ILP), and show that they compare very well. We also find that the algorithm is most cost-effective when the incoming requests are processed in descending order of their bandwidth requirements.

  12. Empirical Evaluation of Superposition Coded Multicasting for Scalable Video

    KAUST Repository

    Chun Pong Lau; Shihada, Basem; Pin-Han Ho

    2013-01-01

    In this paper we investigate cross-layer superposition coded multicast (SCM). Previous studies have proven its effectiveness in exploiting better channel capacity and service granularities via both analytical and simulation approaches. However

  13. Multicasting based optical inverse multiplexing in elastic optical network.

    Science.gov (United States)

    Guo, Bingli; Xu, Yingying; Zhu, Paikun; Zhong, Yucheng; Chen, Yuanxiang; Li, Juhao; Chen, Zhangyuan; He, Yongqi

    2014-06-16

    Optical multicasting based inverse multiplexing (IM) is introduced in spectrum allocation of elastic optical network to resolve the spectrum fragmentation problem, where superchannels could be split and fit into several discrete spectrum blocks in the intermediate node. We experimentally demonstrate it with a 1-to-7 optical superchannel multicasting module and selecting/coupling components. Also, simulation results show that, comparing with several emerging spectrum defragmentation solutions (e.g., spectrum conversion, split spectrum), IM could reduce blocking performance significantly but without adding too much system complexity as split spectrum. On the other hand, service fairness for traffic with different granularity of these schemes is investigated for the first time and it shows that IM performs better than spectrum conversion and almost as well as split spectrum, especially for smaller size traffic under light traffic intensity.

  14. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  15. SOME NOTES ON COST ALLOCATION IN MULTICASTING

    Directory of Open Access Journals (Sweden)

    Darko Skorin-Kapov

    2012-12-01

    Full Text Available We analyze the cost allocation strategies with the problef of broadcasting information from some source to a number of communication network users. A multicast routing chooses a minimum cost tree network that spans the source and all the receivers. The cost of such a network is distributed among its receivers who may be individuals or organizations with possibly conflicting interests. Providing network developers, users and owners with practical computable 'fair' cost allocation solution procedures is of great importance for network mamagement. Consequently, this multidisciplinary problem was extensively studied by Operational Researchers, Economists, Mathematicians and Computer Scientists. The fairness of various proposed solutions was even argued in US courts. This presentation overviews some previously published, as well as some recent results, in the development of algorithmic mechanisms to efficiently compute 'attractive' cost allocation solutions for multicast networks. Specifically, we will analyze cooperative game theory based cost allocation models that avoid cross subsidies and/or are distance and population monotonic. We will also present some related open cost allocation problems and the potential contribution that such models might make to this problem in the future.

  16. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Abu-Dayya, Adnan A.

    2012-01-01

    mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles

  17. University Faculty and the Value of Their Intellectual Property: Comparing IP in Teaching and Research

    Science.gov (United States)

    Hentschke, Guilbert C.

    2017-01-01

    This chapter describes the protectionist and access functions of intellectual property for the teaching and research work of university faculty. The degree to which an individual piece of IP is protected or made accessible to others depends in large measure on its market-related characteristics, including costs of production, availability of…

  18. Universal Space IP Transparent Proxy, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  19. One-to-six WDM multicasting of DPSK signals based on dual-pump four-wave mixing in a silicon waveguide

    DEFF Research Database (Denmark)

    Pu, Minhao; Hu, Hao; Ji, Hua

    2011-01-01

    We present WDM multicasting based on dual-pump four-wave mixing in a 3-mm long dispersion engineered silicon waveguide. One-to-six phase-preserving WDM multicasting of 10-Gb/s differential phase-shiftkeying (DPSK) data is experimentally demonstrated with bit-error rate measurements. All the six...

  20. A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast

    Institute of Scientific and Technical Information of China (English)

    ZHAO Anjun; LU Xiangli; GUO Lei

    2006-01-01

    A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

  1. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  2. Tunable Photonic RF Generator for Dynamic Allocation and Multicast of 1.25 Gbps Channels in the 60 GHz Unlicensed Band

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Pang, Xiaodan; Vegas Olmos, Juan José

    2013-01-01

    ) or in the central office (CO). At the RN, we perform the replication of the original channel suitable for closely spaced multicast applications such as high definition (HD) video delivery where RN serves as a photonic radio frequency (RF) generator for both channel allocation and multicast. Experimental...

  3. Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission

    Directory of Open Access Journals (Sweden)

    Fan Jiang

    2017-11-01

    Full Text Available In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective resource allocation and power control schemes, while considering the quality of service (QoS requirements of both cellular users (CUs and D2D clusters. We first build the optimization model and a heuristic resource and power allocation algorithm is then proposed to solve the energy-efficiency problem with less computational complexity. Numerical results indicate that the proposed algorithm outperforms existing schemes in terms of throughput per energy consumption.

  4. Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Francesco Chiti

    2017-12-01

    Full Text Available The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has triggered new communication paradigms such as device-to-device (D2D and relaying communication schemes, which are both considered as strong drivers for the next fifth-generation (5G cellular systems. Recently, the social-aware layer and its relationship to and influence on the physical communications layer have gained great attention as emerging focus points. We focus here on the case of relaying communications to pursue the multicast data dissemination to a group of users forming a social community through a relay node, according to the extension of the D2D mode to the case of device-to-many devices. Moreover, in our case, the source selects the device to act as the relay among different users of the multicast group by taking into account both the propagation link conditions and the relay social-trust level with the constraint of minimizing the end-to-end content delivery delay. An optimization procedure is also proposed in order to achieve the best performance. Finally, numerical results are provided to highlight the advantages of considering the impact of social level on the end-to-end delivery delay in the integrated social–physical network in comparison with the classical relay-assisted multicast communications for which the relay social-trust level is not considered.

  5. An Economic Case for End System Multicast

    Science.gov (United States)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    This paper presents a non-strategic model for the end-system multicast networks based on the concept of replica exchange economy. We believe that microeconomics is a good candidate to investigate the problem of selfishness of the end-users (peers) in order to maximize the aggregate throughput. In this solution concept, the decisions that a peer might make, does not affect the actions of the other peers at all. The proposed mechanism tunes the price of the service in such a way that general equilibrium holds.

  6. Ruteo multicast mediante algoritmos genéticos

    OpenAIRE

    Klenzi, Raúl O.; Sánchez Tores, Héctor A.; Ortega, Manuel Oscar; Naranjo, Viviana; Espósito, Gabriela

    2000-01-01

    Los sistemas o redes de comunicación construidos teniendo en cuenta el modelo de referencia OSI (Open Systems lnterconection) o la arquitectura de Internet, fueron diseñados para soportar servicios o comunicaciones punto a punto, donde la información fluye entre dos usuarios únicamente. Uno de los tópicos en el cual las redes de computadoras actuales están poniendo mucho énfasis, proviene de las aplicaciones multicast o de grupo. Estas involucran más de dos usuarios (estos usuarios definen...

  7. All-optical broadcast and multicast technologies based on PPLN waveguide

    DEFF Research Database (Denmark)

    Ye, Lingyun; Wang, Ju; Hu, Hao

    2013-01-01

    All-optical 1×4 broadcast and 1×3 multicast experiments of a 40-Gb/s return-to-zero on-off keying (RZ-OOK) signal based on a periodically poled lithium niobate (PPLN) waveguide are demonstrated in this letter. Clear opened eye diagrams and error-free performance are achieved for the broadcast...

  8. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  9. Hybrid digital-analog video transmission in wireless multicast and multiple-input multiple-output system

    Science.gov (United States)

    Liu, Yu; Lin, Xiaocheng; Fan, Nianfei; Zhang, Lin

    2016-01-01

    Wireless video multicast has become one of the key technologies in wireless applications. But the main challenge of conventional wireless video multicast, i.e., the cliff effect, remains unsolved. To overcome the cliff effect, a hybrid digital-analog (HDA) video transmission framework based on SoftCast, which transmits the digital bitstream with the quantization residuals, is proposed. With an effective power allocation algorithm and appropriate parameter settings, the residual gains can be maximized; meanwhile, the digital bitstream can assure transmission of a basic video to the multicast receiver group. In the multiple-input multiple-output (MIMO) system, since nonuniform noise interference on different antennas can be regarded as the cliff effect problem, ParCast, which is a variation of SoftCast, is also applied to video transmission to solve it. The HDA scheme with corresponding power allocation algorithms is also applied to improve video performance. Simulations show that the proposed HDA scheme can overcome the cliff effect completely with the transmission of residuals. What is more, it outperforms the compared WSVC scheme by more than 2 dB when transmitting under the same bandwidth, and it can further improve performance by nearly 8 dB in MIMO when compared with the ParCast scheme.

  10. Almost optimal distributed M2M multicasting in wireless mesh networks

    DEFF Research Database (Denmark)

    Xin, Qin; Manne, Fredrik; Zhang, Yan

    2012-01-01

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoint-to- multipoint (M2M) multicasting in a WMN which aims to use the minimum nu...

  11. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    Directory of Open Access Journals (Sweden)

    Isam Ishaq

    2016-07-01

    Full Text Available The Internet of Things (IoT is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP, but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP.

  12. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.

    Science.gov (United States)

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2016-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

  13. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  14. Joint NC-ARQ and AMC for QoS-Guaranteed Mobile Multicast

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Wang, Haibo; Schwefel, Hans-Peter

    2010-01-01

    the scalability problem of applying ARQ in multicast. Then we propose two joint NC-ARQ-AMC schemes, namely, the Average PER-based AMC (AvgPER-AMC) with Opt-ARQ and AvgPER-AMC with SubOpt-ARQ in a cross-layer design framework to maximize the average spectral efficiency per receiver under specific QoS constraints...

  15. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  16. IP Centrex

    OpenAIRE

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  17. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  18. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  19. A Low-Complexity Subgroup Formation with QoS-Aware for Enhancing Multicast Services in LTE Networks

    Science.gov (United States)

    Algharem, M.; Omar, M. H.; Rahmat, R. F.; Budiarto, R.

    2018-03-01

    The high demand of Multimedia services on in Long Term Evolution (LTE) and beyond networks forces the networks operators to find a solution that can handle the huge traffic. Along with this, subgroup formation techniques are introduced to overcome the limitations of the Conventional Multicast Scheme (CMS) by splitting the multicast users into several subgroups based on the users’ channels quality signal. However, finding the best subgroup configuration with low complexity is need more investigations. In this paper, an efficient and simple subgroup formation mechanisms are proposed. The proposed mechanisms take the transmitter MAC queue in account. The effectiveness of the proposed mechanisms is evaluated and compared with CMS in terms of throughput, fairness, delay, Block Error Rate (BLER).

  20. Multi-Objective Resource Allocation Scheme for D2D Multicast with QoS Guarantees in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Fangmin Li

    2016-09-01

    Full Text Available Device-to-device (D2D multicast communication can greatly improve the spectrum utilization in a content delivery scenario. However, the co-channel interference and power consumption brought by D2D bring new challenges. All the D2D multicast groups expect to achieve a higher system capacity with less extra energy cost. In this paper, we investigate the uplink resource allocation issue when D2D multicast groups share the resources with other cellular uses (CUs, while guaranteeing a certain level of quality of service (QoS to CUs and D2D users. Firstly we address a flexible tradeoff framework in which the system power consumption and the system capacity (i.e., the number of admitted D2D links are assigned with different weight factors so that these two objectives are jointly considered. Then we propose an efficient resource optimization scheme, which comprises sub-channel allocation and signal-to-interference- plus-noise ratio (SINR assignment. Numerical results validate the effectiveness of the proposed framework, and demonstrate the advantages in dealing with the proposed multi-objective optimization problem.

  1. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  2. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James; Ho, Pin-Han; Shihada, Basem

    2009-01-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  3. Resource management in energy-limited, bandwidth-limited, transceiver-limited wireless networks for session-based multicasting

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2001-01-01

    In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well as on bandwidth and transceiver resources...

  4. Out-of-Sequence Prevention for Multicast Input-Queuing Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah; Berger, Michael Stübert

    2011-01-01

    This paper proposes two cell dispatching algorithms for the input-queuing space-memory-memory (IQ-SMM) Closnetwork to reduce out-of-sequence (OOS) for multicast traffic. The frequent connection pattern change of DSRR results in a severe OOS problem. Based on the principle of DSRR, MFDSRR is able ...

  5. MeshTree: A Delay optimised Overlay Multicast Tree Building Protocol

    OpenAIRE

    Tan, Su-Wei; Waters, A. Gill; Crawford, John

    2005-01-01

    We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if computed centrally. We identify two problems in traditional distributed solutions, namely the greedy problem and delay-cost trade-off. By offering solutions to these problems, we propose a new self-organising distributed tree building protocol called MeshTree. The main idea is to embed the delivery tree in a degree-bound...

  6. Adaptive Modulation for a Downlink Multicast Channel in OFDMA Systems

    DEFF Research Database (Denmark)

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2007-01-01

    In this paper we focus on adaptive modulation strategies for multicast service in orthogonal frequency division multiple access systems. A reward function has been defined as the optimization target, which includes both the average user throughput and bit error rate. We also developed an adaptive...... modulation strategy, namely local best reward strategy, to maximize this reward function. The performance of different modulation strategies are compared in different SNR distribution scenarios, and the optimum strategy in each scenario is suggested....

  7. Flexible and re-configurable optical three-input XOR logic gate of phase-modulated signals with multicast functionality for potential application in optical physical-layer network coding.

    Science.gov (United States)

    Lu, Guo-Wei; Qin, Jun; Wang, Hongxiang; Ji, XuYuefeng; Sharif, Gazi Mohammad; Yamaguchi, Shigeru

    2016-02-08

    Optical logic gate, especially exclusive-or (XOR) gate, plays important role in accomplishing photonic computing and various network functionalities in future optical networks. On the other hand, optical multicast is another indispensable functionality to efficiently deliver information in optical networks. In this paper, for the first time, we propose and experimentally demonstrate a flexible optical three-input XOR gate scheme for multiple input phase-modulated signals with a 1-to-2 multicast functionality for each XOR operation using four-wave mixing (FWM) effect in single piece of highly-nonlinear fiber (HNLF). Through FWM in HNLF, all of the possible XOR operations among input signals could be simultaneously realized by sharing a single piece of HNLF. By selecting the obtained XOR components using a followed wavelength selective component, the number of XOR gates and the participant light in XOR operations could be flexibly configured. The re-configurability of the proposed XOR gate and the function integration of the optical logic gate and multicast in single device offer the flexibility in network design and improve the network efficiency. We experimentally demonstrate flexible 3-input XOR gate for four 10-Gbaud binary phase-shift keying signals with a multicast scale of 2. Error-free operations for the obtained XOR results are achieved. Potential application of the integrated XOR and multicast function in network coding is also discussed.

  8. Energy-minimized design in all-optical networks using unicast/multicast traffic grooming

    Science.gov (United States)

    Puche, William S.; Amaya, Ferney O.; Sierra, Javier E.

    2013-09-01

    The increased bandwidth required by applications, tends to raise the amount of optical equipment, for this reason, it is essential to maintain a balance between the wavelength allocation, available capacity and number of optical devices to achieve the lowest power consumption. You could say that we propose a model that minimizes energy consumption, using unicast / multicast traffic grooming in optical networks.

  9. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  10. Multi-layer service function chaining scheduling based on auxiliary graph in IP over optical network

    Science.gov (United States)

    Li, Yixuan; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Software Defined Optical Network (SDON) can be considered as extension of Software Defined Network (SDN) in optical networks. SDON offers a unified control plane and makes optical network an intelligent transport network with dynamic flexibility and service adaptability. For this reason, a comprehensive optical transmission service, able to achieve service differentiation all the way down to the optical transport layer, can be provided to service function chaining (SFC). IP over optical network, as a promising networking architecture to interconnect data centers, is the most widely used scenarios of SFC. In this paper, we offer a flexible and dynamic resource allocation method for diverse SFC service requests in the IP over optical network. To do so, we firstly propose the concept of optical service function (OSF) and a multi-layer SFC model. OSF represents the comprehensive optical transmission service (e.g., multicast, low latency, quality of service, etc.), which can be achieved in multi-layer SFC model. OSF can also be considered as a special SF. Secondly, we design a resource allocation algorithm, which we call OSF-oriented optical service scheduling algorithm. It is able to address multi-layer SFC optical service scheduling and provide comprehensive optical transmission service, while meeting multiple optical transmission requirements (e.g., bandwidth, latency, availability). Moreover, the algorithm exploits the concept of Auxiliary Graph. Finally, we compare our algorithm with the Baseline algorithm in simulation. And simulation results show that our algorithm achieves superior performance than Baseline algorithm in low traffic load condition.

  11. End-to-End Mechanisms for Rate-Adaptive Multicast Streaming over the Internet

    OpenAIRE

    Rimac, Ivica

    2005-01-01

    Continuous media applications over packet-switched networks are becoming more and more popular. Radio stations, for example, already use streaming technology to disseminate their content to users on the Internet, and video streaming services are expected to experience similar popularity. In contrast to traditional television and radio broadcast systems, however, prevalent Internet streaming solutions are based on unicast communication and raise scalability and efficiency issues. Multicast com...

  12. Improvement of the Response Time in an Open Source Audioconference Architecture Based on SIP Multicast Implemented with JainSIP, JainSDP and JGAP Libraries

    Directory of Open Access Journals (Sweden)

    Carlos M. Moreno

    2014-06-01

    Full Text Available Group services like the audioconference require a minimum level of quality of service for multicast sessions. This work proposes a new overlay multicast architecture based on SIP extensions and a genetic algorithm. The architecture consists of a SIP Extender client (SE, a Multicast Gateway Agent (MGA and a Multicast Manager (MM. The SE receives information about the most adequate MGA for it determined by a genetic algorithm inside the MM, then connects the chosen MGA and maintains connection with the MM itself. The genetic algorithm is implemented with JGAP(Java Genetic Algorithm Package libraries. The SE and MGA are programmed with JainSIP and JainSDP libraries which contain Java structures associated with the SIP protocol and session description. Some experiments over UTP wired and WiFi IEEE802.11n network were performed. Partial results with static and dynamic MGA selection show that, if we compare the joining and leaving time measured inside a station containing SE client programmed with JainSIP and JainSDP libraries versus SJphone proprietary client, the software engineering may have more influence than the medium access method in the response time for a potential group member. Even more, the genetic algorithm at the MM minimizes the response time at great scale.

  13. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  14. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  15. Efficiency Intra-Cluster Device-to-Device Relay Selection for Multicast Services Based on Combinatorial Auction

    Directory of Open Access Journals (Sweden)

    Yong Zhang

    2015-12-01

    Full Text Available In Long Term Evolution-Advanced (LTE-A networks, Device-to-device (D2D communications can be utilized to enhance the performance of multicast services by leveraging D2D relays to serve nodes with worse channel conditions within a cluster. For traditional D2D relay schemes, D2D links with poor channel condition may be the bottleneck of system sum data rate. In this paper, to optimize the throughput of D2D communications, we introduce an iterative combinatorial auction algorithm for efficient D2D relay selection. In combinatorial auctions, the User Equipments (UEs that fails to correctly receive multicast data from eNodeB (eNB are viewed as bidders that compete for D2D relays, while the eNB is treated as the auctioneer. We also give properties of convergency and low-complexity and present numerical simulations to verify the efficiency of the proposed algorithm.

  16. Error Control Techniques for Efficient Multicast Streaming in UMTS Networks: Proposals andPerformance Evaluation

    Directory of Open Access Journals (Sweden)

    Michele Rossi

    2004-06-01

    Full Text Available In this paper we introduce techniques for efficient multicast video streaming in UMTS networks where a video content has to be conveyed to multiple users in the same cell. Efficient multicast data delivery in UMTS is still an open issue. In particular, suitable solutions have to be found to cope with wireless channel errors, while maintaining both an acceptable channel utilization and a controlled delivery delay over the wireless link between the serving base station and the mobile terminals. Here, we first highlight that standard solutions such as unequal error protection (UEP of the video flow are ineffective in the UMTS systems due to its inherent large feedback delay at the link layer (Radio Link Control, RLC. Subsequently, we propose a local approach to solve errors directly at the UMTS link layer while keeping a reasonably high channel efficiency and saving, as much as possible, system resources. The solution that we propose in this paper is based on the usage of the common channel to serve all the interested users in a cell. In this way, we can save resources with respect to the case where multiple dedicated channels are allocated for every user. In addition to that, we present a hybrid ARQ (HARQ proactive protocol that, at the cost of some redundancy (added to the link layer flow, is able to consistently improve the channel efficiency with respect to the plain ARQ case, by therefore making the use of a single common channel for multicast data delivery feasible. In the last part of the paper we give some hints for future research, by envisioning the usage of the aforementioned error control protocols with suitably encoded video streams.

  17. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  18. An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding

    Directory of Open Access Journals (Sweden)

    Zhaoyuan Wang

    2015-08-01

    Full Text Available Recent years witness a significant growth in multimedia applications. Among them, a stream of applications is real-time and requires one-to-many fast data transmission with stringent quality-of-service (QoS requirements, where multicast is an important supporting technology. In particular, with more and more mobile end users requesting real-time broadband multimedia applications, it is of vital importance to provide them with satisfied quality of experience. As network coding can offer higher bandwidth to users and accommodate more flows for networks than traditional routing, this paper studies the multicast routing problem with network coding and formulates it as a multi-objective optimization problem. As delay and packet loss ratio (PLR are two important performance indicators for QoS, we consider them as the two objectives for minimization. To address the problem above, we present a multi-objective evolutionary algorithm based on decomposition (MOEA/D, where an all population updating rule is devised to address the problem of lacking feasible solutions in the search space. Experimental results demonstrate the effectiveness of the proposed algorithm and it outperforms a number of state-of-the-art algorithms.

  19. Study on Developing a System with IP Functionality to Monitor the Status of Containers in Maritime Logistics

    Directory of Open Access Journals (Sweden)

    Tae Hoon Kim

    2017-12-01

    Full Text Available There has been increasing demand from consignors and shipping companies for real-time monitoring of maritime cargo due to increases in fresh, dangerous, and high-value cargo. Although larger carriers have developed and integrated their own systems for such real-time monitoring services, small- and medium-sized shippers are struggling with the heavy costs and workforce associated with such capability. This study introduces a system that can do real-time monitoring of the location of shipping containers and their internal status by using IP-RFID that in cludes IP functionality. This system is composed of a tag, a smart point, and a service platform.  The monitoring tags are attached to regular containers to track the opening and closing of the doors, the internal temperature, and humidity. The tags then send the data to the smart point where the GPS information is added. The data packet is then finally transmitted to the service platform for location tracking.  In particular, as the tags in this system have IP functionality like Multicast, they are capable of communicating with the users and also allow users to control them. In order to provide such functionality, the smart points can serve as a gateway between the service platform and the tag. By managing the tag’s connection information and the status of transmission at the smart point, the service platform can directly communicate with tags connected to the respective smart point. This technology could be applied in a diverse range of maritime and non-maritime areas including warehouse management. As for maritime logistics, it also often goes through ground, port, and air transportation phases. Further studies should monitor the actual performance of this equipment across the various phases of maritime logistics to empirically test the systems proposed herein.

  20. Performance Evaluation of Multicast Video Distribution using LTE-A in Vehicular Environments

    OpenAIRE

    Thota, Jayashree; Bulut, Berna; Doufexi, Angela; Armour, Simon; Nix, Andrew

    2017-01-01

    Application Layer Forward Error Correction (AL-FEC) based on Raptor codes has been employed in Multimedia Broadcast/Multicast Services (MBMS) to improve reliability. This paper considers a cross-layer system based on the latest Raptor Q codes for transmitting high data rate video. Multiple Input Multiple Output (MIMO) channels in a realistic outdoor environment for a user moving at 50kmph in an LTE-A system is considered. A link adaptation model with optimized cross-layer parameters is propos...

  1. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  2. The Impact of Packet Loss Behavior in 802.11g on the Cooperation Gain in Reliable Multicast

    DEFF Research Database (Denmark)

    Heide, Janus; Vingelmann, Peter; Pedersen, Morten Videbæk

    2012-01-01

    In group-oriented applications for wireless networks, reliable multicast strategies are important in order to efficiently distribute data, e.g. in Wireless Mesh Networks (WMNs) and Mobile Ad-hoc NETworks (MANETs). To ensure that developed protocols and systems will operate as expected when deploy...

