Ghosh, Arindam; Lee, Jae-Won; Cho, Ho-Shin
2013-01-01
Due to its efficiency, reliability and better channel and resource utilization, cooperative transmission technologies have been attractive options in underwater as well as terrestrial sensor networks. Their performance can be further improved if merged with forward error correction (FEC) techniques. In this paper, we propose and analyze a retransmission protocol named Cooperative-Hybrid Automatic Repeat reQuest (C-HARQ) for underwater acoustic sensor networks, which exploits both the reliability of cooperative ARQ (CARQ) and the efficiency of incremental redundancy-hybrid ARQ (IR-HARQ) using rate-compatible punctured convolution (RCPC) codes. Extensive Monte Carlo simulations are performed to investigate the performance of the protocol, in terms of both throughput and energy efficiency. The results clearly reveal the enhancement in performance achieved by the C-HARQ protocol, which outperforms both CARQ and conventional stop and wait ARQ (S&W ARQ). Further, using computer simulations, optimum values of various network parameters are estimated so as to extract the best performance out of the C-HARQ protocol. PMID:24217359
Efficient Buffering Scheme in the LMA for Seamless Handover in PMIPv6
NASA Astrophysics Data System (ADS)
Kim, Kwang-Ryoul; Lee, Hyo-Beom; Choi, Hyon-Young; Min, Sung-Gi; Han, Youn-Hee
Proxy Mobile IPv6 (PMIPv6) is proposed as a new network-based local mobility protocol which does not involve the Mobile Node (MN) in mobility management. PMIPv6, which uses link-layer attachment information, reduces the movement detection time and eliminates duplicate address detection procedures in order to provide faster handover than Mobile IPv6 (MIPv6). To eliminate packet loss during the handover period, the Local Mobility Anchor (LMA) buffering scheme is proposed. In this scheme, the LMA buffers lost packets of the Mobile Access Gateway (MAG) and the MN during the handover and recovers them after handover. A new Automatic Repeat reQuest (ARQ) handler is defined which efficiently manages the LMA buffer. The ARQ handler relays ARQ result between the MAG and the MN to the LMA. The LMA removes any buffered packets which have been successfully delivered to the MN. The ARQ handler recovers the packet loss during the handover using buffered packets in the LMA. The ARQ information, between the MAG and LMA, is inserted in the outer header of IP-in-IP encapsulated packets of a standard PMIPv6 tunnel. Since the proposed scheme simply adds information to the standard operation of an IP-in-IP tunnel between the LMA and the MAG, it can be implemented seamlessly without modification to the original PMIPv6 messages and signaling sequence. Unlike other Fast Handovers for Mobile IPv6 (FMIPv6) based enhancement for PMIPv6, the proposed scheme does not require any handover related information before the actual handover.
Performance Analysis of Hybrid ARQ Protocols in a Slotted Code Division Multiple-Access Network
1989-08-01
Convolutional Codes . in Proc Int. Conf. Commun., 21.4.1-21.4.5, 1987. [27] J. Hagenauer. Rate Compatible Punctured Convolutional Codes . in Proc Int. Conf...achieved by using a low rate (r = 0.5), high constraint length (e.g., 32) punctured convolutional code . Code puncturing provides for a variable rate code ...investigated the use of convolutional codes in Type II Hybrid ARQ protocols. The error
A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks
Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin
2016-01-01
Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044
An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.
Zhang, Jinhuan; Long, Jun
2017-06-12
Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.
Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV.
Lv, Zhichao; Zhang, Jie; Jin, Jiucai; Li, Qi; Gao, Baoru
2018-04-16
The Unmanned Surface Vehicle (USV) integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.
Kim, Kyungho; Li, Jing; Barazia, Andrew; Tseng, Alan; Youn, Seock-Won; Abbadessa, Giovanni; Yu, Yi; Schwartz, Brian; Andrews, Robert K.; Gordeuk, Victor R.; Cho, Jaehyung
2017-01-01
Previous studies identified the Ser/Thr protein kinase, AKT, as a therapeutic target in thrombo-inflammatory diseases. Here we report that specific inhibition of AKT with ARQ 092, an orally-available AKT inhibitor currently in phase Ib clinical trials as an anti-cancer drug, attenuates the adhesive function of neutrophils and platelets from sickle cell disease patients in vitro and cell-cell interactions in a mouse model of sickle cell disease. Studies using neutrophils and platelets isolated from sickle cell disease patients revealed that treatment with 50–500 nM ARQ 092 significantly blocks αMβ2 integrin function in neutrophils and reduces P-selectin exposure and glycoprotein Ib/IX/V-mediated agglutination in platelets. Treatment of isolated platelets and neutrophils with ARQ 092 inhibited heterotypic cell-cell aggregation under shear conditions. Intravital microscopic studies demonstrated that short-term oral administration of ARQ 092 or hydroxyurea, a major therapy for sickle cell disease, diminishes heterotypic cell-cell interactions in venules of sickle cell disease mice challenged with tumor necrosis factor-α. Co-administration of hydroxyurea and ARQ 092 further reduced the adhesive function of neutrophils in venules and neutrophil transmigration into alveoli, inhibited expression of E-selectin and intercellular adhesion molecule-1 in cremaster vessels, and improved survival in these mice. Ex vivo studies in sickle cell disease mice suggested that co-administration of hydroxyurea and ARQ 092 efficiently blocks neutrophil and platelet activation and that the beneficial effect of hydroxyurea results from nitric oxide production. Our results provide important evidence that ARQ 092 could be a novel drug for the prevention and treatment of acute vaso-occlusive complications in patients with sickle cell disease. PMID:27758820
Analysis of automatic repeat request methods for deep-space downlinks
NASA Technical Reports Server (NTRS)
Pollara, F.; Ekroot, L.
1995-01-01
Automatic repeat request (ARQ) methods cannot increase the capacity of a memoryless channel. However, they can be used to decrease the complexity of the channel-coding system to achieve essentially error-free transmission and to reduce link margins when the channel characteristics are poorly predictable. This article considers ARQ methods on a power-limited channel (e.g., the deep-space channel), where it is important to minimize the total power needed to transmit the data, as opposed to a bandwidth-limited channel (e.g., terrestrial data links), where the spectral efficiency or the total required transmission time is the most relevant performance measure. In the analysis, we compare the performance of three reference concatenated coded systems used in actual deep-space missions to that obtainable by ARQ methods using the same codes, in terms of required power, time to transmit with a given number of retransmissions, and achievable probability of word error. The ultimate limits of ARQ with an arbitrary number of retransmissions are also derived.
Roth, Gaël S; Macek Jilkova, Zuzana; Zeybek Kuyucu, Ayca; Kurma, Keerthi; Ahmad Pour, Séyédéh Tayébéh; Abbadessa, Giovanni; Yu, Yi; Busser, Benoit; Marche, Patrice N; Leroy, Vincent; Decaens, Thomas
2017-10-01
Hepatocellular carcinoma (HCC) is the second most common cause of cancer-related mortality worldwide. The AKT pathway has been found activated in 50% of HCC cases, making it a promising target. Therefore, we assess efficacy of the allosteric AKT inhibitor ARQ 092 compared with untreated control and standard treatment, sorafenib, in vitro and in vivo ARQ 092 blocked phosphorylation of AKT in vitro and strongly inhibited cell growth with significantly higher potency than sorafenib. Similarly, apoptosis and cell migration were strongly reduced by ARQ 092 in vitro To mimic human advanced HCC, we used a diethylnitrosamine-induced cirrhotic rat model with fully developed HCC. MRI analyses showed that ARQ 092 significantly reduced overall tumor size. Furthermore, number of tumors was decreased by ARQ 092, which was associated with increased apoptosis and decreased proliferation. Tumor contrast enhancement was significantly decreased in the ARQ 092 group. Moreover, on tumor tissue sections, we observed a vascular normalization and a significant decrease in fibrosis in the surrounding liver of animals treated with ARQ 092. Finally, pAKT/AKT levels in ARQ 092-treated tumors were reduced, followed by downregulation of actors of AKT downstream signaling pathway: pmTOR, pPRAS40, pPLCγ1, and pS6K1. In conclusion, we demonstrated that ARQ 092 blocks AKT phosphorylation in vitro and in vivo In the HCC-rat model, ARQ 092 was well tolerated, showed antifibrotic effect, and had stronger antitumor effect than sorafenib. Our results confirm the importance of targeting AKT in HCC. Mol Cancer Ther; 16(10); 2157-65. ©2017 AACR . ©2017 American Association for Cancer Research.
Generalized type II hybrid ARQ scheme using punctured convolutional coding
NASA Astrophysics Data System (ADS)
Kallel, Samir; Haccoun, David
1990-11-01
A method is presented to construct rate-compatible convolutional (RCC) codes from known high-rate punctured convolutional codes, obtained from best-rate 1/2 codes. The construction method is rather simple and straightforward, and still yields good codes. Moreover, low-rate codes can be obtained without any limit on the lowest achievable code rate. Based on the RCC codes, a generalized type-II hybrid ARQ scheme, which combines the benefits of the modified type-II hybrid ARQ strategy of Hagenauer (1988) with the code-combining ARQ strategy of Chase (1985), is proposed and analyzed. With the proposed generalized type-II hybrid ARQ strategy, the throughput increases as the starting coding rate increases, and as the channel degrades, it tends to merge with the throughput of rate 1/2 type-II hybrid ARQ schemes with code combining, thus allowing the system to be flexible and adaptive to channel conditions, even under wide noise variations and severe degradations.
Energy efficient rateless codes for high speed data transfer over free space optical channels
NASA Astrophysics Data System (ADS)
Prakash, Geetha; Kulkarni, Muralidhar; Acharya, U. S.
2015-03-01
Terrestrial Free Space Optical (FSO) links transmit information by using the atmosphere (free space) as a medium. In this paper, we have investigated the use of Luby Transform (LT) codes as a means to mitigate the effects of data corruption induced by imperfect channel which usually takes the form of lost or corrupted packets. LT codes, which are a class of Fountain codes, can be used independent of the channel rate and as many code words as required can be generated to recover all the message bits irrespective of the channel performance. Achieving error free high data rates with limited energy resources is possible with FSO systems if error correction codes with minimal overheads on the power can be used. We also employ a combination of Binary Phase Shift Keying (BPSK) with provision for modification of threshold and optimized LT codes with belief propagation for decoding. These techniques provide additional protection even under strong turbulence regimes. Automatic Repeat Request (ARQ) is another method of improving link reliability. Performance of ARQ is limited by the number of retransmissions and the corresponding time delay. We prove through theoretical computations and simulations that LT codes consume less energy per bit. We validate the feasibility of using energy efficient LT codes over ARQ for FSO links to be used in optical wireless sensor networks within the eye safety limits.
Different structural stability and toxicity of PrP(ARR) and PrP(ARQ) sheep prion protein variants.
Paludi, Domenico; Thellung, Stefano; Chiovitti, Katia; Corsaro, Alessandro; Villa, Valentina; Russo, Claudio; Ianieri, Adriana; Bertsch, Uwe; Kretzschmar, Hans A; Aceto, Antonio; Florio, Tullio
2007-12-01
The polymorphisms at amino acid residues 136, 154, and 171 in ovine prion protein (PrP) have been associated with different susceptibility to scrapie: animals expressing PrP(ARQ) [PrP(Ala136/Arg154/Gln171)] show vulnerability, whereas those that express PrP(ARR) [PrP(Ala136/Arg154/Arg171)] are resistant to scrapie. The aim of this study was to evaluate the in vitro toxic effects of PrP(ARR) and PrP(ARQ) variants in relation with their structural characteristics. We show that both peptides cause cell death inducing apoptosis but, unexpectedly, the scrapie resistant PrP(ARR) form was more toxic than the scrapie susceptible PrP(ARQ) variant. Moreover, the alpha-helical conformation of PrP(ARR) was less stable than that of PrP(ARQ) and the structural determinants responsible of these different conformational stabilities were characterized by spectroscopic analysis. We observed that PrP toxicity was inversely related to protein structural stability, being the unfolded conformation more toxic than the native one. However, the PrP(ARQ) variant displays a higher propensity to form large aggregates than PrP(ARR). Interestingly, in the presence of small amounts of PrP(ARR), PrP(ARQ) aggregability was reduced to levels similar to that of PrP(ARR). Thus, in contrast to PrP(ARR) toxicity, scrapie transmissibility seems to reside in the more stable conformation of PrP(ARQ) that allows the formation of large amyloid fibrils.
Deep Space Optical Link ARQ Performance Analysis
NASA Technical Reports Server (NTRS)
Clare, Loren; Miles, Gregory
2016-01-01
Substantial advancements have been made toward the use of optical communications for deep space exploration missions, promising a much higher volume of data to be communicated in comparison with present -day Radio Frequency (RF) based systems. One or more ground-based optical terminals are assumed to communicate with the spacecraft. Both short-term and long-term link outages will arise due to weather at the ground station(s), space platform pointing stability, and other effects. To mitigate these outages, an Automatic Repeat Query (ARQ) retransmission method is assumed, together with a reliable back channel for acknowledgement traffic. Specifically, the Licklider Transmission Protocol (LTP) is used, which is a component of the Disruption-Tolerant Networking (DTN) protocol suite that is well suited for high bandwidth-delay product links subject to disruptions. We provide an analysis of envisioned deep space mission scenarios and quantify buffering, latency and throughput performance, using a simulation in which long-term weather effects are modeled with a Gilbert -Elliot Markov chain, short-term outages occur as a Bernoulli process, and scheduled outages arising from geometric visibility or operational constraints are represented. We find that both short- and long-term effects impact throughput, but long-term weather effects dominate buffer sizing and overflow losses as well as latency performance.
Lath, Darren L; Buckle, Clive H; Evans, Holly R; Fisher, Matthew; Down, Jenny M; Lawson, Michelle A; Chantry, Andrew D
2018-01-01
The receptor tyrosine kinase c-Met, its ligand HGF, and components of the downstream signalling pathway, have all been implicated in the pathogenesis of myeloma, both as modulators of plasma cell proliferation and as agents driving osteoclast differentiation and osteoblast inhibition thus, all these contribute substantially to the bone destruction typically caused by myeloma. Patients with elevated levels of HGF have a poor prognosis, therefore, targeting these entities in such patients may be of substantial benefit. We hypothesized that ARQ-197 (Tivantinib), a small molecule c-Met inhibitor, would reduce myeloma cell growth and prevent myeloma-associated bone disease in a murine model. In vitro we assessed the effects of ARQ-197 on myeloma cell proliferation, cytotoxicity and c-Met protein expression in human myeloma cell lines. In vivo we injected NOD/SCID-γ mice with PBS (non-tumour bearing) or JJN3 cells and treated them with either ARQ-197 or vehicle. In vitro exposure of JJN3, U266 or NCI-H929 cells to ARQ-197 resulted in a significant inhibition of cell proliferation and an induction of cell death by necrosis, probably caused by significantly reduced levels of phosphorylated c-Met. In vivo ARQ-197 treatment of JJN3 tumour-bearing mice resulted in a significant reduction in tumour burden, tumour cell proliferation, bone lesion number, trabecular bone loss and prevented significant decreases in the bone formation rate on the cortico-endosteal bone surface compared to the vehicle group. However, no significant differences on bone parameters were observed in non-tumour mice treated with ARQ-197 compared to vehicle, implying that in tumour-bearing mice the effects of ARQ-197 on bone cells was indirect. In summary, these res ults suggest that ARQ-197 could be a promising therapeutic in myeloma patients, leading to both a reduction in tumour burden and an inhibition of myeloma-induced bone disease.
Measuring the ratio of CO2 efflux to O2 influx in tree stem respiration.
Hilman, Boaz; Angert, Alon
2016-11-01
In recent studies, the ratio of tree stem CO 2 efflux to O 2 influx has been defined as the apparent respiratory quotient (ARQ). The metabolism of carbohydrates, the putative respiratory substrate in trees, is expected to yield an ARQ of 1.0. However, previous studies have reported ARQ values ranging between 0.23 and 0.90. These interesting results may indicate internal transport of respired CO 2 within stems; yet no simple field applicable methods for ARQ measurement have been available. Here, we report on the assembly of a closed circulating system called 'Hampadah', which uses CO 2 and O 2 analyzers to measure air samples from stem chambers. We tested the performance of the Hampadah with samples from 36 trees (Tetragastris panamensis (Engl.) Kuntze). Additionally, we showed the feasibility of measuring ARQ directly from stem chambers, using portable CO 2 and O 2 sensors, in both discrete and continuous modes of operation. The Hampadah measurement proved to be consistent with CO 2 gas standards (R 2 = 0.999) and with O 2 determined by O 2 /Ar measurements with a mass spectrometer (R 2 = 0.998). The Hampadah gave highly reproducible results for ARQ determination of field samples (±0.01 for duplicates). The portable sensors measurement showed good correlation with the Hampadah in measuring CO 2 , O 2 and ARQ (n = 5, R 2 = 0.97, 0.98 and 0.91, respectively). We have demonstrated here that the Hampadah and the sensors' methods enable accurate ARQ measurements for both laboratory and field research. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Automatic-repeat-request error control schemes
NASA Technical Reports Server (NTRS)
Lin, S.; Costello, D. J., Jr.; Miller, M. J.
1983-01-01
Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed.
USDA-ARS?s Scientific Manuscript database
Background Scrapie is a transmissible spongiform encephalopathy that can be transmitted amongst susceptible sheep. The prion protein gene (PRNP) profoundly influences the susceptibility of sheep to the scrapie agent. Findings This study reports the failure to detect PrPSc in nervous or lymphoid tis...
The Changing Energy Sources of Soil Respiration Seasonally and with Experimental Warming
NASA Astrophysics Data System (ADS)
Hicks Pries, C.; Angert, A.; Castanha, C.; Hilman, B.; Torn, M. S.
2017-12-01
Due to its importance in the global carbon cycle, soil respiration has been intensively measured. However, measurements are almost exclusively of CO2, which has limited our understanding of soil respiration's sources and its responses to climate change. Here, we show how dual CO2 and O2 measurements within the soil profile of a temperate forest can indicate how the energy sources driving soil respiration can change seasonally and with experimental warming. We calculated the apparent respiration quotient (ARQ), defined as CO2 produced/O2 consumed, calculated from gas soil concentrations and adjusted for differences in diffusion rates. The ARQ changes depending on the stoichiometry of the organic compounds utilized for energy by microbes and roots. Oxidation of carbohydrates and organic acids results in respiration quotients ≥1 while oxidation of lipids results in respiration quotients ≈0.7 with oxidation of proteins falling in between. We observed clear seasonal patterns in ARQ, with values ≈0.9 during the late spring and summer decreasing to 0.6-0.7 during the winter. These changes in ARQ imply carbohydrates are a more important energy source during the summer when trees are photosynthesizing and providing fresh substrate to both roots and microbes. During the winter, lipids, likely recycled within microbial biomass, are a more important energy source. Furthermore, winter ARQ was higher in heated plots (+4° relative to control) than in control plots, but only at 30 cm, possibly due to increased root activity with heating. These interpretations are supported by δ13CO2 values, which were relatively depleted in the winter and more enriched in the summer—lipids are more depleted in δ13C than are sugars. Consistent with the heating effect, there were strong correlations between temperature and ARQ and temperature and δ13C. Given the large differences in ARQ in this forest soil, we are looking into using ARQ to partition soil respiration fluxes based on energy sources. Integrating O2 and CO2 measurements increases our mechanistic understanding of soil respiration's response to change.
Binary Interval Search: a scalable algorithm for counting interval intersections
Layer, Ryan M.; Skadron, Kevin; Robins, Gabriel; Hall, Ira M.; Quinlan, Aaron R.
2013-01-01
Motivation: The comparison of diverse genomic datasets is fundamental to understand genome biology. Researchers must explore many large datasets of genome intervals (e.g. genes, sequence alignments) to place their experimental results in a broader context and to make new discoveries. Relationships between genomic datasets are typically measured by identifying intervals that intersect, that is, they overlap and thus share a common genome interval. Given the continued advances in DNA sequencing technologies, efficient methods for measuring statistically significant relationships between many sets of genomic features are crucial for future discovery. Results: We introduce the Binary Interval Search (BITS) algorithm, a novel and scalable approach to interval set intersection. We demonstrate that BITS outperforms existing methods at counting interval intersections. Moreover, we show that BITS is intrinsically suited to parallel computing architectures, such as graphics processing units by illustrating its utility for efficient Monte Carlo simulations measuring the significance of relationships between sets of genomic intervals. Availability: https://github.com/arq5x/bits. Contact: arq5x@virginia.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:23129298
Replacing the CCSDS Telecommand Protocol with Next Generation Uplink
NASA Technical Reports Server (NTRS)
Kazz, Greg; Burleigh, Scott; Greenberg, Ed
2012-01-01
Better performing Forward Error Correction on the forward link along with adequate power in the data open an uplink operations trade space that enable missions to: Command to greater distances in deep space (increased uplink margin) Increase the size of the payload data (latency may be a factor) Provides space for the security header/trailer of the CCSDS Space Data Link Security Protocol Note: These higher rates could be used for relief of emergency communication margins/rates and not limited to improving top-end rate performance. A higher performance uplink could also reduce the requirements on flight emergency antenna size and/or the performance required from ground stations. Use of a selective repeat ARQ protocol may increase the uplink design requirements but the resultant development is deemed acceptable, due the factor of 4 to 8 potential increase in uplink data rate.
Do Tree Stems Recapture Respired CO2?
NASA Astrophysics Data System (ADS)
Hilman, B.; Angert, A.
2016-12-01
Tree stem respiration is an important, yet not well understood, component of the terrestrial carbon cycle. Predicting how trees as whole organisms respond to changes in climate and atmospheric CO2 requires understanding of the variability in the fraction of assimilated carbon allocated to respiration, versus the allocation to growth, damage repair, and to rhizosphere symbionts. Here we used the ratio of CO2 efflux/O2 influx (Apparent Respiratory Quotient, ARQ) to study stem respiration. The ARQ in trees stems is predicted to be 1.0, as a result of carbohydrates metabolism. Lower than 1.0 ARQ values may indicate a local assimilation of respired CO2, or dissolution and transport of CO2 in the xylem stream. We measured stems ARQ in 16 tree species at tropical, Mediterranean and temperate ecosystems using stem chambers and in-vitro incubations. The CO2 and O2 were measured by a system we developed, which is based on an IRGA and a Fuel-cell O2 analyzer (Hilman and Angert 2016). We found typical values of ARQ in the range of 0.4-0.8. Since incubations of detach stem tissues yielded similar ARQ values, and since the influence of natural variations in the transpiration stream on ARQ was found to be small, we conclude that the removal of the respired CO2 is not via dissolution in the xylem stream. Using 13C labeling, dark fixation of stem tissues was detected, which is most probably phosphoenolpyruvate carboxylase (PEPC) mediated. Hence, we suggest that in-stem dark fixation of respired CO2 to organic acids (e.g. malate) affects the outgoing efflux. Further research should determine if these organic acids are transported to the canopy, stored in the stem, or transported to the roots to serve as exudates. Hilman B, Angert A (2016) Measuring the ratio of CO2 efflux to O2 influx in tree stem respiration. Tree Physiol 2016, doi: 10.1093/treephys/tpw057
An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs
NASA Astrophysics Data System (ADS)
Basalamah, Anas; Sato, Takuro
For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.
Mak, Winnie W S; Chan, Randolph C H; Yau, Sania S W
2018-05-29
Considering the lack of existing measures on attitudes toward personal recovery and the need to acknowledge the cultural milieu in recovery attitude assessment, the present study developed and validated the Attitudes towards Recovery Questionnaire (ARQ) in a sample of people in recovery of mental illness, family carers, and mental health service providers in Hong Kong. The ARQ was developed based on existing literature and measures of recovery, and focus group discussions with various stakeholders. Findings of the multi-sample confirmatory factor analyses supported a five-factor structure: (1) resilience as a person in recovery, (2) self-appreciation and development, (3) self-direction, (4) family involvement, and (5) social ties and integration. The ARQ was positively correlated with recovery outcomes, empowerment, recovery knowledge, and recovery orientation of mental health services. As a tool for examining recovery attitudes, the ARQ informs us of the mindset across stakeholders and areas that need enhancement to facilitate the recovery process. Copyright © 2018. Published by Elsevier B.V.
NAND Flash Qualification Guideline
NASA Technical Reports Server (NTRS)
Heidecker, Jason
2012-01-01
Better performing Forward Error Correction on the forward link along with adequate power in the data open an uplink operations trade space that enable missions to: Command to greater distances in deep space (increased uplink margin). Increase the size of the payload data (latency may be a factor). Provides space for the security header/trailer of the CCSDS Space Data Link Security Protocol. Note: These higher rates could be used for relief of emergency communication margins/rates and not limited to improving top-end rate performance. A higher performance uplink could also reduce the requirements on flight emergency antenna size and/or the performance required from ground stations. Use of a selective repeat ARQ protocol may increase the uplink design requirements but the resultant development is deemed acceptable, due the factor of 4 to 8 potential increase in uplink data rate.
Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks.
Jung, Young-Ho; Choi, Jihoon
2017-02-25
A new hybrid automatic repeat request (HARQ) scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.
A concatenated coding scheme for error control
NASA Technical Reports Server (NTRS)
Lin, S.
1985-01-01
A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.
1993-07-01
GROUND RADIO ISSUES Multiple transmitters and receivers at a common site has been a dfficult integration issue for many communicaton systems...lower data rate vocoders become available. 10. Compatibility of modulation with channel availability and message integrity improvements, including...overrides can use in- frequency and path diversity, integrity improvements band signaling, busy channel overrides, and Frequency diversity and ARQ ARQ is
Guilera, Georgina; Pereda, Noemí; Paños, Ana; Abad, Judit
2015-07-11
The concept and assessment of resilience have attracted considerable attention in recent years, but none of the instruments developed to measure resilience in adolescents have been adapted to the Spanish context. The Adolescent Resilience Questionnaire (ARQ) provides a comprehensive and multidimensional assessment of the resources associated with resilience in adolescents. This study analyzes the psychometric properties of the ARQ. Participants included a community sample of 1101 Spanish adolescents (53.5 % boys) aged 12-17 years (M = 14.51; SD = 1.755). Results confirm the factor structure based on 12 scales. Internal consistency was generally adequate (between .60 and .84), although the unacceptable coefficient for the Empathy/Tolerance scale (α = .38) means that this scale needs to be revised for the Spanish context. Relationships between ARQ scales and psychopathology were in the expected direction and magnitude. Some gender differences were observed, with higher scores for boys on Confidence and Negative cognition. The Spanish version of the ARQ can help to identify personal characteristics associated with resilience and signs of positive engagement with family, peers, school, and the community. It can identify those adolescents most likely to show resilience in response to adversity, as well as those who may be vulnerable under situations of stress.
Evidence of scrapie transmission to sheep via goat milk.