  3. All-optical multi-wavelength conversion with negative power penalty by a commercial SOA-MZI for WDM wavelength multicast

    NARCIS (Netherlands)

    Yan, N.; Jung, H.D.; Tafur Monroy, I.; Waardt, de H.; Koonen, A.M.J.

    2007-01-01

    WDM wavelength multicast is demonstrated by all-optical multi-wavelength conversion at 10 Gb/s using a commercial SOA-MZI. We report for the first time simultaneous one-to-four conversion with negative power penalty of 1.84 dB.

  4. IPS observation system for the Miyun 50 m radio telescope and its commissioning observation

    International Nuclear Information System (INIS)

    Zhu Xinying; Zhang Xizhen; Zhang Hongbo; Kong Deqing; Qu Huipeng

    2012-01-01

    Ground-based observation of Interplanetary Scintillation (IPS) is an important approach for monitoring solar wind. A ground-based IPS observation system has been newly implemented on a 50 m radio telescope at Miyun station, managed by the National Astronomical Observatories, Chinese Academy of Sciences. This observation system has been constructed for the purpose of observing solar wind speed and the associated scintillation index by using the normalized cross-spectrum of a simultaneous dual-frequency IPS measurement. The system consists of a universal dual-frequency front-end and a dual-channel multi-function back-end specially designed for IPS. After careful calibration and testing, IPS observations on source 3C 273B and 3C 279 have been successfully carried out. The preliminary observation results show that this newly-developed observation system is capable of performing IPS observation. The system's sensitivity for IPS observation can reach over 0.3 Jy in terms of an IPS polarization correlator with 4 MHz bandwidth and 2 s integration time. (research papers)

  5. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  6. Implementación y análisis de CBTv2 en el medioambiente Ns

    OpenAIRE

    Rigotti, Guillermo

    1998-01-01

    Desde la definición del modelo de servicio multicast en IP, el uso de estas facilidades ha ido adquiriendo cada vez mayor importancia en el ámbito de la Internet. El número de aplicaciones que demandan transmisión multicast, tales como conferencias de audio y video, simulación interactiva distribuida, descubrimiento de recursos, etc, ha aumentado en forma continua, viéndose reflejado en el crecimiento experimentado por el MBONE, experimental en sus inicios en 1992 y actualmente considerado in...

  7. Optimizing Neighbor Discovery for Ad hoc Networks based on the Bluetooth PAN Profile

    DEFF Research Database (Denmark)

    Kuijpers, Gerben; Nielsen, Thomas Toftegaard; Prasad, Ramjee

    2002-01-01

    IP layer neighbor discovery mechanisms rely highly on broadcast/multicast capabilities of the underlying link layer. The Bluetooth personal area network (PAN) profile has no native link layer broadcast/multicast capabilities and can only emulate this by repeatedly unicast link layer frames....... This paper introduces a neighbor discovery mechanism that utilizes the resources in the Bluetooth PAN profile more efficient. The performance of the new mechanism is investigated using a IPv6 network simulator and compared with emulated broadcasting. It is shown that the signaling overhead can...

  8. IP Network Design and Implementation for the Caltech-USGS Element of TriNet

    Science.gov (United States)

    Johnson, M. L.; Busby, R.; Watkins, M.; Schwarz, S.; Hauksson, E.

    2001-12-01

    sometimes referred to as group "12". LANs with IP addresses of 10.23.0.0/24 have T1-2 as the primary circuit, and T1-3 as the alternate circuit. Static routes on the acquisition system are used to direct traffic through the primary T1. The network can operate in one of three modes. The most common and desirable mode is "normal", where all three T1's are operational and Caltech has both a primary and secondary central acquisition system running. The second mode is a "failover", where the primary acquisition system is down (due to maintenance or failure) and the secondary acquisition system assumes the primary role. This includes sending acknowledgments to dataloggers and multicasts to the rest of the network. The third mode is a circuit detour. The port numbers on the central acquisition system for the dataloggers on the failed T1 are changed to match the auxiliary ports on the dataloggers. This allows for the auxiliary ports on the dataloggers to receive acknowledgements from the acquiring system through the detoured circuit. The static routes on the system are changed to go through the detoured circuit as specified by the group's IP numbers. At this point the two working T1's will be running at full capacity but the data acquisition will continue with minimal interruption while the third T1 is being restored. The primary acquisition computer continues to listen for data on the failed T1 should things improve spontaneously.

  9. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  10. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  11. Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Young-Ho; Choi, Jihoon

    2017-02-25

    A new hybrid automatic repeat request (HARQ) scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.

  12. Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Ho Jung

    2017-02-01

    Full Text Available A new hybrid automatic repeat request (HARQ scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.

  13. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  14. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  15. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    OpenAIRE

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  16. Ethernet TCP/IP based building energy management system in a university campus in Saudi Arabia

    Energy Technology Data Exchange (ETDEWEB)

    Jomoah, Ibrahim M. [Department of Industrial Engineering, King Abdulaziz University Jeddah-21589 (Saudi Arabia); Kumar, R. Sreerama; Abdel-Shafi, Nabil Yassien [Saudi Electricity Company Chair for DSM and EE, Vice Presidency for Projects, King Abdulaziz University Jeddah 21589 (Saudi Arabia); Al-Abdulaziz, Abdulaziz Uthman M.; Obaid, Ramzy R. [Department of Electrical and Computer Engineering, King Abdulaziz University Jeddah-21589 (Saudi Arabia)

    2013-07-01

    This paper investigates the effectiveness of the Building Energy Management System (BMS) installed in the typical buildings in the main campus of King Abdulaziz University, Jeddah, in Saudi Arabia. As the domestic electricity and hence the oil consumption in Saudi Arabia is increasing at a very alarming rate compared to the other countries in the world, it is of paramount importance to resort to urgent measures in various industrial, commercial and residential sectors in the country to implement energy conservation measures. The major electrical load in the buildings in the University corresponds to air-handling units and lighting. If the Hajj period, during which millions of pilgrims visit Holy Makah, coincides with the summer, the electricity demand in the country further increases. Considering these issues, the university has taken initiatives to minimize energy consumption in the campuses through the various energy conservation measures. Towards this end, BMS is installed in a few of the typical classrooms and office buildings utilizing the existing campus Ethernet TCP/IP. The data analysis is performed over the period from April to September as it is the peak load period due to summer season. The effectiveness of the BMS in the minimization of the energy consumption in these buildings is established by comparing the results of data analysis with BMS against those before the installation of BMS over the peak period. The investigations reveal that appreciable saving in energy consumption can be achieved with the installation of BMS, the magnitude being dependent upon factors such as building characteristics, type of building, its utilization and period of use.

  17. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    Science.gov (United States)

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  19. Wavelength conversion, time demultiplexing and multicasting based on cross-phase modulation and four-wave mixing in dispersion-flattened highly nonlinear photonic crystal fiber

    International Nuclear Information System (INIS)

    Hui, Zhan-Qiang; Zhang, Jian-Guo

    2012-01-01

    We propose the use of cross-phase modulation (XPM) and four-wave mixing (FWM) in dispersion-flattened highly nonlinear photonic crystal fibers (HNL-PCFs) to implement the functionalities of wavelength conversion, simultaneous time demultiplexing and wavelength multicasting in optical time-division multiplexing (OTDM) systems. The experiments on wavelength conversion at 80 Gbit s −1 and OTDM demultiplexing from 80 to 10 Gbit s −1 with wavelength multicasting of two channels are successfully demonstrated to validate the proposed scheme, which are carried out by using two segments of dispersion-flattened HNL-PCFs with lengths of 100 and 50 m, respectively. Moreover, the bit error rate (BER) performance is also measured. The results show that our designed system can achieve a power penalty of less than 4.6 dB for two multicasting channels with a 24 nm wavelength span at the BER of 10 −9 when compared with the 10 Gbit/s back-to-back measurement. The proposed system is transparent to bit rate since only an ultrafast third-order nonlinear effect is used. The resulting configuration is compact, robust and reliable, benefiting from the use of dispersion-flattened HNL-PCFs with short lengths. This also makes the proposed system more flexible in the operational wavelengths than those based on dispersion-shifted fibers and traditional highly nonlinear fibers. (paper)

  20. Command and Control Data Dissemination Using IP Multicast

    National Research Council Canada - National Science Library

    Barrera, Raymond

    1999-01-01

    Tools have been developed which allow tactical data to be exchanged over Internet Protocol networks, but the quality of service necessary to operate these tools is not available for most Naval vessels at this time...

  1. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  2. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  3. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  4. National Ignition Facility (NIF) Control Network Design and Analysis

    International Nuclear Information System (INIS)

    Bryant, R M; Carey, R W; Claybourn, R V; Pavel, G; Schaefer, W J

    2001-01-01

    The control network for the National Ignition Facility (NIF) is designed to meet the needs for common object request broker architecture (CORBA) inter-process communication, multicast video transport, device triggering, and general TCP/IP communication within the NIF facility. The network will interconnect approximately 650 systems, including the embedded controllers, front-end processors (FEPs), supervisory systems, and centralized servers involved in operation of the NIF. All systems are networked with Ethernet to serve the majority of communication needs, and asynchronous transfer mode (ATM) is used to transport multicast video and synchronization triggers. CORBA software infra-structure provides location-independent communication services over TCP/IP between the application processes in the 15 supervisory and 300 FEP systems. Video images sampled from 500 video cameras at a 10-Hz frame rate will be multicast using direct ATM Application Programming Interface (API) communication from video FEPs to any selected operator console. The Ethernet and ATM control networks are used to broadcast two types of device triggers for last-second functions in a large number of FEPs, thus eliminating the need for a separate infrastructure for these functions. Analysis, design, modeling, and testing of the NIF network has been performed to provide confidence that the network design will meet NIF control requirements

  5. Ensuring Software IP Cleanliness

    OpenAIRE

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  6. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  7. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  8. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  9. Proxying UPnP service discovery and access to a non-IP Bluetooth network on a mobile phone

    NARCIS (Netherlands)

    Delphinanto, A.; Koonen, A.M.J.; Hartog, den F.T.H.; Peeters, M.E.

    2007-01-01

    The current service-and device discovery protocols are not platform-and network independent. Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables Universal Plug and Play (UPnP) devices and

  10. Design alternatives for process group membership and multicast

    Science.gov (United States)

    Birman, Kenneth P.; Cooper, Robert; Gleeson, Barry

    1991-01-01

    Process groups are a natural tool for distributed programming, and are increasingly important in distributed computing environments. However, there is little agreement on the most appropriate semantics for process group membership and group communication. These issues are of special importance in the Isis system, a toolkit for distributed programming. Isis supports several styles of process group, and a collection of group communication protocols spanning a range of atomicity and ordering properties. This flexibility makes Isis adaptable to a variety of applications, but is also a source of complexity that limits performance. This paper reports on a new architecture that arose from an effort to simplify Isis process group semantics. Our findings include a refined notion of how the clients of a group should be treated, what the properties of a multicast primitive should be when systems contain large numbers of overlapping groups, and a new construct called the casuality domain. As an illustration, we apply the architecture to the problem of converting processes into fault-tolerant process groups in a manner that is 'transparent' to other processes in the system.

  11. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  12. Multicast in Femtocell Networks: A Successive Interference Cancellation Approach

    Directory of Open Access Journals (Sweden)

    Donglin Hu

    2014-09-01

    Full Text Available A femtocell is a small cellular base station (BS, typically used for serving approved users within a small coverage. In this paper, we investigate the problem of data multicast in femtocell networks that incorporates superposition coding (SC and successive interference cancellation (SIC. The problem is to decide the transmission schedule for each BS, as well as the power allocation for the SC layers, to achieve a sufficiently large SNR for each layer to be decodable with SIC at each user. Minimizing the total BS power consumption achieves the goal of “green” communications. We formulate a Mixed Integer Nonlinear Programming (MINLP problem, and then reformulate the problem into a simpler form. Upper and lower performance bounds on the total BS power consumption are derived. Finally, we consider three typical connection scenarios, and develop optimal and nearoptimal algorithms for the three scenarios. The proposed algorithms have low computational complexity, and outperform a heuristic scheme with considerable gains in our simulation study.

  13. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  14. Australian DefenceScience. Volume 16, Number 1, Autumn

    Science.gov (United States)

    2008-01-01

    are carried via VOIP technology, and multicast IP traffic for audio -visual communications is also supported. The SSATIN system overall is seen to...Artificial Intelligence and Soft Computing Palma de Mallorca, Spain http://iasted.com/conferences/home-628.html 1 - 3 Sep 2008 Visualisation , Imaging and

  15. IPs

    African Journals Online (AJOL)

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  16. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  17. Decentralized Cloud Method For Multicasting Media Stream

    Directory of Open Access Journals (Sweden)

    D M B N Bandara

    2015-08-01

    Full Text Available With the advancement of Information technology the concept of idea sharing has advanced. Mostly on presentations personal computer and projector have become essentials. But on most occasions for connecting these equipment cables and physical devices are used. This is inefficient and time consuming. If a problem occurs someone with technical knowledge is necessary to solve the situation. The objective of this research is to use the wireless technology to reduce the manual configuration and build up a platform where one can easily share files a visuals media and feedback. A system has been developed to detect all the devices over a network and upon granted permission will share video audio and access controls. Final outcome of the research was a collaborative software bundle which work together on a network. One part of the system is a Desktop Network Software. And other is a Mobile Application. Desktop application can detect all other devices in the network which provides the same facility and if required can allocate a group and share its screen files and have a message stream to each device using multicasting. Mobile application can act as a mobile remote to the host computer of the group which can detect any input from user and pass it to the system.

  18. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  19. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  20. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  1. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    OpenAIRE

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  2. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  3. IP Infrastructure Geolocation

    Science.gov (United States)

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  4. Evaluación del punto de conmutación unicast- multicast para ahorro de potencia de transmisión en redes MBMS

    Directory of Open Access Journals (Sweden)

    Raúl Tamayo Fernández

    2014-01-01

    Full Text Available La oferta de aplicaciones y servicios multimedia para terminales móviles se hace principalmente a través de las redes celulares de tercera y cuarta generación (3G/4G existentes. El envío de los datos en este tipo de redes se realiza en modo unicast, es decir, a cada usuario se le dedican recursos de radio (ancho de banda y potencia de transmisión durante toda la sesión. Esto presenta algunos inconvenientes, tales como agotamiento rápido del ancho de banda del operador móvil, alto consumo de potencia de transmisión, incremento de la interferencia, y costos altos del servicio. Los operadores móviles requieren de nuevas tecnologías que optimicen el uso de sus recursos de radio y así lograr un mayor índice de penetración de los servicios. De ahí la necesidad de cambiar de paradigma hacia un modo de transmisión en multicast o broadcast, en el que una misma señal pueda recibirse por varios usuarios simultáneamente, de tal forma que los recursos de radio se puedan compartir. Para ello, la solución técnica sobre redes celulares LTE (Long Term Evolution se dio en la especificación 3GPP Release 6, llamada Servicio Multimedia por Broadcast/Multicast (MBMS, Multimedia Broadcast Multicast Service. La especificación de MBMS permite que una transmisión cambie de modo unicast a modo multicast a partir de un “punto de conmutación”, que determina el momento de hacer el cambio para obtener un ahorro tanto en ancho de banda como en potencia de transmisión. Este artículo presenta una evaluación para determinar los puntos de conmutación de modo de transmisión óptimos en el estándar MBMS para diferentes ambientes de propagación inalámbrica. Además, dado que MBMS se puede utilizar en topologías de Red de Frecuencia Única (SFN, Single Frequency Networks, que tienen la propiedad de “ganancia de red”, también se determina el ahorro de potencia de transmisión adicional que se obtiene en esta configuración.

  5. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  6. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Science.gov (United States)

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  7. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Science.gov (United States)

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  8. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  9. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  10. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  11. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  12. Presence in the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  13. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  14. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Science.gov (United States)

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  15. Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks.

    Science.gov (United States)

    Lin, Frank Yeong-Sung; Hsiao, Chiu-Han; Lin, Leo Shih-Chang; Wen, Yean-Fu

    2013-03-14

    Recent advance in wireless sensor network (WSN) applications such as the Internet of Things (IoT) have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS) is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay) becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  16. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Science.gov (United States)

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  17. ChIP-PIT: Enhancing the Analysis of ChIP-Seq Data Using Convex-Relaxed Pair-Wise Interaction Tensor Decomposition.

    Science.gov (United States)

    Zhu, Lin; Guo, Wei-Li; Deng, Su-Ping; Huang, De-Shuang

    2016-01-01

    In recent years, thanks to the efforts of individual scientists and research consortiums, a huge amount of chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) experimental data have been accumulated. Instead of investigating them independently, several recent studies have convincingly demonstrated that a wealth of scientific insights can be gained by integrative analysis of these ChIP-seq data. However, when used for the purpose of integrative analysis, a serious drawback of current ChIP-seq technique is that it is still expensive and time-consuming to generate ChIP-seq datasets of high standard. Most researchers are therefore unable to obtain complete ChIP-seq data for several TFs in a wide variety of cell lines, which considerably limits the understanding of transcriptional regulation pattern. In this paper, we propose a novel method called ChIP-PIT to overcome the aforementioned limitation. In ChIP-PIT, ChIP-seq data corresponding to a diverse collection of cell types, TFs and genes are fused together using the three-mode pair-wise interaction tensor (PIT) model, and the prediction of unperformed ChIP-seq experimental results is formulated as a tensor completion problem. Computationally, we propose efficient first-order method based on extensions of coordinate descent method to learn the optimal solution of ChIP-PIT, which makes it particularly suitable for the analysis of massive scale ChIP-seq data. Experimental evaluation the ENCODE data illustrate the usefulness of the proposed model.

  18. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  19. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  20. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  1. Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Chuanxin Zhao

    2014-01-01

    Full Text Available In order to improve network throughput and reduce energy consumption, we propose in this paper a cross-layer optimization design that is able to achieve multicast utility maximization and energy consumption minimization. The joint optimization of congestion control and power allocation is formulated to be a nonlinear nonconvex problem. Using dual decomposition, a distributed optimization algorithm is proposed to avoid the congestion by control flow rate at the source node and eliminate the bottleneck by allocating the power at the intermediate node. Simulation results show that the cross-layer algorithm can increase network performance, reduce the energy consumption of wireless nodes and prolong the network lifetime, while keeping network throughput basically unchanged.

  2. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  3. Implementation of IGMP v3 and its application to IPTV carrying network

    Science.gov (United States)

    Zhou, Min; Dong, Ximing

    2008-11-01

    IGMP is a host-router signaling protocol, and it is used to manage the membership of Internet Protocol multicast groups for IPv4. IGMPv3 adds "source filtering" function required to support SSM. Firstly, this paper analyses the improvements and implementation of IGMPv3. Secondly, it points out the problems when applying IGMPv3 to IPTV carrying network. Then it presents the solutions by improving IGMPv3 protocol to reduce channel zapping time which is one of the important metrics affecting the QoE in IPTV service. Method to realize the end user authentication, authorization and accounting in the IP multicast security and authentication area by extending the IGMPv3 protocol is described at last.

  4. Validation of DAB2IP methylation and its relative significance in predicting outcome in renal cell carcinoma

    Science.gov (United States)

    Zhao, Liang-Yun; Kapur, Payal; Wu, Kai-Jie; Wang, Bin; Yu, Yan-Hong; Liao, Bing; He, Da-Lin; Chen, Wei; Margulis, Vitaly; Hsieh, Jer-Tsong; Luo, Jun-Hang

    2016-01-01

    We have recently reported tumor suppressive role of DAB2IP in RCC development. In this study, We identified one CpG methylation biomarker (DAB2IP CpG1) located UTSS of DAB2IP that was associated with poor overall survival in a cohort of 318 ccRCC patients from the Cancer Genome Atlas (TCGA). We further validated the prognostic accuracy of DAB2IP CpG methylation by pyrosequencing quantitative methylation assay in 224 ccRCC patients from multiple Chinese centers (MCHC set), and 239 patients from University of Texas Southwestern Medical Center at Dallas (UTSW set) by using FFPE samples. DAB2IP CpG1 can predict the overall survival of patients in TCGA, MCHC, and UTSW sets independent of patient age, Fuhrman grade and TNM stage (all p<0.05). DAB2IP CpG1 successfully categorized patients into high-risk and low-risk groups with significant differences of clinical outcome in respective clinical subsets, regardless of age, sex, grade, stage, or race (HR: 1.63-7.83; all p<0.05). The detection of DAB2IP CpG1 methylation was minimally affected by ITH in ccRCC. DAB2IP mRNA expression was regulated by DNA methylation in vitro. DAB2IP CpG1 methylation is a practical and repeatable biomarker for ccRCC, which can provide prognostic value that complements the current staging system. PMID:27129174

  5. Using the network as bus system for long discharge data acquisition and data processing

    Energy Technology Data Exchange (ETDEWEB)

    Hennig, Ch. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Teilinstitut Greifswald, Wendelsteinstrasse 1, 17491 Greifswald (Germany)]. E-mail: Christine.Hennig@ipp.mpg.de; Bluhm, T. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Teilinstitut Greifswald, Wendelsteinstrasse 1, 17491 Greifswald (Germany); Heimann, P. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Boltzmannstrasse 2, 85748 Garching (Germany); Kroiss, H. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Boltzmannstrasse 2, 85748 Garching (Germany); Kuehner, G. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Teilinstitut Greifswald, Wendelsteinstrasse 1, 17491 Greifswald (Germany); Kuehntopf, H. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Teilinstitut Greifswald, Wendelsteinstrasse 1, 17491 Greifswald (Germany); Maier, J. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Boltzmannstrasse 2, 85748 Garching (Germany); Zilker, M. [Max-Planck-Institut Fuer Plasmaphysik, EURATOM Association, Boltzmannstrasse 2, 85748 Garching (Germany)

    2006-07-15

    Data acquisition in shot-based fusion experiments is characterized by a large amount of data collected within a short time. The stellarator experiment Wendelstein 7-X (W7-X) will produce a considerable higher amount of data in a continuous and steady-state operation within half an hour. Therefore, it is not sufficient to wait until all data has been acquired and stored in the database before being able to view and analyze data. Continuous and robust data transport is needed for (1) a distributed data monitoring system to visualize trends (2) continuous data acquisition of data available at the network and (3) message signaling. The paper introduces a network channel concept covering a system-wide available data description, half sync/half async communication pattern, data serialization, identification and matching of data. It is focusing on the IP Multicast/UDP implementation for the data monitoring system and presents results of performance measurements. Suitability and limitations are discussed and an appropriate answer to the question 'When is IP Multicast/UDP reliable?' is given.

  6. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  7. Nematodes associated with the double-spined bark beetle Ips duplicatus (Coleoptera: Curculionidae) in central Europe

    Czech Academy of Sciences Publication Activity Database

    Grucmanová, Š.; Holuša, J.; Nermuť, Jiří

    2014-01-01

    Roč. 138, č. 10 (2014), s. 723-732 ISSN 0931-2048 Grant - others:Czech University of Life Sciences in Prague(CZ) 20134325; Czech University of Life Sciences in Prague(CZ) 20124302 Institutional support: RVO:60077344 Keywords : galleries * generations * Ips duplicatus Subject RIV: EH - Ecology, Behaviour Impact factor: 1.650, year: 2014 http://onlinelibrary.wiley.com/doi/10.1111/jen.12142/epdf

  8. Joint Power Allocation for Multicast Systems with Physical-Layer Network Coding

    Directory of Open Access Journals (Sweden)

    Zhu Wei-Ping

    2010-01-01

    Full Text Available This paper addresses the joint power allocation issue in physical-layer network coding (PLNC of multicast systems with two sources and two destinations communicating via a large number of distributed relays. By maximizing the achievable system rate, a constrained optimization problem is first formulated to jointly allocate powers for the source and relay terminals. Due to the nonconvex nature of the cost function, an iterative algorithm with guaranteed convergence is developed to solve the joint power allocation problem. As an alternative, an upper bound of the achievable rate is also derived to modify the original cost function in order to obtain a convex optimization solution. This approximation is shown to be asymptotically optimal in the sense of maximizing the achievable rate. It is confirmed through Monte Carlo simulations that the proposed joint power allocation schemes are superior to the existing schemes in terms of achievable rate and cumulative distribution function (CDF.

  9. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  10. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  11. 4 × 10 Gb s−1 wavelength multicasting with tunable NRZ-to-RZ format conversion using nonlinear polarization rotation in an SOA

    International Nuclear Information System (INIS)

    Liu, S; Fu, S; Tang, M; Shum, P; Liu, D

    2013-01-01

    We experimentally demonstrate simultaneous 4 × 10 Gb s −1 all-optical wavelength multicasting and non-return-to-zero (NRZ)-on-off-keying (OOK) to return-to-zero (RZ)-OOK format conversion with a tunable duty cycle using nonlinear polarization rotation in a semiconductor optical amplifier (SOA). The experimental results show that the duty cycle of four converted RZ-OOK signals can be tuned by adjusting the orientation of a polarizer placed at the SOA output. Four-channel NRZ-OOK-to-RZ-OOK conversion with a full width at half maximum of 33–67 ps can be simultaneously obtained with an extinction ratio over 10 dB. Moreover, it is experimentally verified that such a wavelength multicasting scheme with simultaneous NRZ-OOK-to-RZ-OOK conversion is insensitive to the wavelength of the input signal, indicating that such a scheme can be operated in the whole C-band with less than 0.18 dB power penalty at a bit error ratio level of 10 −9 . The device can facilitate the cross-connection between optical transmission networks employing different modulation formats. (paper)

  12. Utilizing Joint Routing and Capacity Assignment Algorithms to Achieve Inter- and Intra-Group Delay Fairness in Multi-Rate Multicast Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yean-Fu Wen

    2013-03-01

    Full Text Available Recent advance in wireless sensor network (WSN applications such as the Internet of Things (IoT have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  13. IP Security für Linux

    OpenAIRE

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  14. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  15. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  16. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  17. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    International Nuclear Information System (INIS)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F.

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32 P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen

  18. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  19. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    International Nuclear Information System (INIS)

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  20. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  1. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  2. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  3. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  4. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  5. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  6. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  7. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  8. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  9. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  10. Design and implementation of digital television over ethernet PON transmission system

    Science.gov (United States)

    Lu, Xi; Liu, Deming; Mao, Minjing; Wang, Jinjuan

    2005-11-01

    There are two primary methods of transmitting signal of digital television to the home in China. The first one is HFC mode, which is widely used. The other is IPTV mode, which is emerging. In this paper, the scheme of digital television over Ethernet PON is proposed. There are several differences from this system to IPTV and Video over LAN: the real-time transmission of equal-bandwidth based on statistical multiplexing, channel switching based on multicast and IP CA system, etc.. And these are also the key techniques used in this system. The architecture of DTV over EPON system, the function of every component, the framing process and the multiplexing of Ethernet frame are described. The implementation procedure of the system is shown. The mechanism of channel switching using multicast technique is designed and realized. We also present the method of using static VLAN and IGMP snooping mechanism to implement statistical multiplexing on Ethernet layer, and put forward the concept of IP Conditional Access System and define it. An experimental system of DTV over EPON is set up and the experimental result is significant.

  11. Operational Space Weather Products at IPS

    Science.gov (United States)

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  12. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Science.gov (United States)

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  13. Wavelength Tuning Free Transceiver Module in OLT Downstream Multicasting 4λ × 10 Gb/s TWDM-PON System

    OpenAIRE

    M. S. Salleh; A. S. M. Supa’at; S. M. Idrus; S. Yaakob; Z. M. Yusof

    2014-01-01

    We propose a new architecture of dynamic time-wavelength division multiplexing-passive optical network (TWDM-PON) system that employs integrated all-optical packet routing (AOPR) module using 4λ×10 Gbps downstream signal to support 20 km fiber transmission. This module has been designed to support high speed L2 aggregation and routing in the physical layer PON system by using multicasting cross-gain modulation (XGM) to route packet from any PON port to multiple PON links. Meanwhile, the fixed...

  14. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  15. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  16. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  17. Ifabiyi, IP

    African Journals Online (AJOL)

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  18. GenoGAM: genome-wide generalized additive models for ChIP-Seq analysis.

    Science.gov (United States)

    Stricker, Georg; Engelhardt, Alexander; Schulz, Daniel; Schmid, Matthias; Tresch, Achim; Gagneur, Julien

    2017-08-01

    Chromatin immunoprecipitation followed by deep sequencing (ChIP-Seq) is a widely used approach to study protein-DNA interactions. Often, the quantities of interest are the differential occupancies relative to controls, between genetic backgrounds, treatments, or combinations thereof. Current methods for differential occupancy of ChIP-Seq data rely however on binning or sliding window techniques, for which the choice of the window and bin sizes are subjective. Here, we present GenoGAM (Genome-wide Generalized Additive Model), which brings the well-established and flexible generalized additive models framework to genomic applications using a data parallelism strategy. We model ChIP-Seq read count frequencies as products of smooth functions along chromosomes. Smoothing parameters are objectively estimated from the data by cross-validation, eliminating ad hoc binning and windowing needed by current approaches. GenoGAM provides base-level and region-level significance testing for full factorial designs. Application to a ChIP-Seq dataset in yeast showed increased sensitivity over existing differential occupancy methods while controlling for type I error rate. By analyzing a set of DNA methylation data and illustrating an extension to a peak caller, we further demonstrate the potential of GenoGAM as a generic statistical modeling tool for genome-wide assays. Software is available from Bioconductor: https://www.bioconductor.org/packages/release/bioc/html/GenoGAM.html . gagneur@in.tum.de. Supplementary information is available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  19. Split degenerate states and stable p+ip phases from holography

    Energy Technology Data Exchange (ETDEWEB)

    Nie, Zhang-Yu; Zeng, Hui [Kunming University of Science and Technology, Kunming (China); Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing (China); Pan, Qiyuan [Hunan Normal Univ., Key Lab. of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Synergetic Innovation Center for Quantum Effects and Applications, Dept. of Physics, Changsha (China); Zeng, Hua-Bi [Yangzhou University, College of Physics Science and Technology, Yangzhou, Jiangsu (China); National Central University, Department of Physics, Chungli (China)

    2017-02-15

    In this paper, we investigate the p+ip superfluid phases in the complex vector field holographic p-wave model. We find that in the probe limit, the p+ip phase and the p-wave phase are equally stable, hence the p and ip orders can be mixed with an arbitrary ratio to form more general p+λip phases, which are also equally stable with the p-wave and p+ip phases. As a result, the system possesses a degenerate thermal state in the superfluid region. We further study the case on considering the back-reaction on the metric, and we find that the degenerate ground states will be separated into p-wave and p+ip phases, and the p-wave phase is more stable. Finally, due to the different critical temperature of the zeroth order phase transitions from p-wave and p+ip phases to the normal phase, there is a temperature region where the p+ip phase exists but the p-wave phase does not. In this region we find the stable holographic p+ip phase for the first time. (orig.)

  20. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  1. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  2. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  3. A fast neutron detector with IP by track measurement

    International Nuclear Information System (INIS)

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  4. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  5. Engineering of radioimmunoassay (RIA) IP10.1

    International Nuclear Information System (INIS)

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  6. The Worldwide Interplanetary Scintillation (IPS) Stations (WIPSS) Network October 2016 Observing Campaign: Initial WIPSS Data Analyses

    Science.gov (United States)

    Bisi, M. M.; Fallows, R. A.; Jackson, B. V.; Tokumaru, M.; Gonzalez-Esparza, A.; Morgan, J.; Chashei, I. V.; Mejia-Ambriz, J.; Tyul'bashev, S. A.; Manoharan, P. K.; De la Luz, V.; Aguilar-Rodriguez, E.; Yu, H. S.; Barnes, D.; Chang, O.; Odstrcil, D.; Fujiki, K.; Shishov, V.

    2017-12-01

    Interplanetary Scintillation (IPS) allows for the determination of velocity and a proxy for plasma density to be made throughout the corona and inner heliosphere. Where sufficient observations are undertaken, the results can be used as input to the University of California, San Diego (UCSD) three-dimensional (3-D) time-dependent tomography suite to allow for the full 3-D reconstruction of both velocity and density throughout the inner heliosphere. By combining IPS results from multiple observing locations around the planet, we can increase both the temporal and spatial coverage across the whole of the inner heliosphere and hence improve forecast capability. During October 2016, a unique opportunity arose whereby the European-based LOw Frequency ARray (LOFAR) radio telescope was used to make nearly four weeks of continuous observations of IPS as a heliospheric space-weather trial campaign. This was expanded into a global effort to include observations of IPS from the Murchison Widefield Array (MWA) in Western Australia and many more observations from various IPS-dedicated WIPSS Network systems. LOFAR is a next-generation low-frequency radio interferometer capable of observing in the radio frequency range 10-250 MHz, nominally with up to 80 MHz bandwidth at a time. MWA in Western Australia is capable of observing in the 80-300 MHz frequency range nominally using up to 32 MHz of bandwidth. IPS data from LOFAR, ISEE, the MEXican Array Radio Telescope (MEXART), and, where possible, other WIPSS Network systems (such as LPI-BSA and Ooty), will be used in this study and we will present some initial findings for these data sets. We also make a first attempt at the 3-D reconstruction of multiple pertinent WIPSS results in the UCSD tomography. We will also try to highlight some of the potential future tools that make LOFAR a very unique system to be able to test and validate a whole plethora of IPS analysis methods with the same set of IPS data.

  7. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  8. iTAR: a web server for identifying target genes of transcription factors using ChIP-seq or ChIP-chip data.

    Science.gov (United States)

    Yang, Chia-Chun; Andrews, Erik H; Chen, Min-Hsuan; Wang, Wan-Yu; Chen, Jeremy J W; Gerstein, Mark; Liu, Chun-Chi; Cheng, Chao

    2016-08-12

    Chromatin immunoprecipitation followed by massively parallel DNA sequencing (ChIP-seq) or microarray hybridization (ChIP-chip) has been widely used to determine the genomic occupation of transcription factors (TFs). We have previously developed a probabilistic method, called TIP (Target Identification from Profiles), to identify TF target genes using ChIP-seq/ChIP-chip data. To achieve high specificity, TIP applies a conservative method to estimate significance of target genes, with the trade-off being a relatively low sensitivity of target gene identification compared to other methods. Additionally, TIP's output does not render binding-peak locations or intensity, information highly useful for visualization and general experimental biological use, while the variability of ChIP-seq/ChIP-chip file formats has made input into TIP more difficult than desired. To improve upon these facets, here we present are fined TIP with key extensions. First, it implements a Gaussian mixture model for p-value estimation, increasing target gene identification sensitivity and more accurately capturing the shape of TF binding profile distributions. Second, it enables the incorporation of TF binding-peak data by identifying their locations in significant target gene promoter regions and quantifies their strengths. Finally, for full ease of implementation we have incorporated it into a web server ( http://syslab3.nchu.edu.tw/iTAR/ ) that enables flexibility of input file format, can be used across multiple species and genome assembly versions, and is freely available for public use. The web server additionally performs GO enrichment analysis for the identified target genes to reveal the potential function of the corresponding TF. The iTAR web server provides a user-friendly interface and supports target gene identification in seven species, ranging from yeast to human. To facilitate investigating the quality of ChIP-seq/ChIP-chip data, the web server generates the chart of the

  9. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  10. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    Science.gov (United States)

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  11. In Silico Pooling of ChIP-seq Control Experiments

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  12. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  13. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  14. On-line Monitoring of VoIP Quality Using IPFIX

    Directory of Open Access Journals (Sweden)

    Petr Matousek

    2014-01-01

    Full Text Available The main goal of VoIP services is to provide a reliable and high-quality voice transmission over packet networks. In order to prove the quality of VoIP transmission, several approaches were designed. In our approach, we are concerned about on-line monitoring of RTP and RTCP traffic. Based on these data, we are able to compute main VoIP quality metrics including jitter, delay, packet loss, and finally R-factor and MOS values. This technique of VoIP quality measuring can be directly incorporated into IPFIX monitoring framework where an IPFIX probe analyses RTP/RTCP packets, computes VoIP quality metrics, and adds these metrics into extended IPFIX flow records. Then, these extended data are stored in a central IPFIX monitoring system called collector where can be used for monitoring purposes. This paper presents a functional implementation of IPFIX plugin for VoIP quality measurement and compares the results with results obtained by other tools.

  15. An introduction to computer networks

    CERN Document Server

    Rizvi, SAM

    2011-01-01

    AN INTRODUCTION TO COMPUTER NETWORKS is a comprehensive text book which is focused and designed to elaborate the technical contents in the light of TCP/IP reference model exploring both digital and analog data communication. Various communication protocols of different layers are discussed along with their pseudo-code. This book covers the detailed and practical information about the network layer alongwith information about IP including IPV6, OSPF, and internet multicasting. It also covers TCP congestion control and emphasizes on the basic principles of fundamental importance concerning the technology and architecture and provides detailed discussion of leading edge topics of data communication, LAN & Network Layer.

  16. Using the ACR/NEMA standard with TCP/IP and Ethernet

    Science.gov (United States)

    Chimiak, William J.; Williams, Rodney C.

    1991-07-01

    There is a need for a consolidated picture archival and communications system (PACS) in hospitals. At the Bowman Gray School of Medicine of Wake Forest University (BGSM), the authors are enhancing the ACR/NEMA Version 2 protocol using UNIX sockets and TCP/IP to greatly improve connectivity. Initially, nuclear medicine studies using gamma cameras are to be sent to PACS. The ACR/NEMA Version 2 protocol provides the functionality of the upper three layers of the open system interconnection (OSI) model in this implementation. The images, imaging equipment information, and patient information are then sent in ACR/NEMA format to a software socket. From there it is handed to the TCP/IP protocol, which provides the transport and network service. TCP/IP, in turn, uses the services of IEEE 802.3 (Ethernet) to complete the connectivity. The advantage of this implementation is threefold: (1) Only one I/O port is consumed by numerous nuclear medicine cameras, instead of a physical port for each camera. (2) Standard protocols are used which maximize interoperability with ACR/NEMA compliant PACSs. (3) The use of sockets allows a migration path to the transport and networking services of OSIs TP4 and connectionless network service as well as the high-performance protocol being considered by the American National Standards Institute (ANSI) and the International Standards Organization (ISO) -- the Xpress Transfer Protocol (XTP). The use of sockets also gives access to ANSI's Fiber Distributed Data Interface (FDDI) as well as other high-speed network standards.

  17. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  18. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  19. Examining Correlates of Problematic Internet Pornography Use Among University Students

    Science.gov (United States)

    Harper, Cody; Hodgins, David C.

    2016-01-01

    Background and aims The phenomenon of Internet pornography (IP) addiction is gainingincreasing attention in the popular media and psychological research. What has not been tested empirically is how frequency and amount ofIP use, along with other individual characteristics, are related tosymptoms of IP addiction. Methods 105 female and 86 male university students (mean age 21) from Calgary,Canada, were administered measures of IP use, psychosocial functioning (anxiety and depression, life and relationship satisfaction), addictivepropensities, and addictive IP use. Results Men reported earlier age of exposure and more frequent current IP use than women. Individuals not in relationships reported more frequent use than those in relationships. Frequency of IP use wasnot generally correlated with psychosocial functioning but was significantly positively correlated with level of IP addiction. Higher level of IP addiction was associated with poorer psychosocial functioning and problematic alcohol, cannabis, gambling and, in particular, video game use. A curvilinear association was found between frequency of IP use and level of addiction such that daily or greater IP use was associated with a sharp rise in addictive IP scores. Discussion The failure to find a strong significant relationship between IP use and general psychosocial functioning suggests that the overall effect of IP use is not necessarily harmful in and of itself. Addictiveuse of IP, which is associated with poorer psychosocial functioning, emerges when people begin to use IP daily. PMID:27156383

  20. Modelo de asignación predictivo de longitudes de ondas en redes WDM teniendo en cuenta dispersión residual y tráficos unicast/multicast con QoS

    Directory of Open Access Journals (Sweden)

    Javier Sierra

    2009-01-01

    Full Text Available El tráfico de Internet está en constante crecimiento y con él las aplicaciones del tipo unicast/multicast con diferentes requerimientos de Calidad de Servicio (QoS. Esto es motivo para que las Redes de Transporte Ópticas (OTN deban continuar su evolución hacia redes completamente ópticas (sin conversiones Óptico-Electrónico-Óptico: OEO. S/G Light-tree es una arquitectura de los nodos de las redes all-OTN que permite el optimo enrutamiento y/o manejo de tráficos unicast/multicast empleando el concepto de Traffic Grooming (TG, granularidad de tráfico en un ambiente óptico. Las técnicas de grooming así como los algoritmos de asignación y enrutamiento propuestos hasta el momento no tienen en cuenta los fenómenos que se pueden prestar en la fibra óptica, los cuales atenúan o alteran las diferentes longitudes de onda en las redes WDM (Wavelength Division Multiplexing. La dispersión cromática es un fenómeno que deforma los pulsos transmitidos en una fibra óptica y el efecto depende de la longitud de onda empleada en la transmisión. En este artículo, se propone un modelo predictivo de asignación de longitudes de ondas basado en cadenas de Markov que tiene en cuenta la dispersión residual en redes WDM que soportan traffic grooming y tráficos unicast/multicast con requerimientos de QoS. Los resultados de las simulaciones realizadas muestran que el modelo propuesto mejora la probabilidad de bloqueo de tráficos con requerimientos de QoS.

  1. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  2. Investigation of proliferation and migration of tongue squamous cell carcinoma promoted by three chemokines, MIP-3α, MIP-1β, and IP-10

    Directory of Open Access Journals (Sweden)

    Chu H

    2017-08-01

    Full Text Available Hongxing Chu,1,* Bo Jia,1,* Xiaoling Qiu,2 Jie Pan,1 Xiang Sun,1 Zhiping Wang,1 Jianjiang Zhao1 1Department of Oral and Maxillofacial Surgery, Stomatological Hospital, Southern Medical University, Guangzhou, Guangdong, China; 2Department of Endodontology, Stomatological Hospital, Southern Medical University, Guangzhou, Guangdong, China *These authors contributed equally to this work Abstract: The aim of this work was to investigate the role of chemokines in proliferation and migration of tongue squamous cell carcinoma (TSCC. Out of the 80 cytokines surveyed by a human cytokine antibody array, three chemokines, macrophage inflammatory protein-3α (MIP-3α, macrophage inflammatory protein-1β (MIP-1β, and interferon gamma-induced protein 10 (IP-10, showed elevated expression in TSCC cells (CAL-27 and UM-1, compared to the oral mucosal epithelial cells. Immunohistochemistry confirmed the high level of expression of MIP-3α in the TSCC tissues, especially in the high clinical stages. Furthermore, Western blot and immunofluorescence staining indicated that C-C chemokine receptor type 5, C-C chemokine receptor type 6, and C-X-C motif chemokine receptor 3, which are the receptors for MIP-3α, MIP-1β, and IP-10, respectively, were expressed in the TSCC cells. Viability assay showed MIP-3α, MIP-1β, and IP-10 led to the proliferation of the CAL-27 cells. Interestingly, MIP-1β and IP-10 also induced apoptosis in the TSCC cells. Transwell invasion assay showed MIP-3α and IP-10 could increase the invasive capability of TSCC cells; consistently, the enzymatic activities of matrix metalloproteinase-2 and matrix metalloproteinase-9 increased in the MIP-3α- and IP-10-treated cells. In summary, our results indicate the expression of MIP-3α, MIP-1β, and IP-10 increased in the TSCC cells. The elevated expression of MIP-3α and IP-10 promoted proliferation and migration of TSCC. These chemokines, along with their receptors, could be potential biomarkers and

  3. Study of transmitting electric power utility communications in IP network. Transmission of existing electric power utility communications in best effort type IP network under delay constraint; Denryokuyo tsushin kaisen no IP mo eno shuyo kento. Chien jikan seiyakuka ni okeru best effort gata IP mo eno kison denryokuyo tsushin kaisen no shuyo

    Energy Technology Data Exchange (ETDEWEB)

    Miyake, H.

    2000-07-01

    Since IP network does best effort behavior fundamentally, it always generates delay time and delay variation. For this reason, IP network has been unsuitable to transmit real time data such as a voice. However, in recent years, the technologies which transmit real time data in IP network, e.g. VoIP, have spread. If it is possible to transmit the existing electric power utility communications in IP network using these technologies, total network cost can be reduced by the reduction of required bandwidth and the simplification of communication network systems. In this report, it is examined quantitatively whether end-end delay time of the existing electric power utility communications, e.g. on-line, telephone, carrier relay, CDT (cyclic digital transmission equipment), video conference, ITV(industrial television), is within their permission delay time when they are transmitted in the best effort type IP network. (author)

  4. Results from the University of Calgary environmental geophysics test range

    Energy Technology Data Exchange (ETDEWEB)

    Duckworth, K; Lawton, D.C.; Juigalli, J; Parry, D. [Calgary Univ., AB (Canada). Dept. of Geology and Geophysics

    1995-12-31

    The Spy Hill Research Farm, operated by the University of Calgary as a test range site where geophysical equipment and methods related to environmental monitoring can be operated under controlled conditions, was described. The site is used by students in the geophysics courses offered at the University, but it is also intended to be available to other users for equipment tests. The site is underlain by glacial gravels and clays which reach thicknesses in excess of 30 m. Surveys of the site have been completed with the following geophysical systems: Geonics EM-31 and EM-34; Apex Max-Min; Huntec Mk4 IP with Phoenix IP-T1 transmitter; Geometrics Proton Magnetometer; McPhar vertical field Fluxgate magnetometer; Androtex TDR6 IP with Phoenix IP-T1 transmitter; Geometrics 12 channel refraction seismic system; and Pulse Echo Ground Penetrating Radar. The site has proved to be well suited to serve as a test range. The addition of yet more features to the site is being planned.

  5. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    OpenAIRE

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  6. HPC Access Using KVM over IP

    Science.gov (United States)

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  7. Examining Correlates of Problematic Internet Pornography Use Among University Students.

    Science.gov (United States)

    Harper, Cody; Hodgins, David C

    2016-06-01

    Background and aims The phenomenon of Internet pornography (IP) addiction is gainingincreasing attention in the popular media and psychological research.What has not been tested empirically is how frequency and amount ofIP use, along with other individual characteristics, are related tosymptoms of IP addiction. Methods 105 female and 86 male university students (mean age 21) from Calgary,Canada, were administered measures of IP use, psychosocial functioning(anxiety and depression, life and relationship satisfaction), addictivepropensities, and addictive IP use. Results Men reported earlier age of exposure and more frequent currentIP use than women. Individuals not in relationships reported morefrequent use than those in relationships. Frequency of IP use wasnot generally correlated with psychosocial functioning but was significantlypositively correlated with level of IP addiction. Higher level ofIP addiction was associated with poorer psychosocial functioning andproblematic alcohol, cannabis, gambling and, in particular, videogame use. A curvilinear association was found between frequency ofIP use and level of addiction such that daily or greater IP use wasassociated with a sharp rise in addictive IP scores. Discussion The failure to find a strong significant relationship between IPuse and general psychosocial functioning suggests that the overalleffect of IP use is not necessarily harmful in and of itself. Addictiveuse of IP, which is associated with poorer psychosocial functioning,emerges when people begin to use IP daily.

  8. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    International Nuclear Information System (INIS)

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  9. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  10. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  11. Quantitative analysis of macro-ARG using IP system

    International Nuclear Information System (INIS)

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  12. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  13. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  14. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    International Nuclear Information System (INIS)

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  15. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  16. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2) Gene of Drosophila and Interacts with IP3R to Affect Wing Development.

    Science.gov (United States)

    Dean, Derek M; Maroja, Luana S; Cottrill, Sarah; Bomkamp, Brent E; Westervelt, Kathleen A; Deitcher, David L

    2015-11-27

    Inositol 1,4,5-trisphosphate (IP3) regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs) bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy), a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2), a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80(ts) indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling. Copyright © 2016 Dean et al.

  17. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2 Gene of Drosophila and Interacts with IP3R to Affect Wing Development

    Directory of Open Access Journals (Sweden)

    Derek M. Dean

    2016-02-01

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy, a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2, a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80ts indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling.