Konold, Timm; Thorne, Leigh; Simmons, Hugh A; Hawkins, Steve A C; Simmons, Marion M; González, Lorenzo
2016-09-17
Previous studies confirmed that classical scrapie can be transmitted via milk in sheep. The current study aimed to investigate whether scrapie can also be transmitted via goat milk using in vivo (new-born lambs fed milk from scrapie-affected goats due to the unavailability of goat kids from guaranteed scrapie-free herds) and in vitro methods (serial protein misfolding cyclic amplification [sPMCA] on milk samples). In an initial pilot study, new-born lambs of two different prion protein gene (PRNP) genotypes (six VRQ/VRQ and five ARQ/ARQ) were orally challenged with 5 g brain homogenate from two scrapie-affected goats to determine susceptibility of sheep to goat scrapie. All sheep challenged with goat scrapie brain became infected based on the immunohistochemical detection of disease-associated PrP (PrP(sc)) in lymphoid tissue, with an ARQ/ARQ sheep being the first to succumb. Subsequent feeding of milk to eight pairs of new-born ARQ/ARQ lambs, with each pair receiving milk from a different scrapie-affected goat, resulted in scrapie in the six pairs that received the largest volume of milk (38-87 litres per lamb), whereas two pairs fed 8-9 litres per lamb, and an environmental control group raised on sheep milk from healthy ewes, did not show evidence of infection when culled at up to 1882 days of age. Infection in those 12 milk recipients occurred regardless of the clinical status, PrP(sc) distribution, caprine arthritis-encephalitis virus infection status and PRNP polymorphisms at codon 142 (II or IM) of the donor goats, but survival time was influenced by PRNP polymorphisms at codon 141. Serial PMCA applied to a total of 32 milk samples (four each from the eight donor goats collected throughout lactation) detected PrP(sc) in one sample each from two goats. The scrapie agent was present in the milk from infected goats and was able to transmit to susceptible species even at early preclinical stage of infection, when PrP(sc) was undetectable in the brain of the donor goats. Serial PMCA as a PrP(sc) detection method to assess the risk of scrapie transmission via milk in goats proved inefficient compared to the bioassay.
Adaptive Packet Combining Scheme in Three State Channel Model
NASA Astrophysics Data System (ADS)
Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak
2018-01-01
The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.
Konold, Timm; Phelan, Laura J; Donnachie, Ben R; Chaplin, Melanie J; Cawthraw, Saira; González, Lorenzo
2017-05-04
A study to investigate transmission of classical scrapie via goat milk was carried out in sheep: firstly, lambs were challenged orally with goat scrapie brain homogenate to confirm transmission of scrapie from goats to sheep. In the second study phase, milk from scrapie-infected goats was fed to lambs. Lambs were selected according to their prion protein gene (PRNP) genotype, which was either VRQ/VRQ or ARQ/ARQ, with or without additional polymorphisms at codon 141 (FF 141 , LF 141 or LL 141 ) of the ovine PRNP. This report describes the clinical, pathological and molecular phenotype of goat scrapie in those sheep that progressed to clinical end-stage. Ten sheep (six VRQ/VRQ and four ARQ/ARQ, of which three FF 141 and one LL 141 ) challenged with one of two scrapie brain homogenates, and six pairs of sheep (ARQ, of which five LL 141 and seven LF 141 ) fed milk from six different goats, developed clinical disease, which was characterised by a pruritic (all VRQ/VRQ and LL 141 sheep) or a non-pruritic form (all LF 141 and FF 141 sheep). Immunohistochemical (IHC) examination revealed that the pattern of intra- and extracellular accumulation of disease-associated prion protein in the brain was also dependent on PRNP polymorphisms at codon 141, which was similar in VRQ and LL 141 sheep but different from LF 141 and FF 141 sheep. The influence of codon 141 was also seen in discriminatory Western blot (WB), with LF 141 and FF 141 sheep showing a bovine spongiform encephalopathy-like profile (diminished reactivity with P4 antibody) on brain tissue. However, discriminatory WB in lymphoid tissues, and IHC pattern and profile both in lymphoid and brain tissue was consistent with classical scrapie in all sheep. This study provided further evidence that the clinical presentation and the pathological and molecular phenotypes of scrapie in sheep are influenced by PRNP polymorphisms, particularly at codon 141. Differences in the truncation of disease-associated prion protein between LL 141 sheep and those carrying the F 141 allele may be responsible for these observations.
Seabury, C M; Derr, J N
2003-01-01
Susceptibility to scrapie is primarily controlled by polymorphisms in the ovine prion protein gene (PRNP). Here, we report a novel ovine exon three PRNP polymorphism (SNP G346C; P116), its association with the ovine ARQ allele (P116A136R154Q171), and two new genotypes (PARQ/ARR; PARQ/ARQ) for the St. Croix White (SCW) breed and a related composite (CMP) breed developed for meat production. The (P116) polymorphism occurs between the N-terminal cleavage site and the hydrophobic region of the ovine prion protein, a region which exhibits extreme conservation across mammalian taxa. The relatively high frequency (0.75) of resistant ARR alleles and the absence of ARQ alleles for the SCW ewes used as breeding stock for CMP resulted in significant genic differentiation (P = 0.0123; S.E. = 0.00113). Additionally, the majority of the SCW (66.7%) and CMP (65.4%) sampled possessed genotypes considered resistant or nearly resistant to scrapie and experimental BSE (bovine spongiform encephalopathy. Copyright 2003 S. Karger AG, Basel
2011-10-27
COMP Mountain Home COMP Shaw COMP Barksdale COMP Hill COMP Homestead ARB COMP Savannah CRTC COMP Gulfport CRTC COMP Alpena CRTC COMP Montana...Spangdahlem AB Aviano AB Kadena AB Programmed: 165 Baseline Pods purchase in FY12 (del FY13) Alpena CRTC Holloman AFB Eielson AFB Planned: 368...ARQ-52(V)2 ARQ-52B(V)2 ARDS (HDIS) ASQ- T35A P4NS (NACTS-RSI) KITS (Kadena) ASQ-T34 ASQ-T46 AKITS ( Alpena ) Israel No Datalink No Datalink P4R1 ASQ
Power-Constrained Fuzzy Logic Control of Video Streaming over a Wireless Interconnect
NASA Astrophysics Data System (ADS)
Razavi, Rouzbeh; Fleury, Martin; Ghanbari, Mohammed
2008-12-01
Wireless communication of video, with Bluetooth as an example, represents a compromise between channel conditions, display and decode deadlines, and energy constraints. This paper proposes fuzzy logic control (FLC) of automatic repeat request (ARQ) as a way of reconciling these factors, with a 40% saving in power in the worst channel conditions from economizing on transmissions when channel errors occur. Whatever the channel conditions are, FLC is shown to outperform the default Bluetooth scheme and an alternative Bluetooth-adaptive ARQ scheme in terms of reduced packet loss and delay, as well as improved video quality.
A Cost Effective Block Framing Scheme for Underwater Communication
Shin, Soo-Young; Park, Soo-Hyun
2011-01-01
In this paper, the Selective Multiple Acknowledgement (SMA) method, based on Multiple Acknowledgement (MA), is proposed to efficiently reduce the amount of data transmission by redesigning the transmission frame structure and taking into consideration underwater transmission characteristics. The method is suited to integrated underwater system models, as the proposed method can handle the same amount of data in a much more compact frame structure without any appreciable loss of reliability. Herein, the performance of the proposed SMA method was analyzed and compared to those of the conventional Automatic Repeat-reQuest (ARQ), Block Acknowledgement (BA), block response, and MA methods. The efficiency of the underwater sensor network, which forms a large cluster and mostly contains uplink data, is expected to be improved by the proposed method. PMID:22247689
A concatenated coding scheme for error control
NASA Technical Reports Server (NTRS)
Kasami, T.; Fujiwara, T.; Lin, S.
1986-01-01
In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.
Efficient Sparse Signal Transmission over a Lossy Link Using Compressive Sensing
Wu, Liantao; Yu, Kai; Cao, Dongyu; Hu, Yuhen; Wang, Zhi
2015-01-01
Reliable data transmission over lossy communication link is expensive due to overheads for error protection. For signals that have inherent sparse structures, compressive sensing (CS) is applied to facilitate efficient sparse signal transmissions over lossy communication links without data compression or error protection. The natural packet loss in the lossy link is modeled as a random sampling process of the transmitted data, and the original signal will be reconstructed from the lossy transmission results using the CS-based reconstruction method at the receiving end. The impacts of packet lengths on transmission efficiency under different channel conditions have been discussed, and interleaving is incorporated to mitigate the impact of burst data loss. Extensive simulations and experiments have been conducted and compared to the traditional automatic repeat request (ARQ) interpolation technique, and very favorable results have been observed in terms of both accuracy of the reconstructed signals and the transmission energy consumption. Furthermore, the packet length effect provides useful insights for using compressed sensing for efficient sparse signal transmission via lossy links. PMID:26287195
Houston, Fiona; Goldmann, Wilfred; Foster, James; González, Lorenzo; Jeffrey, Martin; Hunter, Nora
2015-01-01
Sheep are natural hosts of the prion disease, scrapie. They are also susceptible to experimental challenge with various scrapie strains and with bovine spongiform encephalopathy (BSE), which affects cattle and has been accidentally transmitted to a range of other species, including man. Incidence and incubation period of clinical disease in sheep following inoculation is controlled by the PRNP gene, which has different alleles defined on the basis of polymorphisms, particularly at codons 136, 154 and 171, although other codons are associated with survival time, and the exact responses of the sheep may be influenced by other breed-related differences. Here we report the results of a long term single study of experimental scrapie and BSE susceptibility of sheep of Cheviot, Poll Dorset and Suffolk breeds, originating from New Zealand and of a wide range of susceptible and resistant PRNP genotypes. Responses were compared with those of sheep from a closed Cheviot flock of UK origin (Roslin Cheviot flock). The unusually long observation period (6–8 years for most, but up to 12 years for others) allows us to draw robust conclusions about rates of survival of animals previously regarded as resistant to infection, particularly PRNP heterozygotes, and is the most comprehensive such study reported to date. BSE inoculation by an intracerebral route produced disease in all genotype groups with differing incubation periods, although M112T and L141F polymorphisms seemed to give some protection. Scrapie isolate SSBP/1, which has the shortest incubation period in sheep with at least one VRQ PRNP allele, also produced disease following sub-cutaneous inoculation in ARQ/ARQ animals of New Zealand origin, but ARQ/ARQ sheep from the Roslin flock survived the challenge. Our results demonstrate that the links between PRNP genotype and clinical prion disease in sheep are much less secure than previously thought, and may break down when, for example, a different breed of sheep is moved into a new flock. PMID:26587837
Data Relay Board with Protocol for High-Speed, Free-Space Optical Communications
NASA Technical Reports Server (NTRS)
Wright, Malcolm; Clare, Loren; Gould, Gary; Pedyash, Maxim
2004-01-01
In a free-space optical communication system, the mitigation of transient outages through the incorporation of error-control methods is of particular concern, the outages being caused by scintillation fades and obscurants. The focus of this innovative technology is the development of a data relay system for a reliable high-data-rate free-spacebased optical-transport network. The data relay boards will establish the link, maintain synchronous connection, group the data into frames, and provide for automatic retransmission (ARQ) of lost or erred frames. A certain Quality of Service (QoS) can then be ensured, compatible with the required data rate. The protocol to be used by the data relay system is based on the draft CCSDS standard data-link protocol Proximity-1, selected by orbiters to multiple lander assets in the Mars network, for example. In addition to providing data-link protocol capabilities for the free-space optical link and buffering the data, the data relay system will interface directly with user applications over Gigabit Ethernet and/or with highspeed storage resources via Fibre Channel. The hardware implementation is built on a network-processor-based architecture. This technology combines the power of a hardware switch capable of data switching and packet routing at Gbps rates, with the flexibility of a software- driven processor that can host highly adaptive and reconfigurable protocols used, for example, in wireless local-area networks (LANs). The system will be implemented in a modular multi-board fashion. The main hardware elements of the data relay system are the new data relay board developed by Rockwell Scientific, a COTS Gigabit Ethernet board for user interface, and a COTS Fibre Channel board that connects to local storage. The boards reside in a cPCI back plane, and can be housed in a VME-type enclosure.
Channel modelling for free-space optical inter-HAP links using adaptive ARQ transmission
NASA Astrophysics Data System (ADS)
Parthasarathy, S.; Giggenbach, D.; Kirstädter, A.
2014-10-01
Free-space optical (FSO) communication systems have seen significant developments in recent years due to growing need for very high data rates and tap-proof communication. The operation of an FSO link is suited to diverse variety of applications such as satellites, High Altitude Platforms (HAPs), Unmanned Aerial Vehicles (UAVs), aircrafts, ground stations and other areas involving both civil and military situations. FSO communication systems face challenges due to different effects of the atmospheric channel. FSO channel primarily suffers from scintillation effects due to Index of Refraction Turbulence (IRT). In addition, acquisition and pointing becomes more difficult because of the high directivity of the transmitted beam: Miss-pointing of the transmitted beam and tracking errors at the receiver generate additional fading of the optical signal. High Altitude Platforms (HAPs) are quasi-stationary vehicles operating in the stratosphere. The slowly varying but precisely determined time-of-flight of the Inter-HAP channel adds to its characteristics. To propose a suitable ARQ scheme, proper theoretical understanding of the optical atmospheric propagation and modeling of a specific scenario FSO channel is required. In this paper, a bi-directional symmetrical Inter-HAP link has been selected and modeled. The Inter-HAP channel model is then investigated via simulations in terms of optical scintillation induced by IRT and in presence of pointing error. The performance characteristic of the model is then quantified in terms of fading statistics from which the Packet Error Probability (PEP) is calculated. Based on the PEP characteristics, we propose suitable ARQ schemes.
Binary Interval Search: a scalable algorithm for counting interval intersections.
Layer, Ryan M; Skadron, Kevin; Robins, Gabriel; Hall, Ira M; Quinlan, Aaron R
2013-01-01
The comparison of diverse genomic datasets is fundamental to understand genome biology. Researchers must explore many large datasets of genome intervals (e.g. genes, sequence alignments) to place their experimental results in a broader context and to make new discoveries. Relationships between genomic datasets are typically measured by identifying intervals that intersect, that is, they overlap and thus share a common genome interval. Given the continued advances in DNA sequencing technologies, efficient methods for measuring statistically significant relationships between many sets of genomic features are crucial for future discovery. We introduce the Binary Interval Search (BITS) algorithm, a novel and scalable approach to interval set intersection. We demonstrate that BITS outperforms existing methods at counting interval intersections. Moreover, we show that BITS is intrinsically suited to parallel computing architectures, such as graphics processing units by illustrating its utility for efficient Monte Carlo simulations measuring the significance of relationships between sets of genomic intervals. https://github.com/arq5x/bits.
Berns, Gregory S; Moore, Sara; Capra, C Monica
2009-08-26
Myelination of white matter in the brain continues throughout adolescence and early adulthood. This cortical immaturity has been suggested as a potential cause of dangerous and impulsive behaviors in adolescence. We tested this hypothesis in a group of healthy adolescents, age 12-18 (N = 91), who underwent diffusion tensor imaging (DTI) to delineate cortical white matter tracts. As a measure of real-world risk taking, participants completed the Adolescent Risk Questionnaire (ARQ) which measures engagement in dangerous activities. After adjusting for age-related changes in both DTI and ARQ, engagement in dangerous behaviors was found to be positively correlated with fractional anisotropy and negatively correlated with transverse diffusivity in frontal white matter tracts, indicative of increased myelination and/or density of fibers (ages 14-18, N = 60). The direction of correlation suggests that rather than having immature cortices, adolescents who engage in dangerous activities have frontal white matter tracts that are more adult in form than their more conservative peers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lapierre, Jean-Marc; Eathiraj, Sudharshan; Vensel, David
The work in this paper describes the optimization of the 3-(3-phenyl-3H-imidazo[4,5-b]pyridin-2-yl)pyridin-2-amine chemical series as potent, selective allosteric inhibitors of AKT kinases, leading to the discovery of ARQ 092 (21a). The cocrystal structure of compound 21a bound to full-length AKT1 confirmed the allosteric mode of inhibition of this chemical class and the role of the cyclobutylamine moiety. Compound 21a demonstrated high enzymatic potency against AKT1, AKT2, and AKT3, as well as potent cellular inhibition of AKT activation and the phosphorylation of the downstream target PRAS40. Compound 21a also served as a potent inhibitor of the AKT1-E17K mutant protein and inhibited tumormore » growth in a human xenograft mouse model of endometrial adenocarcinoma.« less
Acquisition Review Quarterly (ARQ) Vol. 4, No. 4.
1997-01-01
served. Truly, as the African proverb has it, when elephants fight, the grass suffers. In a sinister twist, there is now a big push to get...institutionalizing a formal structure for reporting issues, problems, required actions, and successes. The re- ports were consolidated into a keystone
Innovative Networking Concepts Tested on the Advanced Communications Technology Satellite
NASA Technical Reports Server (NTRS)
Friedman, Daniel; Gupta, Sonjai; Zhang, Chuanguo; Ephremides, Anthony
1996-01-01
This paper describes a program of experiments conducted over the advanced communications technology satellite (ACTS) and the associated TI-VSAT (very small aperture terminal). The experiments were motivated by the commercial potential of low-cost receive only satellite terminals that can operate in a hybrid network environment, and by the desire to demonstrate frame relay technology over satellite networks. The first experiment tested highly adaptive methods of satellite bandwidth allocation in an integrated voice-data service environment. The second involved comparison of forward error correction (FEC) and automatic repeat request (ARQ) methods of error control for satellite communication with emphasis on the advantage that a hybrid architecture provides, especially in the case of multicasts. Finally, the third experiment demonstrated hybrid access to databases and compared the performance of internetworking protocols for interconnecting local area networks (LANs) via satellite. A custom unit termed frame relay access switch (FRACS) was developed by COMSAT Laboratories for these experiments; the preparation and conduct of these experiments involved a total of 20 people from the University of Maryland, the University of Colorado and COMSAT Laboratories, from late 1992 until 1995.
ERIC Educational Resources Information Center
Basaldua, Raul Oscar; Moreno, Oscar Alberto
1971-01-01
This paper is part of a larger research project on the decisional structure of regionalized countries, which the authors are conducting at the Instituto Torcuato Di Tella with the Arq. Jorge Hardoy. (Editor)
47 CFR 80.1125 - Search and rescue coordinating communications.
Code of Federal Regulations, 2011 CFR
2011-10-01
... station involved may impose silence on stations which interfere with that traffic. This instruction may be... “silence, m'aider”; (2) In narrow-band direct-printing telegraphy normally using forward-error correcting mode, the signal SILENCE MAYDAY. However, the ARQ mode may be used when it is advantageous to do so. (f...
Use of CCSDS and OSI Protocols on the Advanced Communications Technology Satellite
NASA Technical Reports Server (NTRS)
Chirieleison, Don
1996-01-01
Although ACTS (Advanced Communications Technology Satellite) provides an almost error-free channel during much of the day and under most conditions, there are times when it is not suitable for reliably error-free data communications when operating in the uncoded mode. Because coded operation is not always available to every earth station, measures must be taken in the end system to maintain adequate throughput when transferring data under adverse conditions. The most effective approach that we tested to improve performance was the addition of an 'outer' Reed-Solomon code through use of CCSDS (Consultative Committee for Space Data Systems) GOS 2 (a forward error correcting code). This addition can benefit all users of an ACTS channel including those applications that do not require totally reliable transport, but it is somewhat expensive because additional hardware is needed. Although we could not characterize the link noise statistically (it appeared to resemble uncorrelated white noise, the type that block codes are least effective in correcting), we did find that CCSDS GOS 2 gave an essentially error-free link at BER's (bit error rate) as high as 6x10(exp -4). For users that demand reliable transport, an ARQ (Automatic Repeat Queuing) protocol such as TCP (Transmission Control Protocol) or TP4 (Transport Protocol, Class 4) will probably be used. In this category, it comes as no surprise that the best choice of the protocol suites tested over ACTS was TP4 using CCSDS GOS 2. TP4 behaves very well over an error-free link which GOS 2 provides up to a point. Without forward error correction, however, TP4 service begins to degrade in the 10(exp -7)-10(exp -6) range and by 4x10(exp -6), it barely gives any throughput at all. If Congestion Avoidance is used in TP4, the degradation is even more pronounced. Fortunately, as demonstrated here, this effect can be more than compensated for by choosing the Selective Acknowledgment option. In fact, this option can enable TP4 to deliver some throughput at error rates as high as 10(exp -5).
USDA-ARS?s Scientific Manuscript database
Sheep scrapie is a transmissible spongiform encephalopathy that can be transmitted horizontally. The prion protein gene (PRNP) profoundly influences the susceptibility of sheep to the scrapie agent and the tissue levels and distribution of PrPSc in affected sheep. The purpose of this study was to co...
Acquisition Review Quarterly (ARQ) Vol. 6, No.4
1999-01-01
collection of information, including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations...acquisition pro- services throughout the acquisition com- fessionals from the Department of Defense, munity. The views expressed were those federal...sums of money services than any other organization in the coupled with the declining budget high- world, with 8.7 million contracts worth light the
Optimal Scheduling for Underwater Communications in Multiple-user Scenarios
2014-09-30
underwater acoustic sensor networks . These techniques aim at consuming as less energy as... underwater acoustic networks disrupt the behavior of surrounding species of marine mammals. As a consequence of these two studies, we aim at developing...Markov models of incremental redundancy hybrid ARQ over underwater acoustic channels. Elsevier Journal on Ad-hoc Networks (Special Issue on Underwater Communications and Networks ), 2014. 4
Rate-compatible punctured convolutional codes (RCPC codes) and their applications
NASA Astrophysics Data System (ADS)
Hagenauer, Joachim
1988-04-01
The concept of punctured convolutional codes is extended by punctuating a low-rate 1/N code periodically with period P to obtain a family of codes with rate P/(P + l), where l can be varied between 1 and (N - 1)P. A rate-compatibility restriction on the puncturing tables ensures that all code bits of high rate codes are used by the lower-rate codes. This allows transmission of incremental redundancy in ARQ/FEC (automatic repeat request/forward error correction) schemes and continuous rate variation to change from low to high error protection within a data frame. Families of RCPC codes with rates between 8/9 and 1/4 are given for memories M from 3 to 6 (8 to 64 trellis states) together with the relevant distance spectra. These codes are almost as good as the best known general convolutional codes of the respective rates. It is shown that the same Viterbi decoder can be used for all RCPC codes of the same M. The application of RCPC codes to hybrid ARQ/FEC schemes is discussed for Gaussian and Rayleigh fading channels using channel-state information to optimize throughput.
Beck, Katy E; Sallis, Rosemary E; Lockey, Richard; Vickery, Christopher M; Béringue, Vincent; Laude, Hubert; Holder, Thomas M; Thorne, Leigh; Terry, Linda A; Tout, Anna C; Jayasena, Dhanushka; Griffiths, Peter C; Cawthraw, Saira; Ellis, Richard; Balkema-Buschmann, Anne; Groschup, Martin H; Simmons, Marion M; Spiropoulos, John
2012-01-01
Two cases of unusual transmissible spongiform encephalopathy (TSE) were diagnosed on the same farm in ARQ/ARQ PrP sheep showing attributes of both bovine spongiform encephalopathy (BSE) and scrapie. These cases, UK-1 and UK-2, were investigated further by transmissions to wild-type and ovine transgenic mice. Lesion profiles (LP) on primary isolation and subpassage, incubation period (IP) of disease, PrPSc immunohistochemical (IHC) deposition pattern and Western blot profiles were used to characterize the prions causing disease in these sheep. Results showed that both cases were compatible with scrapie. The presence of BSE was contraindicated by the following: LP on primary isolation in RIII and/or MR (modified RIII) mice; IP and LP after serial passage in wild-type mice; PrPSc deposition pattern in wild-type mice; and IP and Western blot data in transgenic mice. Furthermore, immunohistochemistry (IHC) revealed that each case generated two distinct PrPSc deposition patterns in both wild-type and transgenic mice, suggesting that two scrapie strains coexisted in the ovine hosts. Critically, these data confirmed the original differential IHC categorization that these UK-1 and UK-2 cases were not compatible with BSE. PMID:21919992
Acquisition Review Quarterly (ARQ), Volume 1 Number 3, Summer 1994
1994-01-01
sole- and dual-source production and their cost implications , and suggests the use of explicit demand curves. 281 - GUIDELINES FOR AUTHORS...millions of square miles of the American landscape. If you look at a map, it is astonishing how much of the country we cover. Naturally, nearly every- thing...See Carnegie Commission Report, Facing Towards Governments - Nongovernmental Organi- zations and Scientific and Technical Advice (New York: Carnegie
NASA Astrophysics Data System (ADS)
Kawai, Hiroyuki; Morimoto, Akihito; Higuchi, Kenichi; Sawahashi, Mamoru
This paper investigates the gain of inter-Node B macro diversity for a scheduled-based shared channel using single-carrier FDMA radio access in the Evolved UTRA (UMTS Terrestrial Radio Access) uplink based on system-level simulations. More specifically, we clarify the gain of inter-Node B soft handover (SHO) with selection combining at the radio frame length level (=10msec) compared to that for hard handover (HHO) for a scheduled-based shared data channel, considering the gains of key packet-specific techniques including channel-dependent scheduling, adaptive modulation and coding (AMC), hybrid automatic repeat request (ARQ) with packet combining, and slow transmission power control (TPC). Simulation results show that the inter-Node B SHO increases the user throughput at the cell edge by approximately 10% for a short cell radius such as 100-300m due to the diversity gain from a sudden change in other-cell interference, which is a feature specific to full scheduled-based packet access. However, it is also shown that the gain of inter-Node B SHO compared to that for HHO is small in a macrocell environment when the cell radius is longer than approximately 500m due to the gains from hybrid ARQ with packet combining, slow TPC, and proportional fairness based channel-dependent scheduling.
Asymptotically reliable transport of multimedia/graphics over wireless channels
NASA Astrophysics Data System (ADS)
Han, Richard Y.; Messerschmitt, David G.
1996-03-01
We propose a multiple-delivery transport service tailored for graphics and video transported over connections with wireless access. This service operates at the interface between the transport and application layers, balancing the subjective delay and image quality objectives of the application with the low reliability and limited bandwidth of the wireless link. While techniques like forward-error correction, interleaving and retransmission improve reliability over wireless links, they also increase latency substantially when bandwidth is limited. Certain forms of interactive multimedia datatypes can benefit from an initial delivery of a corrupt packet to lower the perceptual latency, as long as reliable delivery occurs eventually. Multiple delivery of successively refined versions of the received packet, terminating when a sufficiently reliable version arrives, exploits the redundancy inherently required to improve reliability without a traffic penalty. Modifications to acknowledgment-repeat-request (ARQ) methods to implement this transport service are proposed, which we term `leaky ARQ'. For the specific case of pixel-coded window-based text/graphics, we describe additional functions needed to more effectively support urgent delivery and asymptotic reliability. X server emulation suggests that users will accept a multi-second delay between a (possibly corrupt) packet and the ultimate reliably-delivered version. The relaxed delay for reliable delivery can be exploited for traffic capacity improvement using scheduling of retransmissions.