  18. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  19. Electric conductivity for laboratory and field monitoring of induced partial saturation (IPS) in sands

    Science.gov (United States)

    Kazemiroodsari, Hadi

    Liquefaction is loss of shear strength in fully saturated loose sands caused by build-up of excess pore water pressure, during moderate to large earthquakes, leading to catastrophic failures of structures. Currently used liquefaction mitigation measures are often costly and cannot be applied at sites with existing structures. An innovative, practical, and cost effective liquefaction mitigation technique titled "Induced Partial Saturation" (IPS) was developed by researchers at Northeastern University. The IPS technique is based on injection of sodium percarbonate solution into fully saturated liquefaction susceptible sand. Sodium percarbonate dissolves in water and breaks down into sodium and carbonate ions and hydrogen peroxide which generates oxygen gas bubbles. Oxygen gas bubbles become trapped in sand pores and therefore decrease the degree of saturation of the sand, increase the compressibility of the soil, thus reduce its potential for liquefaction. The implementation of IPS required the development and validation of a monitoring and evaluation technique that would help ensure that the sands are indeed partially saturated. This dissertation focuses on this aspect of the IPS research. The monitoring system developed was based on using electric conductivity fundamentals and probes to detect the transport of chemical solution, calculate degree of saturation of sand, and determine the final zone of partial saturation created by IPS. To understand the fundamentals of electric conductivity, laboratory bench-top tests were conducted using electric conductivity probes and small specimens of Ottawa sand. Bench-top tests were used to study rate of generation of gas bubbles due to reaction of sodium percarbonate solution in sand, and to confirm a theory based on which degree of saturation were calculated. In addition to bench-top tests, electric conductivity probes were used in a relatively large sand specimen prepared in a specially manufactured glass tank. IPS was

  20. Voice over IP in the Local Exchange: A Case Study

    OpenAIRE

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  1. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  2. Ade-Ojo, IP

    African Journals Online (AJOL)

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  3. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  4. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  5. Limitations and possibilities of low cell number ChIP-seq

    Directory of Open Access Journals (Sweden)

    Gilfillan Gregor D

    2012-11-01

    Full Text Available Abstract Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP, we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells, and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance.

  6. Opportunistic Relay Selection in Multicast Relay Networks using Compressive Sensing

    KAUST Repository

    Elkhalil, Khalil

    2014-12-01

    Relay selection is a simple technique that achieves spatial diversity in cooperative relay networks. However, for relay selection algorithms to make a selection decision, channel state information (CSI) from all cooperating relays is usually required at a central node. This requirement poses two important challenges. Firstly, CSI acquisition generates a great deal of feedback overhead (air-time) that could result in significant transmission delays. Secondly, the fed back channel information is usually corrupted by additive noise. This could lead to transmission outages if the central node selects the set of cooperating relays based on inaccurate feedback information. In this paper, we introduce a limited feedback relay selection algorithm for a multicast relay network. The proposed algorithm exploits the theory of compressive sensing to first obtain the identity of the “strong” relays with limited feedback. Following that, the CSI of the selected relays is estimated using linear minimum mean square error estimation. To minimize the effect of noise on the fed back CSI, we introduce a back-off strategy that optimally backs-off on the noisy estimated CSI. For a fixed group size, we provide closed form expressions for the scaling law of the maximum equivalent SNR for both Decode and Forward (DF) and Amplify and Forward (AF) cases. Numerical results show that the proposed algorithm drastically reduces the feedback air-time and achieves a rate close to that obtained by selection algorithms with dedicated error-free feedback channels.

  7. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  8. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  9. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  10. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  11. Prognostic value of CtIP/RBBP8 expression in breast cancer

    International Nuclear Information System (INIS)

    Soria-Bretones, Isabel; Sáez, Carmen; Ruíz-Borrego, Manuel; Japón, Miguel A; Huertas, Pablo

    2013-01-01

    CtIP/RBBP8 is a multifunctional protein involved in transcription, DNA replication, DNA repair by homologous recombination and the G1 and G2 checkpoints. Its multiple roles are controlled by its interaction with several specific factors, including the tumor suppressor proteins BRCA1 and retinoblastoma. Both its functions and interactors point to a putative oncogenic potential of CtIP/RBBP8 loss. However, CtIP/RBBP8 relevance in breast tumor appearance, development, and prognosis has yet to be established. We performed a retrospective analysis of CtIP/RBBP8 and RB1 levels by immunohistochemistry using 384 paraffin-embedded breast cancer biopsies obtained during tumor removal surgery. We have observed that low or no expression of CtIP/RBBP8 correlates with high-grade breast cancer and with nodal metastasis. Reduction on CtIP/RBBP8 is most common in hormone receptor (HR)-negative, HER2-positive, and basal-like tumors. We observed lower levels of RB1 on those tumors with reduced CtIP/RBBP8 levels. On luminal tumors, decreased but not absence of CtIP/RBBP8 levels correlate with increased disease-free survival when treated with a combination of hormone, radio, and chemo therapies

  12. Integrating QoS and security functions in an IP-VPN gateway

    Science.gov (United States)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  13. China's Indigenous IP Policies -- Here to Stay?

    OpenAIRE

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  14. Internetiside VoIP sobib ka ettevõtteile / Valdur Laid

    Index Scriptorium Estoniae

    Laid, Valdur, 1969-

    2005-01-01

    Ilmunud ka: Delovõje Vedomosti 8. juuni lk. 19. Kommunikatsiooni liikumisest internetti ehk IP-võrku ning selle võimalustest ettevõtjaile. Vt. samas: Väikefirmade IP-lahendus jõuab aasta lõpus massturule

  15. All-IP-Ethernet architecture for real-time sensor-fusion processing

    Science.gov (United States)

    Hiraki, Kei; Inaba, Mary; Tezuka, Hiroshi; Tomari, Hisanobu; Koizumi, Kenichi; Kondo, Shuya

    2016-03-01

    Serendipter is a device that distinguishes and selects very rare particles and cells from huge amount of population. We are currently designing and constructing information processing system for a Serendipter. The information processing system for Serendipter is a kind of sensor-fusion system but with much more difficulties: To fulfill these requirements, we adopt All IP based architecture: All IP-Ethernet based data processing system consists of (1) sensor/detector directly output data as IP-Ethernet packet stream, (2) single Ethernet/TCP/IP streams by a L2 100Gbps Ethernet switch, (3) An FPGA board with 100Gbps Ethernet I/F connected to the switch and a Xeon based server. Circuits in the FPGA include 100Gbps Ethernet MAC, buffers and preprocessing, and real-time Deep learning circuits using multi-layer neural networks. Proposed All-IP architecture solves existing problem to construct large-scale sensor-fusion systems.

  16. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  17. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  18. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  19. Validation of the Spanish version of the Irrational Procrastination Scale (IPS.

    Directory of Open Access Journals (Sweden)

    Georgina Guilera

    Full Text Available The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS. The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64. Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  20. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  1. Validation of the Spanish version of the Irrational Procrastination Scale (IPS)

    Science.gov (United States)

    Guilera, Georgina; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18–77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population. PMID:29304119

  2. Validation of the Spanish version of the Irrational Procrastination Scale (IPS).

    Science.gov (United States)

    Guilera, Georgina; Barrios, Maite; Penelo, Eva; Morin, Christopher; Steel, Piers; Gómez-Benito, Juana

    2018-01-01

    The present study is centered in adapting and validating a Spanish version of the Irrational Procrastination Scale (IPS). The sample consists of 365 adults aged 18-77 years (M = 37.70, SD = 12.64). Participants were administered two measures of procrastination, the IPS and the Decisional Procrastination Questionnaire, as well as the Big Five Inventory, and the Satisfaction With Life Scale. First, the factor and replication analysis revealed that the internal structure of the scale is clearly one-dimensional, supporting the idea that IPS seems to measure general procrastination as a single trait. Second, the internal consistency is satisfactory as is the temporal stability of the IPS scores. Third, the correlations encountered between the IPS scores and other measures of procrastination, personality traits and satisfaction with life are all in the expected direction and magnitude. Finally, consistent with previous research, procrastination is related to age, with the youngest being the most procrastinating group. This study represents the first attempt in adapting and validating the IPS measure of procrastination into Spanish. Results suggest that the Spanish version of the IPS offers valid and reliable scores when applied to adult population.

  3. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...... as a biomarker that predicts severity of various diseases and can be used in the immunodiagnostics of Mycobacterium tuberculosis and cytomegalovirus infection. Here, we describe an ELISA-based method to detect IP-10 from dried blood and plasma spot samples....

  4. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  5. An ethernet/IP security review with intrusion detection applications

    International Nuclear Information System (INIS)

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  6. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  7. Numerical study of IP3-induced Ca2+ spiral pattern evolution

    International Nuclear Information System (INIS)

    Tang Jun; Ma Jun; Yi Ming; Jia Ya

    2008-01-01

    The effect of change in concentration of messenger molecule inositol 1,4,5-trisphosphate (IP 3 ) on intracellular Ca 2+ spiral pattern evolution is studied numerically. The results indicate that when the IP 3 concentration decreases from 0.27 μM, a physiologically reasonable value, to different values, the spiral centre drifts to the edge of the medium and disappears for a small enough IP 3 concentration. The instability of spiral pattern can be understood in terms of excitability-change controlled by the IP 3 concentration. On the other hand, when the IP 3 concentration increases from 0.27 μM, a homogeneous area with a high Ca 2+ concentration emerges and competes with the spiral pattern. A high enough IP 3 concentration can lead the homogeneous area to occupy the whole medium. The instability of spiral pattern is ascribed to the change in stability of a stationary state with a high Ca 2+ concentration. (general)

  8. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  9. Evolution of interprofessional learning: Dalhousie University's "From Family Violence to Health" module.

    Science.gov (United States)

    Johnston, Grace M; Ryding, Helen A; Campbell, Lindsay M

    2003-11-01

    At Dalhousie University, interprofessional (IP) learning modules are used to help future health care professionals learn to work together in resolving complex problems. One module, "From Family Violence to Health," features the role of dental professionals. This paper describes the evolution of this module from the year 2000. By February 2003, 1,182 students from 15 health care professions had completed the module. Qualitative evaluation in years 1 and 2 of the program (2000 and 2001) revealed that, before participating in the IP module, many students were able to identify a role for themselves in the recognition of family violence and knew their responsibility to report incidents. However, after participating in the module, they had a greater understanding of the reporting of family violence, a more comprehensive and supportive perspective, increased recognition of how health care professionals could work together and improved awareness of the roles of other professions. In a quantitative evaluation in year 3 (2002), mean student ratings on a scale of 1 to 5 indicated that the IP module was relevant (4.2), increased their understanding of family violence (4.0), and had some impact in promoting IP learning (3.8). As health care delivery becomes more focused on care teams and system thinking, the provision of IP training is expected to increase. The Dalhousie University IP modules (available at http://www.dal.ca/~fhp/ipl/index.html) address health and social problems for which it is critical that health care and other professionals work together. Feedback from practitioners on the development of IP education is welcomed, particularly with regard to the IP module addressing family violence.

  10. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  11. The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia

    OpenAIRE

    Md Khaled Shukran

    2011-01-01

    IP telephony is a transmission of voice and data over Packet Switched IP Networks and it has become a key issue in the telecommunication industry worldwide because of its higher efficiency and cheapest call rate. Hence, most of the countries in the world set up their telecommunication platform on IP based network as a fast revenue generating sources. Though Malaysia is on the way forward on IP based platform but the growth is not reached at satisfactory level due to the absence of effective r...

  12. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  13. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  14. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  15. Standardization efforts in IP telephony

    Science.gov (United States)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  16. Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections

    Directory of Open Access Journals (Sweden)

    Diane Barrett

    2012-03-01

    Full Text Available Zeidman, B. (2011. The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection. Boston, MA: Pearson Education, Inc. 480 pages, ISBN-10: 0137035330;ISBN-13: 978-0137035335, US$49.99.Reviewed by Diane Barrett, American Military University.Do not the book title fool you into thinking that the book is only for those looking to detect software infringement detection. It is a comprehensive look at software intellectual property. The book covers a wide range of topics and has something to offer for just about everyone from lawyers to programmers.(see PDF for full review

  17. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  18. A Reactive and Cycle-True IP Emulator for MPSoC Exploration

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Federico; Sparsø, Jens

    2008-01-01

    The design of MultiProcessor Systems-on-Chip (MPSoC) emphasizes intellectual-property (IP)-based communication-centric approaches. Therefore, for the optimization of the MPSoC interconnect, the designer must develop traffic models that realistically capture the application behavior as executing...... on the IP core. In this paper, we introduce a Reactive IP Emulator (RIPE) that enables an effective emulation of the IP-core behavior in multiple environments, including bit and cycle-true simulation. The RIPE is built as a multithreaded abstract instruction-set processor, and it can generate reactive...

  19. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  20. VoIP under the EU regulatory framework : preventing foreclosure?

    NARCIS (Netherlands)

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  1. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  2. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  3. A Software and Hardware IPTV Architecture for Scalable DVB Distribution

    Directory of Open Access Journals (Sweden)

    Georg Acher

    2009-01-01

    Full Text Available Many standards and even more proprietary technologies deal with IP-based television (IPTV. But none of them can transparently map popular public broadcast services such as DVB or ATSC to IPTV with acceptable effort. In this paper we explain why we believe that such a mapping using a light weight framework is an important step towards all-IP multimedia. We then present the NetCeiver architecture: it is based on well-known standards such as IPv6, and it allows zero configuration. The use of multicast streaming makes NetCeiver highly scalable. We also describe a low cost FPGA implementation of the proposed NetCeiver architecture, which can concurrently stream services from up to six full transponders.

  4. IP and resistivity survey at the INEL cold test pit

    International Nuclear Information System (INIS)

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  5. Computational Methods for ChIP-seq Data Analysis and Applications

    KAUST Repository

    Ashoor, Haitham

    2017-04-25

    The development of Chromatin immunoprecipitation followed by sequencing (ChIP-seq) technology has enabled the construction of genome-wide maps of protein-DNA interaction. Such maps provide information about transcriptional regulation at the epigenetic level (histone modifications and histone variants) and at the level of transcription factor (TF) activity. This dissertation presents novel computational methods for ChIP-seq data analysis and applications. The work of this dissertation addresses four main challenges. First, I address the problem of detecting histone modifications from ChIP-seq cancer samples. The presence of copy number variations (CNVs) in cancer samples results in statistical biases that lead to inaccurate predictions when standard methods are used. To overcome this issue I developed HMCan, a specially designed algorithm to handle ChIP-seq cancer data by accounting for the presence of CNVs. When using ChIP-seq data from cancer cells, HMCan demonstrates unbiased and accurate predictions compared to the standard state of the art methods. Second, I address the problem of identifying changes in histone modifications between two ChIP-seq samples with different genetic backgrounds (for example cancer vs. normal). In addition to CNVs, different antibody efficiency between samples and presence of samples replicates are challenges for this problem. To overcome these issues, I developed the HMCan-diff algorithm as an extension to HMCan. HMCan-diff implements robust normalization methods to address the challenges listed above. HMCan-diff significantly outperforms another state of the art methods on data containing cancer samples. Third, I investigate and analyze predictions of different methods for enhancer prediction based on ChIP-seq data. The analysis shows that predictions generated by different methods are poorly overlapping. To overcome this issue, I developed DENdb, a database that integrates enhancer predictions from different methods. DENdb also

  6. Photometric studies of δ Scuti stars. I. IP Virginis

    Science.gov (United States)

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  7. Functional-logic simulation of IP-blocks dose functional failures

    Directory of Open Access Journals (Sweden)

    Vyacheslav M. Barbashov

    2017-11-01

    Full Text Available The technique of functional-logical simulation of System-on-Chip (SoC total dose radiation failures is presented based on fuzzy logic sets theory. An analysis of the capabilities of this approach for IP-blocks radiation behavior is carried out along with the analysis of operating modes under irradiation influence on IP-blocks radiation behavior. The following elements of this technique application for simulation of dose radiation failures of various types of IP-units are studied: logical elements, memory units and cells, processors. Examples of criterial membership functions and operability functions construction are given for these IP-units and for various critical parameters characterizing their failures. It is shown that when modeling total dose failures it is necessary to take into account the influence of the functional mode on the model parameters. The technique proposed allows improving the reliability of the SoC radiation hardness estimation, also for the purpose of solving the problems of information security of electronic devices.

  8. The psisub(IPS)-LAS relation for extragalactic radio sources

    International Nuclear Information System (INIS)

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  9. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  10. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    Science.gov (United States)

    2003-04-01

    IP-HORNET, Metropolitan Optical Networks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION...OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500...Gemelos, and L. G. Kazovsky, “CSMA/CA MAC protocols for IP-HORNET: An IP over WDM metropolitan area ring netowrk ,” in Proceedings of GLOBE- COM’00

  11. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    Science.gov (United States)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated

  12. Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching

    DEFF Research Database (Denmark)

    Jha, Vikas; Kalia, Kartik; Chowdhary, Bhawani Shankar

    2016-01-01

    With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone....... With the humongous popularity of Internet the overall traffic on Internet has the same story. Focusing on transmission of IP traffic in an optical network with signals remaining in their optical nature generated at particular wavelength, proposed is the switching of optically generated IP packets through optical...... cross connects based on translation of wavelength when an IP packet is crossing the optical cross connect. Adding the concepts of layer 3 routing protocols along with the wavelength translation scheme, will help in spanning the overall optical network for a larger area....

  13. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  14. SpaceWire: IP, Components, Development Support and Test Equipment

    Science.gov (United States)

    Parkes, S.; McClements, C.; Mills, S.; Martin, I.

    SpaceWire is a communications network for use onboard spacecraft. It is designed to connect high data-rate sensors, large solid-state memories, processing units and the downlink telemetry subsystem providing an integrated data-handling network. SpaceWire links are serial, high-speed (2 Mbits/sec to 400 Mbits/sec), bi-directional, full-duplex, pointto- point data links which connect together SpaceWire equipment. Application information is sent along a SpaceWire link in discrete packets. Control and time information can also be sent along SpaceWire links. SpaceWire is defined in the ECSS-E50-12A standard [1]. With the adoption of SpaceWire on many space missions the ready availability of intellectual property (IP) cores, components, software drivers, development support, and test equipment becomes a major issue for those developing satellites and their electronic subsystems. This paper describes the work being done at the University of Dundee and STAR-Dundee Ltd with ESA, BNSC and internal funding to make these essential items available. STAR-Dundee is a spin-out company of the University of Dundee set up specifically to support users of SpaceWire.

  15. Solar Type II Radio Bursts and IP Type II Events

    Science.gov (United States)

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  16. The role of calsenilin/DREAM/KChIP3 in contextual fear conditioning.

    Science.gov (United States)

    Alexander, Jon C; McDermott, Carmel M; Tunur, Tumay; Rands, Vicky; Stelly, Claire; Karhson, Debra; Bowlby, Mark R; An, W Frank; Sweatt, J David; Schrader, Laura A

    2009-03-01

    Potassium channel interacting proteins (KChIPs) are members of a family of calcium binding proteins that interact with Kv4 potassium (K(+)) channel primary subunits and also act as transcription factors. The Kv4 subunit is a primary K(+) channel pore-forming subunit, which contributes to the somatic and dendritic A-type currents throughout the nervous system. These A-type currents play a key role in the regulation of neuronal excitability and dendritic processing of incoming synaptic information. KChIP3 is also known as calsenilin and as the transcription factor, downstream regulatory element antagonist modulator (DREAM), which regulates a number of genes including prodynorphin. KChIP3 and Kv4 primary channel subunits are highly expressed in hippocampus, an area of the brain important for learning and memory. Through its various functions, KChIP3 may play a role in the regulation of synaptic plasticity and learning and memory. We evaluated the role of KChIP3 in a hippocampus-dependent memory task, contextual fear conditioning. Male KChIP3 knockout (KO) mice showed significantly enhanced memory 24 hours after training as measured by percent freezing. In addition, we found that membrane association and interaction with Kv4.2 of KChIP3 protein was significantly decreased and nuclear KChIP3 expression was increased six hours after the fear conditioning training paradigm with no significant change in KChIP3 mRNA. In addition, prodynorphin mRNA expression was significantly decreased six hours after fear conditioning training in wild-type (WT) but not in KO animals. These data suggest a role for regulation of gene expression by KChIP3/DREAM/calsenilin in consolidation of contextual fear conditioning memories.

  17. Research on TCP/IP network communication based on Node.js

    Science.gov (United States)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  18. An Iterative Interplanetary Scintillation (IPS) Analysis Using Time-dependent 3-D MHD Models as Kernels

    Science.gov (United States)

    Jackson, B. V.; Yu, H. S.; Hick, P. P.; Buffington, A.; Odstrcil, D.; Kim, T. K.; Pogorelov, N. V.; Tokumaru, M.; Bisi, M. M.; Kim, J.; Yun, J.

    2017-12-01

    The University of California, San Diego has developed an iterative remote-sensing time-dependent three-dimensional (3-D) reconstruction technique which provides volumetric maps of density, velocity, and magnetic field. We have applied this technique in near real time for over 15 years with a kinematic model approximation to fit data from ground-based interplanetary scintillation (IPS) observations. Our modeling concept extends volumetric data from an inner boundary placed above the Alfvén surface out to the inner heliosphere. We now use this technique to drive 3-D MHD models at their inner boundary and generate output 3-D data files that are fit to remotely-sensed observations (in this case IPS observations), and iterated. These analyses are also iteratively fit to in-situ spacecraft measurements near Earth. To facilitate this process, we have developed a traceback from input 3-D MHD volumes to yield an updated boundary in density, temperature, and velocity, which also includes magnetic-field components. Here we will show examples of this analysis using the ENLIL 3D-MHD and the University of Alabama Multi-Scale Fluid-Kinetic Simulation Suite (MS-FLUKSS) heliospheric codes. These examples help refine poorly-known 3-D MHD variables (i.e., density, temperature), and parameters (gamma) by fitting heliospheric remotely-sensed data between the region near the solar surface and in-situ measurements near Earth.

  19. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    OpenAIRE

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  20. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  1. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  2. Review Report on the Design of In-Pile Test Section(IPS)

    International Nuclear Information System (INIS)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-01

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins

  3. Review Report on the Design of In-Pile Test Section(IPS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Min; Park, Kook Nam; Shim, Bong Sik; Lee, Chung Young; Chi, Dae Young; Park, Su Ki; Ahn, Sung Ho; Kim, Young Ki; Lee, Kye Hong; Kim, Kwan Hyun

    2009-01-15

    The In-Pile Test Section(IPS) accommodating fuel pins has loaded IR-1 hole in HANARO has double pressure vessel for the design conditions of 350 deg. C, 17.5 MPa and is composed of outer assembly and inner assembly. Dummy fuel, dummy fuel supports and Top flange are the main components in inner assembly and inner pressure vessel, outer pressure vessel and head are the components in outer assembly. The IPS at current status has dummy fuels and confirm the requirements for the IPS design improvements during the design, manufacturing and installation process. Head, Top Flange, Instrumentation Feed through, Lifting Eye, Fuel Carrier Leg, Retainer and Nozzle cover are the main parts that the design needs to be changed. This report suggest the needs for the IPS design modification and it would be reflected to the new IPS design which would accommodating test fuel pins.

  4. Network connectivity enhancement by exploiting all optical multicast in semiconductor ring laser

    Science.gov (United States)

    Siraj, M.; Memon, M. I.; Shoaib, M.; Alshebeili, S.

    2015-03-01

    The use of smart phone and tablet applications will provide the troops for executing, controlling and analyzing sophisticated operations with the commanders providing crucial documents directly to troops wherever and whenever needed. Wireless mesh networks (WMNs) is a cutting edge networking technology which is capable of supporting Joint Tactical radio System (JTRS).WMNs are capable of providing the much needed bandwidth for applications like hand held radios and communication for airborne and ground vehicles. Routing management tasks can be efficiently handled through WMNs through a central command control center. As the spectrum space is congested, cognitive radios are a much welcome technology that will provide much needed bandwidth. They can self-configure themselves, can adapt themselves to the user requirement, provide dynamic spectrum access for minimizing interference and also deliver optimal power output. Sometimes in the indoor environment, there are poor signal issues and reduced coverage. In this paper, a solution utilizing (CR WMNs) over optical network is presented by creating nanocells (PCs) inside the indoor environment. The phenomenon of four-wave mixing (FWM) is exploited to generate all-optical multicast using semiconductor ring laser (SRL). As a result same signal is transmitted at different wavelengths. Every PC is assigned a unique wavelength. By using CR technology in conjunction with PC will not only solve network coverage issue but will provide a good bandwidth to the secondary users.

  5. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  6. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... will be posted without alteration at http://www.regulations.gov , including any personal information... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...

  7. Searching CLEF-IP by Strategy

    NARCIS (Netherlands)

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  8. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  9. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  10. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  11. Quantitative ChIP-Seq Normalization Reveals Global Modulation of the Epigenome

    Directory of Open Access Journals (Sweden)

    David A. Orlando

    2014-11-01

    Full Text Available Epigenomic profiling by chromatin immunoprecipitation coupled with massively parallel DNA sequencing (ChIP-seq is a prevailing methodology used to investigate chromatin-based regulation in biological systems such as human disease, but the lack of an empirical methodology to enable normalization among experiments has limited the precision and usefulness of this technique. Here, we describe a method called ChIP with reference exogenous genome (ChIP-Rx that allows one to perform genome-wide quantitative comparisons of histone modification status across cell populations using defined quantities of a reference epigenome. ChIP-Rx enables the discovery and quantification of dynamic epigenomic profiles across mammalian cells that would otherwise remain hidden using traditional normalization methods. We demonstrate the utility of this method for measuring epigenomic changes following chemical perturbations and show how reference normalization of ChIP-seq experiments enables the discovery of disease-relevant changes in histone modification occupancy.

  12. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  13. The Incredibly Long-Lived SN 2005ip

    Science.gov (United States)

    Fox, Ori

    2016-10-01

    Type IIn supernovae (SNe IIn) are defined by their relatively narrow spectral line features associated with a dense circumstellar medium (CSM) formed by the progenitor star. The nature of the progenitor and mass loss remains relatively unknown. Shock interaction with the dense CSM can often result in significant UV emission for several years post-explosion, thereby probing the CSM characteristics, progenitor mass loss history and, ultimately, the progenitor itself. The Type IIn SN 2005ip proves to be one of the most interesting and well-studied targets within this subclass. Compared to all other supernovae, SN 2005ip is the most luminous for its age. Now more than 11 years post-explosion, the SN has released >10^51 erg throughout its lifetime as the forward shock continues to collide with a dense CSM. Here we propose HST/STIS-MAMA UV observations of SN 2005ip to investigate the massive CSM. When accounting for the shock travel time, these observations will probe material lost from the progenitor more than 1000 years prior to the explosion. We already have a single HST/STIS spectrum of SN 2005ip from 2014, which was obtained while the shock was still within a higher mass regime. With just 5 orbits, a second spectrum will allow us to directly trace the evolution of the CSM and produce new constraints on the pre-SN mass-loss history. Coinciding with Cycle 24's UV Initiative, this program offers new insight regarding both the progenitor and explosion characteristics of the SN IIn subclass.

  14. Sate-of-the-art IP switching router architecture using SFQ technology

    International Nuclear Information System (INIS)

    Miyaho, N.; Miyahara, K.; Yamazaki, A.

    2006-01-01

    Taking the recent trend of rapid IP traffic increasing and QoS in the Internet into account, we propose an innovative IP router architecture from the viewpoint of minimum switching delay, switching capacity, QoS assurance for the next generation Internet services. We examined the IP router performance using superconductivity device simulator (WinS) assuming the future-generation Nb junction process and confirmed more than 300 GHz clock operation. For the evaluation of a novel IP switch architecture, we effectively apply the SFQ circuits using Josephson junctions to an extremely restricted function block in the switching node and a conventional semiconductor technology is also applied for the rest parts of the other function blocks inside it

  15. Implantación de switching y ToIP sobre una red WAN

    OpenAIRE

    Pique Palacin, Ivan

    2013-01-01

    Este proyecto tiene como objeto el diseño y la implementación de servicios de comunicaciones de LAN (Switching) y Telefonía IP (ToIP), todos ellos integrados sobre una red WAN nacional ya existente y funcionando, gestionada por un ISP. Aquest projecte té com a objecte el disseny i la implementació de serveis de comunicacions de LAN (Switching) i telefonia IP (ToIP), tots ells integrats sobre una xarxa WAN nacional ja existent i funcionant, gestionada per un ISP. Bachelor thesis for the ...

  16. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  17. HMCan: A method for detecting chromatin modifications in cancer samples using ChIP-seq data

    KAUST Repository

    Ashoor, Haitham

    2013-09-09

    Motivation: Cancer cells are often characterized by epigenetic changes, which include aberrant histone modifications. In particular, local or regional epigenetic silencing is a common mechanism in cancer for silencing expression of tumor suppressor genes. Though several tools have been created to enable detection of histone marks in ChIP-seq data from normal samples, it is unclear whether these tools can be efficiently applied to ChIP-seq data generated from cancer samples. Indeed, cancer genomes are often characterized by frequent copy number alterations: gains and losses of large regions of chromosomal material. Copy number alterations may create a substantial statistical bias in the evaluation of histone mark signal enrichment and result in underdetection of the signal in the regions of loss and overdetection of the signal in the regions of gain. Results: We present HMCan (Histone modifications in cancer), a tool specially designed to analyze histone modification ChIP-seq data produced from cancer genomes. HMCan corrects for the GC-content and copy number bias and then applies Hidden Markov Models to detect the signal from the corrected data. On simulated data, HMCan outperformed several commonly used tools developed to analyze histone modification data produced from genomes without copy number alterations. HMCan also showed superior results on a ChIP-seq dataset generated for the repressive histone mark H3K27me3 in a bladder cancer cell line. HMCan predictions matched well with experimental data (qPCR validated regions) and included, for example, the previously detected H3K27me3 mark in the promoter of the DLEC1 gene, missed by other tools we tested. The Author 2013. Published by Oxford University Press. All rights reserved.

  18. Controlling applied to information processing: quality management applied to IP projects and IP services; Informationsverarbeitungs-Controlling: Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service

    Energy Technology Data Exchange (ETDEWEB)

    Becker, B. [Vereinigung Deutscher Elektrizitaetswerke e.V. (VDEW), Frankfurt am Main (Germany); Beckers, F. [Isar-Amperwerke AG, Muenchen (Germany); Dewald, N. [Bayernwerk AG, Muenchen (Germany); Hauffe, P. [Pfalzwerke AG, Ludwigshafen am Rhein (Germany); Hein, F. [EVS AG Stuttgart (Germany); Hoederath, M. [Vereinigte Elektrizitaetswerke Westfalen AG (VEW), Dortmund (Germany); Seyen, R. [Staedtische Werke Nuernberg GmbH (Germany)

    1998-01-12

    The working group on information processing (IP) basics (in German: `IV-Grundlagen`) has prepared this contribution dealing with controlling applied to information processing. This new report, on the one hand, takes into consideration the role of the organizational IP unit as one offering its services to all sections of a company. On the other hand, information processing as an operational infrastructure influencing all business processes becomes increasingly important with respect to the competitiveness of the EVU. Therefore, quality management applied to IP projects and IP services must support this development. (orig./RHM) [Deutsch] Der VDEW Arbeitskreis `IV-Grundlagen` hat einen Beitrag zum Controlling fuer die Informationsverarbeitung erstellt. Hier geht zum einen die Rolle der Organisationseinheit IV als Dienstleister fuer alle Unternehmensbereiche ein. Zum anderen gewinnt die Informationsverarbeitung als betriebliche Infrastruktur fuer alle Geschaeftsprozesse zunehmende Bedeutung fuer die Wettbewerbsfaehigkeit der EVU. Das Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service muss dies unterstuetzen. (orig./RHM)

  19. Practical guidelines for the comprehensive analysis of ChIP-seq data.

    Directory of Open Access Journals (Sweden)

    Timothy Bailey

    Full Text Available Mapping the chromosomal locations of transcription factors, nucleosomes, histone modifications, chromatin remodeling enzymes, chaperones, and polymerases is one of the key tasks of modern biology, as evidenced by the Encyclopedia of DNA Elements (ENCODE Project. To this end, chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq is the standard methodology. Mapping such protein-DNA interactions in vivo using ChIP-seq presents multiple challenges not only in sample preparation and sequencing but also for computational analysis. Here, we present step-by-step guidelines for the computational analysis of ChIP-seq data. We address all the major steps in the analysis of ChIP-seq data: sequencing depth selection, quality checking, mapping, data normalization, assessment of reproducibility, peak calling, differential binding analysis, controlling the false discovery rate, peak annotation, visualization, and motif analysis. At each step in our guidelines we discuss some of the software tools most frequently used. We also highlight the challenges and problems associated with each step in ChIP-seq data analysis. We present a concise workflow for the analysis of ChIP-seq data in Figure 1 that complements and expands on the recommendations of the ENCODE and modENCODE projects. Each step in the workflow is described in detail in the following sections.

  20. The extended TRIP supporting VoIP routing reservation with distributed QoS

    Science.gov (United States)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  1. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  2. Longevity and clinical performance of IPS-Empress ceramic restorations--a literature review.

    Science.gov (United States)

    El-Mowafy, Omar; Brochu, Jean-François

    2002-04-01

    A literature review of longevity and clinical performance of IPS-Empress restorations is presented. A MEDLINE search was conducted in fall 2000. Selection criteria were set so as to identify suitable clinical trials that were published in full and that had lasted more than 2 years. A total of 6 clinical trials on the performance of IPS-Empress inlays and onlays and a total of 3 clinical trials on the performance of IPS-Empress crowns were identified. Survival rates for IPS-Empress inlays and onlays ranged from 96% at 4.5 years to 91% at 7 years; most failures were due to bulk fracture. IPS-Empress crowns had a survival rate ranging from 92% to 99% at 3 to 3.5 years; crown failure was also mainly due to fracture. Dentists should inform their patients about these survival rates when offering such treatment. The use of IPS-Empress crowns in the posterior of the mouth is not recommended until the results of more long-term clinical trials are available.

  3. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Real-time resource availability signaling in IP multimedia subsystem networks

    NARCIS (Netherlands)

    Ozcelebi, T.; Radovanovic, I.; Sengupta, D.

    2008-01-01

    IP Multimedia Subsystem (IMS) allows the use of unlicensed, non-dedicated and nondeterministic access networks for delivering IP multimedia services. Providing end-to-end Quality-of-Service (QoS) for resource demanding real-time services (e.g. real-time multimedia) over such networks is a

  5. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  6. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  7. Examples of modelling IP in AEM data: synthetic and real data

    DEFF Research Database (Denmark)

    Viezzoli, Andrea; Kaminskiy, Vladislav; Fiandaca, Gianluca

    There have been multiple evidences in the literature in the past several years of what has been referred to as IP effect in the Time Domain Airborne EM data (TDEM). This phenomenon is known to be responsible for incorrect inversion modelling of electrical resistivity, lower interpreted depth...... of investigation and lost information about chargeability of the subsurface as well as about other valuable parameters. Historically there have been many suggestions to account for the IP effect using the Cole-Cole model. In current paper we are showing the possibility to extract IP information from airborne TDEM...... with both high electrical conductivity and in resistive environments. Furthermore, modelling of IP effects allows corrected resistivity models. The Amakinskaya kimberlite pipe results highlight the relevance of chargeability for kimberlite exploration....

  8. Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM

    Directory of Open Access Journals (Sweden)

    La Surimi

    2015-07-01

    Abstract VoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed. The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet.   Keywords— VoIP, SCTP, ECN, AQM,AVQ.

  9. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  10. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  11. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  12. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  13. Analysis of ChIP-seq Data in R/Bioconductor.

    Science.gov (United States)

    de Santiago, Ines; Carroll, Thomas

    2018-01-01

    The development of novel high-throughput sequencing methods for ChIP (chromatin immunoprecipitation) has provided a very powerful tool to study gene regulation in multiple conditions at unprecedented resolution and scale. Proactive quality-control and appropriate data analysis techniques are of critical importance to extract the most meaningful results from the data. Over the last years, an array of R/Bioconductor tools has been developed allowing researchers to process and analyze ChIP-seq data. This chapter provides an overview of the methods available to analyze ChIP-seq data based primarily on software packages from the open-source Bioconductor project. Protocols described in this chapter cover basic steps including data alignment, peak calling, quality control and data visualization, as well as more complex methods such as the identification of differentially bound regions and functional analyses to annotate regulatory regions. The steps in the data analysis process were demonstrated on publicly available data sets and will serve as a demonstration of the computational procedures routinely used for the analysis of ChIP-seq data in R/Bioconductor, from which readers can construct their own analysis pipelines.

  14. A Learning-Based Approach for IP Geolocation

    Science.gov (United States)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  15. Optimal use of tandem biotin and V5 tags in ChIP assays

    Directory of Open Access Journals (Sweden)

    Krpic Sanja

    2009-02-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP assays coupled to genome arrays (Chip-on-chip or massive parallel sequencing (ChIP-seq lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes.

  16. Optimal use of tandem biotin and V5 tags in ChIP assays

    Science.gov (United States)

    Kolodziej, Katarzyna E; Pourfarzad, Farzin; de Boer, Ernie; Krpic, Sanja; Grosveld, Frank; Strouboulis, John

    2009-01-01

    Background Chromatin immunoprecipitation (ChIP) assays coupled to genome arrays (Chip-on-chip) or massive parallel sequencing (ChIP-seq) lead to the genome wide identification of binding sites of chromatin associated proteins. However, the highly variable quality of antibodies and the availability of epitopes in crosslinked chromatin can compromise genomic ChIP outcomes. Epitope tags have often been used as more reliable alternatives. In addition, we have employed protein in vivo biotinylation tagging as a very high affinity alternative to antibodies. In this paper we describe the optimization of biotinylation tagging for ChIP and its coupling to a known epitope tag in providing a reliable and efficient alternative to antibodies. Results Using the biotin tagged erythroid transcription factor GATA-1 as example, we describe several optimization steps for the application of the high affinity biotin streptavidin system in ChIP. We find that the omission of SDS during sonication, the use of fish skin gelatin as blocking agent and choice of streptavidin beads can lead to significantly improved ChIP enrichments and lower background compared to antibodies. We also show that the V5 epitope tag performs equally well under the conditions worked out for streptavidin ChIP and that it may suffer less from the effects of formaldehyde crosslinking. Conclusion The combined use of the very high affinity biotin tag with the less sensitive to crosslinking V5 tag provides for a flexible ChIP platform with potential implications in ChIP sequencing outcomes. PMID:19196479

  17. Emancipating Intellectual Property from Proprietarianism: Drahos, Foucault, and a Quasi-Genealogy of IP

    Directory of Open Access Journals (Sweden)

    Wendyl Luna

    2018-01-01

    Full Text Available This paper argues that Peter Drahos undertakes a partial Foucauldian genealogy by emancipating intellectual property (IP from proprietarianism. He demonstrates the dominance of proprietarianism in IP by drawing sample practices from trademark, copyright, and patent laws, and then seeks to displace the proprietarian dominance with instrumentalism, which reconstitutes IP as a “liberty-intruding privilege.” Ironically, despite doing a genealogy, Drahos does not eradicate sovereignty altogether as Michel Foucault insists, but instead determines IP as a “sovereignty mechanism” that has a “sovereignty effect.” After explaining what Foucauldian genealogy is, the paper will explain how Drahos undertakes a genealogy of IP, while highlighting the limitations of Drahos’ analysis from a Foucauldian perspective.

  18. Building Model for the University of Mosul Computer Network Using OPNET Simulator

    Directory of Open Access Journals (Sweden)

    Modhar Modhar A. Hammoudi

    2013-04-01

    Full Text Available This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600, core switch (Cisco6509, two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX. Three applications were added to test the network model. These applications were FTP (File Transfer Protocol, HTTP (Hyper Text Transfer Protocol and VoIP (Voice over Internet Protocol. The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised upto 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme.

  19. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  20. EQuIP-ped for Success

    Science.gov (United States)

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  1. (S)-(+)-Ipsdienol: Interspecific Inhibition of Ips latidens (LeConte) by Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1992-01-01

    In south-central British Columbia, the attraction of Ips latidens (LeConte) to its pheromone, ipsenol, was inhibited by (S)-(+)-ipsdienol, a pheromone for I. pini (Say). (R)-(-)-Ipsdienol had no effect on I. latidens. (S)-(+)-lpsdienol probably plays a role in interspecific communication between the two species...

  2. Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP

    Directory of Open Access Journals (Sweden)

    Muhamad Arsad Adam

    2016-11-01

    Full Text Available Teknologi  VoIP  (Voice  Over  Internet  Protocol merupakan  teknologi  yang  mampu  melewatkan  panggilan  suara, video  dan  data  dalam  jaringan  IP.  Voice  over  Internet  Protocol (VoIP  dalam  teknologi  komunikasi  cukup  signifikan  sehingga tidak  terlepas  dari  kejahatan  cybercrime,  Teknologi  VoIP  dapat disalahgunakan  untuk  melakukan  tindakan  kejahatan  jarak  jauh sehingga  diperlukan  langkah-langkah  investigasi  jika  terjadi masalah.  Menemukan  artefact  pada  Infrastruktur  VoIP merupakan tantangan tersendiri. WireSharks salah satu tool yang digunakan  dalam  investigasi  ini.  Metode  yang  digunakan  adalah DFIF  yang  terdiri  tahapan  adalah  Collection,  Examination, Analysis, dan Report and Documentation. Investigasi pada layanan VoIP  dapat  berhasil  dilakukan  dengan  menemukan  data  digital evidence  di  layer  5.  Tujuan  Penelitian  ini  yaitu  Mengetahui Karakteristik Data Digital berupa suara pada layanan Voice Over IP  dan  Menganalisis  Data  Digital  berupa  suara  pada  layanan Voice Over IP. Hasil dari penelitian ini barang bukti digital yang berupa  percakapan  yang  dapat  dipertanggungjawabkan  dalam pengadilan..Kata kunci— Data, Evidence, Forensik,Network, VoIP

  3. Impact of time-domain IP pulse length on measured data and inverted models

    DEFF Research Database (Denmark)

    Olsson, P. I.; Fiandaca, G.; Dahlin, T.

    2015-01-01

    The duration of time domain (TD) induced polarization (IP) current injections has significant impact on the acquired IP data as well as on the inversion models, if the standard evaluation procedure is followed. However, it is still possible to retrieve similar inversion models if the waveform...... of the injected current and the IP response waveform are included in the inversion. The on-time also generally affects the signal-tonoise ratio (SNR) where an increased on-time gives higher SNR for the IP data....

  4. A Brazilian version of the "Children's Interview for Psychiatric Syndromes" (ChIPS A versão brasileira do "Children's Interview for Psychiatric Syndromes" (ChIPS

    Directory of Open Access Journals (Sweden)

    Isabella G. S. de Souza

    2009-01-01

    Full Text Available OBJETIVE: The advance of research in child and adolescent psychiatry in Brazil heavily depends on the existence of instruments for the investigation of psychiatric syndromes adapted to Brazilian Portuguese. METHODS: This article describes a careful process of translation of the Children's Interview for Psychiatric Syndromes for the purpose of use in research in Brazil. The Children's Interview for Psychiatric Syndromes has a version for parents (P-ChIPs and a version for children (ChIPS. In this article, the sections of P-ChIPS referring to attention-deficit hyperactivity disorder, oppositional-defiant disorder, conduct disorder, mania/hypomania, anorexia nervosa, bulimia nervosa and psychotic disorders were translated to Brazilian Portuguese. The sections of the ChIPS referring to substance use disorders, social anxiety disorder, specific phobias, obsessive-compulsive disorder, generalized anxiety disoder, separation anxiety disorder, post-traumatic disorders and depression/dysthimia were also adapted. Each section was translated by two independent translators and later discussed in a committee composed of experts in the field of Psychiatry and a professional of the field of linguistics. RESULT: A final version containing an interview for the main psychiatric syndromes was defined. CONCLUSION: The translated P-ChIPS is a helpful instrument in children and adolescent clinical evaluation.OBJETIVO: O avanço em pesquisa em psiquiatria da infância e adolescência no Brasil depende da existência de instrumentos para a investigação de síndromes psiquiátricas adaptadas à Língua Portuguesa. Este artigo descreve um cuidadoso processo de tradução do Children´s Interview for Psychiatric Syndromes para o uso em pesquisa no Brasil. MÉTODOS: O Children´s Interview for Psychiatric Syndromes tem uma versão para pais (P-ChIPs e uma versão para as crianças (ChIPs. Nesse artigo, as seções do P-ChIPs referentes ao transtorno do déficit de aten

  5. Considerations on VoIP Throughput in 802.11 Networks

    Directory of Open Access Journals (Sweden)

    POTORAC, A. D.

    2009-10-01

    Full Text Available Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction. From this point of view, transmitting voice over IP networks is the most sensitive category of applications, especially when wireless medium is involved. The paper discusses the possibilities of transmitting the maximum number of simultaneous voice streams over 802.11 wireless networks considering the main factors which impact with VoIP throughput, in a basic scenario. Starting from a proposed communication model, the number of simultaneous possible VoIP sessions is calculated, taking into consideration the contribution of the protocol overheads, the security overheads, the PHY level timings and the CODEC proprieties. Numerical results are generated and compared.

  6. Multiformat decoder for a DSP-based IP set-top box

    Science.gov (United States)

    Pescador, F.; Garrido, M. J.; Sanz, C.; Juárez, E.; Samper, D.; Antoniello, R.

    2007-05-01

    Internet Protocol Set-Top Boxes (IP STBs) based on single-processor architectures have been recently introduced in the market. In this paper, the implementation of an MPEG-4 SP/ASP video decoder for a multi-format IP STB based on a TMS320DM641 DSP is presented. An initial decoder for PC platform was fully tested and ported to the DSP. Using this code an optimization process was started achieving a 90% speedup. This process allows real-time MPEG-4 SP/ASP decoding. The MPEG-4 decoder has been integrated in an IP STB and tested in a real environment using DVD movies and TV channels with excellent results.

  7. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  8. PENGGUNAAN METODE SIMULASI DALAM PEMBELAJARAN KETERAMPILAN LITERASI INFORMASI IPS BAGI MAHASISWA PGSD

    Directory of Open Access Journals (Sweden)

    Ana Nurhasanah

    2016-06-01

    Full Text Available Abstrak. Mata pelajaran IPS di Sekolah Dasar dikembangkan sebagai mata pelajaran terintegrasi atau integrative social studies, bukan sebagai pendidikan disiplin ilmu. Tantangan yang dihadapi peserta didik saat ini adalah banyak dan beragamnya masalah-masalah sosial yang harus dihadapi dalam kehidupan sehari-hari, oleh sebab itu pembelajaran IPS bertujuan untuk  mengembangkan keterampilan sosial. Namun, mengingat perkembangan siswa SD yang masih dalam tingkat berpikir kongkrit maka disarankan pembelajaran IPS SD menggunakan contoh-contoh masalah sosial yang kongkrit dan yang  mungkin melibatkan pengalaman-pengalaman siswa SD secara langsung. Namun dalam kenyataannya berdasarkan wawancara pada guru-guru SD di kota Serang masih banyak ditemukan kesulitan dalam mengajarkan IPS. Hal ini menunjukan bahwa kemampuan guru-guru di SD belum sesuai dengan tuntutan tujuan pembelajaran IPS. Oleh sebab itu penting kiranya mahasiswa PGSD semester V sebagai calon tenaga pendidik dibekali pengalaman dengan metode simulasi guna mengembangkan literasi informasi pada pembelajaran IPS yang menunjang pada pengembangan karir profesionalnya nanti. Kata kunci: metode simulasi, literasi informasi IPS, dan mahasiswa  Abstract. Social studies in elementary school subjects developed as an integrated or integrative social studies, not as educational disciplines. The challenges facing students today are many and varied social problems that must be faced in everyday life, so learning IPS aims to develop social skills. However, considering the development of elementary school students who are still in the level of concrete thinking it is advisable elementary social studies learning using examples of concrete social problems and that may involve experiences elementary students directly. But in reality based on the interviews of the teachers in the city of Serang there are still many difficulties in teaching social studies. This shows that the ability of teachers in primary

  9. Improving the accuracy of blood pressure measurement: the influence of the European Society of Hypertension International Protocol (ESH-IP) for the validation of blood pressure measuring devices and future perspectives.

    Science.gov (United States)

    Stergiou, George S; Asmar, Roland; Myers, Martin; Palatini, Paolo; Parati, Gianfranco; Shennan, Andrew; Wang, Jiguang; O'Brien, Eoin

    2018-03-01

    The European Society of Hypertension (ESH) International Protocol (ESH-IP) for the validation of blood pressure (BP) measuring devices was published in 2002, with the main objective of simplifying the validation procedures, so that more BP monitors would be subjected to independent validation. This article provides an overview of the international impact of the ESH-IP and of the lessons learned from its use, to be able to justify further developments in validation protocols. A review of published (PubMed) validation studies from 2002 to 2017 was performed. One hundred and seventy-seven validation studies using the ESH-IP, 59 using the British Hypertension Society protocol, 46 using the Association for the Advancement of Medical Instrumentation (AAMI) standard and 23 using the International Organization for Standardization (ISO) standard were identified. Lists of validated office-clinic, home and ambulatory BP monitors are provided. Of the ESH-IP studies, 93% tested oscillometric devices, 80% upper arm, 71% home, 25% office and 7% ambulatory monitors (some had more than one function). The original goal of the ESH-IP has been fulfilled in that in the last decade the number of published validation studies has more than doubled. It is now recognized that the provision of accurate devices would be best served by having a universal protocol. An international initiative has been put in place by AAMI, ESH and ISO experts aiming to reach consensus for a universal validation protocol to be accepted worldwide, which will allow a more thorough evaluation of the accuracy and performance of future BP monitors.