Acquisition Review Quarterly (ARQ): Volume 1, Number 1, Winter 1994
1994-01-01
OH. Horngren , C. T., & Foster, G. (1991). Cost Accounting , a Managerial Emphasis (7th ed.). Englewood Cliffs, NJ. Moniison, D. C. (1901, March). Deep...1), or are predicted to occur for the duration of their cost account ( s ) as planned on Work Package Planning Sheets (WPPS). The Narrative Variance...in dealing with similar business situations. Research 19- COST OVERRUN OPTIMISM: Fact or Fiction Major David S . Christensen, USAF "Wheii idken to
Acquisition Review Quarterly (ARQ): Volume 10, Number 3, Summer 2003
2003-01-01
PROJECT NUMBER Lt Col Robert L. Waller, USAF, (Ret), Robert Graham, Maj David R. King, USAF, Lt Col John D. Driessnack, USAF, LTC Michael D. Proctor...High-Technology Industries Implications for Industrial Policy Maj David R. King, USAF Lt Col John D. Driessnack, USAF Why the "T" in SMART A...Business School William H . Reed Director Michael Wynne Defense Contract Audit Agency Acting Under Secretary of Defense (Acquisition, Technology, and
1991-11-01
Mosquitos no litoral paranaense. I - Idade fisioldgica de no Parque National da Serra dos Orgaos, Anopheles cruzii (Diptera, Culicidae). Arq. Estado do...no Parque National da Peryassii, A.G. 1908. OS culicideos do Brazil. Serra dos Grgaos, Estado do Rio de Janeiro, Inst. de Manguinhos, Rio de Janeiro...Kerteszia no litoral Guimar%es, A.E. and V.N.M. Victoria. 1986. do estado de Santa Catarina. Rev. Bras. Mosquitos no Parque National da Serra dos
Houston, Fiona; Foster, James; Goldmann, Wilfred; Drummond, Dawn; Parnham, David; Kennedy, Iain; Green, Andrew; Stewart, Paula; Chong, Angela
2012-01-01
Bovine spongiform encephalopathy (BSE) is a transmissible spongiform encephalopathy (TSE) (or prion disease) that is readily transmissible to sheep by experimental infection and has the shortest incubation period in animals with the ARQ/ARQ PRNP genotype (at codons 136, 154, and 171). Because it is possible that sheep in the United Kingdom could have been infected with BSE by being fed contaminated meat and bone meal supplements at the same time as cattle, there is considerable interest in the responses of sheep to BSE inoculation. Epidemiological evidence suggests that very young individuals are more susceptible to TSE infection; however, this has never been properly tested in sheep. In the present study, low doses of BSE were fed to lambs of a range of ages (∼24 h, 2 to 3 weeks, 3 months, and 6 months) and adult sheep. The incidence of clinical BSE disease after inoculation was high in unweaned lambs (∼24 h and 2 to 3 weeks old) but much lower in older weaned animals The incubation period was also found to be influenced by the genotype at codon 141 of the PRNP gene, as lambs that were LF heterozygotes had a longer mean incubation period than those that were homozygotes of either type. The results suggest that sheep in the United Kingdom would have been at high risk of BSE infection only if neonatal animals had inadvertently ingested contaminated supplementary foodstuffs. PMID:22915816
Efficient model checking of network authentication protocol based on SPIN
NASA Astrophysics Data System (ADS)
Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan
2013-03-01
Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.
Studies on Optimized Assured Cooperative Communications
2014-04-01
a corresponding vector xr = [ −x∗ s ,2 x∗ s ,1 ] . The received signal yd, m at the destination at the m -th H-ARQ (re)transmission round with relay...3 15.54 15.48 21.65 28.30 15.05 s ,1 s ,2 r 0 100 200 300 400 500 600 700 800 900 1000 Transmission round index T ra ns m is si on p ow er P s , l a nd...ns m is si on p ow er P s , l a nd P r Equal power assignment
Cross-layer Design for MIMO Systems with Transmit Antenna Selection and Imperfect CSI
NASA Astrophysics Data System (ADS)
Yu, Xiangbin; Liu, Yan; Rui, Yun; Zhou, Tingting; Yin, Xin
2013-04-01
In this paper, by combining adaptive modulation and automatic repeat request (ARQ), a cross-layer design (CLD) scheme for multiple-input and multiple-output (MIMO) system with transmit antenna selection (TAS) and imperfect channel state information (CSI) is presented. Based on the imperfect CSI, the probability density function of the effective signal to noise ratio (SNR) is derived, and the fading gain switching thresholds are also derived subject to a target packet loss rate and fixed power constraint. According to these results, we further derive the average spectrum efficiency (SE) and packet error rate (PER) of the system. As a result, closed-form expressions of the average SE and PER are obtained, respectively. The derived expressions include the expressions under perfect CSI as special cases, and can provide good performance evaluation for the CLD system with imperfect CSI. Simulation results verify the validity of the theoretical analysis. The results show that the CLD system with TAS provides better SE than that with space-time block coding, but the SE and PER performance of the system with imperfect CSI are worse than those with perfect CSI due to the estimation error.
The automated Army ROTC Questionnaire (ARQ)
NASA Technical Reports Server (NTRS)
Young, David L. H.
1991-01-01
The Reserve Officer Training Corps Cadet Command (ROTCCC) takes applications for its officer training program from college students and Army enlisted personnel worldwide. Each applicant is required to complete a set of application forms prior to acceptance into the ROTC program. These forms are covered by several regulations that govern the eligibility of potential applicants and guide the applicant through the application process. Eligibility criteria changes as Army regulations are periodically revised. Outdated information results in a loss of applications attributable to frustration and error. ROTCCC asked for an inexpensive and reliable way of automating their application process. After reviewing the process, it was determined that an expert system with good end user interface capabilities could be used to solve a large part of the problem. The system captures the knowledge contained within the regulations, enables the quick distribution and implementation of eligibility criteria changes, and distributes the expertise of the admissions personnel to the education centers and colleges. The expert system uses a modified version of CLIPS that was streamlined to make the most efficient use of its capabilities. A user interface with windowing capabilities provides the applicant with a simple and effective way to input his/her personal data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br
We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The threemore » techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.« less
Mellors, L J; Gibbs, C L; Barclay, C J
2001-05-01
The results of previous studies suggest that the maximum mechanical efficiency of rat papillary muscles is lower during a contraction protocol involving sinusoidal length changes than during one involving afterloaded isotonic contractions. The aim of this study was to compare directly the efficiency of isolated rat papillary muscle preparations in isotonic and sinusoidal contraction protocols. Experiments were performed in vitro (27 degrees C) using left ventricular papillary muscles from adult rats. Each preparation performed three contraction protocols: (i) low-frequency afterloaded isotonic contractions (10 twitches at 0.2 Hz), (ii) sinusoidal length change contractions with phasic stimulation (40 twitches at 2 Hz) and (iii) high-frequency afterloaded isotonic contractions (40 twitches at 2 Hz). The first two protocols resembled those used in previous studies and the third combined the characteristics of the first two. The parameters for each protocol were adjusted to those that gave maximum efficiency. For the afterloaded isotonic protocols, the afterload was set to 0.3 of the maximum developed force. The sinusoidal length change protocol incorporated a cycle amplitude of +/-5% resting length and a stimulus phase of -10 degrees. Measurements of force output, muscle length change and muscle temperature change were used to calculate the work and heat produced during and after each protocol. Net mechanical efficiency was defined as the proportion of the energy (enthalpy) liberated by the muscle that appeared as work. The efficiency in the low-frequency, isotonic contraction protocol was 21.1+/-1.4% (mean +/- s.e.m., N=6) and that in the sinusoidal protocol was 13.2+/-0.7%, consistent with previous results. This difference was not due to the higher frequency or greater number of twitches because efficiency in the high-frequency, isotonic protocol was 21.5+/-1.0%. Although these results apparently confirm that efficiency is protocol-dependent, additional experiments designed to measure work output unambiguously indicated that the method used to calculate work output in isotonic contractions overestimated actual work output. When net work output, which excludes work done by parallel elastic elements, rather than total work output was used to determine efficiency in afterloaded isotonic contractions, efficiency was similar to that for sinusoidal contractions. The maximum net mechanical efficiency of rat papillary muscles performing afterloaded isotonic or sinusoidal length change contractions was between 10 and 15%.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Report of Investigation: Jill Vines Loftus, Senior Executive Service (Redacted)
2015-06-16
should have kno\\V!i,. wiis baseless, for Which the1·e was llo stai1(1arq," . ·. . We considered her 11Uegationand d01e’.r111h1ed M$. Lo1t1,11>ptovlded...on Ms.· LOftus’ retunlli’lp from TrelW:lll, NJ, to Washington, D.C. Ms, Loftus submitted att Atlltrak boarding pass in lieu 0fa receipt...Loftus acknowledged she submitted a boarding pass in lieu ofa receipt for her Amtrak tran$portation to Trenton, NJ, and that she did not provide n
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks.
Ogundile, Olayinka O; Alfa, Attahiru S
2017-05-10
Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks.
A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks
Ogundile, Olayinka O.; Alfa, Attahiru S.
2017-01-01
Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks. PMID:28489054
Practical State Machine Replication with Confidentiality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Zhang, Haibin
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less
A two-hop based adaptive routing protocol for real-time wireless sensor networks.
Rachamalla, Sandhya; Kancherla, Anitha Sheela
2016-01-01
One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.
Deterministic generation of remote entanglement with active quantum feedback
Martin, Leigh; Motzoi, Felix; Li, Hanhan; ...
2015-12-10
We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
NASA Astrophysics Data System (ADS)
Fauji, Shantanu
We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.
PrP genotype frequencies and risk evaluation for scrapie in dairy sheep breeds from southern Italy.
Martemucci, Giovanni; Iamartino, Daniela; Blasi, Michele; D'Alessandro, Angela Gabriella
2015-12-01
Concerns regarding scrapie in sheep breeding have increased in the last few decades. The present study was carried out in dairy sheep breeds from southern Italy. In order to find breeding animals resistant to scrapie, the PrP genes of 1,205 animals from entire flocks of dairy native Apulian Leccese and Altamurana breeds, and Sicilian Comisana breed, were analysed for polymorphisms at codons 136, 154, and 171 related to scrapie resistance/susceptibility. The Altamurana breed was considered as two populations (Alt-Cav and Alt-Cra-Zoe), based on presumed cross-breeding. A total of five alleles and ten different genotypes were found. The ARQ allele was predominant for all breeds followed by ARR, the most resistant allele to scrapie, which was highly prevalent in Comisana (50%) and in native Alt-Cav (42.4%). The VRQ allele, associated with the highest susceptibility to scrapie, was detected at not negligeable levels in allocthonous Comisana (3.5%), at a low frequency (0.2%) in native Leccese and Alt-Cra-Zoe, while it was absent in Alt-Cav. The frequencies of PrP genotypes with a very low susceptibility risk to scrapie (R1) was higher in Comisana and Alt-Cav. The most susceptible genotype, ARQ/VRQ, was found only in Comisana. Within the Altamurana breed, there were notable differences between Alt-Cav and Alt-Cra-Zoe sheep. The Alt-Cav was characterised by the absence of VRQ and AHQ alleles and by the higher frequency of the ARR/ARR genotype (18.7%). Breeding programs, mainly in endangered breeds such as Altamurana, should be conducted gradually, combining resistance to scrapie, maintenance of genetic variability, and production. Copyright © 2015 Elsevier B.V. All rights reserved.
Bey, Erik A.; Reinicke, Kathryn E.; Srougi, Melissa C.; Varnes, Marie; Anderson, Vernon; Pink, John J.; Li, Long Shan; Patel, Malina; Cao, Lifen; Moore, Zachary; Rommel, Amy; Boatman, Michael; Lewis, Cheryl; Euhus, David M.; Bornmann, William G.; Buchsbaum, Donald J.; Spitz, Douglas R.; Gao, Jinming; Boothman, David A.
2013-01-01
Improving patient outcome by personalized therapy involves a thorough understanding of an agent’s mechanism of action. β-Lapachone (clinical forms, Arq501/Arq761) has been developed to exploit dramatic cancer-specific elevations in the phase II detoxifying enzyme, NAD(P)H:quinone oxidoreductase (NQO1). NQO1 is dramatically elevated in solid cancers, including primary and metastatic (e.g., triple-negative (ER-, PR-, Her2/Neu-)) breast cancers. To define cellular factors that influence the efficacy of β-lapachone using knowledge of its mechanism of action, we confirmed that NQO1 was required for lethality and mediated a futile redox cycle where ~120 moles of superoxide were formed per mole of β-lapachone in 5 min. β-Lapachone induced reactive oxygen species (ROS), stimulated DNA single strand break-dependent PARP1 hyperactivation, caused dramatic loss of essential nucleotides (NAD+/ATP) and elicited programmed necrosis in breast cancer cells. While PARP1 hyperactivation and NQO1 expression were major determinants of β-lapachone-induced lethality, alterations in catalase expression, including treatment with exogenous enzyme, caused marked cytoprotection. Thus, catalase is an important resistance factor, and highlights H2O2 as an obligate ROS for cell death from this agent. Exogenous superoxide dismutase (SOD) enhanced catalase-induced cytoprotection. β-Lapachone-induced cell death included AIF translocation from mitochondria to nuclei, TUNEL+ staining, atypical PARP1 cleavage, and GAPDH S-nitrosylation, which were abrogated by catalase. We predict that the ratio of NQO1:catalase activities in breast cancer versus associated normal tissue are likely to be the major determinants affecting the therapeutic window of β-lapachone and other NQO1 bioactivatable drugs. PMID:23883585
Fast, efficient error reconciliation for quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.
2003-05-01
We describe an error-reconciliation protocol, which we call Winnow, based on the exchange of parity and Hamming's 'syndrome' for N-bit subunits of a large dataset. The Winnow protocol was developed in the context of quantum-key distribution and offers significant advantages and net higher efficiency compared to other widely used protocols within the quantum cryptography community. A detailed mathematical analysis of the Winnow protocol is presented in the context of practical implementations of quantum-key distribution; in particular, the information overhead required for secure implementation is one of the most important criteria in the evaluation of a particular error-reconciliation protocol. The increasemore » in efficiency for the Winnow protocol is largely due to the reduction in authenticated public communication required for its implementation.« less
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.
Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen
2016-10-01
In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.
A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks
Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen
2016-01-01
In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079
Two-party quantum key agreement protocols under collective noise channel
NASA Astrophysics Data System (ADS)
Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong
2018-06-01
Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Power Conservation through Energy Efficient Routing in Wireless Sensor Networks.
Kandris, Dionisis; Tsioumas, Panagiotis; Tzes, Anthony; Nikolakopoulos, George; Vergados, Dimitrios D
2009-01-01
The power awareness issue is the primary concern within the domain of Wireless Sensor Networks (WSNs). Most power dissipation ocurrs during communication, thus routing protocols in WSNs mainly aim at power conservation. Moreover, a routing protocol should be scalable, so that its effectiveness does not degrade as the network size increases. In response to these issues, this work describes the development of an efficient routing protocol, named SHPER (Scaling Hierarchical Power Efficient Routing).
MR efficiency using automated MRI-desktop eProtocol
NASA Astrophysics Data System (ADS)
Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.
2017-03-01
MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.
Efficient multiparty quantum key agreement with collective detection.
Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie
2017-11-10
As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Gowans, Dakers; Telarico, Chad
The Commercial and Industrial Lighting Evaluation Protocol (the protocol) describes methods to account for gross energy savings resulting from the programmatic installation of efficient lighting equipment in large populations of commercial, industrial, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. A separate Uniform Methods Project (UMP) protocol, Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol, addresses methods for evaluating savings resulting from lighting control measures such as adding time clocks, tuning energy management system commands, and adding occupancy sensors.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Nonpainful wide-area compression inhibits experimental pain.
Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena
2016-09-01
Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.
Efficient multiuser quantum cryptography network based on entanglement.
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-04
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Efficient multiuser quantum cryptography network based on entanglement
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-01-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854
Efficient multiuser quantum cryptography network based on entanglement
NASA Astrophysics Data System (ADS)
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Efficiency in nonequilibrium molecular dynamics Monte Carlo simulations
Radak, Brian K.; Roux, Benoît
2016-10-07
Hybrid algorithms combining nonequilibrium molecular dynamics and Monte Carlo (neMD/MC) offer a powerful avenue for improving the sampling efficiency of computer simulations of complex systems. These neMD/MC algorithms are also increasingly finding use in applications where conventional approaches are impractical, such as constant-pH simulations with explicit solvent. However, selecting an optimal nonequilibrium protocol for maximum efficiency often represents a non-trivial challenge. This work evaluates the efficiency of a broad class of neMD/MC algorithms and protocols within the theoretical framework of linear response theory. The approximations are validated against constant pH-MD simulations and shown to provide accurate predictions of neMD/MC performance.more » An assessment of a large set of protocols confirms (both theoretically and empirically) that a linear work protocol gives the best neMD/MC performance. Lastly, a well-defined criterion for optimizing the time parameters of the protocol is proposed and demonstrated with an adaptive algorithm that improves the performance on-the-fly with minimal cost.« less
Probst, Alexander; Facius, Rainer; Wirth, Reinhard; Moissl-Eichinger, Christine
2010-01-01
In order to meet planetary-protection requirements, culturable bacterial spore loads are measured representatively for the total microbial contamination of spacecraft. However, the National Aeronautics and Space Administration's (NASA's) cotton swab protocols for spore load determination have not changed for decades. To determine whether a more efficient alternative was available, a novel swab was evaluated for recovery of different Bacillus atrophaeus spore concentrations on stainless steel and other surfaces. Two protocols for the nylon-flocked swab (NFS) were validated and compared to the present NASA standard protocol. The results indicate that the novel swab protocols recover 3- to 4-fold more (45.4% and 49.0% recovery efficiency) B. atrophaeus spores than the NASA standard method (13.2%). Moreover, the nylon-flocked-swab protocols were superior in recovery efficiency for spores of seven different Bacillus species, including Bacillus anthracis Sterne (recovery efficiency, 20%). The recovery efficiencies for B. atrophaeus spores from different surfaces showed a variation from 5.9 to 62.0%, depending on the roughness of the surface analyzed. Direct inoculation of the swab resulted in a recovery rate of about 80%, consistent with the results of scanning electron micrographs that allowed detailed comparisons of the two swab types. The results of this investigation will significantly contribute to the cleanliness control of future life detection missions and will provide significant improvement in detection of B. anthracis contamination for law enforcement and security efforts. PMID:20543054
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Li-Ping
2010-11-01
We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
NASA Astrophysics Data System (ADS)
Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta
2017-08-01
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram
2016-01-01
A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194
Efficient and universal quantum key distribution based on chaos and middleware
NASA Astrophysics Data System (ADS)
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.
Nonpainful wide-area compression inhibits experimental pain
Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena
2016-01-01
Abstract Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM. PMID:27152691
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Michael; Haeri, Hossein; Reynolds, Arlis
This chapter provides a set of model protocols for determining energy and demand savings that result from specific energy efficiency measures implemented through state and utility efficiency programs. The methods described here are approaches that are or are among the most commonly used and accepted in the energy efficiency industry for certain measures or programs. As such, they draw from the existing body of research and best practices for energy efficiency program evaluation, measurement, and verification (EM&V). These protocols were developed as part of the Uniform Methods Project (UMP), funded by the U.S. Department of Energy (DOE). The principal objectivemore » for the project was to establish easy-to-follow protocols based on commonly accepted methods for a core set of widely deployed energy efficiency measures.« less
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks
Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay
2014-01-01
Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
Efficient protocols for Stirling heat engines at the micro-scale
NASA Astrophysics Data System (ADS)
Muratore-Ginanneschi, Paolo; Schwieger, Kay
2015-10-01
We investigate the thermodynamic efficiency of sub-micro-scale Stirling heat engines operating under the conditions described by overdamped stochastic thermodynamics. We show how to construct optimal protocols such that at maximum power the efficiency attains for constant isotropic mobility the universal law η=2 ηC/(4-ηC) , where ηC is the efficiency of an ideal Carnot cycle. We show that these protocols are specified by the solution of an optimal mass transport problem. Such solution can be determined explicitly using well-known Monge-Ampère-Kantorovich reconstruction algorithms. Furthermore, we show that the same law describes the efficiency of heat engines operating at maximum work over short time periods. Finally, we illustrate the straightforward extension of these results to cases when the mobility is anisotropic and temperature dependent.
León, Ileana R.; Schwämmle, Veit; Jensen, Ole N.; Sprenger, Richard R.
2013-01-01
The majority of mass spectrometry-based protein quantification studies uses peptide-centric analytical methods and thus strongly relies on efficient and unbiased protein digestion protocols for sample preparation. We present a novel objective approach to assess protein digestion efficiency using a combination of qualitative and quantitative liquid chromatography-tandem MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein fractions. We evaluated nine trypsin-based digestion protocols, based on standard in-solution or on spin filter-aided digestion, including new optimized protocols. We investigated various reagents for protein solubilization and denaturation (dodecyl sulfate, deoxycholate, urea), several trypsin digestion conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents before analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative liquid chromatography-tandem MS workflow quantified over 3700 distinct peptides with 96% completeness between all protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows for efficient, unbiased generation and recovery of peptides from all protein classes, including membrane proteins. This deoxycholate-assisted protocol was also optimal for spin filter-aided digestions as compared with existing methods. PMID:23792921
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
NASA Astrophysics Data System (ADS)
Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.
A More Efficient Contextuality Distillation Protocol
NASA Astrophysics Data System (ADS)
Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang
2018-03-01
Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.
A More Efficient Contextuality Distillation Protocol
NASA Astrophysics Data System (ADS)
Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang
2017-12-01
Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
High efficiency endocrine operation protocol: From design to implementation.
Mascarella, Marco A; Lahrichi, Nadia; Cloutier, Fabienne; Kleiman, Simcha; Payne, Richard J; Rosenberg, Lawrence
2016-10-01
We developed a high efficiency endocrine operative protocol based on a mathematical programming approach, process reengineering, and value-stream mapping to increase the number of operations completed per day without increasing operating room time at a tertiary-care, academic center. Using this protocol, a case-control study of 72 patients undergoing endocrine operation during high efficiency days were age, sex, and procedure-matched to 72 patients undergoing operation during standard days. The demographic profile, operative times, and perioperative complications were noted. The average number of cases per 8-hour workday in the high efficiency and standard operating rooms were 7 and 5, respectively. Mean procedure times in both groups were similar. The turnaround time (mean ± standard deviation) in the high efficiency group was 8.5 (±2.7) minutes as compared with 15.4 (±4.9) minutes in the standard group (P < .001). Transient postoperative hypocalcemia was 6.9% (5/72) and 8.3% (6/72) for the high efficiency and standard groups, respectively (P = .99). In this study, patients undergoing high efficiency endocrine operation had similar procedure times and perioperative complications compared with the standard group. The proposed high efficiency protocol seems to better utilize operative time and decrease the backlog of patients waiting for endocrine operation in a country with a universal national health care program. Copyright © 2016 Elsevier Inc. All rights reserved.
ECS: efficient communication scheduling for underwater sensor networks.
Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao
2011-01-01
TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.
Geometric Heat Engines Featuring Power that Grows with Efficiency.
Raz, O; Subaşı, Y; Pugatch, R
2016-04-22
Thermodynamics places a limit on the efficiency of heat engines, but not on their output power or on how the power and efficiency change with the engine's cycle time. In this Letter, we develop a geometrical description of the power and efficiency as a function of the cycle time, applicable to an important class of heat engine models. This geometrical description is used to design engine protocols that attain both the maximal power and maximal efficiency at the fast driving limit. Furthermore, using this method, we also prove that no protocol can exactly attain the Carnot efficiency at nonzero power.
Comparison of Gluten Extraction Protocols Assessed by LC-MS/MS Analysis.
Fallahbaghery, Azadeh; Zou, Wei; Byrne, Keren; Howitt, Crispin A; Colgrave, Michelle L
2017-04-05
The efficiency of gluten extraction is of critical importance to the results derived from any analytical method for gluten detection and quantitation, whether it employs reagent-based technology (antibodies) or analytical instrumentation (mass spectrometry). If the target proteins are not efficiently extracted, the end result will be an under-estimation in the gluten content posing a health risk to people affected by conditions such as celiac disease (CD) and nonceliac gluten sensitivity (NCGS). Five different extraction protocols were investigated using LC-MRM-MS for their ability to efficiently and reproducibly extract gluten. The rapid and simple "IPA/DTT" protocol and related "two-step" protocol were enriched for gluten proteins, 55/86% (trypsin/chymotrypsin) and 41/68% of all protein identifications, respectively, with both methods showing high reproducibility (CV < 15%). When using multistep protocols, it was critical to examine all fractions, as coextraction of proteins occurred across fractions, with significant levels of proteins existing in unexpected fractions and not all proteins within a particular gluten class behaving the same.
A Robust and Energy-Efficient Transport Protocol for Cognitive Radio Sensor Networks
Salim, Shelly; Moh, Sangman
2014-01-01
A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. CRSNs benefit from cognitive radio capabilities such as dynamic spectrum access and transmission parameters reconfigurability; but cognitive radio also brings additional challenges and leads to higher energy consumption. Motivated to improve the energy efficiency in CRSNs, we propose a robust and energy-efficient transport protocol (RETP). The novelties of RETP are two-fold: (I) it combines distributed channel sensing and channel decision with centralized schedule-based data transmission; and (II) it differentiates the types of data transmission on the basis of data content and adopts different acknowledgment methods for different transmission types. To the best of our knowledge, no transport layer protocols have yet been designed for CRSNs. Simulation results show that the proposed protocol achieves remarkably longer network lifetime and shorter event-detection delay compared to those achieved with a conventional transport protocol, while simultaneously preserving event-detection reliability. PMID:25333288
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin
2018-01-01
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
Modifications in trypsin digestion protocol for increasing the efficiency and coverage.
Syal, Kirtimaan; Tadala, Raghu
2015-01-01
Standard trypsin digestion protocol of proteins followed by MALDI-MS analysis has been realized as an important tool for the identification and characterization of proteins. In this article, we proposed the elimination of the step of 'staining/de-staining of gel pieces' in in-gel digestion protocol in order to improve the efficiency of trypsin digestion. Coomassie dye is known to interfere with digestion of proteins by trypsin and the procedure of staining-de-staining could result in loss of photoaffinity probe, post translational modifications and catalytic activities of enzymes. Further, we studied parameters like hydrophobicity and isoelectric point, and attempted to quantitatively relate it to the efficiency of trypsin digestion. We suggest that properties of proteins should be considered and trypsin digestion protocol should be appropriately modified as per sequence and other information.