  10. Pressurisation of IP-SOFC technology for second generation hybrid application

    Energy Technology Data Exchange (ETDEWEB)

    Jones, L.

    2005-07-01

    The Integrated Planar Solid Oxide Fuel Cell (IP-SOFC) technology developed by Rolls-Royce plc is a hybrid fuel cell technology considered highly suitable for the distributed power generation market. This report presents the results of a project to examine the technical viability of the IP-SOFC technology and some of the associated hybrid system component technologies under pressurised conditions and to investigate the validity of the predicted pressurisation phenomena. The work included: identification of critical material specifications, construction processes, control parameters, etc; the design and commissioning of two pressurised IP-SOFC test rigs at Rolls Royce in Derby; testing two multi-bundle strips at high temperature and atmospheric pressure; testing an active IP-SOFC bundle at high temperature and pressure; testing an experimental steam reforming unit at high temperature and pressure; testing a novel low pressure drop, off-gas combustor concept under atmospheric and pressurised conditions; design studies to identify key parameters affecting the successful integration and packaging of the fuel cell stack with certain associated hybrid components; and designing a hybrid system experimental verification rig. Significant progress was made in addressing the development challenges associated with the IP-SOFC of leakage, performance, durability, yield and geometry, the reaction rate of steam reforming and emissions from the off-gas combustor. Recommendations for future work are made.

  11. Myricetin stimulates the absorption of the pro-carcinogen PhIP

    NARCIS (Netherlands)

    Schutte, M.E.; Sandt, J.J.M. van de; Alink, G.M.; Groten, J.P.; Rietjens, I.M.C.M.

    2006-01-01

    The effect of the flavonoid myricetin on the transport of the pro-carcinogen 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) through differentiated Caco-2 monolayers, a model for the intestinal epithelium, is described. Myricetin causes an increase of the transport of PhIP from the apical to

  12. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... including notification in the Federal Register. (2) VRS and IP Relay provider. Any entity desiring to...

  13. Novel characteristics of CtIP at damage-induced foci following the initiation of DNA end resection

    International Nuclear Information System (INIS)

    Fujisawa, Hiroshi; Fujimori, Akira; Okayasu, Ryuichi; Uesaka, Mitsuru; Yajima, Hirohiko

    2015-01-01

    Highlights: • CtIP becomes hyperphosphorylated and forms foci following cell irradiation. • CtIP accumulates in foci subsequent to the peak of hyperphosphorylation. • CtIP is maintained in a hypophosphorylated state at later times. • CtIP is continuously recruited to DNA double strand breaks downstream of resection. • CtIP presumably have a distinct role following the initiation of resection. - Abstract: Homologous recombination (HR) is a major repair pathway for DNA double strand breaks (DSBs), and end resection, which generates a 3′-single strand DNA tail at the DSB, is an early step in the process. Resection is initiated by the Mre11 nuclease together with CtIP. Here, we describe novel characteristics of CtIP at DSBs. At early times following exposure of human cells to ionizing radiation, CtIP localized to the DSB, became hyperphosphorylated and formed foci in an ATM-dependent manner. At later times, when the initiation of resection had occurred, CtIP foci persist but CtIP is maintained in a hypophosphorylated state, which is dependent on ATM and ATR. Exposure to cycloheximide revealed that CtIP turns over at DSB sites downstream of resection. Our findings provide strong evidence that CtIP is continuously recruited to DSBs downstream of both the initiation and extension step of resection, strongly suggesting that CtIP has functions in addition to promoting the initiation of resection during HR

  14. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  15. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  16. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie R. Watzlaf

    2012-06-01

    Full Text Available Consumer-based, free Voice and video over the Internet Protocol (VoIP software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 

  17. A metropolitan optical network with support for multicasting in the optical domain

    NARCIS (Netherlands)

    Dey, D.; Koonen, A.M.J.; Bochove, van A.C.; Geuzebroek, D.; Salvador, M.R.; Berghmans, F.; Thienpont, H.; Danckaert, J.; Desmet, L.

    2001-01-01

    We present the FLAMINGO1 network architecture, an all-optical wavelength-and-timeslotted Metropolitan Optical Network based on a multiple-ring topology. A couple of important aspects of this architecture include all-optical packet switching at intermediate nodes on a ring and the ability to put IP

  18. A Metropolitan Optical Network with support for multicasting in the optical domain

    NARCIS (Netherlands)

    Dey, D.; Koonen, A.M.J.; van Bochove, A.C.; Geuzebroek, D.H.; Salvador, M.R.; Thienpont, H.; Berghmans, F.; Danckaert, J.; Desmet, L.

    2001-01-01

    We present the FLAMINGO1 network architecture, an all-optical wavelength-and-timeslotted Metropolitan Optical Network based on a multiple-ring topology. A couple of important aspects of this architecture include all-optical packet switching at intermediate nodes on a ring and the ability to put IP

  19. CMT: a constrained multi-level thresholding approach for ChIP-Seq data analysis.

    Directory of Open Access Journals (Sweden)

    Iman Rezaeian

    Full Text Available Genome-wide profiling of DNA-binding proteins using ChIP-Seq has emerged as an alternative to ChIP-chip methods. ChIP-Seq technology offers many advantages over ChIP-chip arrays, including but not limited to less noise, higher resolution, and more coverage. Several algorithms have been developed to take advantage of these abilities and find enriched regions by analyzing ChIP-Seq data. However, the complexity of analyzing various patterns of ChIP-Seq signals still needs the development of new algorithms. Most current algorithms use various heuristics to detect regions accurately. However, despite how many formulations are available, it is still difficult to accurately determine individual peaks corresponding to each binding event. We developed Constrained Multi-level Thresholding (CMT, an algorithm used to detect enriched regions on ChIP-Seq data. CMT employs a constraint-based module that can target regions within a specific range. We show that CMT has higher accuracy in detecting enriched regions (peaks by objectively assessing its performance relative to other previously proposed peak finders. This is shown by testing three algorithms on the well-known FoxA1 Data set, four transcription factors (with a total of six antibodies for Drosophila melanogaster and the H3K4ac antibody dataset.

  20. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  1. Use of seatbelts by vehicle occupants in University College Hospital ...

    African Journals Online (AJOL)

    Use of seatbelts by vehicle occupants in University College Hospital, Ibadan, Nigeria. AO Sangowawa, SEU Ekanem, BT Alagh, IP Ebong, B Faseru, O Uchendu, BJ Adekunle, VHS Shaahu, A Fajola, GI Ogbole ...

  2. Automated Integration of Dedicated Hardwired IP Cores in Heterogeneous MPSoCs Designed with ESPAM

    Directory of Open Access Journals (Sweden)

    Ed Deprettere

    2008-06-01

    Full Text Available This paper presents a methodology and techniques for automated integration of dedicated hardwired (HW IP cores into heterogeneous multiprocessor systems. We propose an IP core integration approach based on an HW module generation that consists of a wrapper around a predefined IP core. This approach has been implemented in a tool called ESPAM for automated multiprocessor system design, programming, and implementation. In order to keep high performance of the integrated IP cores, the structure of the IP core wrapper is devised in a way that adequately represents and efficiently implements the main characteristics of the formal model of computation, namely, Kahn process networks, we use as an underlying programming model in ESPAM. We present details about the structure of the HW module, the supported types of IP cores, and the minimum interfaces these IP cores have to provide in order to allow automated integration in heterogeneous multiprocessor systems generated by ESPAM. The ESPAM design flow, the multiprocessor platforms we consider, and the underlying programming (KPN model are introduced as well. Furthermore, we present the efficiency of our approach by applying our methodology and ESPAM tool to automatically generate, implement, and program heterogeneous multiprocessor systems that integrate dedicated IP cores and execute real-life applications.

  3. Spojení s dynamickou IP adresou

    Czech Academy of Sciences Publication Activity Database

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  4. IP-telefon säästab oluliselt sidekulusid / Kristjan Otsmann

    Index Scriptorium Estoniae

    Otsmann, Kristjan, 1971-

    2005-01-01

    Telekomifirma Norby Telecomi poolt pakutavast IP-telefonist ehk helistamisest läbi Interneti, millega saab vähendada sidekulusid mitmeid kordi. Erinevatest internetipõhise kõnesidelahenduse lisateenustest. Vt. samas: Saaremaa Spa Hotellid säästab tuhandeid kroone kuus [intervjuu Saaremaa Spa Hotellide IT-juhiga Andri Võrguga]; Kuus olulist tööd enne IP-lahenduse tellimist

  5. Software for rapid time dependent ChIP-sequencing analysis (TDCA).

    Science.gov (United States)

    Myschyshyn, Mike; Farren-Dai, Marco; Chuang, Tien-Jui; Vocadlo, David

    2017-11-25

    Chromatin immunoprecipitation followed by DNA sequencing (ChIP-seq) and associated methods are widely used to define the genome wide distribution of chromatin associated proteins, post-translational epigenetic marks, and modifications found on DNA bases. An area of emerging interest is to study time dependent changes in the distribution of such proteins and marks by using serial ChIP-seq experiments performed in a time resolved manner. Despite such time resolved studies becoming increasingly common, software to facilitate analysis of such data in a robust automated manner is limited. We have designed software called Time-Dependent ChIP-Sequencing Analyser (TDCA), which is the first program to automate analysis of time-dependent ChIP-seq data by fitting to sigmoidal curves. We provide users with guidance for experimental design of TDCA for modeling of time course (TC) ChIP-seq data using two simulated data sets. Furthermore, we demonstrate that this fitting strategy is widely applicable by showing that automated analysis of three previously published TC data sets accurately recapitulates key findings reported in these studies. Using each of these data sets, we highlight how biologically relevant findings can be readily obtained by exploiting TDCA to yield intuitive parameters that describe behavior at either a single locus or sets of loci. TDCA enables customizable analysis of user input aligned DNA sequencing data, coupled with graphical outputs in the form of publication-ready figures that describe behavior at either individual loci or sets of loci sharing common traits defined by the user. TDCA accepts sequencing data as standard binary alignment map (BAM) files and loci of interest in browser extensible data (BED) file format. TDCA accurately models the number of sequencing reads, or coverage, at loci from TC ChIP-seq studies or conceptually related TC sequencing experiments. TC experiments are reduced to intuitive parametric values that facilitate biologically

  6. In-Pile Section(IPS) Inner Assembly Manufacturing Report

    International Nuclear Information System (INIS)

    Lee, Jong Min; Shim, Bong Sik; Lee, Chung Yong

    2009-12-01

    The objective of this report is to present the manufacturing, assembling and testing process of IPS Inner Assembly used in Fuel Test Loop(FTL) pre-operation test. The majority of the manufactured components are test fuels, inner assembly structures and subsidiary tools that is needed during the assembly process. In addition, Mock-up test for the welding and brazing is included at this stage. Lower structure, such as test fuels, fuel carrier legs are assembled and following structures, such as fuel carrier stem in the middle structure, top flange in the top structure are assembled together each other. To Verify the Reactor Coolant Pressure Boundary(RCPB) function in IPS Inner Assembly helium leak test and hydraulic test is performed with its acceptance criteria. According to the ASME III code Authorized Nuclear Inspector(ANI) is required during the hydraulic test. As-built measurement and insulation resistance test are performed to the structures and instrumentations after the test process. All requirements are satisfied and the IPS Inner Assembly was loaded in HANARO IR-1 hole in September 25, 2009

  7. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  8. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  9. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  10. [Two years clinical observation of a kind of castable ceramic--IPS Empress].

    Science.gov (United States)

    Liu, Y; Li, Y; Nie, Y

    1999-03-01

    We used this material in clinic since 1995. Discussion on the prosthetic effects of the above-mentioned material to spreat it clinically. Through half to two years clinical observations to evaluate the effect of IPS Empress crowns in anterior teeth and inlays in posteriors. and Prosthesis made of this kind of material IPS Empress is one kind of excellent all-ceramic prosthetic material. IPS Empress also could be used in post crowns and the clinical effect was satisfactory.

  11. GMI-IPS: Python Processing Software for Aircraft Campaigns

    Science.gov (United States)

    Damon, M. R.; Strode, S. A.; Steenrod, S. D.; Prather, M. J.

    2018-01-01

    NASA's Atmospheric Tomography Mission (ATom) seeks to understand the impact of anthropogenic air pollution on gases in the Earth's atmosphere. Four flight campaigns are being deployed on a seasonal basis to establish a continuous global-scale data set intended to improve the representation of chemically reactive gases in global atmospheric chemistry models. The Global Modeling Initiative (GMI), is creating chemical transport simulations on a global scale for each of the ATom flight campaigns. To meet the computational demands required to translate the GMI simulation data to grids associated with the flights from the ATom campaigns, the GMI ICARTT Processing Software (GMI-IPS) has been developed and is providing key functionality for data processing and analysis in this ongoing effort. The GMI-IPS is written in Python and provides computational kernels for data interpolation and visualization tasks on GMI simulation data. A key feature of the GMI-IPS, is its ability to read ICARTT files, a text-based file format for airborne instrument data, and extract the required flight information that defines regional and temporal grid parameters associated with an ATom flight. Perhaps most importantly, the GMI-IPS creates ICARTT files containing GMI simulated data, which are used in collaboration with ATom instrument teams and other modeling groups. The initial main task of the GMI-IPS is to interpolate GMI model data to the finer temporal resolution (1-10 seconds) of a given flight. The model data includes basic fields such as temperature and pressure, but the main focus of this effort is to provide species concentrations of chemical gases for ATom flights. The software, which uses parallel computation techniques for data intensive tasks, linearly interpolates each of the model fields to the time resolution of the flight. The temporally interpolated data is then saved to disk, and is used to create additional derived quantities. In order to translate the GMI model data to the

  12. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  13. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  14. Determination of alpha particle detection efficiency of an imaging plate (IP) detector

    International Nuclear Information System (INIS)

    Rahman, N.M; Iida, Takao; Yamazawa, Hiromi; Moriizumi, Jun

    2006-01-01

    In order to determine the detection efficiency of the imaging plate (IP) detector, the true radioactivity of the alpha particles, which sampled in the collection media, should be known. The true radioactivity could be accurately predicted with the help of the reference alpha spectrometer measurement. The detection efficiency calculated for the IP was estimated with the theoretical curve and the experimental data. It is assumed that the air sample contained the decay products of both 222 Rn and 220 Rn series, the most significant sources of alpha particles. The present study estimated the detection efficiency of the IP as 39.3% with an uncertainty of 2.9 that is well enough to confirm the future use of the IP as a radiation detector. Experimental materials and methods are described. (S.Y.)

  15. ChIP-exo interrogation of Crp, DNA, and RNAP holoenzyme interactions

    DEFF Research Database (Denmark)

    Latif, Haythem; Federowicz, Stephen; Ebrahim, Ali

    2018-01-01

    Numerous in vitro studies have yielded a refined picture of the structural and molecular associations between Cyclic-AMP receptor protein (Crp), the DNA motif, and RNA polymerase (RNAP) holoenzyme. In this study, high-resolution ChIP-exonuclease (ChIP-exo) was applied to study Crp binding in vivo...

  16. Inhibition by salmeterol and cilomilast of fluticasone-enhanced IP-10 release in airway epithelial cells.

    Science.gov (United States)

    Reddy, P J; Aksoy, Mark O; Yang, Yi; Li, Xiu Xia; Ji, Rong; Kelsen, Steven G

    2008-02-01

    The CXC chemokines, IP-10/CXCL10 and IL-8/CXCL8, play a role in obstructive lung disease by attracting Th1/Tc1 lymphocytes and neutrophils, respectively. Inhaled corticosteroids (ICS) and long acting beta 2-agonists (LABA) are widely used. However, their effect(s) on the release of IP-10 and IL-8 by airway epithelial cells are poorly understood. This study examined the effects of fluticasone, salmeterol, and agents which raise intracellular cAMP (cilomilast and db-cAMP) on the expression of IP-10 and IL-8 protein and mRNA. Studies were performed in cultured human airway epithelial cells during cytokine-stimulated IP-10 and IL-8 release. Cytokine treatment (TNF-alpha, IL-1beta and IFN-gamma) increased IP-10 and IL-8 protein and mRNA levels. Fluticasone (0.1 nM to 1 microM) increased IP-10 but reduced IL-8 protein release without changing IP-10 mRNA levels assessed by real time RT-PCR. The combination of salmeterol (1 micro M) and cilomilast (1-10 mu M) reduced IP-10 but had no effect on IL-8 protein. Salmeterol alone (1 micro M) and db-cAMP alone (1 mM) antagonised the effects of fluticasone on IP-10 but not IL-8 protein. In human airway epithelial cells, inhibition by salmeterol of fluticasone-enhanced IP-10 release may be an important therapeutic effect of the LABA/ICS combination not present when the two drugs are used separately.

  17. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection

    Directory of Open Access Journals (Sweden)

    Xuan Dau Hoang

    2016-10-01

    Full Text Available On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. Fast finding of Hot-IPs in the IP packet stream can be effectively used in early detection of DDoS (Distributed Denial of Service attack targets and spreading sources of network worms. Research results show that the Count-Min method gives the best overall performance for Hot-IP detection thanks to its low computational complexity, low space requirement and fast processing speed. We also propose an early detection model of DDoS attack targets based on Hot-IP finding, which can be deployed on the target network routers.

  18. Inference of hierarchical regulatory network of estrogen-dependent breast cancer through ChIP-based data

    Directory of Open Access Journals (Sweden)

    Parvin Jeffrey

    2010-12-01

    Full Text Available Abstract Background Global profiling of in vivo protein-DNA interactions using ChIP-based technologies has evolved rapidly in recent years. Although many genome-wide studies have identified thousands of ERα binding sites and have revealed the associated transcription factor (TF partners, such as AP1, FOXA1 and CEBP, little is known about ERα associated hierarchical transcriptional regulatory networks. Results In this study, we applied computational approaches to analyze three public available ChIP-based datasets: ChIP-seq, ChIP-PET and ChIP-chip, and to investigate the hierarchical regulatory network for ERα and ERα partner TFs regulation in estrogen-dependent breast cancer MCF7 cells. 16 common TFs and two common new TF partners (RORA and PITX2 were found among ChIP-seq, ChIP-chip and ChIP-PET datasets. The regulatory networks were constructed by scanning the ChIP-peak region with TF specific position weight matrix (PWM. A permutation test was performed to test the reliability of each connection of the network. We then used DREM software to perform gene ontology function analysis on the common genes. We found that FOS, PITX2, RORA and FOXA1 were involved in the up-regulated genes. We also conducted the ERα and Pol-II ChIP-seq experiments in tamoxifen resistance MCF7 cells (denoted as MCF7-T in this study and compared the difference between MCF7 and MCF7-T cells. The result showed very little overlap between these two cells in terms of targeted genes (21.2% of common genes and targeted TFs (25% of common TFs. The significant dissimilarity may indicate totally different transcriptional regulatory mechanisms between these two cancer cells. Conclusions Our study uncovers new estrogen-mediated regulatory networks by mining three ChIP-based data in MCF7 cells and ChIP-seq data in MCF7-T cells. We compared the different ChIP-based technologies as well as different breast cancer cells. Our computational analytical approach may guide biologists to

  19. Multiplexed ChIP-Seq Using Direct Nucleosome Barcoding: A Tool for High-Throughput Chromatin Analysis.

    Science.gov (United States)

    Chabbert, Christophe D; Adjalley, Sophie H; Steinmetz, Lars M; Pelechano, Vicent

    2018-01-01

    Chromatin immunoprecipitation followed by sequencing (ChIP-Seq) or microarray hybridization (ChIP-on-chip) are standard methods for the study of transcription factor binding sites and histone chemical modifications. However, these approaches only allow profiling of a single factor or protein modification at a time.In this chapter, we present Bar-ChIP, a higher throughput version of ChIP-Seq that relies on the direct ligation of molecular barcodes to chromatin fragments. Bar-ChIP enables the concurrent profiling of multiple DNA-protein interactions and is therefore amenable to experimental scale-up, without the need for any robotic instrumentation.

  20. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  1. Post-translational inhibition of IP-10 secretion in IEC by probiotic bacteria: impact on chronic inflammation.

    Directory of Open Access Journals (Sweden)

    Gabriele Hoermannsperger

    Full Text Available BACKGROUND: Clinical and experimental studies suggest that the probiotic mixture VSL#3 has protective activities in the context of inflammatory bowel disease (IBD. The aim of the study was to reveal bacterial strain-specific molecular mechanisms underlying the anti-inflammatory potential of VSL#3 in intestinal epithelial cells (IEC. METHODOLOGY/PRINCIPAL FINDINGS: VSL#3 inhibited TNF-induced secretion of the T-cell chemokine interferon-inducible protein (IP-10 in Mode-K cells. Lactobacillus casei (L. casei cell surface proteins were identified as active anti-inflammatory components of VSL#3. Interestingly, L. casei failed to block TNF-induced IP-10 promoter activity or IP-10 gene transcription at the mRNA expression level but completely inhibited IP-10 protein secretion as well as IP-10-mediated T-cell transmigration. Kinetic studies, pulse-chase experiments and the use of a pharmacological inhibitor for the export machinery (brefeldin A showed that L. casei did not impair initial IP-10 production but decreased intracellular IP-10 protein stability as a result of blocked IP-10 secretion. Although L. casei induced IP-10 ubiquitination, the inhibition of proteasomal or lysosomal degradation did not prevent the loss of intracellular IP-10. Most important for the mechanistic understanding, the inhibition of vesicular trafficking by 3-methyladenine (3-MA inhibited IP-10 but not IL-6 expression, mimicking the inhibitory effects of L. casei. These findings suggest that L. casei impairs vesicular pathways important for the secretion of IP-10, followed by subsequent degradation of the proinflammatory chemokine. Feeding studies in TNF(DeltaARE and IL-10(-/- mice revealed a compartimentalized protection of VSL#3 on the development of cecal but not on ileal or colonic inflammation. Consistent with reduced tissue pathology in IL-10(-/- mice, IP-10 protein expression was reduced in primary epithelial cells. CONCLUSIONS/SIGNIFICANCE: We demonstrate segment

  2. Triazolophostins: a library of novel and potent agonists of IP3 receptors

    OpenAIRE

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin William; Sureshan, Kana M

    2015-01-01

    IP3 receptors are channels that mediate the release of Ca2+ from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of sy...

  3. Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2010-06-01

    Full Text Available 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

  4. Which IP Strategies Do Young Highly Innovative Firms Choose

    DEFF Research Database (Denmark)

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  5. A simple method to quantitate IP-10 in dried blood and plasma spots.

    Directory of Open Access Journals (Sweden)

    Martine G Aabye

    Full Text Available BACKGROUND: Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn screening. AIM: To develop a robust and sensitive ELISA-based assay for IP-10 detection in plasma, dried blood spots (DBS and dried plasma spots (DPS; to validate the ELISA in clinically relevant samples; and to assess the performance of the assay for detection of Cytomegalovirus (CMV and M.tuberculosis specific immune responses. METHOD: We raised mice and rat monoclonal antibodies against human IP-10 and developed an ELISA. The assay was validated and applied to the detection of CMV and M.tuberculosis specific responses in 18 patients with immune reactivity towards M.tuberculosis and 32 healthy controls of which 22 had immune reactivity towards CMV and none towards M.tuberculosis. We compared the performance of this new assay to IFN-γ. RESULTS: The ELISA was reliable for IP-10 detection in both plasma and filter paper samples. The linear range of the ELISA was 2.5-600 pg/ml. IFN-γ was not readily detectable in DPS samples. IP-10 was stabile in filter paper samples for at least 4 weeks at 37 °C. The correlation between IP-10 detected in plasma, DPS and DBS samples was excellent (r(2>0.97. CONCLUSIONS: This newly developed assay is reliable for IP-10 quantification in plasma, DBS and DPS samples from antigen stimulated and non-stimulated whole blood. The filter paper assays enable easy sample acquisition and transport at ambient temperature e.g. via the postal system. The system can potentially simplify diagnostic assays for M.tuberculosis and CMV infection.