Balint, B; Ivanović, Z; Petakov, M; Taseski, J; Jovcić, G; Stojanović, N; Milenković, P
1999-03-01
The efficiency of five different cryopreservation protocols (our original controlled-rate and noncontrolled-rate protocols) was evaluated on the basis of the recovery after thawing of very primitive pluripotent hemopoietic stem cells (MRA(CFU-GM), pluripotent progenitors (CFU-Sd12) and committed granulocyte-monocyte progenitors (CFU-GM) in mouse bone marrow. Although the nucleated cell recovery and viability determined immediately after the thawing and washing of the cells were found to be similar, whether controlled-rate or noncontrolled-rate cryopreservation protocols were used, the recovery of MRA(CFU-GM), CFU-Sd12 and CFU-GM varied depending on the type of protocol and the cryoprotector (DMSO) concentrations used. It was shown that the controlled-rate protocol was more efficient, enabling better MRA(CFU-GM), CFU-Sd12 and CFU-GM recovery from frozen samples. The most efficient was the controlled-rate protocol of cryopreservation designed to compensate for the release of fusion heat, which enabled a better survival of CFU-Sd12 and CFU-GM when combined with a lower (5%) DMSO concentration. On the contrary, a satisfactory survival rate of very primitive stem cells (MRA(CFU-GM)) was achieved only when 10% DMSO was included with a five-step protocol of cryopreservation. These results point to adequately used controlled-rate freezing as essential for a highly efficient cryopreservation of some of the categories of hematopoietic stem and progenitor cells. At the same time, it was obvious that a higher DMSO concentration was necessary for the cryopreservation of very primitive stem cells, but not, however, for more mature progenitor cells (CFU-S, CFU-GM). These results imply the existence of a mechanism that decreases the intracellular concentration of DMSO in primitive MRA cells, which is not the case for less primitive progenitors.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Guowei; Itoh, Kenichi; Sato, Takuro
Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.
Energy-efficient and fast data gathering protocols for indoor wireless sensor networks.
Tümer, Abdullah Erdal; Gündüz, Mesut
2010-01-01
Wireless Sensor Networks have become an important technology with numerous potential applications for the interaction of computers and the physical environment in civilian and military areas. In the routing protocols that are specifically designed for the applications used by sensor networks, the limited available power of the sensor nodes has been taken into consideration in order to extend the lifetime of the networks. In this paper, two protocols based on LEACH and called R-EERP and S-EERP with base and threshold values are presented. R-EERP and S-EERP are two efficient energy aware routing protocols that can be used for some critical applications such as detecting dangerous gases (methane, ammonium, carbon monoxide, etc.) in an indoor environment. In R-EERP, sensor nodes are deployed randomly in a field similar to LEACH. In S-EERP, nodes are deployed sequentially in the rooms of the flats of a multi-story building. In both protocols, nodes forming clusters do not change during a cluster change time, only the cluster heads change. Furthermore, an XOR operation is performed on the collected data in order to prevent the sending of the same data sensed by the nodes close to each other. Simulation results show that our proposed protocols are more energy-efficient than the conventional LEACH protocol.
College of American Pathologists Cancer Protocols: Optimizing Format for Accuracy and Efficiency.
Strickland-Marmol, Leah B; Muro-Cacho, Carlos A; Barnett, Scott D; Banas, Matthew R; Foulis, Philip R
2016-06-01
-The data in College of American Pathologists cancer protocols have to be presented effectively to health care providers. There is no consensus on the format of those protocols, resulting in various designs among pathologists. Cancer protocols are independently created by site-specific experts, so there is inconsistent wording and repetition of data. This lack of standardization can be confusing and may lead to interpretation errors. -To define a synopsis format that is effective in delivering essential pathologic information and to evaluate the aesthetic appeal and the impact of varying format styles on the speed and accuracy of data extraction. -We queried individuals from several health care backgrounds using varying formats of the fallopian tube protocol of the College of American Pathologists without content modification to investigate their aesthetic appeal, accuracy, efficiency, and readability/complexity. Descriptive statistics, an item difficulty index, and 3 tests of readability were used. -Columned formats were aesthetically more appealing than justified formats (P < .001) and were associated with greater accuracy and efficiency. Incorrect assumptions were made about items not included in the protocol. Uniform wording and short sentences were associated with better performance by participants. -Based on these data, we propose standardized protocol formats for cancer resections of the fallopian tube and the more-familiar colon, employing headers, short phrases, and uniform terminology. This template can be easily and minimally modified for other sites, standardizing format and verbiage and increasing user accuracy and efficiency. Principles of human factors engineering should be considered in the display of patient data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kats, G.H.; Rosenfield, A.H.; McIntosh, T.A.
1997-06-01
The energy efficiency industry is constrained by lack of financing. For example, in the United States, commercial and public buildings need an investment of $100 billion for cost-effective retrofits with an average payback of about four years. But the current level of financing is stagnant at only about 34% of this level per year. The U.S. Department of Energy (DOE) has led the development of the North American Energy Measurement and Verification Protocol (NEMVP). This Protocol will increase the reliability and quality of estimated efficiency savings and improve realized savings. A critical element in the development of low cost financingmore » and a secondary market--whether for homes or credit card debt--is the adoption of protocols to provide uniformity and reliability of the product. This is also true of energy efficiency installations, which have been characterized by inconsistency in the installation methodologies and, frequently, unreliability of savings. This Protocol, published in April 1996, is a DOE-led effort involving American Society of Heating, Refrigerating, and Air-Conditioning Engineers, Inc. ASHRAE, National Association of Energy Service Companies NAESCO, National Association of Regulatory Utility Commissioners NARUC, National Association of State Energy Officials NASEO, US Environmental Protection Agency EPA, Canada`s Canadian Association of Energy Service Companies CAESCO, and Mexico`s Comision Nacional Para El Ahorro De Energia CONAE and Fideicomiso De Apoyo Al Programa De Ahorro De Energia Del Sector Electrico FIDE. DOE has begun to build on this Protocol to develop new forms of lower-cost financing including, ultimately, development of a secondary market for energy efficiency. This could double financing for building energy efficiency within five years.« less
ECS: Efficient Communication Scheduling for Underwater Sensor Networks
Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao
2011-01-01
TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols. PMID:22163775
Jansma, J Martijn; de Zwart, Jacco A; van Gelderen, Peter; Duyn, Jeff H; Drevets, Wayne C; Furey, Maura L
2013-01-01
Technical developments in MRI have improved signal to noise, allowing use of analysis methods such as Finite impulse response (FIR) of rapid event related functional MRI (er-fMRI). FIR is one of the most informative analysis methods as it determines onset and full shape of the hemodynamic response function (HRF) without any a-priori assumptions. FIR is however vulnerable to multicollinearity, which is directly related to the distribution of stimuli over time. Efficiency can be optimized by simplifying a design, and restricting stimuli distribution to specific sequences, while more design flexibility necessarily reduces efficiency. However, the actual effect of efficiency on fMRI results has never been tested in vivo. Thus, it is currently difficult to make an informed choice between protocol flexibility and statistical efficiency. The main goal of this study was to assign concrete fMRI signal to noise values to the abstract scale of FIR statistical efficiency. Ten subjects repeated a perception task with five random and m-sequence based protocol, with varying but, according to literature, acceptable levels of multicollinearity. Results indicated substantial differences in signal standard deviation, while the level was a function of multicollinearity. Experiment protocols varied up to 55.4% in standard deviation. Results confirm that quality of fMRI in an FIR analysis can significantly and substantially vary with statistical efficiency. Our in vivo measurements can be used to aid in making an informed decision between freedom in protocol design and statistical efficiency. PMID:23473798
Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.
This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.
Outdoor Irrigation Measurement and Verification Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge
This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.
Efficient entanglement distillation without quantum memory.
Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J; Fiurášek, Jaromír; Schnabel, Roman
2016-05-31
Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution.
Efficient entanglement distillation without quantum memory
Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J.; Fiurášek, Jaromír; Schnabel, Roman
2016-01-01
Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution. PMID:27241946
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Benton, Nathanael; Burns, Patrick
Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: High-efficiency/variable speed drive (VSD) compressormore » replacing modulating, load/unload, or constant-speed compressor; and Compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.« less
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying
2015-05-28
Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes' location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols.
Thiolation mediated pegylation platform to generate functional universal red blood cells.
Nacharaju, Parimala; Manjula, Belur N; Acharya, Seetharama A
2007-01-01
The PEGylation that adds an extension arm on protein amino groups with the conservation of their positive charge masks the A and D antigens of erythrocytes efficiently. In the present study, the efficiency of masking the antigens of RBC by PEGylation protocols that do not conserve the charge with and without adding extension arms is compared. The conjugation of PEG-5000 to RBCs through the addition of extension arms masked the D antigen more efficiently than the other protocol. A combination of PEG-5 K and PEG-20 K is needed to mask the A antigen, irrespective of the PEGylation approach. The oxygen affinity of the PEGylated RBCs increased by the extension arm facilitated PEGylation. The protocol involving the conjugation of PEG-chains without adding extension arm did not alter the oxygen affinity of RBCs. A combination of PEGylation protocols is an alternate strategy to generate universal red blood cells with good levels of oxygen affinity.
A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.
Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan
2017-11-01
Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.
An energy-efficient data gathering protocol in large wireless sensor network
NASA Astrophysics Data System (ADS)
Wang, Yamin; Zhang, Ruihua; Tao, Shizhong
2006-11-01
Wireless sensor network consisting of a large number of small sensors with low-power transceiver can be an effective tool for gathering data in a variety of environment. The collected data must be transmitted to the base station for further processing. Since a network consists of sensors with limited battery energy, the method for data gathering and routing must be energy efficient in order to prolong the lifetime of the network. In this paper, we presented an energy-efficient data gathering protocol in wireless sensor network. The new protocol used data fusion technology clusters nodes into groups and builds a chain among the cluster heads according to a hybrid of the residual energy and distance to the base station. Results in stochastic geometry are used to derive the optimum parameter of our algorithm that minimizes the total energy spent in the network. Simulation results show performance superiority of the new protocol.
Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications
NASA Technical Reports Server (NTRS)
Carek, David A.
2005-01-01
This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-01-01
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-12-04
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.
Electroencephalography for children with autistic spectrum disorder: a sedation protocol.
Keidan, Ilan; Ben-Menachem, Erez; Tzadok, Michal; Ben-Zeev, Bruria; Berkenstadt, Haim
2015-02-01
To report the effectiveness and efficiency of a predetermined sedation protocol for providing sedation for electroencephalograph (EEG) studies in children with autism. Sleep EEG has been advocated for the majority of children with autism spectrum disorder. In most cases, sedation is required to allow adequate studies. Most sedation drugs have negative effects on the EEG pattern. The sedation protocol we adopted included chloral hydrate, dexmedetomidine, and ketamine and was evaluated prospectively for 2 years. One hundred and eighty-three children with autistic spectrum disorder were sedated with the described drug protocol that was efficient, provided adequate EEG readings, and was not associated with serious adverse events. Our protocol kept costs to a minimum but provided appropriate escalation in care when required. © 2014 John Wiley & Sons Ltd.
The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Schmuck, Frank Bernhard
1988-01-01
Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.
Transfection using DEAE-dextran.
Selden, R F
2001-05-01
Two protocols for DEAE-dextran transfection of cells are provided in this unit. The Basic Protocol describes a procedure used to transfect adherent cells and the first Alternate Protocol presents a method used to transfect suspension cells. If an increase in transfection efficiency is needed, cells can be treated with chloroquine as described in the second Alternate Protocol.
NASA Technical Reports Server (NTRS)
Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)
2010-01-01
The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.
Design and development of compact monitoring system for disaster remote health centres.
Santhi, S; Sadasivam, G S
2015-02-01
To enhance speedy communication between the patient and the doctor through newly proposed routing protocol at the mobile node. The proposed model is applied for a telemedicine application during disaster recovery management. In this paper, Energy Efficient Link Stability Routing Protocol (EELSRP) has been developed by simulation and real time. This framework is designed for the immediate healing of affected persons in remote areas, especially at the time of the disaster where there is no hospital proximity. In case of disasters, there might be an outbreak of infectious diseases. In such cases, the patient's medical record is also transferred by the field operator from disaster place to the hospital to facilitate the identification of the disease-causing agent and to prescribe the necessary medication. The heterogeneous networking framework provides reliable, energy efficientand speedy communication between the patient and the doctor using the proposed routing protocol at the mobile node. The performance of the simulation and real time versions of the Energy Efficient Link Stability Routing Protocol (EELSRP) protocol has been analyzed. Experimental results prove the efficiency of the real-time version of EESLRP protocol. The packet delivery ratio and throughput of the real time version of EELSRP protocol is increased by 3% and 10%, respectively, when compared to the simulated version of EELSRP. The end-to-end delay and energy consumption are reduced by 10% and 2% in the real time version of EELSRP.
Improvement of Cell Survival During Human Pluripotent Stem Cell Definitive Endoderm Differentiation
Wang, Han; Luo, Xie; Yao, Li; Lehman, Donna M.
2015-01-01
Definitive endoderm (DE) is a vital precursor for internal organs such as liver and pancreas. Efficient protocol to differentiate human embryonic stem cells (hESCs) or induced pluripotent stem cells (iPSCs) to DE is essential for regenerative medicine and for modeling diseases; yet, poor cell survival during DE differentiation remains unsolved. In this study, our use of B27 supplement in modified differentiation protocols has led to a substantial improvement. We used an SOX17-enhanced green fluorescent protein (eGFP) reporter hESC line to compare and modify established DE differentiation protocols. Both total live cell numbers and the percentages of eGFP-positive cells were used to assess differentiation efficiency. Among tested protocols, three modified protocols with serum-free B27 supplement were developed to generate a high number of DE cells. Massive cell death was avoided during DE differentiation and the percentage of DE cells remained high. When the resulting DE cells were further differentiated toward the pancreatic lineage, the expression of pancreatic-specific markers was significantly increased. Similar high DE differentiation efficiency was observed in H1 hESCs and iPSCs through the modified protocols. In B27 components, bovine serum albumin was found to facilitate DE differentiation and cell survival. Using our modified DE differentiation protocols, satisfactory quantities of quality DE can be produced as primary material for further endoderm lineage differentiation. PMID:26132288
ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS
The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.
Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...
Jansma, J Martijn; de Zwart, Jacco A; van Gelderen, Peter; Duyn, Jeff H; Drevets, Wayne C; Furey, Maura L
2013-05-15
Technical developments in MRI have improved signal to noise, allowing use of analysis methods such as Finite impulse response (FIR) of rapid event related functional MRI (er-fMRI). FIR is one of the most informative analysis methods as it determines onset and full shape of the hemodynamic response function (HRF) without any a priori assumptions. FIR is however vulnerable to multicollinearity, which is directly related to the distribution of stimuli over time. Efficiency can be optimized by simplifying a design, and restricting stimuli distribution to specific sequences, while more design flexibility necessarily reduces efficiency. However, the actual effect of efficiency on fMRI results has never been tested in vivo. Thus, it is currently difficult to make an informed choice between protocol flexibility and statistical efficiency. The main goal of this study was to assign concrete fMRI signal to noise values to the abstract scale of FIR statistical efficiency. Ten subjects repeated a perception task with five random and m-sequence based protocol, with varying but, according to literature, acceptable levels of multicollinearity. Results indicated substantial differences in signal standard deviation, while the level was a function of multicollinearity. Experiment protocols varied up to 55.4% in standard deviation. Results confirm that quality of fMRI in an FIR analysis can significantly and substantially vary with statistical efficiency. Our in vivo measurements can be used to aid in making an informed decision between freedom in protocol design and statistical efficiency. Published by Elsevier B.V.
Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Saeed Tanoli, Tariq; Khalid Khan, Muhammad
2013-12-01
Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.
Beating the photon-number-splitting attack in practical quantum cryptography.
Wang, Xiang-Bin
2005-06-17
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.
Collavini, Silvia; Kosta, Ivet; Völker, Sebastian F; Cabanero, German; Grande, Hans J; Tena-Zaera, Ramón; Delgado, Juan Luis
2016-06-08
[70]Fullerene is presented as an efficient alternative electron-selective contact (ESC) for regular-architecture perovskite solar cells (PSCs). A smart and simple, well-described solution processing protocol for the preparation of [70]- and [60]fullerene-based solar cells, namely the fullerene saturation approach (FSA), allowed us to obtain similar power conversion efficiencies for both fullerene materials (i.e., 10.4 and 11.4 % for [70]- and [60]fullerene-based devices, respectively). Importantly, despite the low electron mobility and significant visible-light absorption of [70]fullerene, the presented protocol allows the employment of [70]fullerene as an efficient ESC. The [70]fullerene film thickness and its solubility in the perovskite processing solutions are crucial parameters, which can be controlled by the use of this simple solution processing protocol. The damage to the [70]fullerene film through dissolution during the perovskite deposition is avoided through the saturation of the perovskite processing solution with [70]fullerene. Additionally, this fullerene-saturation strategy improves the performance of the perovskite film significantly and enhances the power conversion efficiency of solar cells based on different ESCs (i.e., [60]fullerene, [70]fullerene, and TiO2 ). Therefore, this universal solution processing protocol widens the opportunities for the further development of PSCs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
IRB Process Improvements: A Machine Learning Analysis.
Shoenbill, Kimberly; Song, Yiqiang; Cobb, Nichelle L; Drezner, Marc K; Mendonca, Eneida A
2017-06-01
Clinical research involving humans is critically important, but it is a lengthy and expensive process. Most studies require institutional review board (IRB) approval. Our objective is to identify predictors of delays or accelerations in the IRB review process and apply this knowledge to inform process change in an effort to improve IRB efficiency, transparency, consistency and communication. We analyzed timelines of protocol submissions to determine protocol or IRB characteristics associated with different processing times. Our evaluation included single variable analysis to identify significant predictors of IRB processing time and machine learning methods to predict processing times through the IRB review system. Based on initial identified predictors, changes to IRB workflow and staffing procedures were instituted and we repeated our analysis. Our analysis identified several predictors of delays in the IRB review process including type of IRB review to be conducted, whether a protocol falls under Veteran's Administration purview and specific staff in charge of a protocol's review. We have identified several predictors of delays in IRB protocol review processing times using statistical and machine learning methods. Application of this knowledge to process improvement efforts in two IRBs has led to increased efficiency in protocol review. The workflow and system enhancements that are being made support our four-part goal of improving IRB efficiency, consistency, transparency, and communication.
Weakley, Jonathon Js; Till, Kevin; Read, Dale B; Phibbs, Padraic J; Roe, Gregory; Darrall-Jones, Joshua; Jones, Ben L
2017-08-04
Training that is efficient and effective is of great importance to an athlete. One method of improving efficiency is by incorporating supersets into resistance training routines. However, the structuring of supersets is still unexplored. Therefore, the purpose of this study was to assess the effects of agonist-antagonist (A-A), alternate peripheral (A-P), and similar biomechanical (SB) superset configurations on rate of perceived exertion (RPE), kinetic and kinematic changes during the bench press. 10 subjects performed resistance training protocols in a randomized-crossover design, with magnitude-based inferences assessing changes/differences within and between protocols. Changes in RPE were very likely and almost certainly greater in the A-P and SB protocols when compared with the A-A, while all superset protocols had very likely to almost certain reductions in mean velocity and power from baseline. Reductions in mean velocity and power were almost certainly greater in the SB protocol, with differences between the A-A and A-P protocols being unclear. Decreases in peak force were likely and almost certain in the A-A and SB protocols respectively, with changes in A-P being unclear. Differences between these protocols showed likely greater decreases in SB peak forces when compared to A-A, with all other superset comparisons being unclear. This study demonstrates the importance of exercise selection when incorporating supersets into a training routine. It is suggested that the practitioner uses A-A supersets when aiming to improve training efficiency and minimize reductions in kinetic and kinematic output of the agonist musculature while completing the barbell bench press.
Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua
2011-01-01
Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.
Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua
2011-01-01
Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay. PMID:22319385
An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.
Singh, Kishor; Moh, Sangman
2017-09-04
Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.
An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks
Singh, Kishor
2017-01-01
Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551
Efficient Isolation Protocol for B and T Lymphocytes from Human Palatine Tonsils
Assadian, Farzaneh; Sandström, Karl; Laurell, Göran; Svensson, Catharina; Akusjärvi, Göran; Punga, Tanel
2015-01-01
Tonsils form a part of the immune system providing the first line of defense against inhaled pathogens. Usually the term “tonsils” refers to the palatine tonsils situated at the lateral walls of the oral part of the pharynx. Surgically removed palatine tonsils provide a convenient accessible source of B and T lymphocytes to study the interplay between foreign pathogens and the host immune system. This video protocol describes the dissection and processing of surgically removed human palatine tonsils, followed by the isolation of the individual B and T cell populations from the same tissue sample. We present a method, which efficiently separates tonsillar B and T lymphocytes using an antibody-dependent affinity protocol. Further, we use the method to demonstrate that human adenovirus infects specifically the tonsillar T cell fraction. The established protocol is generally applicable to efficiently and rapidly isolate tonsillar B and T cell populations to study the role of different types of pathogens in tonsillar immune responses. PMID:26650582
A secure RFID-based WBAN for healthcare applications.
Ullah, Sana; Alamri, Atif
2013-10-01
A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.
Optimal approach to quantum communication using dynamic programming.
Jiang, Liang; Taylor, Jacob M; Khaneja, Navin; Lukin, Mikhail D
2007-10-30
Reliable preparation of entanglement between distant systems is an outstanding problem in quantum information science and quantum communication. In practice, this has to be accomplished by noisy channels (such as optical fibers) that generally result in exponential attenuation of quantum signals at large distances. A special class of quantum error correction protocols, quantum repeater protocols, can be used to overcome such losses. In this work, we introduce a method for systematically optimizing existing protocols and developing more efficient protocols. Our approach makes use of a dynamic programming-based searching algorithm, the complexity of which scales only polynomially with the communication distance, letting us efficiently determine near-optimal solutions. We find significant improvements in both the speed and the final-state fidelity for preparing long-distance entangled states.
Secure and Efficient Network Fault Localization
2012-02-27
ORGANIZATION NAME(S) AND ADDRESS (ES) Carnegie Mellon University,School of Computer Science,Computer Science Department,Pittsburgh,PA,15213 8. PERFORMING...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT...efficiency than previously known protocols for fault localization. Our proposed fault localization protocols also address the security threats that
IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong
2017-10-01
Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.
Chowdhury, Supriyo; Basu, Arpita; Kundu, Surekha
2014-09-01
In spite of the economic importance of sesame (Sesamum indicum L.) and the recent availability of its genome sequence, a high-frequency transformation protocol is still not available. The only two existing Agrobacterium-mediated transformation protocols that are available have poor transformation efficiencies of less than 2%. In the present study, we report a high-frequency, simple, and reproducible transformation protocol for sesame. Transformation was done using de-embryonated cotyledons via somatic embryogenic stages. All the critical parameters of transformation, like incubation period of explants in pre-regeneration medium prior to infection by Agrobacterium tumefaciens, cocultivation period, concentrations of acetosyringone in cocultivation medium, kanamycin concentration, and concentration of plant hormones, including 6-benzylaminopurine, have been optimized. This protocol is superior to the two existing protocols in its high regeneration and transformation efficiencies. The transformed sesame lines have been tested by PCR, RT-PCR for neomycin phosphotransferase II gene expression, and β-glucuronidase (GUS) assay. The regeneration frequency and transformation efficiency are 57.33 and 42.66%, respectively. T0 and T1 generation transgenic plants were analyzed, and several T1 plants homozygous for the transgenes were obtained.
WEAMR — A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs
Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung
2013-01-01
Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs. PMID:23669714
WEAMR-a weighted energy aware multipath reliable routing mechanism for hotline-based WSNs.
Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung
2013-05-13
Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs.
PROTOCOL TO EVALUATE THE MOISTURE DURABILITY OF ENERGY-EFFICIENT WALLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boudreaux, Philip R; Pallin, Simon B; Hun, Diana E
Walls account for about 8% of the energy used in residential buildings. This energy penalty can be reduced with higher insulation levels and increased airtightness. However, these measures can compromise the moisture durability and long-term performance of wall assemblies because they can lead to lower moisture tolerance due to reduced drying potential. To avert these problems, a moisture durability protocol was developed to evaluate the probability that an energy-efficient wall design will experience mold growth. This protocol examines the effects of moisture sources in walls through a combination of simulations and lab experiments, uses the mold growth index as themore » moisture durability indicator, and is based on a probabilistic approach that utilizes stochastically varying input parameters. The simulation tools used include a new validated method for taking into account the effects of air leakage in wall assemblies This paper provides an overview of the developed protocol, discussion of the probabilistic simulation approach and describes results from the evaluation of two wall assemblies in Climate Zones 2, 4, and 6. The protocol will be used to supply builders with wall designs that are energy efficient, moisture durable and cost-effective.« less
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems
Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio
2013-01-01
Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828
Research on low-latency MAC protocols for wireless sensor networks
NASA Astrophysics Data System (ADS)
He, Chenguang; Sha, Xuejun; Lee, Chankil
2007-11-01
Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kusabuka, Hotaka; Fujiwara, Kento; Tokunaga, Yusuke
Adoptive immunotherapy using chimeric antigen receptor-expressing T (CAR-T) cells has attracted attention as an efficacious strategy for cancer treatment. To prove the efficacy and safety of CAR-T cell therapy, the elucidation of immunological mechanisms underlying it in mice is required. Although a retroviral vector (Rv) is mainly used for the introduction of CAR to murine T cells, gene transduction efficiency is generally less than 50%. The low transduction efficiency causes poor precision in the functional analysis of CAR-T cells. We attempted to improve the Rv gene transduction protocol to more efficiently generate functional CAR-T cells by optimizing the period ofmore » pre-cultivation and antibody stimulation. In the improved protocol, gene transduction efficiency to murine T cells was more than 90%. In addition, almost all of the prepared murine T cells expressed CAR after puromycin selection. These CAR-T cells had antigen-specific cytotoxic activity and secreted multiple cytokines by antigen stimulation. We believe that our optimized gene transduction protocol for murine T cells contributes to the advancement of T cell biology and development of immunotherapy using genetically engineered T cells. - Highlights: • We established highly efficient gene transduction protocols for murine T cells. • CD8{sup +} CAR-T cells had antigen-specific cytotoxic activity. • CD4{sup +} CAR-T cells secreted multiple cytokines by antigen stimulation. • This finding can contribute to the development of T-cell biology and immunotherapy.« less
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
Amin, Ruhul; Biswas, G P
2015-08-01
Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.
Deterministic and efficient quantum cryptography based on Bell's theorem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen Zengbing; Pan Jianwei; Physikalisches Institut, Universitaet Heidelberg, Philosophenweg 12, 69120 Heidelberg
2006-05-15
We propose a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic. The proposal uses photon pairs with entanglement both in polarization and in time degrees of freedom; each measurement in which both of the two communicating parties register a photon can establish one and only one perfect correlation, and thus deterministically create a key bit. Eavesdropping can be detected by violation of local realism. A variation of the protocol shows a higher security, similar to the six-state protocol, under individual attacks. Our scheme allows a robust implementation under the current technology.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Bulk Data Dissemination in Low Power Sensor Networks: Present and Future Directions
Xu, Zhirong; Hu, Tianlei; Song, Qianshu
2017-01-01
Wireless sensor network-based (WSN-based) applications need an efficient and reliable data dissemination service to facilitate maintenance, management and data distribution tasks. As WSNs nowadays are becoming pervasive and data intensive, bulk data dissemination protocols have been extensively studied recently. This paper provides a comprehensive survey of the state-of-the-art bulk data dissemination protocols. The large number of papers available in the literature propose various techniques to optimize the dissemination protocols. Different from the existing survey works which separately explores the building blocks of dissemination, our work categorizes the literature according to the optimization purposes: Reliability, Scalability and Transmission/Energy efficiency. By summarizing and reviewing the key insights and techniques, we further discuss on the future directions for each category. Our survey helps unveil three key findings for future direction: (1) The recent advances in wireless communications (e.g., study on cross-technology interference, error estimating codes, constructive interference, capture effect) can be potentially exploited to support further optimization on the reliability and energy efficiency of dissemination protocols; (2) Dissemination in multi-channel, multi-task and opportunistic networks requires more efforts to fully exploit the spatial-temporal network resources to enhance the data propagation; (3) Since many designs incur changes on MAC layer protocols, the co-existence of dissemination with other network protocols is another problem left to be addressed. PMID:28098830
Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shibin; Chang, Yan
2017-08-01
Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.