  6. Redox routes to substitution of aluminum(III): synthesis and characterization of (IP-)2AlX (IP = α-iminopyridine, X = Cl, Me, SMe, S2CNMe2, C≡CPh, N3, SPh, NHPh).

    Science.gov (United States)

    Myers, Thomas W; Holmes, Alexandra L; Berben, Louise A

    2012-08-20

    Redox active ligands are shown to facilitate a variety of group transfer reactions at redox inert aluminum(III). Disulfides can be used as a two-electron group transfer reagent, and we show that (IP(-))(2)AlSR can be formed by reaction of [(THF)(6)Na][(IP(2-))(2)Al] (1c) with disulfides RSSR (where X = C(S)NMe(2), 4; SMe, 5). In a more general redox route to substitution of aluminum bis(iminopyridine) complexes, we report zinc(II) salts as a group transfer reagent. Reaction of [((R)IP(2-))(2)Al](-) (R = H, 1c; Me, 1d) with ZnX(2) affords ((R)IP(-))(2)AlX (where IP = iminopyridine, R = H, and X = Cl, 2; CCPh, 6; N(3), 7; SPh, 8; or R = Me and X = NHPh, 9). Single crystal X-ray diffraction analysis of the complexes reveal that each of the five coordinate complexes reported here has a trigonal bipyramidal geometry with τ = 0.668 - 0.858. We observed a correlation between the greatest deviations from ideal trigonal bipyramidal symmetry (lowest τ values), the bond lengths consistent with smallest degree of ligand reduction, and the least polarizable X ligand in (IP(-))(2)AlX. Complex 4 is six-coordinate and is best described as distorted octahedral. Variable temperature magnetic susceptibility measurements indicate that each of the complexes 3-9 has a biradical electronic structure similar to previously reported 2. Magnetic exchange coupling constants in the range J = -94 to -212 cm(-1) were fit to the data for 2-9 to describe the energy of antiferromagnetic interaction between ligand radicals assuming a spin Hamiltonian of the form Ĥ = -2JŜ(L(1))·Ŝ(L(2)). The strongest coupling occurs when the angle between the ligand planes is smallest, presumably to afford good overlap with the Al-X σ* orbital. Electrochemical properties of the complexes were probed using cyclic voltammetry and each of 3-9 displayed a reversible two-electron reduction and two quasi-reversible one-electron oxidation processes. The energy of the ligand based redox processes for 2-9 differ by

  7. Model-Based Learning Environment Based on The Concept IPS School-Based Management

    Directory of Open Access Journals (Sweden)

    Hamid Darmadi

    2017-03-01

    Full Text Available The results showed: (1 learning model IPS-oriented environment can grow and not you love the cultural values of the area as a basis for the development of national culture, (2 community participation, and the role of government in implementing learning model of IPS-based environment provides a positive impact for the improvement of management school resources, (3 learning model IPS-based environment effectively creating a way of life together peacefully, increase the intensity of togetherness and mutual respect (4 learning model IPS-based environment can improve student learning outcomes, (5 there are differences in the expression of attitudes and results learning among students who are located in the area of conflict with students who are outside the area of conflict (6 analysis of the scale of attitudes among school students da SMA result rewards high school students to the values of unity and nation, respect for diversity and peaceful coexistence, It is recommended that the Department of Education authority as an institution of Trustees and the development of social and cultural values in the province can apply IPS learning model based environments.

  8. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  9. ß-Phellandrene: Kairomone for Pine Engraver, Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1990-01-01

    The responses of Ips pini (Scolytidae) to multiple-funnel traps baited with the pheromone, ipsdienol, and various monoterpenes were determined in stands of lodgepole pine in southern and central British Columbia. Ips pini was attracted to both ipsdienol and ß-phellandrene, demonstrating that ß-phellandrene is a kairomone for this...

  10. Functional role of EF-hands 3 and 4 in membrane-binding of KChIP1

    Indian Academy of Sciences (India)

    Prakash

    type KChIP1, truncated KChIP1 exhibited lower lipid-binding capability. Compared with wild-type KChIP1, increasing membrane permeability by the use of digitonin caused a marked .... with sonication, the supernatant (soluble protein fractions).

  11. Cyclic ADP-ribose and IP3 mediate abscisic acid-induced isoflavone accumulation in soybean sprouts

    International Nuclear Information System (INIS)

    Jiao, Caifeng; Yang, Runqiang; Gu, Zhenxin

    2016-01-01

    In this study, the roles of ABA-cADPR-Ca 2+ and ABA-IP3-Ca 2+ signaling pathways in UV-B-induced isoflavone accumulation in soybean sprouts were investigated. Results showed that abscisic acid (ABA) up regulated cyclic ADP-ribose (cADPR) and inositol 1,4,5-trisphosphate (IP3) levels in soybean sprouts under UV-B radiation. Furthermore, cADPR and IP3, as second messengers of UV-B-triggered ABA, induced isoflavone accumulation by up-regulating proteins and genes expression and activity of isoflavone biosynthetic-enzymes (chalcone synthase, CHS; isoflavone synthase, IFS). After Ca 2+ was chelated by EGTA, isoflavone content decreased. Overall, ABA-induced cADPR and IP3 up regulated isoflavone accumulation which was mediated by Ca 2+ signaling via enhancing the expression of proteins and genes participating in isoflavone biosynthesis in soybean sprouts under UV-B radiation. - Highlights: • UV-B-induced cADPR and IP3 synthesis was mediated by ABA. • cADPR and IP3 were involved in UV-B-ABA-induced isoflavone accumulation. • cADPR and IP3-induced isoflavone accumulation may be mediated by Ca 2+ . • ABA, cADPR, IP3 and Ca 2+ could activate proteins expression of CHS and IFS.

  12. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    International Nuclear Information System (INIS)

    Guo Junqing; Chen Liu; Ai Hongwu; Jing Jiannian; Zhou Jiyong; Zhang Chuyu; You Shangyou

    2004-01-01

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-γ inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V H region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo

  13. Cell-type specificity of ChIP-predicted transcription factor binding sites

    Directory of Open Access Journals (Sweden)

    Håndstad Tony

    2012-08-01

    Full Text Available Abstract Background Context-dependent transcription factor (TF binding is one reason for differences in gene expression patterns between different cellular states. Chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq identifies genome-wide TF binding sites for one particular context—the cells used in the experiment. But can such ChIP-seq data predict TF binding in other cellular contexts and is it possible to distinguish context-dependent from ubiquitous TF binding? Results We compared ChIP-seq data on TF binding for multiple TFs in two different cell types and found that on average only a third of ChIP-seq peak regions are common to both cell types. Expectedly, common peaks occur more frequently in certain genomic contexts, such as CpG-rich promoters, whereas chromatin differences characterize cell-type specific TF binding. We also find, however, that genotype differences between the cell types can explain differences in binding. Moreover, ChIP-seq signal intensity and peak clustering are the strongest predictors of common peaks. Compared with strong peaks located in regions containing peaks for multiple transcription factors, weak and isolated peaks are less common between the cell types and are less associated with data that indicate regulatory activity. Conclusions Together, the results suggest that experimental noise is prevalent among weak peaks, whereas strong and clustered peaks represent high-confidence binding events that often occur in other cellular contexts. Nevertheless, 30-40% of the strongest and most clustered peaks show context-dependent regulation. We show that by combining signal intensity with additional data—ranging from context independent information such as binding site conservation and position weight matrix scores to context dependent chromatin structure—we can predict whether a ChIP-seq peak is likely to be present in other cellular contexts.

  14. Evaluation of VoIP QoS Performance in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Tariq Meeran

    2017-07-01

    Full Text Available The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP solutions in wireless mesh network (WMN scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose challenges for the implementation of multimedia applications such as voice in various scenarios. Therefore, various solutions to make WMN more suitable for VoIP application have been proposed in the scientific literature. In this work, we have extensively explored a set of applicable scenarios by conducting experiments by means of a network simulator. The following scenarios were selected as the most representatives for performance evaluation: first responders, flooded village, remote village, and platoon deployment. Each selected scenario has been studied under six sub-scenarios corresponding to various combinations of the IEEE 802.11g, 802.11n, 802.11s, and 802.11e standards; the G.711 and G.729 codecs; and the ad hoc on demand distance vector (AODV and hybrid wireless mesh protocol (HWMP routing protocols. The results in terms of quality of service (measured with the mean opinion score rating scale, supported by the analysis of delay, jitter and packet loss, show that 802.11g integration with both VoIP codecs and AODV routing protocol results in better VoIP performance as compared to most other scenarios. In case of 802.11g integration with 802.11s, VoIP performance decreases as compared to the other sub-scenarios without 802.11s. The results also show that 802.11n integration with 802.11e decreases VoIP performance in larger deployments. We conclude the paper with some recommendations in terms of combinations of those standards and protocols with a view to achieve a higher quality of service for the given scenarios.

  15. Programmable genetic algorithm IP core for sensing and surveillance applications

    Science.gov (United States)

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  16. Fish the ChIPs: a pipeline for automated genomic annotation of ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Minucci Saverio

    2011-10-01

    Full Text Available Abstract Background High-throughput sequencing is generating massive amounts of data at a pace that largely exceeds the throughput of data analysis routines. Here we introduce Fish the ChIPs (FC, a computational pipeline aimed at a broad public of users and designed to perform complete ChIP-Seq data analysis of an unlimited number of samples, thus increasing throughput, reproducibility and saving time. Results Starting from short read sequences, FC performs the following steps: 1 quality controls, 2 alignment to a reference genome, 3 peak calling, 4 genomic annotation, 5 generation of raw signal tracks for visualization on the UCSC and IGV genome browsers. FC exploits some of the fastest and most effective tools today available. Installation on a Mac platform requires very basic computational skills while configuration and usage are supported by a user-friendly graphic user interface. Alternatively, FC can be compiled from the source code on any Unix machine and then run with the possibility of customizing each single parameter through a simple configuration text file that can be generated using a dedicated user-friendly web-form. Considering the execution time, FC can be run on a desktop machine, even though the use of a computer cluster is recommended for analyses of large batches of data. FC is perfectly suited to work with data coming from Illumina Solexa Genome Analyzers or ABI SOLiD and its usage can potentially be extended to any sequencing platform. Conclusions Compared to existing tools, FC has two main advantages that make it suitable for a broad range of users. First of all, it can be installed and run by wet biologists on a Mac machine. Besides it can handle an unlimited number of samples, being convenient for large analyses. In this context, computational biologists can increase reproducibility of their ChIP-Seq data analyses while saving time for downstream analyses. Reviewers This article was reviewed by Gavin Huttley, George

  17. IP-10 is a potential biomarker of cystic fibrosis acute pulmonary exacerbations.

    Directory of Open Access Journals (Sweden)

    George M Solomon

    Full Text Available Cystic fibrosis (CF is characterized by acute pulmonary exacerbations (APE. The CF nasal airway exhibits a similar ion transport defect as the lung, and colonization, infection, and inflammation within the nasal passages are common among CF patients. Nasal lavage fluid (NLF is a minimally invasive means to collect upper airway samples.We collected NLF at the onset and resolution of CF APE and compared a 27-plex cytokine profile to stable CF outpatients and normal controls. We also tested IP-10 levels in the bronchoalveolar lavage fluid (BALF of CF patients. Well-differentiated murine sinonasal monolayers were exposed to bacterial stimulus, and IP-10 levels were measured to test epithelial secretion.Subjects hospitalized for APE had elevated IP-10 (2582 pg/mL [95% CL of mean: 818,8165], N=13 which significantly decreased (647 pg/mL [357,1174], P<0.05, N =13 following antimicrobial therapy. Stable CF outpatients exhibited intermediately elevated levels (680 pg/mL [281,1644], N=13 that were less than CF inpatients upon admission (P=0.056 but not significantly different than normal controls (342 pg/mL [110,1061]; P=0.3, N=10. IP-10 was significantly increased in CF BALF (2673 pg/mL [1306,5458], N=10 compared to healthy post-lung transplant patients (8.4 pg/mL [0.03,2172], N=5, P<0.001. IP-10 levels from well-differentiated CF murine nasal epithelial monolayers exposed to Pseudomonas PAO-1 bacteria-free prep or LPS (100 nM apically for 24 hours were significantly elevated (1159 ± 147, P<0.001 for PAO-1; 1373 ± 191, P<0.001 for LPS vs. 305 ± 68 for vehicle controls. Human sino-nasal epithelial cells derived from CF patients had a similar response to LPS (34% increase, P<0.05, N=6.IP-10 is elevated in the nasal lavage of CF patients with APE and responds to antimicrobial therapy. IP-10 is induced by airway epithelia following stimulation with bacterial pathogens in a murine model. Additional research regarding IP-10 as a potential biomarker is

  18. KChIP2 genotype dependence of transient outward current (Ito) properties in cardiomyocytes isolated from male and female mice.

    Science.gov (United States)

    Waldschmidt, Lara; Junkereit, Vera; Bähring, Robert

    2017-01-01

    The transient outward current (Ito) in cardiomyocytes is largely mediated by Kv4 channels associated with Kv Channel Interacting Protein 2 (KChIP2). A knockout model has documented the critical role of KChIP2 in Ito expression. The present study was conducted to characterize in both sexes the dependence of Ito properties, including current magnitude, inactivation kinetics, recovery from inactivation and voltage dependence of inactivation, on the number of functional KChIP2 alleles. For this purpose we performed whole-cell patch-clamp experiments on isolated left ventricular cardiomyocytes from male and female mice which had different KChIP2 genotypes; i.e., wild-type (KChIP2+/+), heterozygous knockout (KChIP2+/-) or complete knockout of KChIP2 (KChIP2-/-). We found in both sexes a KChIP2 gene dosage effect (i.e., a proportionality between number of alleles and phenotype) on Ito magnitude, however, concerning other Ito properties, KChIP2+/- resembled KChIP2+/+. Only in the total absence of KChIP2 (KChIP2-/-) we observed a slowing of Ito kinetics, a slowing of recovery from inactivation and a negative shift of a portion of the voltage dependence of inactivation. In a minor fraction of KChIP2-/- myocytes Ito was completely lost. The distinct KChIP2 genotype dependences of Ito magnitude and inactivation kinetics, respectively, seen in cardiomyocytes were reproduced with two-electrode voltage-clamp experiments on Xenopus oocytes expressing Kv4.2 and different amounts of KChIP2. Our results corroborate the critical role of KChIP2 in controlling Ito properties. They demonstrate that the Kv4.2/KChIP2 interaction in cardiomyocytes is highly dynamic, with a clear KChIP2 gene dosage effect on Kv4 channel surface expression but not on inactivation gating.

  19. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  20. Proposta de metodologia para avaliação de redes de voz sobre IP

    OpenAIRE

    Vandersilvio da Silva

    2006-01-01

    A redução de custo com telefonia através do uso de voz sobre IP tem disparado a busca de soluções que transformem redes IP originalmente dedicadas a transporte de dados em redes para transporte de voz. Esta dissertação tem por objetivo apresentar uma metodologia para sistematizar a avaliação de redes para o tráfego de voz sobre IP de acordo com as possibilidades disponíveis no cenário a ser avaliado. Inicialmente é dada uma visão geral de voz sobre IP, apresentando os protocolos utilizados, o...

  1. FANCD2 Binds CtIP and Regulates DNA-End Resection during DNA Interstrand Crosslink Repair

    Directory of Open Access Journals (Sweden)

    Junya Unno

    2014-05-01

    Full Text Available The Fanconi anemia (FA pathway is critically involved in the maintenance of hematopoietic stem cells and the suppression of carcinogenesis. A key FA protein, FANCD2, is monoubiquitinated and accumulates in chromatin in response to DNA interstrand crosslinks (ICLs, where it coordinates DNA repair through mechanisms that are still poorly understood. Here, we report that CtIP protein directly interacts with FANCD2. A region spanning amino acids 166 to 273 of CtIP and monoubiquitination of FANCD2 are both essential for the FANCD2-CtIP interaction and mitomycin C (MMC-induced CtIP foci. Remarkably, both FANCD2 and CtIP are critical for MMC-induced RPA2 hyperphosphorylation, an event that accompanies end resection of double-strand breaks. Collectively, our results reveal a role of monoubiquitinated FANCD2 in end resection that depends on its binding to CtIP during ICL repair.

  2. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  3. Value-Based Billing in a 3G IP Services Environment

    OpenAIRE

    Ryan, Conor; Donnelly, William; de Leastar, Eamonn; Cloney, James

    2002-01-01

    The proliferation of IP-based services has resulted in a paradigm shift away from traditional flat-rat, single service billing to content and usage based billing for composed service sets. The Information Societies Technology (IST) FORM project has prototyped an accounting and billing solution for IP-based telecommunications services. A key element of the solution is the IPDR Network Data Management - Usage specification. This paper presents the FORM development of a federated accounting and ...

  4. TCP/IP Communication System for Controlling a Vehicular Traffic Intersection

    Directory of Open Access Journals (Sweden)

    Pedraza-Martínez Luis Fernando

    2013-10-01

    Full Text Available This paper describes the development of a prototype of a vehicular traffic controller, whose system of communication is based on the TCP/IP protocol, in order to re- motely monitor and control the operation of traffic lights for a vehicular intersection. The results show the times of communication between the central and the traffic controller. The conclusions highlight the importance of using the TCP/IP protocol in traffic light systems.

  5. Potassium Channel Interacting Protein 2 (KChIP2) is not a transcriptional regulator of cardiac electrical remodeling

    DEFF Research Database (Denmark)

    Winther, Sine V; Tuomainen, Tomi; Borup, Rehannah

    2016-01-01

    The heart-failure relevant Potassium Channel Interacting Protein 2 (KChIP2) augments CaV1.2 and KV4.3. KChIP3 represses CaV1.2 transcription in cardiomyocytes via interaction with regulatory DNA elements. Hence, we tested nuclear presence of KChIP2 and if KChIP2 translocates into the nucleus...... intracellular Ca(2+) concentration. Neither increasing nor decreasing intracellular Ca(2+) concentrations caused translocation of KChIP2. Microarray analysis did not identify relief of transcriptional repression in murine KChIP2(-/-) heart samples. We conclude that although there is a baseline presence of KCh...

  6. A novel fusion protein of IP10-scFv retains antibody specificity and chemokine function

    Energy Technology Data Exchange (ETDEWEB)

    Junqing, Guo; Liu, Chen; Hongwu, Ai; Jiannian, Jing; Jiyong, Zhou; Chuyu, Zhang; Shangyou, You

    2004-07-23

    We combined the specificity of tumor-specific antibody with the chemokine function of interferon-{gamma} inducible protein 10 (IP-10) to recruit immune effector cells in the vicinity of tumor cells. A novel fusion protein of IP10-scFv was constructed by fusing mouse IP-10 to V{sub H} region of single-chain Fv fragment (scFv) against acidic isoferritin (AIF), and expressed in NS0 murine myeloma cells. The IP10-scFv fusion protein was shown to maintain the specificity of the antiAIF scFv with similar affinity constant, and bind to the human hepatocarcinoma SMMC 7721 cells secreting AIF as well as the activated mouse T lymphocytes expressing CXCR3 receptor. Furthermore, the IP10-scFv protein either in solution or bound on the surface of SMMC 7721 cells induced significant chemotaxis of mouse T cells in vitro. The results indicate that the IP10-scFv fusion protein possesses both bioactivities of the tumor-specific antibody and IP-10 chemokine, suggesting its possibility to induce an enhanced immune response against the residual tumor cells in vivo.

  7. Triazolophostins: a library of novel and potent agonists of IP3 receptors.

    Science.gov (United States)

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin W; Sureshan, Kana M

    2015-06-28

    IP3 receptors are channels that mediate the release of Ca(2+) from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of synthetic conditions for each analog. Such lengthy one-at-a-time syntheses limit access to AdA analogs. We have addressed this problem by synthesizing a library of triazole-based AdA analogs, triazolophostins, by employing click chemistry. An advanced intermediate having all the necessary phosphates and a β-azide at the anomeric position was reacted with various alkynes under Cu(i) catalysis to yield triazoles, which upon deprotection gave triazolophostins. All eleven triazolophostins synthesized are more potent than IP3 and some are equipotent with AdA in functional analyses of IP3 receptors. We show that a triazole ring can replace adenine without compromising the potency of AdA and provide facile routes to novel AdA analogs.

  8. Impact of VoIP and QoS on Open and Distance Learning

    Directory of Open Access Journals (Sweden)

    Sanjay JASOLA

    2006-07-01

    Full Text Available Voice over Internet Protocol (VoIP is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support any kind of sophisticated quality of service (QoS mechanism. Although the type of service (TOS field in the Internet protocol (IP header has been existing and has been allowing the differentiated treatment of packets, it was never really used on a large scale. The voice is sensitive to delay and jitter so bandwidth must be guaranteed while transporting it. With the extensive use of Internet for carrying voice, there is a need to add QoS functionality in it. QoS with reference to VoIP has been discussed in the paper. Limited bandwidth and network latency are the issues which need to be considered while using wireless LAN for packetized voice data. Efforts of standards like 802.11e which will take care of these issues, have also been explored. The impact of these technologies on distance education has also been explored in the paper.

  9. DNA-binding proteins regulating pIP501 transfer and replication

    Directory of Open Access Journals (Sweden)

    Elisabeth Grohmann

    2016-08-01

    Full Text Available pIP501 is a Gram-positive broad-host-range model plasmid intensively used for studying plasmid replication and conjugative transfer. It is a multiple antibiotic resistance plasmid frequently found in clinical Enterococcus faecalis and Enterococcus faecium isolates. Replication of pIP501 proceeds unidirectionally by a theta mechanism. The minimal replicon of pIP501 is composed of the repR gene encoding the essential rate-limiting replication initiator protein RepR and the origin of replication, oriR, located downstream of repR. RepR is similar to RepE of related streptococcal plasmid pAMβ1, which has been shown to possess RNase activity cleaving free RNA molecules in close proximity of the initiation site of DNA synthesis. Replication of pIP501 is controlled by the concerted action of a small protein, CopR, and an antisense RNA, RNAIII. CopR has a dual role: It acts as transcriptional repressor at the repR promoter and prevents convergent transcription of RNAIII and repR mRNA (RNAII, thereby indirectly increasing RNAIII synthesis. CopR binds asymmetrically as a dimer at two consecutive binding sites upstream of and overlapping with the repR promoter. RNAIII induces transcriptional attenuation within the leader region of the repR mRNA (RNAII. Deletion of either control component causes a 10- to 20-fold increase of plasmid copy number, while simultaneous deletions have no additional effect. Conjugative transfer of pIP501 depends on a type IV secretion system (T4SS encoded in a single operon. Its transfer host-range is considerably broad, as it has been transferred to virtually all Gram-positive bacteria including filamentous streptomycetes and even the Gram-negative Escherichia coli. Expression of the 15 genes encoding the T4SS is tightly controlled by binding of the relaxase TraA, the transfer initiator protein, to the operon promoter, which overlaps with the origin of transfer (oriT. The T4SS operon encodes the DNA-binding proteins TraJ (VirD4

  10. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  11. Bio-EdIP: An automatic approach for in vitro cell confluence images quantification.

    Science.gov (United States)

    Cardona, Andrés; Ariza-Jiménez, Leandro; Uribe, Diego; Arroyave, Johanna C; Galeano, July; Cortés-Mancera, Fabian M

    2017-07-01

    Cell imaging is a widely-employed technique to analyze multiple biological processes. Therefore, simple, accurate and quantitative tools are needed to understand cellular events. For this purpose, Bio-EdIP was developed as a user-friendly tool to quantify confluence levels using cell culture images. The proposed algorithm combines a pre-processing step with subsequent stages that involve local processing techniques and a morphological reconstruction-based segmentation algorithm. Segmentation performance was assessed in three constructed image sets, comparing F-measure scores and AUC values (ROC analysis) for Bio-EdIP, its previous version and TScratch. Furthermore, segmentation results were compared with published algorithms using eight public benchmarks. Bio-EdIP automatically segmented cell-free regions from images of in vitro cell culture. Based on mean F-measure scores and ROC analysis, Bio-EdIP conserved a high performance regardless of image characteristics of the constructed dataset, when compared with its previous version and TScratch. Although acquisition quality of the public dataset affected Bio-EdIP segmentation, performance was better in two out of eight public sets. Bio-EdIP is a user-friendly interface, which is useful for the automatic analysis of confluence levels and cell growth processes using in vitro cell culture images. Here, we also presented new manually annotated data for algorithms evaluation. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  13. Dental anomalies in 14 patients with IP: clinical and radiological analysis and review.

    Science.gov (United States)

    Santa-Maria, Fernanda D; Mariath, Luiza Monteavaro; Poziomczyk, Cláudia S; Maahs, Marcia A P; Rosa, Rafael F M; Zen, Paulo R G; Schüller-Faccini, Lavínia; Kiszewski, Ana Elisa

    2017-06-01

    Current knowledge on dental anomalies in patients with incontinentia pigmenti (IP) has been obtained by examining case reports; however, an overall characterization of such alterations remains lacking. The objective of this study was to determine the frequency, type and location of dental alterations in IP using a case series. Fourteen patients (9 children and 5 adults) with a clinical diagnosis of IP who presented dental anomalies were included in this study. All patients were administered a clinical questionnaire, dental examination and radiological investigation. In the present case series, agenesis of primary dentition was present in 60 % of patients and agenesis of permanent tooth was present in 92.8 % of patients. Most cases were missing at least 6 teeth. Second molar agenesis was present in 13 patients (92.8 %). Anomalies in dental crowns occurred in 71.4 % of cases, and the central incisor was most frequently affected. Two adult patients still had primary teeth. Malocclusion was found in 10 patients (71.4 %). High-arched palate was observed in 7 (50 %) patients. Patients with IP present alterations in both primary and permanent dentition. Because the agenesis of permanent teeth is more common, primary teeth are not always replaced. In addition, the durability of primary dentition appears to be greater in IP. This study shows that patients with IP experience significant loss of teeth, especially in permanent dentition, and have an increased risk of high-arched palate compared to the general population. Prophylactic care of primary teeth in IP is relevant for improving functional and aesthetic outcomes until dental prostheses are implanted.

  14. Pre-equilibrium Longitudinal Flow in the IP-Glasma Framework for Pb+Pb Collisions at the LHC

    Science.gov (United States)

    McDonald, Scott; Shen, Chun; Fillion-Gourdeau, François; Jeon, Sangyong; Gale, Charles

    2017-08-01

    In this work, we debut a new implementation of IP-Glasma and quantify the pre-equilibrium longitudinal flow in the IP-Glasma framework. The saturation physics based IP-Glasma model naturally provides a non-zero initial longitudinal flow through its pre-equilibrium Yang-Mills evolution. A hybrid IP-Glasma+MUSIC+UrQMD frame-work is employed to test this new implementation against experimental data and to make further predictions about hadronic flow observables in Pb+Pb collisions at 5.02 TeV. Finally, the non-zero pre-equilibrium longitudinal flow of the IP-Glasma model is quantified, and its origin is briefly discussed.

  15. IP-10 can be measured in dried plasma spots in patients with chronic hepatitis C infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Andersen, Ellen Sloth; Christensen, Peer Brehm

    2012-01-01

    The chemokine IP-10 (CXCL10) is a candidate marker for hepatitis C virus (HCV) fibrosis monitoring. The aim of this proof-of-concept study is to assess if IP-10 measurements from dried plasma spots (DPS) are accurate in HCV-infected patients with either minimal or significant fibrosis. We measured...... IP-10 levels in plasma and DPS of 21 HCV-infected patients with cirrhosis and 19 patients with no/little fibrosis (determined with FibroScan). Cirrhotic patients had significantly higher levels of IP-10 compared to patients with minimal fibrosis. DPS and plasma measurements of IP-10 are comparable...

  16. Legal Protection on IP Cores for System-on-Chip Designs

    Science.gov (United States)

    Kinoshita, Takahiko

    The current semiconductor industry has shifted from vertical integrated model to horizontal specialization model in term of integrated circuit manufacturing. In this circumstance, IP cores as solutions for System-on-Chip (SoC) have become increasingly important for semiconductor business. This paper examines to what extent IP cores of SoC effectively can be protected by current intellectual property system including integrated circuit layout design law, patent law, design law, copyright law and unfair competition prevention act.

  17. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  18. [Clinical application of IPS-empress 2 pressable all-ceramic crowns].

    Science.gov (United States)

    Wang, Ai-jun; He, Xiao-ming; Liu, Li-xia; Zhang, Chao-biao; Zhang, Min; Shen, Bei-yong

    2007-02-01

    To evaluate the clinical prosthetic effect of IPS-Empress 2 pressahie ceramic crowns. 198 teeth of 70 patients were restored with IPS-Empress 2 pressahie ceramic crowns. The patients were asked to return in one week and every half year. The clinical prosthetic effect was evaluated. Through follow-up of 3-38 months, the veneer porcelain crowns of 3 teeth were broken. 2 crowns fall off due to teeth fracture, gingivitis occurred in 2 teeth, pulpitis or periapical periodontitis occurred in 3 teeth. The shades of 3 crowns were darkening. The prosthetic effect of 185 teeth was satisfied. The rate of satisfaction was 93.4%. IPS-Empress 2 pressable all-ceramic crown has the advantages of aesthetic effect, good hiocompatihility and simple fabrication. But its strength is not enough for posterior teeth and it can not cover the deep color of non-vital teeth and metal materials.

  19. Human iPS Cell-Derived Germ Cells: Current Status and Clinical Potential

    Directory of Open Access Journals (Sweden)

    Tetsuya Ishii

    2014-10-01

    Full Text Available Recently, fertile spermatozoa and oocytes were generated from mouse induced pluripotent (iPS cells using a combined in vitro and in vivo induction system. With regard to germ cell induction from human iPS cells, progress has been made particularly in the male germline, demonstrating in vitro generation of haploid, round spermatids. Although iPS-derived germ cells are expected to be developed to yield a form of assisted reproductive technology (ART that can address unmet reproductive needs, genetic and/or epigenetic instabilities abound in iPS cell generation and germ cell induction. In addition, there is still room to improve the induction protocol in the female germline. However, rapid advances in stem cell research are likely to make such obstacles surmountable, potentially translating induced germ cells into the clinical setting in the immediate future. This review examines the current status of the induction of germ cells from human iPS cells and discusses the clinical potential, as well as future directions.

  20. DIVERSITY in binding, regulation, and evolution revealed from high-throughput ChIP.

    Science.gov (United States)

    Mitra, Sneha; Biswas, Anushua; Narlikar, Leelavati

    2018-04-23

    Genome-wide in vivo protein-DNA interactions are routinely mapped using high-throughput chromatin immunoprecipitation (ChIP). ChIP-reported regions are typically investigated for enriched sequence-motifs, which are likely to model the DNA-binding specificity of the profiled protein and/or of co-occurring proteins. However, simple enrichment analyses can miss insights into the binding-activity of the protein. Note that ChIP reports regions making direct contact with the protein as well as those binding through intermediaries. For example, consider a ChIP experiment targeting protein X, which binds DNA at its cognate sites, but simultaneously interacts with four other proteins. Each of these proteins also binds to its own specific cognate sites along distant parts of the genome, a scenario consistent with the current view of transcriptional hubs and chromatin loops. Since ChIP will pull down all X-associated regions, the final reported data will be a union of five distinct sets of regions, each containing binding sites of one of the five proteins, respectively. Characterizing all five different motifs and the corresponding sets is important to interpret the ChIP experiment and ultimately, the role of X in regulation. We present diversity which attempts exactly this: it partitions the data so that each partition can be characterized with its own de novo motif. Diversity uses a Bayesian approach to identify the optimal number of motifs and the associated partitions, which together explain the entire dataset. This is in contrast to standard motif finders, which report motifs individually enriched in the data, but do not necessarily explain all reported regions. We show that the different motifs and associated regions identified by diversity give insights into the various complexes that may be forming along the chromatin, something that has so far not been attempted from ChIP data. Webserver at http://diversity.ncl.res.in/; standalone (Mac OS X/Linux) from https

  1. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun; Li, Yue; Peng, Chengbin; Zhang, Zhaolei

    2014-01-01

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene

  2. Immunocytochemical evidence for co-expression of Type III IP3 receptor with signaling components of bitter taste transduction

    Directory of Open Access Journals (Sweden)

    Kinnamon Sue C

    2001-04-01

    Full Text Available Abstract Background Taste receptor cells are responsible for transducing chemical stimuli into electrical signals that lead to the sense of taste. An important second messenger in taste transduction is IP3, which is involved in both bitter and sweet transduction pathways. Several components of the bitter transduction pathway have been identified, including the T2R/TRB taste receptors, phospholipase C β2, and the G protein subunits α-gustducin, β3, and γ13. However, the identity of the IP3 receptor subtype in this pathway is not known. In the present study we used immunocytochemistry on rodent taste tissue to identify the IP3 receptors expressed in taste cells and to examine taste bud expression patterns for IP3R3. Results Antibodies against Type I, II, and III IP3 receptors were tested on sections of rat and mouse circumvallate papillae. Robust cytoplasmic labeling for the Type III IP3 receptor (IP3R3 was found in a large subset of taste cells in both species. In contrast, little or no immunoreactivity was seen with antibodies against the Type I or Type II IP3 receptors. To investigate the potential role of IP3R3 in bitter taste transduction, we used double-label immunocytochemistry to determine whether IP3R3 is expressed in the same subset of cells expressing other bitter signaling components. IP3R3 immunoreactive taste cells were also immunoreactive for PLCβ2 and γ13. Alpha-gustducin immunoreactivity was present in a subset of IP3R3, PLCβ2, and γ13 positive cells. Conclusions IP3R3 is the dominant form of the IP3 receptor expressed in taste cells and our data suggest it plays an important role in bitter taste transduction.

  3. Synthesis and evaluation of p-iodo-phentermine (IP) as a brain perfusion imaging agent

    International Nuclear Information System (INIS)

    Kizuka, H.; Elmaleh, D.R.; Brownell, G.L.; Strauss, H.W.

    1985-01-01

    rho-( 123 I and 131 I) iodo α,α-dimethylphenethylamine (rho-iodophentermine, IP) as the α-methylated analogue of iodoamphetamine has been prepared. It is hoped that this methyl substitution will increase the lipophilicity of the agent, enhance resistance to metabolism by monoamine oxidase, and will result in increased initial uptake and slower washout from the brain as compared to N-isopropyl-rho-( 123 I) iodoamphetamine. IP was prepared by diazotization of rho-aminophentermine followed by decomposition of the diazonium salt with KI. Radioiodinated IP was prepared either by the solid-phase isotopic exchange reaction or by decomposition of the piperidinotriazene derivative with a radiochemical yield of 40-60%. Biodistribution of 131 I-IP in rats showed brain uptake in the range of 1.7% dose g -1 at 5, 30 and 60 min. Imaging studies with 123 I-IP in dogs showed high brain extraction and slow washout of activity. (author)

  4. Using the MDCT thick slab MinIP method for the follow-up of pulmonary emphysema.

    Science.gov (United States)

    Lan, Hai; Nishitani, Hiromu; Nishihara, Sadamitsu; Ueno, Junji; Takao, Shoichiro; Iwamoto, Seiji; Kawanaka, Takashi; Mahmut, Mawlan; Qingge, Si

    2011-08-01

    The purpose of this study was to evaluate the usefulness of thick slab minimum intensity projection (MinIP) as a follow-up method in patients with pulmonary emphysema. This method was used to determine the presence or absence of changes over time in the lung field based on multi-detector-row CT (MDCT) data. Among patients diagnosed with pulmonary emphysema who underwent 16-MDCT (slice thickness, 1 mm) twice at an interval of 6 months or more, 12 patients without changes in the lung field and 14 with clear changes in the lung field were selected as subjects. An image interpretation experiment was performed by five image interpreters. Pulmonary emphysema was followed up using two types of thick slab MinIP (thick slab MinIP 1 and 2) and multi-planar reformation (MPR), and the results of image interpretation were evaluated by receiver operating characteristic (ROC) analysis. In addition, the time required for image interpretation was compared among the three follow-up methods. The area under the ROC curve (Az) was 0.794 for thick slab MinIP 1, 0.778 for the thick slab MinIP 2, and 0.759 for MPR, showing no significant differences among the three methods. Individual differences in each item were significantly more marked for MPR than for thick slab MinIP. The time required for image interpretation was around 18 seconds for thick slab MinIP 1, 11 seconds for thick slab MinIP 2, and approximately 127 seconds for MPR, showing significant differences among the three methods. There were no significant differences in the results of image interpretation regarding the presence or absence of changes in the lung fields between thick slab MinIP and MPR. However, thick slab MinIP showed a shorter image interpretation time and smaller individual differences in the results among image interpreters than MPR, suggesting the usefulness of this method for determining the presence or absence of changes with time in the lung fields of patients with pulmonary emphysema.

  5. An Installation of IPS Bypass Line at the Fuel Test Loop

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Ho Young; Ahn, G. H.; Lee, M.; Kim, M. S.; Cho, S. H.; Han, J. S.; Hur, S. O. [KAERI, Daejeon (Korea, Republic of)

    2010-12-15

    The Fuel Test Loop(FTL) was installed for the national goal of self-supporting technology in the field of design and construction of nuclear power plant. The FTL with the fuel irradiation equipment is essential in developing, improving and inspecting the fuel of CANDU type or PWR type nuclear power plant. The FTL should be operated at the same conditions of commercial nuclear power plant such as temperature, pressure, flow rate, neutron flux and so on. Starting designing in December 2001, the FTL was installed from March 2007 to August 2008. Especially the In Pile Section(IPS) was installed at IR1 hole in August 2008. Until September 2009 after loading the test fuel, a series of power escalation tests (LSD, CSB1, CSB2, HSB, HOP) were conducted. And it was operated at the condition of CSB2 for the 8 cycles from October 2009 to July 2010. But it could not be normally operated in early 2010, because the high radiation released from irradiated materials due to the worn down bearing of main cooling pump. So, we removed the IPS and installed a newly designed IPS bypass line to prevent increasing high radiation. In this report we will present preliminary works, main works processes, devices of making work environments, a designing and manufacturing of IPS bypass line and a rack of IPS, installing know-hows, problems and solutions broke out during the work etc. We believe that our efforts to complete successful installing and operating of the FTL system will contribute for the efficient utilization of HANARO

  6. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  7. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  8. Quantitative analysis of intraneuronal transport in human iPS neurons

    Directory of Open Access Journals (Sweden)

    Haruko Nakamura

    2015-08-01

    Full Text Available Induced pluripotent stem (iPS cells are promising tools to investigate disease mechanism and develop new drugs. Intraneuronal transport, which is fundamental for neuronal survival and function, is vulnerable to various pharmacological and chemical agents and is disrupted in some neurodegenerative disorders. We applied a quantification method for axonal transport by counting CM-DiI–labeled particles traveling along the neurite, which allowed us to monitor and quantitate, for the first time, intraneuronal transport in human neurons differentiated from iPS cells (iCell neurons. We evaluated the acute effects of several anti-neoplastic agents that have been previously shown to affect intraneuronal transport. Vincristine, paclitaxel and oxaliplatin decreased the number of moving particle along neurites. Cisplatin, however, produced no effect on intraneuronal transport, which is in contrast to our previous report indicating that it inhibits transport in chick dorsal root ganglion neurons. Our system may be a useful method for assessing intraneuronal transport and neurotoxicity in human iPS neurons.

  9. A short-term clinical evaluation of IPS Empress 2 crowns.

    Science.gov (United States)

    Toksavul, Suna; Toman, Muhittin

    2007-01-01

    The aim of this study was to evaluate the clinical performance of all-ceramic crowns made with the IPS Empress 2 system after an observation period of 12 to 60 months. Seventy-nine IPS Empress 2 crowns were placed in 21 patients. The all-ceramic crowns were evaluated clinically, radiographically, and using clinical photographs. The evaluations took place at baseline (2 days after cementation) and at 6-month intervals for 12 to 60 months. Survival rate of the crowns was determined using Kaplan-Meier statistical analysis. Based on the US Public Health Service criteria, 95.24% of the crowns were rated satisfactory after a mean follow-up period of 58 months. Fracture was registered in only 1 crown. One endodontically treated tooth failed as a result of fracture at the cervical margin area. In this in vivo study, IPS Empress 2 crowns exhibited a satisfactory clinical performance during an observation period ranging from 12 to 60 months.

  10. [Microstructure and mechanical property of a new IPS-Empress 2 dental glass-ceramic].

    Science.gov (United States)

    Luo, Xiao-ping; Watts, D C; Wilson, N H F; Silsons, N; Cheng, Ya-qin

    2005-03-01

    To investigate the microstructure and mechanical properties of a new IPS-Empress 2 dental glass-ceramic. AFM, SEM and XRD were used to analyze the microstructure and crystal phase of IPS-Empress 2 glass-ceramic. The flexural strength and fracture toughness were tested using 3-point bending method and indentation method respectively. IPS-Empress 2 glass-ceramic mainly consisted of lithium disilicate crystal, lithium phosphate and glass matrix, which formed a continuous interlocking structure. The crystal phases were not changed before and after hot-pressed treatment. AFM showed nucleating agent particles of different sizes distributed on the highly polished ceramic surface. The strength and fracture toughness were 300 MPa and 3.1 MPam(1/2). The high strength and fracture toughness of IPS-Empress 2 glass ceramic are attributed to the fine lithium disilicate crystalline, interlocking microstructure and crack deflection.

  11. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  12. Leukotriene B4 (LTB4) induces formation of inositol-phosphates (IP's) in rat peritoneal polymorphonuclear leukocytes (PMN's)

    International Nuclear Information System (INIS)

    Chi-Rosso, G.; Crooke, S.T.; Mong, S.

    1986-01-01

    LTB 4 induced rapid breakdown of prelabeled inositol-phospholipids (PI) in rat PMN. Formation of [ 3 H]-inositol-trisphosphate ([ 3 H]-IP 3 ) was rapid, with a peak of 250-300% of the control level, after 5-15 sec of stimulation with LTB 4 . Accumulation of [ 3 H]-inositol-bisphosphate ([ 3 H]-IP 2 ) was rapid, peaking after 30 sec of stimulation. [ 3 H]-inositol-monophosphate ([ 3 H]-IP 1 ) accumulated gradually in the presence of LiCl. The kinetics of [ 3 H]-IP 3 , [ 3 H]-IP 2 and [ 3 H]-IP 1 accumulation suggested that LTB 4 may interact with receptors in PMNs, activate phospholipase C which, in turn, induces hydrolysis of PI. The agonist activities of several LTB 4 analogs were employed to investigate the structure activity relationship of LTB 4 receptor mediated activation of PI hydrolysis. Increases in [ 3 H]-IP 3 formation were dependent upon the concentration of LTB 4 and the agonist analogs. The rank order potency of these analogs were equivalent to that of the pharmacological activity of LTB 4 agonists in the chemotaxis assay. Furthermore, the Islet activation protein (IAP) inhibited LTB 4 induced [ 3 H]-IP 3 formation. The tumor promoting phorbomyristate ester also inhibited LTB 4 induced [ 3 H]-IP 3 formation. These results suggest LTB 4 may interact with receptors in rat PMNs, activate G/sub i/ protein regulated phospholipase C and induce [ 3 H]-IP 3 formation

  13. Dietary Chemoprevention of PhIP Induced Carcinogenesis in Male Fischer 344 Rats with Tomato and Broccoli

    Science.gov (United States)

    Canene-Adams, Kirstie; Sfanos, Karen S.; Liang, Chung-Tiang; Yegnasubramanian, Srinivasan; Nelson, William G.; Brayton, Cory; De Marzo, Angelo M.

    2013-01-01

    The heterocyclic amine, 2-amino-1-methyl-6-phenylimidazo[4,5-B]pyridine (PhIP), found in meats cooked at high temperatures, has been implicated in epidemiological and rodent studies for causing breast, prostate, and colorectal cancers. A previous animal study using a xenograft model has shown that whole tomato and broccoli, when eaten in combination, exhibit a marked effect on tumor reduction compared to when eaten alone. Our aim was to determine if PhIP-induced carcinogenesis can be prevented by dietary consumption of whole tomato + broccoli powders. Male Fischer 344 rats (n = 45) were randomized into the following treatment groups: control (AIN93G diet), PhIP (200 ppm in AIN93G diet for the first 20 weeks of the study), or tomato + broccoli + PhIP (mixed in AIN93G diet at 10% each and fed with PhIP for 20 weeks, and then without PhIP for 32 weeks). Study animals were monitored for 52 weeks and were euthanized as necessary based on a set of criteria for health status and tumor burden. Although there appeared to be some hepatic and intestinal toxicity due to the combination of PhIP and tomato + broccoli, these rodents had improved survival and reduced incidence and/or severity of PhIP-induced neoplastic lesions compared to the PhIP-alone treated group. Rats eating tomato + broccoli exhibited a marked decrease in the number and size of cribiform prostatic intraepitheilial neoplasia/carcinoma in situ (cribiform PIN/CIS) lesions and in the incidence of invasive intestinal adenocarcinomas and skin carcinomas. Although the apparent toxic effects of combined PhIP and tomato + broccoli need additional study, the results of this study support the hypothesis that a diet rich in tomato and broccoli can reduce or prevent dietary carcinogen-induced cancers. PMID:24312188

  14. Normalization and experimental design for ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Alekseyenko Artyom A

    2007-06-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been widely used to investigate the DNA binding sites for a variety of proteins on a genome-wide scale. However, several issues in the processing and analysis of ChIP-chip data have not been resolved fully, including the effect of background (mock control subtraction and normalization within and across arrays. Results The binding profiles of Drosophila male-specific lethal (MSL complex on a tiling array provide a unique opportunity for investigating these topics, as it is known to bind on the X chromosome but not on the autosomes. These large bound and control regions on the same array allow clear evaluation of analytical methods. We introduce a novel normalization scheme specifically designed for ChIP-chip data from dual-channel arrays and demonstrate that this step is critical for correcting systematic dye-bias that may exist in the data. Subtraction of the mock (non-specific antibody or no antibody control data is generally needed to eliminate the bias, but appropriate normalization obviates the need for mock experiments and increases the correlation among replicates. The idea underlying the normalization can be used subsequently to estimate the background noise level in each array for normalization across arrays. We demonstrate the effectiveness of the methods with the MSL complex binding data and other publicly available data. Conclusion Proper normalization is essential for ChIP-chip experiments. The proposed normalization technique can correct systematic errors and compensate for the lack of mock control data, thus reducing the experimental cost and producing more accurate results.

  15. Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

    Directory of Open Access Journals (Sweden)

    david irwin

    2011-03-01

    Full Text Available The popularity of Voice over the Internet Protocol (VoIP is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is not applicable to VoIP calls. Therefore, other methods of recovering electronic evidence and information from VoIP are required.  This research looks at what protocol evidence remains after a VoIP call has taken place examining both a virtual hard disk and the Random Access Memory (RAM. This paper proposes a set of identifiable credentials based on packet header information contained within the VoIP protocol stack. A series of controlled tests were undertaken whereby these credentials were forensically searched for on a virtual machine which was used to make the VoIP call. This experiment was then repeated by a search for the same protocol credentials within the RAM.

  16. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  17. ReMap 2018: an updated atlas of regulatory regions from an integrative analysis of DNA-binding ChIP-seq experiments.

    Science.gov (United States)

    Chèneby, Jeanne; Gheorghe, Marius; Artufel, Marie; Mathelier, Anthony; Ballester, Benoit

    2018-01-04

    With this latest release of ReMap (http://remap.cisreg.eu), we present a unique collection of regulatory regions in human, as a result of a large-scale integrative analysis of ChIP-seq experiments for hundreds of transcriptional regulators (TRs) such as transcription factors, transcriptional co-activators and chromatin regulators. In 2015, we introduced the ReMap database to capture the genome regulatory space by integrating public ChIP-seq datasets, covering 237 TRs across 13 million (M) peaks. In this release, we have extended this catalog to constitute a unique collection of regulatory regions. Specifically, we have collected, analyzed and retained after quality control a total of 2829 ChIP-seq datasets available from public sources, covering a total of 485 TRs with a catalog of 80M peaks. Additionally, the updated database includes new search features for TR names as well as aliases, including cell line names and the ability to navigate the data directly within genome browsers via public track hubs. Finally, full access to this catalog is available online together with a TR binding enrichment analysis tool. ReMap 2018 provides a significant update of the ReMap database, providing an in depth view of the complexity of the regulatory landscape in human. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. Experimental evaluation of the IP multimedia subsystem

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  19. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  20. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For