Review and publication of protocol submissions to Trials - what have we learned in 10 years?
Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G
2016-12-16
Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.
MTP: An atomic multicast transport protocol
NASA Technical Reports Server (NTRS)
Freier, Alan O.; Marzullo, Keith
1990-01-01
Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.
Factors affecting the efficient transformation of Colletotrichum species
Redman, Regina S.; Rodriguez, Rusty J.
1994-01-01
Factors affecting the efficient transformation of Colletotrichum species. Experimental Mycology, 18, 230-246. Twelve isolates representing four species of Colletotrichum were transformed either by enhanced protoplast, restriction enzyme-mediated integration (REMI), or electroporation-mediated protocols. The enhanced protoplast transformation protocol resulted in 100- and 50-fold increases in the transformation efficiencies of Colletotrichum lindemuthianum and C. magna , respectively. REMI transformation involved the use of Hin dIII and vector DNA linearized with HindIII to increase the number of integration events and potential gene disruptions in the fungal genome. Combining the enhanced protoplast and the REMI protocols resulted in a 22-fold increase in the number of hygromycin/nystatin-resistant mutants in C. lindemuthianum . Electroporation-mediated transformation was performed on mycelial fragments and spores of four Colletotrichum species, resulting in efficiencies of up to 1000 transformants/μg DNA. The pHA1.3 vector which confers hygromycin resistance contains telomeric sequences from Fusarium oxysporum , transforms by autonomous replication and genomic integration, and was essential for elevated transformation efficiencies of 100 to 10,000 transformants/μg DNA. Modifications of pHA1.3 occurred during bacterial amplification and post fungal transformation resulting in plasmids capable of significantly elevated transformation efficiencies in C. lindemuthianum.
Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex
2011-04-15
In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Jacobson, David
The high-efficiency boiler and furnace measure produces gas heating savings resulting from installation of more energy-efficient heating equipment in a residence. Such equipment, which ranges in size from 60 kBtu/hr to 300 kBtu/hr, is installed primarily in single-family homes and multifamily buildings with individual heating systems for each dwelling unit. This protocol does not cover integrated heating and water heating units which can be used in lieu of space heating only equipment.
Palacio-Bielsa, Ana; Cubero, Jaime; Cambra, Miguel A; Collados, Raquel; Berruete, Isabel M; López, María M
2011-01-01
Xanthomonas arboricola pv. pruni, the causal agent of bacterial spot disease of stone fruit, is considered a quarantine organism by the European Union and the European and Mediterranean Plant Protection Organization (EPPO). The bacterium can undergo an epiphytic phase and/or be latent and can be transmitted by plant material, but currently, only visual inspections are used to certify plants as being X. arboricola pv. pruni free. A novel and highly sensitive real-time TaqMan PCR detection protocol was designed based on a sequence of a gene for a putative protein related to an ABC transporter ATP-binding system in X. arboricola pv. pruni. Pathogen detection can be completed within a few hours with a sensitivity of 10(2) CFU ml(-1), thus surpassing the sensitivity of the existing conventional PCR. Specificity was assessed for X. arboricola pv. pruni strains from different origins as well as for closely related Xanthomonas species, non-Xanthomonas species, saprophytic bacteria, and healthy Prunus samples. The efficiency of the developed protocol was evaluated with field samples of 14 Prunus species and rootstocks. For symptomatic leaf samples, the protocol was very efficient even when washed tissues of the leaves were directly amplified without any previous DNA extraction. For samples of 117 asymptomatic leaves and 285 buds, the protocol was more efficient after a simple DNA extraction, and X. arboricola pv. pruni was detected in 9.4% and 9.1% of the 402 samples analyzed, respectively, demonstrating its frequent epiphytic or endophytic phase. This newly developed real-time PCR protocol can be used as a quantitative assay, offers a reliable and sensitive test for X. arboricola pv. pruni, and is suitable as a screening test for symptomatic as well as asymptomatic plant material.
Optimization of protocol design: a path to efficient, lower cost clinical trial execution
Malikova, Marina A
2016-01-01
Managing clinical trials requires strategic planning and efficient execution. In order to achieve a timely delivery of important clinical trials’ outcomes, it is useful to establish standardized trial management guidelines and develop robust scoring methodology for evaluation of study protocol complexity. This review will explore the challenges clinical teams face in developing protocols to ensure that the right patients are enrolled and the right data are collected to demonstrate that a drug is safe and efficacious, while managing study costs and study complexity based on proposed comprehensive scoring model. Key factors to consider when developing protocols and techniques to minimize complexity will be discussed. A methodology to identify processes at planning phase, approaches to increase fiscal return and mitigate fiscal compliance risk for clinical trials will be addressed. PMID:28031939
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
Cameron, Colin; Bell-Rogers, Patricia; McDowall, Rebeccah; Rebelo, Ana R.; Cai, Hugh Y.
2014-01-01
This study analyzed sheep prion protein (PrP) genotypes of samples submitted from Ontario and other provinces of Canada to the Animal Health Laboratory at the University of Guelph, Guelph, Ontario, between 2005 and 2012. In Ontario, the proportion of scrapie-resistant sheep increased from 2005 to 2012 as evidenced by an increase in the ARR haplotype. When Canadian provinces (Alberta, Ontario, Quebec, and Nova Scotia) were compared from 2008 to 2012, a high proportion of scrapie-resistant sheep was found in all the provinces. The proportions of resistant sheep were lower in Alberta and Quebec than in Ontario and Nova Scotia. Alberta had higher proportions of susceptible sheep and a higher frequency of VRQ alleles, and Quebec had a higher frequency of the ARQ allele. PMID:25355994
Seamless Insert-Plasmid Assembly at High Efficiency and Low Cost
Benoit, Roger M.; Ostermeier, Christian; Geiser, Martin; Li, Julia Su Zhou; Widmer, Hans; Auer, Manfred
2016-01-01
Seamless cloning methods, such as co-transformation cloning, sequence- and ligation-independent cloning (SLIC) or the Gibson assembly, are essential tools for the precise construction of plasmids. The efficiency of co-transformation cloning is however low and the Gibson assembly reagents are expensive. With the aim to improve the robustness of seamless cloning experiments while keeping costs low, we examined the importance of complementary single-stranded DNA ends for co-transformation cloning and the influence of single-stranded gaps in circular plasmids on SLIC cloning efficiency. Most importantly, our data show that single-stranded gaps in double-stranded plasmids, which occur in typical SLIC protocols, can drastically decrease the efficiency at which the DNA transforms competent E. coli bacteria. Accordingly, filling-in of single-stranded gaps using DNA polymerase resulted in increased transformation efficiency. Ligation of the remaining nicks did not lead to a further increase in transformation efficiency. These findings demonstrate that highly efficient insert-plasmid assembly can be achieved by using only T5 exonuclease and Phusion DNA polymerase, without Taq DNA ligase from the original Gibson protocol, which significantly reduces the cost of the reactions. We successfully used this modified Gibson assembly protocol with two short insert-plasmid overlap regions, each counting only 15 nucleotides. PMID:27073895
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-11-25
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.
SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-01-01
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409
Liver plasma membranes: an effective method to analyze membrane proteome.
Cao, Rui; Liang, Songping
2012-01-01
Plasma membrane proteins are critical for the maintenance of biological systems and represent important targets for the treatment of disease. The hydrophobicity and low abundance of plasma membrane proteins make them difficult to analyze. The protocols given here are the efficient isolation/digestion procedures for liver plasma membrane proteomic analysis. Both protocol for the isolation of plasma membranes and protocol for the in-gel digestion of gel-embedded plasma membrane proteins are presented. The later method allows the use of a high detergent concentration to achieve efficient solubilization of hydrophobic plasma membrane proteins while avoiding interference with the subsequent LC-MS/MS analysis.
Menichella, G; Lai, M; Pierelli, L; Vittori, M; Serafini, R; Ciarli, M; Foddai, M L; Salerno, G; Sica, S; Scambia, G; Leone, G; Bizzi, B
1997-01-01
Reconstitution of hematopoiesis by means of peripheral blood stem cells is a valid alternative to autologous bone marrow transplantation. The aim of this investigation was to increase the efficiency of collection of circulating blood progenitor cells and to obtain a purer product for transplant. We carried out leukapheresis procedures with the Fresenius AS 104 blood cell separator, using two different protocols, the previously used PBSC-LYM and a new mononuclear cell collection program. Both programs were highly effective in collecting mononuclear cells (MNC) and CD34+ cells. Some differences were found, especially regarding MNC yield and efficiencies. There are remarkable differences in the efficiency of collection of CD34+ cells (62.38% with the new program as opposed to 31.69% with the older one). Linear regression analysis showed a negative correlation between blood volume processed and MNC efficiency only for the PBSC-LYM program. Differences were also observed in the degree of inverse correlation existing in both programs between patients' white blood cell precount and MNC collection efficiency. The inverse correlation was stronger for the PBSC-LYM program. Seven patients with solid tumors and hematologic malignancies received high dose chemotherapy and were subsequently transplanted with peripheral blood stem cells collected using the new protocol. All patients obtained a complete and stable engraftment with the reinfusion product collected with one or two leukapheresis procedures. High efficiencies and yields were observed in the new protocol for MNC and CD34+ cells. These were able to effect rapid and complete bone marrow recovery after myeloablative chemotherapy.
A psychoengineering paradigm for the neurocognitive mechanisms of biofeedback and neurofeedback.
Gaume, A; Vialatte, A; Mora-Sánchez, A; Ramdani, C; Vialatte, F B
2016-09-01
We believe that the missing keystone to design effective and efficient biofeedback and neurofeedback protocols is a comprehensive model of the mechanisms of feedback learning. In this manuscript we review the learning models in behavioral, developmental and cognitive psychology, and derive a synthetic model of the psychological perspective on biofeedback. We afterwards review the neural correlates of feedback learning mechanisms, and present a general neuroscience model of biofeedback. We subsequently show how biomedical engineering principles can be applied to design efficient feedback protocols. We finally present an integrative psychoengineering model of the feedback learning processes, and provide new guidelines for the efficient design of biofeedback and neurofeedback protocols. We identify five key properties, (1) perceptibility=can the subject perceive the biosignal?, (2) autonomy=can the subject regulate by himself?, (3) mastery=degree of control over the biosignal, (4) motivation=rewards system of the biofeedback, and (5) learnability=possibility of learning. We conclude with guidelines for the investigation and promotion of these properties in biofeedback protocols. Copyright © 2016 Elsevier Ltd. All rights reserved.
Bastings, Lobke; Westphal, Johan R; Beerendonk, Catharina C M; Bekkers, Ruud L M; Zusterzeel, Petra L M; Hendriks, Jan C M; Braat, Didi D M; Peek, Ronald
2016-12-01
Different protocols are being used worldwide for the cryopreservation of human ovarian tissue for fertility preservation purposes. The efficiency and efficacy of the majority of these protocols has not been extensively evaluated, possibly resulting in sub-optimally cryopreserved ovarian tissue. To address the impact of this issue, we assessed the effects of two clinically successful human ovarian tissue slow-freezing cryopreservation procedures on the quality of the cryopreserved tissue. To differentiate between cryopreservation ( C ) versus thawing ( T ) related effects, four combinations of these two (A and B) very different cryopreservation/thawing protocols (A C A T , A C B T , B C A T , B C B T ) were studied. Before and after cryopreservation and thawing, the percentage of living and morphologically normal follicles, as well as the overall tissue viability, was assessed. Our experiments revealed that the choice of the cryopreservation protocol noticeably affected the overall tissue viability and percentage of living follicles, with a higher viability after protocol B C when compared to A C . No statistically significant differences in tissue viability were observed between the two thawing protocols, but thawing protocol B T required considerably more human effort and materials than thawing protocol A T . Tissue morphology was best retained using the B C A T combination. Our results indicate that extensive and systematical evaluation of clinically used protocols is warranted.
SPP: A data base processor data communications protocol
NASA Technical Reports Server (NTRS)
Fishwick, P. A.
1983-01-01
The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-08-01
A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.
NASA Astrophysics Data System (ADS)
Matsuo, Tomoaki; Ohkawara, Kazunori; Seino, Satoshi; Shimojo, Nobutake; Yamada, Shin; Ohshima, Hiroshi; Tanaka, Kiyoji; Mukai, Chiaki
2013-02-01
Maximal oxygen consumption decreases during spaceflight, and astronauts also experience controversial weight loss. Future space missions require a more efficient exercise program to maintain work efficiency and to control increased energy expenditure (EE). We have been developing two types of original exercise training protocols which are better suited to astronauts’ daily routine exercise during long-term spaceflight: sprint interval training (SIT) and high-intensity interval aerobic training (HIAT). In this study, we compared the total EE, including excess post-exercise energy expenditure (EPEE), induced by our interval cycling protocols with the total EE of a traditional, continuous aerobic training (CAT). In the results, while the EPEEs after the SIT and HIAT were greater than after the CAT, the total EE for an entire exercise/rest session with the CAT was the greatest of our three exercise protocols. The SIT and HIAT would be potential protocols to control energy expenditure for long space missions.
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
An economic and feasible Quantum Sealed-bid Auction protocol
NASA Astrophysics Data System (ADS)
Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan
2018-02-01
We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Stern, Frank; Spencer, Justin
Savings from electric energy efficiency measures and programs are often expressed in terms of annual energy and presented as kilowatt-hours per year (kWh/year). However, for a full assessment of the value of these savings, it is usually necessary to consider the measure or program's impact on peak demand as well as time-differentiated energy savings. This cross-cutting protocol describes methods for estimating the peak demand and time-differentiated energy impacts of measures implemented through energy efficiency programs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Stoughton, Kate M; Figueroa, Jorge
This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.
Quantum key distribution using basis encoding of Gaussian-modulated coherent states
NASA Astrophysics Data System (ADS)
Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua
2018-04-01
The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.
NASA Astrophysics Data System (ADS)
Bragard, Jean; Simic, Ana; Elorza, Jorge; Grigoriev, Roman O.; Cherry, Elizabeth M.; Gilmour, Robert F.; Otani, Niels F.; Fenton, Flavio H.
2013-12-01
In this article, we compare quantitatively the efficiency of three different protocols commonly used in commercial defibrillators. These are based on monophasic and both symmetric and asymmetric biphasic shocks. A numerical one-dimensional model of cardiac tissue using the bidomain formulation is used in order to test the different protocols. In particular, we performed a total of 4.8 × 106 simulations by varying shock waveform, shock energy, initial conditions, and heterogeneity in internal electrical conductivity. Whenever the shock successfully removed the reentrant dynamics in the tissue, we classified the mechanism. The analysis of the numerical data shows that biphasic shocks are significantly more efficient (by about 25%) than the corresponding monophasic ones. We determine that the increase in efficiency of the biphasic shocks can be explained by the higher proportion of newly excited tissue through the mechanism of direct activation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bragard, Jean, E-mail: jbragard@unav.es; Simic, Ana; Elorza, Jorge
2013-12-15
In this article, we compare quantitatively the efficiency of three different protocols commonly used in commercial defibrillators. These are based on monophasic and both symmetric and asymmetric biphasic shocks. A numerical one–dimensional model of cardiac tissue using the bidomain formulation is used in order to test the different protocols. In particular, we performed a total of 4.8 × 10{sup 6} simulations by varying shock waveform, shock energy, initial conditions, and heterogeneity in internal electrical conductivity. Whenever the shock successfully removed the reentrant dynamics in the tissue, we classified the mechanism. The analysis of the numerical data shows that biphasic shocksmore » are significantly more efficient (by about 25%) than the corresponding monophasic ones. We determine that the increase in efficiency of the biphasic shocks can be explained by the higher proportion of newly excited tissue through the mechanism of direct activation.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Dimetrosky, Scott; Parkinson, Katie
Given new regulations, increased complexity in the market, and the general shift from CFLs to LEDs, this evaluation protocol was updated in 2017 to shift the focus of the protocols toward LEDs and away from CFLs and to resolve evaluation uncertainties affecting residential lighting incentive programs.
Protocols for second-generation business satellites systems
NASA Astrophysics Data System (ADS)
Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.
The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-06-21
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-01-01
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-08-01
A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.
Enhanced Weight based DSR for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Verma, Samant; Jain, Sweta
2011-12-01
Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining
2015-03-01
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Nicely, Lucas D; Zhang, Haibin
Modern large-scale networks require the ability to withstand arbitrary failures (i.e., Byzantine failures). Byzantine reliable broadcast algorithms can be used to reliably disseminate information in the presence of Byzantine failures. We design a novel Byzantine reliable broadcast protocol for loosely connected and synchronous networks. While previous such protocols all assume correct senders, our protocol is the first to handle Byzantine senders. To achieve this goal, we have developed new techniques for fault detection and fault tolerance. Our protocol is efficient, and under normal circumstances, no expensive public-key cryptographic operations are used. We implement and evaluate our protocol, demonstrating that ourmore » protocol has high throughput and is superior to the existing protocols in uncivil executions.« less
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Nam, Junghyun; Kim, Moonseong
2014-01-01
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Keates, Steven
This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).
Perumal, Madhumathy; Dhandapani, Sivakumar
2015-01-01
Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.
Zhang, Weihong; Chen, Jianhan
2013-06-11
Temperature-based replica exchange (RE) is now considered a principal technique for enhanced sampling of protein conformations. It is also recognized that existence of sharp cooperative transitions (such as protein folding/unfolding) can lead to temperature exchange bottlenecks and significantly reduce the sampling efficiency. Here, we revisit two adaptive temperature-based RE protocols, namely, exchange equalization (EE) and current maximization (CM), that were previously examined using atomistic simulations (Lee and Olson, J. Chem. Physics2011, 134, 24111). Both protocols aim to overcome exchange bottlenecks by adaptively adjusting the simulation temperatures, either to achieve uniform exchange rates (in EE) or to maximize temperature diffusion (CM). By designing a realistic yet computationally tractable coarse-grained protein model, one can sample many reversible folding/unfolding transitions using conventional constant temperature molecular dynamics (MD), standard REMD, EE-REMD, and CM-REMD. This allows rigorous evaluation of the sampling efficiency, by directly comparing the rates of folding/unfolding transitions and convergence of various thermodynamic properties of interest. The results demonstrate that both EE and CM can indeed enhance temperature diffusion compared to standard RE, by ∼3- and over 10-fold, respectively. Surprisingly, the rates of reversible folding/unfolding transitions are similar in all three RE protocols. The convergence rates of several key thermodynamic properties, including the folding stability and various 1D and 2D free energy surfaces, are also similar. Therefore, the efficiency of RE protocols does not appear to be limited by temperature diffusion, but by the inherent rates of spontaneous large-scale conformational rearrangements. This is particularly true considering that virtually all RE simulations of proteins in practice involve exchange attempt frequencies (∼ps(-1)) that are several orders of magnitude faster than the slowest protein motions (∼μs(-1)). Our results also suggest that the efficiency of RE will not likely be improved by other protocols that aim to accelerate exchange or temperature diffusion. Instead, protocols with some types of guided tempering will likely be necessary to drive faster large-scale conformational transitions.
A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.
Alia, Osama Moh'd
2014-01-01
Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.
A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks
2014-01-01
Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060
A Passive Testing Approach for Protocols in Wireless Sensor Networks
Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing
2015-01-01
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495
A Passive Testing Approach for Protocols in Wireless Sensor Networks.
Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing
2015-11-19
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.
Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav
2017-01-03
Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.
A Simple XML Producer-Consumer Protocol
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy
2000-01-01
This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.
Random access to mobile networks with advanced error correction
NASA Technical Reports Server (NTRS)
Dippold, Michael
1990-01-01
A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.
Highly Charged Rydberg Ions from the Coulomb Explosion of Clusters
NASA Astrophysics Data System (ADS)
Komar, D.; Kazak, L.; Almassarani, M.; Meiwes-Broer, K.-H.; Tiggesbäumker, J.
2018-03-01
Ion emission from a nanoplasma produced in the interaction of intense optical laser pulses with argon clusters is studied resolving simultaneously charge states and recoil energies. By applying appropriate static electric fields we observe that a significant fraction of the ions Arq + (q =1 - 7 ) has electrons with binding energies lower than 150 meV; i.e., nRyd≥15 levels are populated. Charge state changes observed on a μ s time scale can be attributed to electron emission due to autoionizing Rydberg states, indicating that high-ℓ Rydberg levels are populated as well. The experiments support theoretical predictions that a significant fraction of delocalized electrons, which are bound with hundreds of eV to the nanoplasma after the laser exposure, fill up meV bound ion states in the adiabatic expansion. We expect the process to be relevant for the long-term evolution of expanding laser-induced dense plasmas in general.
Optimizing Decision Preparedness by Adapting Scenario Complexity and Automating Scenario Generation
NASA Technical Reports Server (NTRS)
Dunne, Rob; Schatz, Sae; Flore, Stephen M.; Nicholson, Denise
2011-01-01
Klein's recognition-primed decision (RPD) framework proposes that experts make decisions by recognizing similarities between current decision situations and previous decision experiences. Unfortunately, military personnel arQ often presented with situations that they have not experienced before. Scenario-based training (S8T) can help mitigate this gap. However, SBT remains a challenging and inefficient training approach. To address these limitations, the authors present an innovative formulation of scenario complexity that contributes to the larger research goal of developing an automated scenario generation system. This system will enable trainees to effectively advance through a variety of increasingly complex decision situations and experiences. By adapting scenario complexities and automating generation, trainees will be provided with a greater variety of appropriately calibrated training events, thus broadening their repositories of experience. Preliminary results from empirical testing (N=24) of the proof-of-concept formula are presented, and future avenues of scenario complexity research are also discussed.
Performance analysis of Aloha networks with power capture and near/far effect
NASA Astrophysics Data System (ADS)
McCartin, Joseph T.
1989-06-01
An analysis is presented for the throughput characteristics for several classes of Aloha packet networks. Specifically, the throughput for variable packet length Aloha utilizing multiple power levels to induce receiver capture is derived. The results are extended to an analysis of a selective-repeat ARQ Aloha network. Analytical results are presented which indicate a significant increase in throughput for a variable packet network implementing a random two power level capture scheme. Further research into the area of the near/far effect on Aloha networks is included. Improvements in throughput for mobile radio Aloha networks which are subject to the near/far effect are presented. Tactical Command, Control and Communications (C3) systems of the future will rely on Aloha ground mobile data networks. The incorporation of power capture and the near/far effect into future tactical networks will result in improved system analysis, design, and performance.
Deterministic secure quantum communication using a single d-level system.
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-03-22
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.
Quantum Correlations in Nonlocal Boson Sampling.
Shahandeh, Farid; Lund, Austin P; Ralph, Timothy C
2017-09-22
Determination of the quantum nature of correlations between two spatially separated systems plays a crucial role in quantum information science. Of particular interest is the questions of if and how these correlations enable quantum information protocols to be more powerful. Here, we report on a distributed quantum computation protocol in which the input and output quantum states are considered to be classically correlated in quantum informatics. Nevertheless, we show that the correlations between the outcomes of the measurements on the output state cannot be efficiently simulated using classical algorithms. Crucially, at the same time, local measurement outcomes can be efficiently simulated on classical computers. We show that the only known classicality criterion violated by the input and output states in our protocol is the one used in quantum optics, namely, phase-space nonclassicality. As a result, we argue that the global phase-space nonclassicality inherent within the output state of our protocol represents true quantum correlations.
Pepper, sweet (Capsicum annuum).
Heidmann, Iris; Boutilier, Kim
2015-01-01
Capsicum (pepper) species are economically important crops that are recalcitrant to genetic transformation by Agrobacterium (Agrobacterium tumefaciens). A number of protocols for pepper transformation have been described but are not routinely applicable. The main bottleneck in pepper transformation is the low frequency of cells that are both susceptible for Agrobacterium infection and have the ability to regenerate. Here, we describe a protocol for the efficient regeneration of transgenic sweet pepper (C. annuum) through inducible activation of the BABY BOOM (BBM) AP2/ERF transcription factor. Using this approach, we can routinely achieve a transformation efficiency of at least 0.6 %. The main improvements in this protocol are the reproducibility in transforming different genotypes and the ability to produce fertile shoots. An added advantage of this protocol is that BBM activity can be induced subsequently in stable transgenic lines, providing a novel regeneration system for clonal propagation through somatic embryogenesis.
Banothu, Janardhan; Gali, Rajitha; Velpula, Ravibabu; Bavantula, Rajitha; Crooks, Peter A.
2013-01-01
Highly efficient and eco-friendly protocol for the synthesis of bis(3-indolyl)methanes by the electrophilic substitution reaction of indole with aldehydes catalyzed by poly(4-vinylpyridinium)hydrogen sulfate was described. Excellent yields, shorter reaction times, simple work-up procedure, avoiding hazardous organic solvents, and reusability of the catalyst are the most obvious advantages of this method. PMID:24052864
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.
This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.
Multi-party Quantum Key Agreement without Entanglement
NASA Astrophysics Data System (ADS)
Cai, Bin-Bin; Guo, Gong-De; Lin, Song
2017-04-01
A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.
Efficient decentralized consensus protocols
NASA Technical Reports Server (NTRS)
Lakshman, T. V.; Agrawala, A. K.
1986-01-01
Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.
A dyadic protocol for training complex skills: a replication using female participants.
Sanchez-Ku, M L; Arthur, W
2000-01-01
The effectiveness and efficiency of the active interlocked modeling (AIM) dyadic protocol in training complex skills has been extensively demonstrated. However, past evaluation studies have all used male participants exclusively. Consequently, the present study investigated the generalizability of the effectiveness and efficiency gains to women. We randomly assigned 108 female participants to either the AIM-dyad condition or a standard individual control training condition. The results supported the robustness and viability of the AIM protocol. Although their overall performance was lower than that obtained for men in previous studies, women trained in the AIM-dyad condition performed as well as those trained in the individual condition. Thus, the efficiency gains associated with the AIM-dyad protocol, which result from the ability to train two people simultaneously to reach the same performance level as a single person with no increase in training time or machine cost, are generalizable to female participants. The applied and basic research implications of the present study are discussed within the context of well-documented male/female differences in the performance of complex psychomotor tasks. For instance, given the number of women entering the workforce and the significant proportion of women in professions previously deemed to be male-dominated (e.g., air navigation), it is reassuring to know that sex differences in task performance do not necessarily imply sex differences in the effectiveness of training protocols.
ERIC Educational Resources Information Center
Papadopoulos, Pantelis M.; Lagkas, Thomas D.; Demetriadis, Stavros N.
2012-01-01
This study provides field research evidence on the efficiency of a "free-selection" peer review assignment protocol as compared to the typically implemented "assigned-pair" protocol. The study employed 54 sophomore students who were randomly assigned into three groups: Assigned-Pair (AP) (the teacher assigns student works for review to student…
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
The Space Communications Protocol Standards Program
NASA Technical Reports Server (NTRS)
Jeffries, Alan; Hooke, Adrian J.
1994-01-01
In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
Real-time echocardiogram transmission protocol based on regions and visualization modes.
Cavero, Eva; Alesanco, Álvaro; García, José
2014-09-01
This paper proposes an Echocardiogram Transmission Protocol (ETP) for real-time end-to-end transmission of echocardiograms over IP networks. The ETP has been designed taking into account the echocardiogram characteristics of each visualized region, encoding each region according to its data type, visualization characteristics and diagnostic importance in order to improve the coding and thus the transmission efficiency. Furthermore, each region is sent separately and different error protection techniques can be used for each region. This leads to an efficient use of resources and provides greater protection for those regions with more clinical information. Synchronization is implemented for regions that change over time. The echocardiogram composition is different for each device. The protocol is valid for all echocardiogram devices thanks to the incorporation of configuration information which includes the composition of the echocardiogram. The efficiency of the ETP has been proved in terms of the number of bits sent with the proposed protocol. The codec and transmission rates used for the regions of interest have been set according to previous recommendations. Although the saving in the codified bits depends on the video composition, a coding gain higher than 7% with respect to without using ETP has been achieved.
Microplastics in seafood: Benchmark protocol for their extraction and characterization.
Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika
2016-08-01
Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies. Copyright © 2016 Elsevier Ltd. All rights reserved.
Assisted closed-loop optimization of SSVEP-BCI efficiency
Fernandez-Vargas, Jacobo; Pfaff, Hanns U.; Rodríguez, Francisco B.; Varona, Pablo
2012-01-01
We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research. PMID:23443214
Assisted closed-loop optimization of SSVEP-BCI efficiency.
Fernandez-Vargas, Jacobo; Pfaff, Hanns U; Rodríguez, Francisco B; Varona, Pablo
2013-01-01
We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research.
Phetpeng, Sukanya; Kitpipit, Thitika; Thanakiatkrai, Phuvadol
2015-07-01
Improvised explosive devices (IEDs) made from household items are encountered in terrorist attacks worldwide. Assembling an IED leaves trace DNA on its components, but deflagration degrades DNA. To maximize the amount of DNA recovered, a systematic evaluation of DNA collection methods was carried out and the most efficient methods were implemented with IED casework evidence as a validation exercise. Six swab types and six moistening agents were used to collect dried buffy coat stains on four common IED substrates. The most efficient swab/moistening agent combinations were then compared with tape-lifting using three brands of adhesive tape and also with direct DNA extraction from evidence. The most efficient collection methods for different IED substrates (post-study protocol) were then implemented for IED casework and compared with the pre-study protocol using 195 pieces of IED evidence. There was no single best swab type or moistening agent. Swab type had the largest effect on DNA recovery percentages, but moistening agents, substrates, and the interactions between factors all affected DNA recovery. The most efficient swab/moistening agent combinations performed equally well when compared with the best adhesive tape and direct extraction. The post-study protocol significantly improved STR profiles obtained from IED evidence. This paper outlines a comprehensive study of DNA collection methods for trace DNA and the validation of the most efficient collection methods with IED evidence. The findings from both parts of this study emphasize the need to continuously re-evaluate standard operating protocols with empirical studies. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Bala, Manju; Verma, Praveen Kumar; Sharma, Deepika; Kumar, Neeraj; Singh, Bikram
2015-05-01
An efficient water-catalyzed method has been developed for the synthesis of 2-substituted benzimidazoles, benzoxazoles, and benzothiazoles in one step. The present method excludes the usage of toxic metal catalysts and bases to produce benzazoles in good to excellent yields. An efficient and versatile water-mediated method has been established for the synthesis of various 2-arylbenzazoles. The present protocol excludes the usage of any catalyst and additive provided excellent selectivities and yields with high functional group tolerance for the synthesis of 2-arylated benzimidazoles, benzoxazoles, and benzothiazoles. Benzazolones were also synthesized using similar reaction protocol.
Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.
Chhor, Chloe M; Mercado, Cecilia L
2017-02-01
The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.
Efficient differentiation of mouse embryonic stem cells into motor neurons.
Wu, Chia-Yen; Whye, Dosh; Mason, Robert W; Wang, Wenlan
2012-06-09
Direct differentiation of embryonic stem (ES) cells into functional motor neurons represents a promising resource to study disease mechanisms, to screen new drug compounds, and to develop new therapies for motor neuron diseases such as spinal muscular atrophy (SMA) and amyotrophic lateral sclerosis (ALS). Many current protocols use a combination of retinoic acid (RA) and sonic hedgehog (Shh) to differentiate mouse embryonic stem (mES) cells into motor neurons. However, the differentiation efficiency of mES cells into motor neurons has only met with moderate success. We have developed a two-step differentiation protocol that significantly improves the differentiation efficiency compared with currently established protocols. The first step is to enhance the neuralization process by adding Noggin and fibroblast growth factors (FGFs). Noggin is a bone morphogenetic protein (BMP) antagonist and is implicated in neural induction according to the default model of neurogenesis and results in the formation of anterior neural patterning. FGF signaling acts synergistically with Noggin in inducing neural tissue formation by promoting a posterior neural identity. In this step, mES cells were primed with Noggin, bFGF, and FGF-8 for two days to promote differentiation towards neural lineages. The second step is to induce motor neuron specification. Noggin/FGFs exposed mES cells were incubated with RA and a Shh agonist, Smoothened agonist (SAG), for another 5 days to facilitate motor neuron generation. To monitor the differentiation of mESs into motor neurons, we used an ES cell line derived from a transgenic mouse expressing eGFP under the control of the motor neuron specific promoter Hb9. Using this robust protocol, we achieved 51 ± 0.8% of differentiation efficiency (n = 3; p < 0.01, Student's t-test). Results from immunofluorescent staining showed that GFP+ cells express the motor neuron specific markers, Islet-1 and choline acetyltransferase (ChAT). Our two-step differentiation protocol provides an efficient way to differentiate mES cells into spinal motor neurons.
How to make optimal use of maximal multipartite entanglement in clock synchronization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ren, Changliang; Hofmann, Holger F.
2014-12-04
We introduce a multi-party quantum clock synchronization protocol that makes optimal use of the maximal multipartite entanglement of GHZ-type states. The measurement statistics of the protocol are analyzed and the efficiency is evaluated.
A fast and mild decellularization protocol for obtaining extracellular matrix.
Mirzarafie, Ariana; Grainger, Rhian K; Thomas, Ben; Bains, William; Ustok, Fatma I; Lowe, Chris R
2014-04-01
Degradation of extracellular matrix (ECM) function with age is a major cause of loss of tissue function with age that we would wish to reverse. Tissue engineering to provide replacement tissue requires an ECM-mimicking scaffold for cell organization. The standard protocols for achieving this take 10 days and include steps that may change the protein structure of the ECM. Here we describe a much shorter protocol for decellularizing chicken muscle, skin, and tendon samples that achieves the same efficiency as the original protocol without protein cross-link interference. Our protocol can be completed in 72 hr.
Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation
NASA Astrophysics Data System (ADS)
Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min
2016-05-01
In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.
Multi-Hop Teleportation of an Unknown Qubit State Based on W States
NASA Astrophysics Data System (ADS)
Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen
2018-04-01
Quantum teleportation is important in quantum communication networks. Considering that quantum state information is also transmitted between two distant nodes, intermediated nodes are employed and two multi-hop teleportation protocols based on W state are proposed. One is hop-by-hop teleportation protocol and the other is the improved multi-hop teleportation protocol with centralized unitary transformation. In hop-by-hop protocol, the transmitted quantum state needs to be recovered at every node on the route. In improved multi-hop teleportation protocol with centralized unitary transformation, intermediate nodes need not to recover the transmitted quantum state. Compared to the hop-by-hop protocol, the improved protocol can reduce the transmission delay and improve the transmission efficiency.
Komaroff, A L; Flatley, M; Browne, C; Sherman, H; Fineberg, S E; Knopp, R H
1976-04-01
Briefly trained physicians assistants using protocols (clinical algorithms) for diabetes, hypertension, and related chronic arteriosclerotic and hypertensive heart disease abstrated information from the medical record and obtained history and physical examination data on every patient-visit to a city hospital chronic disease clinic over a 18-month period. The care rendered by the protocol system was compared with care rendered by a "traditional" system in the same clinic in which physicians delegated few clinical tasks. Increased thoroughness in collecting clinical data in the protocol system led to an increase in the recognition of new pathology. Outcome criteria reflected equivalent quality of care in both groups. Efficiency time-motion studies demonstrated a 20 per cent saving in physician time with the protocol system. Coct estimates, based on the time spent with patients by various providers and on the laboratory-test-ordering patterns, demonstrated equivalent costs of the two systems, given optimal staffing patterns. Laboratory tests were a major element of the cost of patient care,and the clinical yield per unit cost of different tests varied widely.
Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...
2016-06-01
Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.
Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less
Pithioux, Martine; Roseren, Flavy; Jalain, Christian; Launay, Franck; Charpiot, Philippe; Chabrand, Patrick; Roffino, Sandrine; Lamy, Edouard
2017-10-23
This protocol describes the use of a newly developed external fixator for distraction osteogenesis in a rat femoral model. Distraction osteogenesis (DO) is a surgical technique leading to bone regeneration after an osteotomy. The osteotomized extremities are moved away from each other by gradual distraction to reach the desired elongation. This procedure is widely used in humans for lower and upper limb lengthening, treatment after a bone nonunion, or the regeneration of a bone defect following surgery for bone tumor excision, as well as in maxillofacial reconstruction. Only a few studies clearly demonstrate the efficiency of their protocol in obtaining a functional regenerated bone, i.e., bone that will support physiological weight-bearing without fracture after removal of the external fixator. Moreover, protocols for DO vary and reproducibility is limited by lack of information, making comparison between studies difficult. The aim of this study was to develop a reproducible protocol comprising an appropriate external fixator design for rat limb lengthening, with a detailed surgical technique that permits physiological weight-bearing by the animal after removal of the external fixator.
A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.
Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang
2017-08-08
Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.
Al-Majid, Abdullah M.; Barakat, Assem; AL-Najjar, Hany J.; Mabkhot, Yahia N.; Ghabbour, Hazem A.; Fun, Hoong-Kun
2013-01-01
A simple protocol, involving the green synthesis for the construction of novel bis-pyrimidine derivatives, 3a–i and 4a–e are accomplished by the aqueous diethylamine media promoted tandem Aldol-Michael reaction between two molecules of barbituric acid derivatives 1a,b with various aldehydes. This efficient synthetic protocol using an economic and environmentally friendly reaction media with versatility and shorter reaction time provides bis-pyrimidine derivatives with high yields (88%–99%). PMID:24317435
Sawtell, Nancy M; Thompson, Richard L
2014-01-01
Two important components to a useful strategy to examine viral gene regulation in vivo are (1) a highly efficient protocol to generate viral mutants that limits undesired mutation and retains full replication competency in vivo and (2) an efficient system to detect and quantify viral promoter activity in rare cells in vivo. Our strategy and protocols for generating, characterizing, and employing HSV viral promoter/reporter mutants in vivo are provided in this two-part chapter.
Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-05-18
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.
Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-01-01
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686
NASA Astrophysics Data System (ADS)
Rodrigues, Diego S.; Mancera, Paulo F. A.; Pinho, Suani T. R.
2016-12-01
Despite the current and increasingly successful fight against cancer, there are some important questions concerning the efficiency of its treatment - in particular, the design of oncology chemotherapy protocols. Seeking efficiency, schedules based on more frequent, low-doses of drugs, known as metronomic chemotherapy, have been proposed as an alternative to the classical standard protocol of chemotherapy administration. The in silico approach may be very useful for providing a comparative analysis of these two kinds of protocols. In so doing, we found that metronomic schedules are more effective in eliminating tumour cells mainly due to their chemotherapeutic action on endothelial cells and that more frequent, low drug doses also entail outcomes in which the survival time of patient is increased.
ASCOT: a text mining-based web-service for efficient search and assisted creation of clinical trials
2012-01-01
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols. PMID:22595088
Sabbadini, Silvia; Pandolfini, Tiziana; Girolomini, Luca; Molesini, Barbara; Navacchi, Oriano
2015-01-01
Until now, the application of genetic transformation techniques in peach has been limited by the difficulties in developing efficient regeneration and transformation protocols. Here we describe an efficient regeneration protocol for the commercial micropropagation of GF677 rootstock (Prunus persica × Prunus amygdalus). The method is based on the production, via organogenesis, of meristematic bulk tissues characterized by a high competence for shoot regeneration. This protocol has also been used to obtain GF677 plants genetically engineered with an empty hairpin cassette (hereafter indicated as hp-pBin19), through Agrobacterium tumefaciens-mediated transformation. After 7-8 months of selection on media containing kanamycin, we obtained two genetically modified GF677 lines. PCR and Southern blot analyses were performed to confirm the genetic status.
Korkontzelos, Ioannis; Mu, Tingting; Ananiadou, Sophia
2012-04-30
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols.
Building a generalized distributed system model
NASA Technical Reports Server (NTRS)
Mukkamala, R.
1992-01-01
The key elements in the second year (1991-92) of our project are: (1) implementation of the distributed system prototype; (2) successful passing of the candidacy examination and a PhD proposal acceptance by the funded student; (3) design of storage efficient schemes for replicated distributed systems; and (4) modeling of gracefully degrading reliable computing systems. In the third year of the project (1992-93), we propose to: (1) complete the testing of the prototype; (2) enhance the functionality of the modules by enabling the experimentation with more complex protocols; (3) use the prototype to verify the theoretically predicted performance of locking protocols, etc.; and (4) work on issues related to real-time distributed systems. This should result in efficient protocols for these systems.
Protocol Independent Adaptive Route Update for VANET
Rasheed, Asim; Qayyum, Amir
2014-01-01
High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption
NASA Astrophysics Data System (ADS)
Poh, Geong Sen; Martin, Keith M.
Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distributor to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant gains in computational and operational efficiency.
Efficient Group Coordination in Multicast Trees
2001-01-01
describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast
Pruritus is a common feature in sheep infected with the BSE agent
Konold, Timm; Bone, Gemma; Vidal-Diez, Alberto; Tortosa, Raul; Davis, Andrew; Dexter, Glenda; Hill, Peter; Jeffrey, Martin; Simmons, Marion M; Chaplin, Melanie J; Bellworthy, Susan J; Berthelin-Baker, Christine
2008-01-01
Background The variability in the clinical or pathological presentation of transmissible spongiform encephalopathies (TSEs) in sheep, such as scrapie and bovine spongiform encephalopathy (BSE), has been attributed to prion protein genotype, strain, breed, clinical duration, dose, route and type of inoculum and the age at infection. The study aimed to describe the clinical signs in sheep infected with the BSE agent throughout its clinical course to determine whether the clinical signs were as variable as described for classical scrapie in sheep. The clinical signs were compared to BSE-negative sheep to assess if disease-specific clinical markers exist. Results Forty-seven (34%) of 139 sheep, which comprised 123 challenged sheep and 16 undosed controls, were positive for BSE. Affected sheep belonged to five different breeds and three different genotypes (ARQ/ARQ, VRQ/VRQ and AHQ/AHQ). None of the controls or BSE exposed sheep with ARR alleles were positive. Pruritus was present in 41 (87%) BSE positive sheep; the remaining six were judged to be pre-clinically infected. Testing of the response to scratching along the dorsum of a sheep proved to be a good indicator of clinical disease with a test sensitivity of 85% and specificity of 98% and usually coincided with weight loss. Clinical signs that were displayed significantly earlier in BSE positive cases compared to negative cases were behavioural changes, pruritic behaviour, a positive scratch test, alopecia, skin lesions, teeth grinding, tremor, ataxia, loss of weight and loss of body condition. The frequency and severity of each specific clinical sign usually increased with the progression of disease over a period of 16–20 weeks. Conclusion Our results suggest that BSE in sheep presents with relatively uniform clinical signs, with pruritus of increased severity and abnormalities in behaviour or movement as the disease progressed. Based on the studied sheep, these clinical features appear to be independent of breed, affected genotype, dose, route of inoculation and whether BSE was passed into sheep from cattle or from other sheep, suggesting that the clinical phenotype of BSE is influenced by the TSE strain more than by other factors. The clinical phenotype of BSE in the genotypes and breed studied was indistinguishable from that described for classical scrapie cases. PMID:18445253
A new quantum sealed-bid auction protocol with secret order in post-confirmation
NASA Astrophysics Data System (ADS)
Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian
2015-10-01
A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.
NASA Astrophysics Data System (ADS)
Giorda, Paolo; Allegra, Michele
2017-07-01
Understanding how correlations can be used for quantum communication protocols is a central goal of quantum information science. While many authors have linked the global measures of correlations such as entanglement or discord to the performance of specific protocols, in general the latter may require only correlations between specific observables. In this work, we first introduce a general measure of correlations for two-qubit states, based on the classical mutual information between local observables. Our measure depends on the state’s purity and the symmetry in the correlation distribution, according to which we provide a classification of maximally mixed marginal states (MMMS). We discuss the complementarity relation between correlations and coherence. By focusing on a simple yet paradigmatic example, i.e. the remote state preparation protocol, we introduce a method to systematically define the proper protocol-tailored measures of the correlations. The method is based on the identification of those correlations that are relevant (useful) for the protocol. On the one hand, the approach allows the role of the symmetry of the correlation distribution to be discussed in determining the efficiency of the protocol, both for MMMS and general two-qubit quantum states, and on the other hand, it allows an optimized protocol for non-MMMS to be devised, which is more efficient with respect to the standard one. Overall, our findings clarify how the key resources in simple communication protocols are the purity of the state used and the symmetry of the correlation distribution.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
Energy-Aware RFID Anti-Collision Protocol.
Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos
2018-06-11
The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.
Silva, D V; Branco, S M J; Holanda, I S A; Royaert, S; Motamayor, J C; Marelli, J P; Corrêa, R X
2016-03-04
Theobroma cacao is a species of great economic importance with its beans used for chocolate production. The tree has been a target of various molecular studies. It contains many polyphenols, which complicate the extraction of nucleic acids with the extraction protocols requiring a large amount of plant material. These issues, therefore, necessitate the optimization of the protocols. The aim of the present study was to evaluate different methods for extraction of total RNA from shoot apical meristems of T. cacao 'CCN 51' and to assess the influence of storage conditions for the meristems on the extraction. The study also aimed to identify the most efficient protocol for RNA extraction using a small amount of plant material. Four different protocols were evaluated for RNA extraction using one shoot apical meristem per sample. Among these protocols, one that was more efficient was then tested to extract RNA using four different numbers of shoot apical meristems, subjected to three different storage conditions. The best protocol was tested for cDNA amplification using reverse transcription-polymerase chain reaction; the cDNA quality was determined to be satisfactory for molecular analyses. The study revealed that with the best RNA extraction protocol, one shoot apical meristem was sufficient for extraction of high-quality total RNA. The results obtained might enable advances in genetic analyses and molecular studies using reduced amount of plant material.
A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.
Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker
2013-12-01
Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.
Deterministic entanglement distillation for secure double-server blind quantum computation.
Sheng, Yu-Bo; Zhou, Lan
2015-01-15
Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.
Deterministic entanglement distillation for secure double-server blind quantum computation
Sheng, Yu-Bo; Zhou, Lan
2015-01-01
Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565
Recyclable amplification for single-photon entanglement from photon loss and decoherence
NASA Astrophysics Data System (ADS)
Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo
2018-01-01
We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.
Alam, Pravej; Khan, Zainul Abdeen; Abdin, Malik Zainul; Khan, Jawaid A; Ahmad, Parvaiz; Elkholy, Shereen F; Sharaf-Eldin, Mahmoud A
2017-05-01
Catharanthus roseus is an important medicinal plant known for its pharmacological qualities such as antimicrobial, anticancerous, antifeedant, antisterility, antidiabetic activities. More than 130 bioactive compounds like vinblastine, vindoline and vincristine have been synthesized in this plant. Extensive studies have been carried out for optimization regeneration and transformation protocols. Most of the protocol described are laborious and time-consuming. Due to sophisticated protocol of regeneration and genetic transformation, the production of these bioactive molecules is less and not feasible to be commercialized worldwide. Here we have optimized the efficient protocol for regeneration and transformation to minimize the time scale and enhance the transformation frequency through Agrobacterium and sonication-assisted transformation (SAAT) method. In this study, hypocotyl explants responded best for maximal production of transformed shoots. The callus percentage were recorded 52% with 1.0 mg L -1 (BAP) and 0.5 mg L -1 (NAA) while 80% shoot percentage obtained with 4.0 mg L -1 (BAP) and 0.05 mg L -1 (NAA). The microscopic studies revealed that the expression of GFP was clearly localized in leaf tissue of the C. roseus after transformation of pRepGFP0029 construct. Consequently, transformation efficiency was revealed on the basis of GFP localization. The transformation efficiency of SAAT method was 6.0% comparable to 3.5% as conventional method. Further, PCR analysis confirmed the integration of the nptII gene in the transformed plantlets of C. roseus.
Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor
2016-02-24
In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption.
Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor
2016-01-01
In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption. PMID:26927104
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng
2018-04-01
With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
Optimization and evaluation of single-cell whole-genome multiple displacement amplification.
Spits, C; Le Caignec, C; De Rycke, M; Van Haute, L; Van Steirteghem, A; Liebaers, I; Sermon, K
2006-05-01
The scarcity of genomic DNA can be a limiting factor in some fields of genetic research. One of the methods developed to overcome this difficulty is whole genome amplification (WGA). Recently, multiple displacement amplification (MDA) has proved very efficient in the WGA of small DNA samples and pools of cells, the reaction being catalyzed by the phi29 or the Bst DNA polymerases. The aim of the present study was to develop a reliable, efficient, and fast protocol for MDA at the single-cell level. We first compared the efficiency of phi29 and Bst polymerases on DNA samples and single cells. The phi29 polymerase generated accurately, in a short time and from a single cell, sufficient DNA for a large set of tests, whereas the Bst enzyme showed a low efficiency and a high error rate. A single-cell protocol was optimized using the phi29 polymerase and was evaluated on 60 single cells; the DNA obtained DNA was assessed by 22 locus-specific PCRs. This new protocol can be useful for many applications involving minute quantities of starting material, such as forensic DNA analysis, prenatal and preimplantation genetic diagnosis, or cancer research. (c) 2006 Wiley-Liss, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Simons, George; Barsun, Stephan
The main focus of most evaluations is to determine the energy-savings impacts of the installed measure. This protocol defines a combined heat and power (CHP) measure as a system that sequentially generates both electrical energy and useful thermal energy from one fuel source at a host customer's facility or residence. This protocol is aimed primarily at regulators and administrators of ratepayer-funded CHP programs; however, project developers may find the protocol useful to understand how CHP projects are evaluated.
Operating systems and network protocols for wireless sensor networks.
Dutta, Prabal; Dunkels, Adam
2012-01-13
Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.
Secure multiparty computation of a comparison problem.
Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang
2016-01-01
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.
Improvements of Quantum Private Comparison Protocol Based on Cluster States
NASA Astrophysics Data System (ADS)
Zhou, Ming-Kuai
2018-01-01
Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.
Kinetic and potential sputtering of an anorthite-like glassy thin film
NASA Astrophysics Data System (ADS)
Hijazi, H.; Bannister, M. E.; Meyer, H. M.; Rouleau, C. M.; Meyer, F. W.
2017-07-01
In this paper, we present measurements of He+ and He+2 ion-induced sputtering of an anorthite-like thin film at a fixed solar wind-relevant impact energy of 0.5 keV/amu using a quartz crystal microbalance approach (QCM) for determination of total absolute sputtering yields. He+2 ions are the most abundant multicharged ions in the solar wind, and increased sputtering by these ions in comparison to equivelocity He+ ions is expected to have the biggest effect on the overall sputtering efficiency of solar wind impact on the Moon. Our measurements indicate an almost 70% increase of the sputtering yield for doubly charged incident He ions compared to that for same velocity He+ impact (14.6 amu/ion for He+2 vs. 8.7 amu/ion for He+). Using a selective sputtering model, the new QCM results presented here, together with previously published results for Ar+q ions and SRIM results for the relevant kinetic-sputtering yields, the effect due to multicharged-solar-wind-ion impact on local near-surface modification of lunar anorthite-like soil is explored. It is shown that the multicharged-solar-wind component leads to a more pronounced and significant differentiation of depleted and enriched surface elements as well as a shortening of the timescale over which such surface-compositional modifications might occur in astrophysical settings. In addition, to validate previous and future determinations of multicharged-ion-induced sputtering enhancement for those cases where the QCM approach cannot be used, relative quadrupole mass spectrometry (QMS)-based measurements are presented for the same anorthite-like thin film as were investigated by QCM, and their suitability and limitations for charge state-enhanced yield measurements are discussed.
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-01-01
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384
Accurate, Streamlined Analysis of mRNA Translation by Sucrose Gradient Fractionation
Aboulhouda, Soufiane; Di Santo, Rachael; Therizols, Gabriel; Weinberg, David
2017-01-01
The efficiency with which proteins are produced from mRNA molecules can vary widely across transcripts, cell types, and cellular states. Methods that accurately assay the translational efficiency of mRNAs are critical to gaining a mechanistic understanding of post-transcriptional gene regulation. One way to measure translational efficiency is to determine the number of ribosomes associated with an mRNA molecule, normalized to the length of the coding sequence. The primary method for this analysis of individual mRNAs is sucrose gradient fractionation, which physically separates mRNAs based on the number of bound ribosomes. Here, we describe a streamlined protocol for accurate analysis of mRNA association with ribosomes. Compared to previous protocols, our method incorporates internal controls and improved buffer conditions that together reduce artifacts caused by non-specific mRNA–ribosome interactions. Moreover, our direct-from-fraction qRT-PCR protocol eliminates the need for RNA purification from gradient fractions, which greatly reduces the amount of hands-on time required and facilitates parallel analysis of multiple conditions or gene targets. Additionally, no phenol waste is generated during the procedure. We initially developed the protocol to investigate the translationally repressed state of the HAC1 mRNA in S. cerevisiae, but we also detail adapted procedures for mammalian cell lines and tissues. PMID:29170751
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-05-19
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.
Tumeh, Paul C; Koya, Richard C; Chodon, Thinle; Graham, Nicholas A; Graeber, Thomas G; Comin-Anduix, Begoña; Ribas, Antoni
2010-10-01
Optimized conditions for the ex vivo activation, genetic manipulation, and expansion of human lymphocytes for adoptive cell therapy may lead to protocols that maximize their in vivo function. We analyzed the effects of 4 clinical grade activation and expansion protocols over 3 weeks on cell proliferative rate, immunophenotype, cell metabolism, and transduction efficiency of human peripheral blood mononuclear cells (PBMCs). Peak lentiviral transduction efficiency was early (days 2 to 4), at a time when cells showed a larger size, maximal uptake of metabolic substrates, and the highest level of proximal T-cell receptor signaling engagement. Anti-CD2/3/28 activation beads induced greater proliferation rate and skewed PBMCs early on to a CD4 phenotype when compared with the cells cultured in OKT3. Multicolor surface phenotyping demonstrated that changes in T-cell surface markers that define T-cell functional phenotypes were dependent on the time spent in culture as opposed to the particular activation protocol. In conclusion, ex vivo activation of human PBMCs for adoptive cell therapy demonstrate defined immunophenotypic and functional signatures over time, with cells early on showing larger sizes, higher transduction efficiency, maximal metabolic activity, and zeta-chain-associated protein-70 activation.
Tumeh, Paul C.; Koya, Richard C.; Chodon, Thinle; Graham, Nicholas A.; Graeber, Thomas G.; Comin-Anduix, Begoña; Ribas, Antoni
2011-01-01
Optimized conditions for the ex vivo activation, genetic manipulation, and expansion of human lymphocytes for adoptive cell therapy (ACT) may lead to protocols that maximize their in vivo function. We analyzed the effects of four clinical grade activation and expansion protocols over three weeks on cell proliferative rate, immunophenotype, cell metabolism, and transduction efficiency of human peripheral blood mononuclear cells (PBMCs). Peak lentiviral transduction efficiency was early (days 2 to 4), at a time when cells demonstrated a larger size, maximal uptake of metabolic substrates, and the highest level of proximal TCR signaling engagement. Anti-CD2/3/28 activation beads induced greater proliferation rate and skewed PBMCs early on to a CD4 phenotype when compared to the cells cultured in OKT3. Multicolor surface phenotyping demonstrated that changes in T cell surface markers that define T cell functional phenotypes were dependent on the time spent in culture as opposed to the particular activation protocol. In conclusion, ex vivo activation of human PBMCs for ACT demonstrate defined immunophenotypic and functional signatures over time, with cells early on showing larger sizes, higher transduction efficiency, maximal metabolic activity and ZAP-70 activation. PMID:20842061
SELECTING PLANT SPECIES FOR PESTICIDE REGISTRATION TESTS
Current test protocols used by the US EPA for the registration of pesticides examines plant responses of 10 crop species but may not examine regionally important native plants or crops. In order to test the efficiency of current test protocols we selected six native plant species...
A protocol for the health and fitness assessment of NBA players.
Scheller, A; Rask, B
1993-04-01
The assessment of the health and fitness of elite basketball players should be a multidisciplinary process. We have described an organized, efficient, and comprehensive protocol for preseason physical evaluations that could be used at the university as well as professional level.
Deterministic secure quantum communication using a single d-level system
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557
Research on TCP/IP network communication based on Node.js
NASA Astrophysics Data System (ADS)
Huang, Jing; Cai, Lixiong
2018-04-01
In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
Shahrisa, Aziz; Teimuri-Mofrad, Reza; Gholamhosseini-Nazari, Mahdi
2015-02-01
A variety of organocatalysts has been screened for the synthesis of arylaminonaphthols. It has been shown that (N,N-dimethylethanolamine) is a highly efficient organocatalyst for the direct synthesis of a novel class of arylaminonaphthols via three-component condensation of 2-naphthol, aldehydes, and arylamines under solvent-free conditions. Mild, one-pot, and green reaction conditions, relatively short reaction times and good yields make this protocol highly significant. 25 new compounds have been synthesized by this method.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allen, David James; Hedrick, Charles D.; Martinez, Ruben
This report documents tests conducted by Sandia National Laboratories (SNL) on behalf of the U.S. Department of State to evaluate a temporary anti-personnel (TAP) barrier system developed by Mitigation Technologies. For this, the SNL Denial and Structural Assessment department developed a test protocol for the evaluation of the TAP barrier system on the basis of deployment efficiency and barrier effectiveness against a riotous/mob attack threat. The test protocol was then executed by SNL personnel and the results of the testing are documented.
Perfect joint remote state preparation of arbitrary six-qubit cluster-type states
NASA Astrophysics Data System (ADS)
Choudhury, Binayak S.; Samanta, Soumen
2018-07-01
In this paper, a joint remote state preparation protocol, which is applicable to six-qubit cluster states, is presented. The scheme is performed with the help of three quantum channels constituted by eight qubits. A new index of efficiency for JRSP protocols is defined. A comparison is made with the existing similar schemes from which it is concluded that the present scheme utilizes its resources more efficiently. The work is a part of the line of research on transfer and remote preparation of entanglement.
Balan, Daniela; Adolfsson, Hans
2002-04-05
The direct formation of alpha-methylene-beta-amino acid derivatives is achieved using the aza version of the Baylis-Hillman protocol. The products are readily formed in a three-component one-pot reaction between arylaldehydes, sulfonamides, and alpha,beta-unsaturated carbonyl compounds. The reaction is efficiently catalyzed by titanium isopropoxide and 2-hydroxyquinuclidine in the presence of molecular sieves. The protocol allows for structural variation of the substrates, tolerating electron-poor and electron-rich arylaldehydes and various Michael acceptors.
Crispr-mediated Gene Targeting of Human Induced Pluripotent Stem Cells.
Byrne, Susan M; Church, George M
2015-01-01
CRISPR/Cas9 nuclease systems can create double-stranded DNA breaks at specific sequences to efficiently and precisely disrupt, excise, mutate, insert, or replace genes. However, human embryonic stem or induced pluripotent stem cells (iPSCs) are more difficult to transfect and less resilient to DNA damage than immortalized tumor cell lines. Here, we describe an optimized protocol for genome engineering of human iPSCs using a simple transient transfection of plasmids and/or single-stranded oligonucleotides. With this protocol, we achieve transfection efficiencies greater than 60%, with gene disruption efficiencies from 1-25% and gene insertion/replacement efficiencies from 0.5-10% without any further selection or enrichment steps. We also describe how to design and assess optimal sgRNA target sites and donor targeting vectors; cloning individual iPSC by single cell FACS sorting, and genotyping successfully edited cells.
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
Zhang, Zezhong; Qi, Qingqing
2014-05-01
Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.
An energy-aware routing protocol for query-based applications in wireless sensor networks.
Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.
An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks
Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Seo, Eunhui; Kang, Hwansu; Lim, Oh-Kyung; Jun, Hee-Sook
2018-05-24
Mature skeletal muscle cells cannot be expanded in culture systems. Therefore, it is difficult to construct an in vitro model for muscle diseases. To establish an efficient protocol for myogenic differentiation of human adipose tissue-derived stem cells (hADSCs), we investigated whether addition of IL-6 and/or myocyte-conditioned media (CM) to conventional differentiation media can shorten the differentiation period. hADSCs were differentiated to myocytes using the conventional protocol or modified with the addition of 25 pg/mL IL-6 and/or C2C12 CM (25% v / v ). The expression of MyoD and myogenine mRNA was significantly higher at 5⁻6 days after differentiation using the modified protocol than with the conventional protocol. mRNA and protein expression of myosin heavy chain, a marker of myotubes, was significantly upregulated at 28 and 42 days of differentiation using the modified protocol, and the level achieved after a 4-week differentiation period was similar to that achieved at 6 weeks using the conventional protocol. The expression of p-STAT3 was significantly increased when the modified protocol was used. Similarly, addition of colivelin, a STAT3 activator, instead of IL-6 and C2C12 CM, promoted the myogenic differentiation of ADSCs. The modified protocol improved differentiation efficiency and reduced the time required for differentiation of myocytes. It might be helpful to save cost and time when preparing myocytes for cell therapies and drug discovery.
Zhang, Zheshen; Voss, Paul L
2009-07-06
We propose a continuous variable based quantum key distribution protocol that makes use of discretely signaled coherent light and reverse error reconciliation. We present a rigorous security proof against collective attacks with realistic lossy, noisy quantum channels, imperfect detector efficiency, and detector electronic noise. This protocol is promising for convenient, high-speed operation at link distances up to 50 km with the use of post-selection.
FD/DAMA Scheme For Mobile/Satellite Communications
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.
1992-01-01
Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.
Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman
2008-08-04
Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks
Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang
2017-01-01
Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs. PMID:28786915
Effects of protocol step length on biomechanical measures in swimming.
Barbosa, Tiago M; de Jesus, Kelly; Abraldes, J Arturo; Ribeiro, João; Figueiredo, Pedro; Vilas-Boas, João Paulo; Fernandes, Ricardo J
2015-03-01
The assessment of energetic and mechanical parameters in swimming often requires the use of an intermittent incremental protocol, whose step lengths are corner stones for the efficiency of the evaluation procedures. To analyze changes in swimming kinematics and interlimb coordination behavior in 3 variants, with different step lengths, of an intermittent incremental protocol. Twenty-two male swimmers performed n×di variants of an intermittent and incremental protocol (n≤7; d1=200 m, d2=300 m, and d3=400 m). Swimmers were videotaped in the sagittal plane for 2-dimensional kinematical analysis using a dual-media setup. Video images were digitized with a motion-capture system. Parameters that were assessed included the stroke kinematics, the segmental and anatomical landmark kinematics, and interlimb coordination. Movement efficiency was also estimated. There were no significant variations in any of the selected variables according to the step lengths. A high to very high relationship was observed between step lengths. The bias was much reduced and the 95%CI fairly tight. Since there were no meaningful differences between the 3 protocol variants, the 1 with shortest step length (ie, 200 m) should be adopted for logistical reasons.
Droplet-based pyrosequencing using digital microfluidics.
Boles, Deborah J; Benton, Jonathan L; Siew, Germaine J; Levy, Miriam H; Thwar, Prasanna K; Sandahl, Melissa A; Rouse, Jeremy L; Perkins, Lisa C; Sudarsan, Arjun P; Jalili, Roxana; Pamula, Vamsee K; Srinivasan, Vijay; Fair, Richard B; Griffin, Peter B; Eckhardt, Allen E; Pollack, Michael G
2011-11-15
The feasibility of implementing pyrosequencing chemistry within droplets using electrowetting-based digital microfluidics is reported. An array of electrodes patterned on a printed-circuit board was used to control the formation, transportation, merging, mixing, and splitting of submicroliter-sized droplets contained within an oil-filled chamber. A three-enzyme pyrosequencing protocol was implemented in which individual droplets contained enzymes, deoxyribonucleotide triphosphates (dNTPs), and DNA templates. The DNA templates were anchored to magnetic beads which enabled them to be thoroughly washed between nucleotide additions. Reagents and protocols were optimized to maximize signal over background, linearity of response, cycle efficiency, and wash efficiency. As an initial demonstration of feasibility, a portion of a 229 bp Candida parapsilosis template was sequenced using both a de novo protocol and a resequencing protocol. The resequencing protocol generated over 60 bp of sequence with 100% sequence accuracy based on raw pyrogram levels. Excellent linearity was observed for all of the homopolymers (two, three, or four nucleotides) contained in the C. parapsilosis sequence. With improvements in microfluidic design it is expected that longer reads, higher throughput, and improved process integration (i.e., "sample-to-sequence" capability) could eventually be achieved using this low-cost platform.
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Droplet-Based Pyrosequencing Using Digital Microfluidics
Boles, Deborah J.; Benton, Jonathan L.; Siew, Germaine J.; Levy, Miriam H.; Thwar, Prasanna K.; Sandahl, Melissa A.; Rouse, Jeremy L.; Perkins, Lisa C.; Sudarsan, Arjun P.; Jalili, Roxana; Pamula, Vamsee K.; Srinivasan, Vijay; Fair, Richard B.; Griffin, Peter B.; Eckhardt, Allen E.; Pollack, Michael G.
2013-01-01
The feasibility of implementing pyrosequencing chemistry within droplets using electrowetting-based digital microfluidics is reported. An array of electrodes patterned on a printed-circuit board was used to control the formation, transportation, merging, mixing, and splitting of submicroliter-sized droplets contained within an oil-filled chamber. A three-enzyme pyrosequencing protocol was implemented in which individual droplets contained enzymes, deoxyribonucleotide triphosphates (dNTPs), and DNA templates. The DNA templates were anchored to magnetic beads which enabled them to be thoroughly washed between nucleotide additions. Reagents and protocols were optimized to maximize signal over background, linearity of response, cycle efficiency, and wash efficiency. As an initial demonstration of feasibility, a portion of a 229 bp Candida parapsilosis template was sequenced using both a de novo protocol and a resequencing protocol. The resequencing protocol generated over 60 bp of sequence with 100% sequence accuracy based on raw pyrogram levels. Excellent linearity was observed for all of the homopolymers (two, three, or four nucleotides) contained in the C. parapsilosis sequence. With improvements in microfluidic design it is expected that longer reads, higher throughput, and improved process integration (i.e., “sample-to-sequence” capability) could eventually be achieved using this low-cost platform. PMID:21932784
An Energy Balanced and Lifetime Extended Routing Protocol for Underwater Sensor Networks.
Wang, Hao; Wang, Shilian; Zhang, Eryang; Lu, Luxi
2018-05-17
Energy limitation is an adverse problem in designing routing protocols for underwater sensor networks (UWSNs). To prolong the network lifetime with limited battery power, an energy balanced and efficient routing protocol, called energy balanced and lifetime extended routing protocol (EBLE), is proposed in this paper. The proposed EBLE not only balances traffic loads according to the residual energy, but also optimizes data transmissions by selecting low-cost paths. Two phases are operated in the EBLE data transmission process: (1) candidate forwarding set selection phase and (2) data transmission phase. In candidate forwarding set selection phase, nodes update candidate forwarding nodes by broadcasting the position and residual energy level information. The cost value of available nodes is calculated and stored in each sensor node. Then in data transmission phase, high residual energy and relatively low-cost paths are selected based on the cost function and residual energy level information. We also introduce detailed analysis of optimal energy consumption in UWSNs. Numerical simulation results on a variety of node distributions and data load distributions prove that EBLE outperforms other routing protocols (BTM, BEAR and direct transmission) in terms of network lifetime and energy efficiency.
NASA Astrophysics Data System (ADS)
Armeli Minicante, S.; Ambrosi, E.; Back, M.; Barichello, J.; Cattaruzza, E.; Gonella, F.; Scantamburlo, E.; Trave, E.
2016-07-01
Seaweeds are a reserve of natural dyes (chlorophylls a, b and c), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts.
An Efficient Method for Generation of Knockout Human Embryonic Stem Cells Using CRISPR/Cas9 System.
Bohaciakova, Dasa; Renzova, Tereza; Fedorova, Veronika; Barak, Martin; Kunova Bosakova, Michaela; Hampl, Ales; Cajanek, Lukas
2017-11-01
Human embryonic stem cells (hESCs) represent a promising tool to study functions of genes during development, to model diseases, and to even develop therapies when combined with gene editing techniques such as CRISPR/CRISPR-associated protein-9 nuclease (Cas9) system. However, the process of disruption of gene expression by generation of null alleles is often inefficient and tedious. To circumvent these limitations, we developed a simple and efficient protocol to permanently downregulate expression of a gene of interest in hESCs using CRISPR/Cas9. We selected p53 for our proof of concept experiments. The methodology is based on series of hESC transfection, which leads to efficient downregulation of p53 expression even in polyclonal population (p53 Low cells), here proven by a loss of regulation of the expression of p53 target gene, microRNA miR-34a. We demonstrate that our approach achieves over 80% efficiency in generating hESC clonal sublines that do not express p53 protein. Importantly, we document by a set of functional experiments that such genetically modified hESCs do retain typical stem cells characteristics. In summary, we provide a simple and robust protocol to efficiently target expression of gene of interest in hESCs that can be useful for laboratories aiming to employ gene editing in their hESC applications/protocols.
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-01-01
Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326
2012-11-01
that mobile application developers should reconsider implementing garbled circuits due to their extreme resource usage, and instead rely upon our equivalently secure and significantly more efficient alternative.
Tschiersch, Henning; Junker, Astrid; Meyer, Rhonda C; Altmann, Thomas
2017-01-01
Automated plant phenotyping has been established as a powerful new tool in studying plant growth, development and response to various types of biotic or abiotic stressors. Respective facilities mainly apply non-invasive imaging based methods, which enable the continuous quantification of the dynamics of plant growth and physiology during developmental progression. However, especially for plants of larger size, integrative, automated and high throughput measurements of complex physiological parameters such as photosystem II efficiency determined through kinetic chlorophyll fluorescence analysis remain a challenge. We present the technical installations and the establishment of experimental procedures that allow the integrated high throughput imaging of all commonly determined PSII parameters for small and large plants using kinetic chlorophyll fluorescence imaging systems (FluorCam, PSI) integrated into automated phenotyping facilities (Scanalyzer, LemnaTec). Besides determination of the maximum PSII efficiency, we focused on implementation of high throughput amenable protocols recording PSII operating efficiency (Φ PSII ). Using the presented setup, this parameter is shown to be reproducibly measured in differently sized plants despite the corresponding variation in distance between plants and light source that caused small differences in incident light intensity. Values of Φ PSII obtained with the automated chlorophyll fluorescence imaging setup correlated very well with conventionally determined data using a spot-measuring chlorophyll fluorometer. The established high throughput operating protocols enable the screening of up to 1080 small and 184 large plants per hour, respectively. The application of the implemented high throughput protocols is demonstrated in screening experiments performed with large Arabidopsis and maize populations assessing natural variation in PSII efficiency. The incorporation of imaging systems suitable for kinetic chlorophyll fluorescence analysis leads to a substantial extension of the feature spectrum to be assessed in the presented high throughput automated plant phenotyping platforms, thus enabling the simultaneous assessment of plant architectural and biomass-related traits and their relations to physiological features such as PSII operating efficiency. The implemented high throughput protocols are applicable to a broad spectrum of model and crop plants of different sizes (up to 1.80 m height) and architectures. The deeper understanding of the relation of plant architecture, biomass formation and photosynthetic efficiency has a great potential with respect to crop and yield improvement strategies.
Nisar, Bushra; Rubab, Syeda Laila; Raza, Abdul Rauf; Tariq, Sobia; Sultan, Ayesha; Tahir, Muhammad Nawaz
2018-04-11
Novel and highly sensitive indole-based imines have been synthesized. Their synthesis has been compared employing a variety of protocols. Ultimately, a convenient, economical and high yielding set of conditions employing green chemistry have been designed for their synthesis.
USDA-ARS?s Scientific Manuscript database
An efficient protocol for Agrobacterium-mediated transformation of Serbian potato cultivars Dragacevka and Jelica, enabling the introduction of oryzacystatin genes OCI and OCII, was established. Starting with leaf explants a two-stage transformation protocol combining procedures of Webb and Wenzler...
Entanglement routers via a wireless quantum network based on arbitrary two qubit systems
NASA Astrophysics Data System (ADS)
Metwally, N.
2014-12-01
A wireless quantum network is generated between multi-hops, where each hop consists of two entangled nodes. These nodes share a finite number of entangled two-qubit systems randomly. Different types of wireless quantum bridges (WQBS) are generated between the non-connected nodes. The efficiency of these WQBS to be used as quantum channels between its terminals to perform quantum teleportation is investigated. We suggest a theoretical wireless quantum communication protocol to teleport unknown quantum signals from one node to another, where the more powerful WQBS are used as quantum channels. It is shown that, by increasing the efficiency of the sources that emit the initial partial entangled states, one can increase the efficiency of the wireless quantum communication protocol.
Data dissemination using gossiping in wireless sensor networks
NASA Astrophysics Data System (ADS)
Medidi, Muralidhar; Ding, Jin; Medidi, Sirisha
2005-06-01
Disseminating data among sensors is a fundamental operation in energy-constrained wireless sensor networks. We present a gossip-based adaptive protocol for data dissemination to improve energy efficiency of this operation. To overcome the data implosion problems associated with dissemination operation, our protocol uses meta-data to name the data using high-level data descriptors and negotiation to eliminate redundant transmissions of duplicate data in the network. Further, we adapt the gossiping with data aggregation possibilities in sensor networks. We simulated our data dissemination protocol, and compared it to the SPIN protocol. We find that our protocol improves on the energy consumption by about 20% over others, while improving significantly over the data dissemination rate of gossiping.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Jacobson, David; Metoyer, Jarred
The specific measure described here involves improving the overall efficiency in air-conditioning systems as a whole (compressor, evaporator, condenser, and supply fan). The efficiency rating is expressed as the energy efficiency ratio (EER), seasonal energy efficiency ratio (SEER), and integrated energy efficiency ratio (IEER). The higher the EER, SEER or IEER, the more efficient the unit is.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Carlson, Stephen
This Commercial and Industrial Lighting Controls Evaluation Protocol (the protocol) describes methods to account for energy savings resulting from programmatic installation of lighting control equipment in large populations of commercial, industrial, government, institutional, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. When lighting controls are installed in conjunction with a lighting retrofit project, the lighting control savings must be calculated parametrically with the lighting retrofit project so savings are not double counted.
General method for rapid purification of native chromatin fragments.
Kuznetsov, Vyacheslav I; Haws, Spencer A; Fox, Catherine A; Denu, John M
2018-05-24
Biochemical, proteomic and epigenetic studies of chromatin rely on the efficient ability to isolate native nucleosomes in high yield and purity. However, isolation of native chromatin suitable for many downstream experiments remains a challenging task. This is especially true for the budding yeast Saccharomyces cerevisiae, which continues to serve as an important model organism for the study of chromatin structure and function. Here, we developed a time- and cost-efficient universal protocol for isolation of native chromatin fragments from yeast, insect, and mammalian cells. The resulting protocol preserves histone posttranslational modification in the native chromatin state, and is applicable for both parallel multi-sample spin-column purification and large scale isolation. This protocol is based on the efficient and stable purification of polynucleosomes, features a combination of optimized cell lysis and purification conditions, three options for chromatin fragmentation, and a novel ion-exchange chromatographic purification strategy. The procedure will aid chromatin researchers interested in isolating native chromatin material for biochemical studies, and as a mild, acid- and detergent-free sample preparation method for mass-spectrometry analysis. Published under license by The American Society for Biochemistry and Molecular Biology, Inc.
NASA Astrophysics Data System (ADS)
Borjas, Zulema; Esteve-Núñez, Abraham; Ortiz, Juan Manuel
2017-07-01
Microbial Desalination Cells constitute an innovative technology where microbial fuel cell and electrodialysis merge in the same device for obtaining fresh water from saline water with no energy-associated cost for the user. In this work, an anodic biofilm of the electroactive bacteria Geobacter sulfurreducens was able to efficiently convert the acetate present in synthetic waste water into electric current (j = 0.32 mA cm-2) able to desalinate water. .Moreover, we implemented an efficient start-up protocol where desalination up to 90% occurred in a desalination cycle (water production:0.308 L m-2 h-1, initial salinity: 9 mS cm-1, final salinity: <1 mS cm-1) using a filter press-based MDC prototype without any energy supply (excluding peristaltic pump energy). This start-up protocol is not only optimized for time but also simplifies operational procedures making it a more feasible strategy for future scaling-up of MDCs either as a single process or as a pre-treatment method combined with other well established desalination technologies such as reverse osmosis (RO) or reverse electrodialysis.
NASA Astrophysics Data System (ADS)
Duchoslav, Jiri; Kehrer, Matthias; Hinterreiter, Andreas; Duchoslav, Vojtech; Unterweger, Christoph; Fürst, Christian; Steinberger, Roland; Stifter, David
2018-06-01
In the current work, chemical derivatization of amine (NH2) groups with trifluoroacetic anhydride (TFAA) as an analytical method to improve the information scope of X-ray photoelectron spectroscopy (XPS) is investigated. TFAA is known to successfully label hydroxyl (OH) groups. With the introduction of a newly developed gas-phase derivatization protocol conducted at ambient pressure and using a catalyst also NH2 groups can now efficiently be labelled with a high yield and without the formation of unwanted by-products. By establishing a comprehensive and self-consistent database of reference binding energies for XPS a promising approach for distinguishing hydroxyl from amine groups is presented. The protocol was verified on different polymers, including poly(allylamine), poly(ethyleneimine), poly(vinylalcohol) and chitosan, the latter one containing both types of addressed chemical groups.
Zerbini, Francesca; Zanella, Ilaria; Fraccascia, Davide; König, Enrico; Irene, Carmela; Frattini, Luca F; Tomasi, Michele; Fantappiè, Laura; Ganfini, Luisa; Caproni, Elena; Parri, Matteo; Grandi, Alberto; Grandi, Guido
2017-04-24
The exploitation of the CRISPR/Cas9 machinery coupled to lambda (λ) recombinase-mediated homologous recombination (recombineering) is becoming the method of choice for genome editing in E. coli. First proposed by Jiang and co-workers, the strategy has been subsequently fine-tuned by several authors who demonstrated, by using few selected loci, that the efficiency of mutagenesis (number of mutant colonies over total number of colonies analyzed) can be extremely high (up to 100%). However, from published data it is difficult to appreciate the robustness of the technology, defined as the number of successfully mutated loci over the total number of targeted loci. This information is particularly relevant in high-throughput genome editing, where repetition of experiments to rescue missing mutants would be impractical. This work describes a "brute force" validation activity, which culminated in the definition of a robust, simple and rapid protocol for single or multiple gene deletions. We first set up our own version of the CRISPR/Cas9 protocol and then we evaluated the mutagenesis efficiency by changing different parameters including sequence of guide RNAs, length and concentration of donor DNAs, and use of single stranded and double stranded donor DNAs. We then validated the optimized conditions targeting 78 "dispensable" genes. This work led to the definition of a protocol, featuring the use of double stranded synthetic donor DNAs, which guarantees mutagenesis efficiencies consistently higher than 10% and a robustness of 100%. The procedure can be applied also for simultaneous gene deletions. This work defines for the first time the robustness of a CRISPR/Cas9-based protocol based on a large sample size. Since the technical solutions here proposed can be applied to other similar procedures, the data could be of general interest for the scientific community working on bacterial genome editing and, in particular, for those involved in synthetic biology projects requiring high throughput procedures.
Ligand efficiency based approach for efficient virtual screening of compound libraries.
Ke, Yi-Yu; Coumar, Mohane Selvaraj; Shiao, Hui-Yi; Wang, Wen-Chieh; Chen, Chieh-Wen; Song, Jen-Shin; Chen, Chun-Hwa; Lin, Wen-Hsing; Wu, Szu-Huei; Hsu, John T A; Chang, Chung-Ming; Hsieh, Hsing-Pang
2014-08-18
Here we report for the first time the use of fit quality (FQ), a ligand efficiency (LE) based measure for virtual screening (VS) of compound libraries. The LE based VS protocol was used to screen an in-house database of 125,000 compounds to identify aurora kinase A inhibitors. First, 20 known aurora kinase inhibitors were docked to aurora kinase A crystal structure (PDB ID: 2W1C); and the conformations of docked ligand were used to create a pharmacophore (PH) model. The PH model was used to screen the database compounds, and rank (PH rank) them based on the predicted IC50 values. Next, LE_Scale, a weight-dependant LE function, was derived from 294 known aurora kinase inhibitors. Using the fit quality (FQ = LE/LE_Scale) score derived from the LE_Scale function, the database compounds were reranked (PH_FQ rank) and the top 151 (0.12% of database) compounds were assessed for aurora kinase A inhibition biochemically. This VS protocol led to the identification of 7 novel hits, with compound 5 showing aurora kinase A IC50 = 1.29 μM. Furthermore, testing of 5 against a panel of 31 kinase reveals that it is selective toward aurora kinase A & B, with <50% inhibition for other kinases at 10 μM concentrations and is a suitable candidate for further development. Incorporation of FQ score in the VS protocol not only helped identify a novel aurora kinase inhibitor, 5, but also increased the hit rate of the VS protocol by improving the enrichment factor (EF) for FQ based screening (EF = 828), compared to PH based screening (EF = 237) alone. The LE based VS protocol disclosed here could be applied to other targets for hit identification in an efficient manner. Copyright © 2014 Elsevier Masson SAS. All rights reserved.
A new communication protocol family for a distributed spacecraft control system
NASA Technical Reports Server (NTRS)
Baldi, Andrea; Pace, Marco
1994-01-01
In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.
Ye, Shanwen; Cai, Changyang; Ren, Huibo; Wang, Wenjia; Xiang, Mengqi; Tang, Xiaoshan; Zhu, Caiping; Yin, Tengfei; Zhang, Li; Zhu, Qiang
2017-01-01
Genetic engineering technology has been successfully used in many plant species, but is limited in woody plants, especially in bamboos. Ma bamboo (Dendrocalamus latiflorus Munro) is one of the most important bamboo species in Asia, and its genetic improvement was largely restricted by the lack of an efficient regeneration and transformation method. Here we reported a plantlet regeneration and Agrobacterium-mediated transformation protocol by using Ma bamboo young shoots as explants. Under our optimized conditions, embryogenic calluses were successfully induced from the excised young shoots on callus induction medium and rapidly grew on callus multiplication medium. Shoots and roots were regenerated on shoot induction medium and root induction medium, respectively, with high efficiency. An Agrobacterium-mediated genetic transformation protocol of Ma bamboo was established, verified by PCR and GUS staining. Furthermore, the maize Lc gene under the control of the ubiquitin promoter was successfully introduced into Ma bamboo genome and generated an anthocyanin over-accumulation phenotype. Our methods established here will facilitate the basic research as well as genetic breeding of this important bamboo species. Key achievements: A stable and high efficiency regeneration and Agrobacterium-mediated transformation protocol for Ma bamboo from vegetative organ is established. PMID:28798758
Incineration of polychlorinated biphenyls in high-efficiency boilers: a viable disposal option
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hunt, G.T.; Wolf, P.; Fennelly, P.F.
1984-03-01
Approximately 750 million pounds of polychlorinated biphenyls (PCBs) remain in service today in the United States. The eventual disposition of these materials and the vast stock piles already removed from commerce and use represents a formidable problem to both U.S. industry (e.g., utility companies) and federal and state environmental agencies. Despite the fact that available disposal options include the use of high-temperature incineration, disposal efforts have been significantly hampered by the lack of approved incineration facilities. The results of comprehensive PCB incineration programs conducted in accordance with EPA test protocols at each of three high-efficiency boiler sites are presented. Fluemore » gas sampling procedures included the use of both the modified method 5 PCB train and the Source Assessment Sampling System (SASS). Analytical protocols included the use of gas chromatography (GC/ECD) and combined gas chromatography/mass spectrometry (GC/MS). PCB destruction efficiency data for each of nine test runs were in excess of the 99.9% values assumed by the EPA regulation. The cumulative data set lends further credibility to the use of high-efficiency boilers as a viable disposal option for PCB contaminated (50-500 ppm) waste oils when conducted in strict accordance with existing EPA protocols.« less
Intelligent routing protocol for ad hoc wireless network
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2006-05-01
A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.
An Authentication Protocol for Future Sensor Networks.
Bilal, Muhammad; Kang, Shin-Gak
2017-04-28
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
An Authentication Protocol for Future Sensor Networks
Bilal, Muhammad; Kang, Shin-Gak
2017-01-01
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937
RNA isolation from loquat and other recalcitrant woody plants with high quality and yield.
Morante-Carriel, Jaime; Sellés-Marchart, Susana; Martínez-Márquez, Ascensión; Martínez-Esteso, María José; Luque, Ignacio; Bru-Martínez, Roque
2014-05-01
RNA isolation is difficult in plants that contain large amounts of polysaccharides and polyphenol compounds. To date, no commercial kit has been developed for the isolation of high-quality RNA from tissues with these characteristics, especially for fruit. The common protocols for RNA isolation are tedious and usually result in poor yields when applied to recalcitrant plant tissues. Here an efficient RNA isolation protocol based on cetyltrimethylammonium bromide (CTAB) and two successive precipitations with 10 M lithium chloride (LiCl) was developed specifically for loquat fruits, but it was proved to work efficiently in other tissues of loquat and woody plants. The RNA isolated by this improved protocol was not only of high purity and integrity (A260/A280 ratios ranged from 1.90 to 2.04 and A260/A230 ratios were>2.0) but also of high yield (up to 720 μg on average [coefficient of variation=21%] total RNA per gram fresh tissue). The protocol was tested on loquat fruit (different stages of development, postharvest, ripening, and bruising), leaf, root, flower, stem, and bud; quince fruit and root; grapevine cells in liquid culture; and rose petals. The RNA obtained with this method is amenable to enzymatic treatments and can be efficiently applied for research on gene characterization, expression, and function. Copyright © 2014 Elsevier Inc. All rights reserved.
In-memory interconnect protocol configuration registers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cheng, Kevin Y.; Roberts, David A.
Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less
Cryopreservation of Human Pluripotent Stem Cells in Defined Medium
Liu, Weiwei; Chen, Guokai
2014-01-01
This protocol describes a cryopreservation procedure using an enzyme-free dissociation method to harvest cells and preserve cells in albumin-free chemically defined E8 medium for human pluripotent stem cells (hPSCs). The dissociation by EDTA/PBS produces small cell aggregates that allow high survival efficiency in passaging and cryopreservation. The preservation in E8 medium eliminates serum or other animal products, and is suitable for the increasing demand for high quality hPSCs in translational research. In combination with the special feature of EDTA/PBS dissociation, this protocol allows efficient cryopreservation in more time-saving manner. PMID:25366897
Generation of genetic constructs that simultaneously express several shRNAs.
Kretova, Olga V; Alembekov, Ildar R; Tchurikov, Nickolai A
2012-05-01
RNAi has potential as an antiviral gene therapy strategy. Cassette constructs simultaneously expressing several siRNAs could prove to be the most efficient technique in developing gene therapy approaches for highly mutable viruses such as HIV-1. Here we describe a rapid and cost-saving protocol to generate cassettes that simultaneously express three siRNAs for repression of HIV-1 and CCR5 transcripts. siRNA biological activity was tested in a non-viral system, and exhibited both efficiency and specificity. Our results suggest this protocol can be used to rapidly generate cassette constructs for antiviral gene therapy applications.
Duncan, James R; Kline, Benjamin; Glaiberman, Craig B
2007-04-01
To create and test methods of extracting efficiency data from recordings of simulated renal stent procedures. Task analysis was performed and used to design a standardized testing protocol. Five experienced angiographers then performed 16 renal stent simulations using the Simbionix AngioMentor angiographic simulator. Audio and video recordings of these simulations were captured from multiple vantage points. The recordings were synchronized and compiled. A series of efficiency metrics (procedure time, contrast volume, and tool use) were then extracted from the recordings. The intraobserver and interobserver variability of these individual metrics was also assessed. The metrics were converted to costs and aggregated to determine the fixed and variable costs of a procedure segment or the entire procedure. Task analysis and pilot testing led to a standardized testing protocol suitable for performance assessment. Task analysis also identified seven checkpoints that divided the renal stent simulations into six segments. Efficiency metrics for these different segments were extracted from the recordings and showed excellent intra- and interobserver correlations. Analysis of the individual and aggregated efficiency metrics demonstrated large differences between segments as well as between different angiographers. These differences persisted when efficiency was expressed as either total or variable costs. Task analysis facilitated both protocol development and data analysis. Efficiency metrics were readily extracted from recordings of simulated procedures. Aggregating the metrics and dividing the procedure into segments revealed potential insights that could be easily overlooked because the simulator currently does not attempt to aggregate the metrics and only provides data derived from the entire procedure. The data indicate that analysis of simulated angiographic procedures will be a powerful method of assessing performance in interventional radiology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Huang, Robert; Masanet, Eric
This chapter focuses on IT measures in the data center and examines the techniques and analysis methods used to verify savings that result from improving the efficiency of two specific pieces of IT equipment: servers and data storage.
Leverrier, Anthony; Grangier, Philippe
2009-05-08
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
Grobarczyk, Benjamin; Franco, Bénédicte; Hanon, Kevin; Malgrange, Brigitte
2015-10-01
Genome engineering and human iPS cells are two powerful technologies, which can be combined to highlight phenotypic differences and identify pathological mechanisms of complex diseases by providing isogenic cellular material. However, very few data are available regarding precise gene correction in human iPS cells. Here, we describe an optimized stepwise protocol to deliver CRISPR/Cas9 plasmids in human iPS cells. We highlight technical issues especially those associated to human stem cell culture and to the correction of a point mutation to obtain isogenic iPS cell line, without inserting any resistance cassette. Based on a two-steps clonal isolation protocol (mechanical picking followed by enzymatic dissociation), we succeed to select and expand corrected human iPS cell line with a great efficiency (more than 2% of the sequenced colonies). This protocol can also be used to obtain knock-out cell line from healthy iPS cell line by the NHEJ pathway (with about 15% efficiency) and reproduce disease phenotype. In addition, we also provide protocols for functional validation tests after every critical step.
Multiplex Droplet Digital PCR Protocols for Quantification of GM Maize Events.
Dobnik, David; Spilsberg, Bjørn; Bogožalec Košir, Alexandra; Štebih, Dejan; Morisset, Dany; Holst-Jensen, Arne; Žel, Jana
2018-01-01
The standard-curve based simplex quantitative polymerase chain reaction (qPCR) has been the gold standard for DNA target quantification for more than a decade. The large and growing number of individual analyses needed to test for genetically modified organisms (GMOs) is reducing the cost-effectiveness of qPCR. Droplet digital PCR (ddPCR) enables absolute quantification without standard curves, avoids the amplification efficiency bias observed with qPCR, allows more accurate estimations at low target copy numbers and, in combination with multiplexing, significantly improves cost efficiency. Here we describe two protocols for multiplex quantification of GM maize events: (1) nondiscriminating, with multiplex quantification of targets as a group (12 GM maize lines) and (2) discriminating, with multiplex quantification of individual targets (events). The first enables the quantification of twelve European Union authorized GM maize events as a group with only two assays, but does not permit determination of the individual events present. The second protocol enables the quantification of four individual targets (three GM events and one endogene) in a single reaction. Both protocols can be modified for quantification of any other DNA target.
Suraniti, Emmanuel; Studer, Vincent; Sojic, Neso; Mano, Nicolas
2011-04-01
Immobilization and electrical wiring of enzymes is of particular importance for the elaboration of efficient biosensors and can be cumbersome. Here, we report a fast and easy protocol for enzyme immobilization, and as a proof of concept, we applied it to the immobilization of bilirubin oxidase, a labile enzyme. In the first step, bilirubin oxidase is mixed with a redox hydrogel "wiring" the enzyme reaction centers to electrodes. Then, this adduct is covered by an outer layer of PEGDA made by photoinitiated polymerization of poly(ethylene-glycol) diacrylate (PEGDA) and a photoclivable precursor, DAROCUR. This two-step protocol is 18 times faster than the current state-of-the-art protocol and leads to currents 25% higher. In addition, the outer layer of PEGDA acts as a protective layer increasing the lifetime of the electrode by 100% when operating continuously for 2000 s and by 60% when kept in dry state for 24 h. This new protocol is particularly appropriate for labile enzymes that quickly denaturate. In addition, by tuning the ratio PEGDA/DAROCUR, it is possible to make the enzyme electrodes even more active or more stable.
Conservation of coconut (Cocos nucifera L.) germplasm at sub-zero temperature.
Sisunandar; Sopade, Peter A; Samosir, Yohannes M S; Rival, Alain; Adkins, Steve W
2012-01-01
Protocols are proposed for the low (-20 degree C) and ultra-low (-80 degree C) temperature storage of coconut (Cocos nucifera L.) embryos. A tissue dehydration step prior to storage, and a rapid warming step upon recovery optimized the protocol. The thermal properties of water located within embryos were monitored using differential scanning calorimetry (DSC). In the most efficient version of the protocol, embryos were dehydrated under a sterile air flow in a dehydration solution containing glucose (3.33 M) and glycerol (15 percent) for 16 hours. This protocol decreased the embryo water content from 77 to 29 percent FW and at the same time reduced the amount of freezable water down to 0.03 percent. The dehydrated embryos could be stored for up to 3 weeks at -20 degree C (12 percent producing normal plants upon recovery) or 26 weeks at -80 degree C (28 percent producing normal plants upon recovery). These results indicate that it is possible to store coconut germplasm on a medium term basis using an ultra-deep freezer unit. However for more efficient, long term storage, cryopreservation remains the preferred option.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-02-24
The Philadelphia Housing Authority worked with the U.S. Department of Energy’s Building America Program to integrate energy-efficiency measures into the refurbishment process that each unit normally goes through between occupancies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W; Tiessen, Alex
This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller - or multiple chillers - and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components.
On Alarm Protocol in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin
We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
NASA Astrophysics Data System (ADS)
Balitanas, Maricel; Kim, Tai-Hoon
This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Weakley, Jonathon J S; Till, Kevin; Read, Dale B; Roe, Gregory A B; Darrall-Jones, Joshua; Phibbs, Padraic J; Jones, Ben
2017-09-01
Investigate the acute and short-term (i.e., 24 h) effects of traditional (TRAD), superset (SS), and tri-set (TRI) resistance training protocols on perceptions of intensity and physiological responses. Fourteen male participants completed a familiarisation session and three resistance training protocols (i.e., TRAD, SS, and TRI) in a randomised-crossover design. Rating of perceived exertion, lactate concentration ([Lac]), creatine kinase concentration ([CK]), countermovement jump (CMJ), testosterone, and cortisol concentrations was measured pre, immediately, and 24-h post the resistance training sessions with magnitude-based inferences assessing changes/differences within/between protocols. TRI reported possible to almost certainly greater efficiency and rate of perceived exertion, although session perceived load was very likely lower. SS and TRI had very likely to almost certainly greater lactate responses during the protocols, with changes in [CK] being very likely and likely increased at 24 h, respectively. At 24-h post-training, CMJ variables in the TRAD protocol had returned to baseline; however, SS and TRI were still possibly to likely reduced. Possible increases in testosterone immediately post SS and TRI protocols were reported, with SS showing possible increases at 24-h post-training. TRAD and SS showed almost certain and likely decreases in cortisol immediately post, respectively, with TRAD reporting likely decreases at 24-h post-training. SS and TRI can enhance training efficiency and reduce training time. However, acute and short-term physiological responses differ between protocols. Athletes can utilise SS and TRI resistance training, but may require additional recovery post-training to minimise effects of fatigue.
A Mobility-Aware QoS Signaling Protocol for Ambient Networks
NASA Astrophysics Data System (ADS)
Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho
Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.
A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures
NASA Technical Reports Server (NTRS)
Geser, Alfons; Miner, Paul S.
2004-01-01
This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.
A software defined RTU multi-protocol automatic adaptation data transmission method
NASA Astrophysics Data System (ADS)
Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng
2018-02-01
Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.
Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload
NASA Astrophysics Data System (ADS)
Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun
2018-06-01
An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.
Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload
NASA Astrophysics Data System (ADS)
Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun
2018-03-01
An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.
Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia
2018-01-15
Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.
Electro-Optic Quantum Memory for Light Using Two-Level Atoms
NASA Astrophysics Data System (ADS)
Hétet, G.; Longdell, J. J.; Alexander, A. L.; Lam, P. K.; Sellars, M. J.
2008-01-01
We present a simple quantum memory scheme that allows for the storage of a light field in an ensemble of two-level atoms. The technique is analogous to the NMR gradient echo for which the imprinting and recalling of the input field are performed by controlling a linearly varying broadening. Our protocol is perfectly efficient in the limit of high optical depths and the output pulse is emitted in the forward direction. We provide a numerical analysis of the protocol together with an experiment performed in a solid state system. In close agreement with our model, the experiment shows a total efficiency of up to 15%, and a recall efficiency of 26%. We suggest simple realizable improvements for the experiment to surpass the no-cloning limit.
Electro-optic quantum memory for light using two-level atoms.
Hétet, G; Longdell, J J; Alexander, A L; Lam, P K; Sellars, M J
2008-01-18
We present a simple quantum memory scheme that allows for the storage of a light field in an ensemble of two-level atoms. The technique is analogous to the NMR gradient echo for which the imprinting and recalling of the input field are performed by controlling a linearly varying broadening. Our protocol is perfectly efficient in the limit of high optical depths and the output pulse is emitted in the forward direction. We provide a numerical analysis of the protocol together with an experiment performed in a solid state system. In close agreement with our model, the experiment shows a total efficiency of up to 15%, and a recall efficiency of 26%. We suggest simple realizable improvements for the experiment to surpass the no-cloning limit.
Promoting Wired Links in Wireless Mesh Networks: An Efficient Engineering Solution
Barekatain, Behrang; Raahemifar, Kaamran; Ariza Quintana, Alfonso; Triviño Cabrera, Alicia
2015-01-01
Wireless Mesh Networks (WMNs) cannot completely guarantee good performance of traffic sources such as video streaming. To improve the network performance, this study proposes an efficient engineering solution named Wireless-to-Ethernet-Mesh-Portal-Passageway (WEMPP) that allows effective use of wired communication in WMNs. WEMPP permits transmitting data through wired and stable paths even when the destination is in the same network as the source (Intra-traffic). Tested with four popular routing protocols (Optimized Link State Routing or OLSR as a proactive protocol, Dynamic MANET On-demand or DYMO as a reactive protocol, DYMO with spanning tree ability and HWMP), WEMPP considerably decreases the end-to-end delay, jitter, contentions and interferences on nodes, even when the network size or density varies. WEMPP is also cost-effective and increases the network throughput. Moreover, in contrast to solutions proposed by previous studies, WEMPP is easily implemented by modifying the firmware of the actual Ethernet hardware without altering the routing protocols and/or the functionality of the IP/MAC/Upper layers. In fact, there is no need for modifying the functionalities of other mesh components in order to work with WEMPPs. The results of this study show that WEMPP significantly increases the performance of all routing protocols, thus leading to better video quality on nodes. PMID:25793516
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Cryptography in the Bounded-Quantum-Storage Model
NASA Astrophysics Data System (ADS)
Schaffner, Christian
2007-09-01
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.
Targeted Genome Editing Using DNA-Free RNA-Guided Cas9 Ribonucleoprotein for CHO Cell Engineering.
Shin, Jongoh; Lee, Namil; Cho, Suhyung; Cho, Byung-Kwan
2018-01-01
Recent advances in the CRISPR/Cas9 system have dramatically facilitated genome engineering in various cell systems. Among the protocols, the direct delivery of the Cas9-sgRNA ribonucleoprotein (RNP) complex into cells is an efficient approach to increase genome editing efficiency. This method uses purified Cas9 protein and in vitro transcribed sgRNA to edit the target gene without vector DNA. We have applied the RNP complex to CHO cell engineering to obtain desirable phenotypes and to reduce unintended insertional mutagenesis and off-target effects. Here, we describe our routine methods for RNP complex-mediated gene deletion including the protocols to prepare the purified Cas9 protein and the in vitro transcribed sgRNA. Subsequently, we also describe a protocol to confirm the edited genomic positions using the T7E1 enzymatic assay and next-generation sequencing.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Entanglement distillation for quantum communication network with atomic-ensemble memories.
Li, Tao; Yang, Guo-Jian; Deng, Fu-Guo
2014-10-06
Atomic ensembles are effective memory nodes for quantum communication network due to the long coherence time and the collective enhancement effect for the nonlinear interaction between an ensemble and a photon. Here we investigate the possibility of achieving the entanglement distillation for nonlocal atomic ensembles by the input-output process of a single photon as a result of cavity quantum electrodynamics. We give an optimal entanglement concentration protocol (ECP) for two-atomic-ensemble systems in a partially entangled pure state with known parameters and an efficient ECP for the systems in an unknown partially entangled pure state with a nondestructive parity-check detector (PCD). For the systems in a mixed entangled state, we introduce an entanglement purification protocol with PCDs. These entanglement distillation protocols have high fidelity and efficiency with current experimental techniques, and they are useful for quantum communication network with atomic-ensemble memories.
Experimental measurement-device-independent verification of quantum steering
NASA Astrophysics Data System (ADS)
Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.
2015-01-01
Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
Cryopreservation for preservation of potato genetic resources
Niino, Takao; Arizaga, Miriam Valle
2015-01-01
Cryopreservation is becoming a very important tool for the long-term storage of plant genetic resources and efficient cryopreservation protocols have been developed for a large number of plant species. Practical procedures, developed using in vitro tissue culture, can be a simple and reliable preservation option of potato genetic resources rather than maintaining by vegetative propagation in genebanks due their allogamous nature. Cryopreserved materials insure a long-term backup of field collections against loss of plant germplasm. Occurrence of genetic variation, in tissue culture cells during prolonged subcultures, can be avoided with suitable cryopreservation protocols that provide high regrowth, leading and facilitating a systematic and strategic cryo-banking of plant genetic resources. Cryopreservation protocols for potato reviewed here, can efficiently complement field and in vitro conservation, providing for preservation of genotypes difficult to preserve by other methods, wild types and other species decided as priority collections. PMID:25931979
Approximating the Qualitative Vickrey Auction by a Negotiation Protocol
NASA Astrophysics Data System (ADS)
Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs
A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
Experimental measurement-device-independent verification of quantum steering.
Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J
2015-01-07
Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
Quantum processing by remote quantum control
NASA Astrophysics Data System (ADS)
Qiang, Xiaogang; Zhou, Xiaoqi; Aungskunsiri, Kanin; Cable, Hugo; O'Brien, Jeremy L.
2017-12-01
Client-server models enable computations to be hosted remotely on quantum servers. We present a novel protocol for realizing this task, with practical advantages when using technology feasible in the near term. Client tasks are realized as linear combinations of operations implemented by the server, where the linear coefficients are hidden from the server. We report on an experimental demonstration of our protocol using linear optics, which realizes linear combination of two single-qubit operations by a remote single-qubit control. In addition, we explain when our protocol can remain efficient for larger computations, as well as some ways in which privacy can be maintained using our protocol.
Quantum private query with perfect user privacy against a joint-measurement attack
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min
2016-12-01
The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.
Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study
Sigilião, Lara Carvalho Freitas; Marquezan, Mariana; Elias, Carlos Nelson; Ruellas, Antônio Carlos; Sant'Anna, Eduardo Franzotti
2015-01-01
Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding. Methods: A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L), 12-blade bur at high speed (G12H), 30-blade bur at low speed (G30L), DU10CO ORTHO polisher (GDU), Renew System (GR) and Diagloss polisher (GD). Mean roughness (Ra) and mean roughness depth (Rz) of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz) were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM). Results: In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05) was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz); Ra and (∆Ra, ∆Rz); Rz (r = - 0.445, r = - 0.475, p < 0.01). Conclusion: All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness. PMID:26560825
Efficient ultrafiltration-based protocol to deplete extracellular vesicles from fetal bovine serum
Kornilov, Roman; Puhka, Maija; Mannerström, Bettina; Hiidenmaa, Hanna; Peltoniemi, Hilkka; Siljander, Pia; Seppänen-Kaijansinkko, Riitta; Kaur, Sippy
2018-01-01
ABSTRACT Fetal bovine serum (FBS) is the most commonly used supplement in studies involving cell-culture experiments. However, FBS contains large numbers of bovine extracellular vesicles (EVs), which hamper the analyses of secreted EVs from the cell type of preference and, thus, also the downstream analyses. Therefore, a prior elimination of EVs from FBS is crucial. However, the current methods of EV depletion by ultracentrifugation are cumbersome and the commercial alternatives expensive. In this study, our aim was to develop a protocol to completely deplete EVs from FBS, which may have wide applicability in cell-culture applications. We investigated different EV-depleted FBS prepared by our novel ultrafiltration-based protocol, by conventionally used overnight ultracentrifugation, or commercially available depleted FBS, and compared them with regular FBS. All sera were characterized by nanoparticle tracking analysis, electron microscopy, Western blotting and RNA quantification. Next, adipose-tissue mesenchymal stem cells (AT-MSCs) and cancer cells were grown in the media supplemented with the three different EV-depleted FBS and compared with cells grown in regular FBS media to assess the effects on cell proliferation, stress, differentiation and EV production. The novel ultrafiltration-based protocol depleted EVs from FBS clearly more efficiently than ultracentrifugation and commercial methods. Cell proliferation, stress, differentiation and EV production of AT-MSCs and cancer cell lines were similarly maintained in all three EV-depleted FBS media up to 96 h. In summary, our ultrafiltration protocol efficiently depletes EVs, is easy to use and maintains cell growth and metabolism. Since the method is also cost-effective and easy to standardize, it could be used in a wide range of cell-culture applications helping to increase comparability of EV research results between laboratories. PMID:29410778
IMPROVED TEST METHODS FOR ELECTRONIC AIR CLEANERS
The objective of this project was to develop a fractional filtration efficiency test protocol for residential electrostatic precipitators (ESPs) that avoids the limitations of the ASHRAE 52.2 method. Specifically, the objectives were to a) determine the change in efficiency that ...
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737
Protocol for determining bull trout presence
Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott
2002-01-01
The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.
Lichen elements as pollution indicators: evaluation of methods for large monitoring programmes
Susan Will-Wolf; Sarah Jovan; Michael C. Amacher
2017-01-01
Lichen element content is a reliable indicator for relative air pollution load in research and monitoring programmes requiring both efficiency and representation of many sites. We tested the value of costly rigorous field and handling protocols for sample element analysis using five lichen species. No relaxation of rigour was supported; four relaxed protocols generated...
USDA-ARS?s Scientific Manuscript database
Estradiol production is essential for reproductive efficiency. This study compared numbers of follicles in beef cows that did or did not have elevated preovulatory estradiol during a fixed-time AI (FTAI) protocol. In experiment 1, 5 low estradiol (LowE2) and 5 high estradiol (HighE2) cows were slaug...
Maestrale, Caterina; Cancedda, Maria G; Pintus, Davide; Masia, Mariangela; Nonno, Romolo; Ru, Giuseppe; Carta, Antonello; Demontis, Francesca; Santucciu, Cinzia; Ligios, Ciriaco
2015-10-01
Thirty-seven goats carrying different prion protein genotypes (PRNP) were orally infected with a classical scrapie brain homogenate from wild-type (ARQ/ARQ) sheep and then mated to obtain 2 additional generations of offspring, which were kept in the same environment and allowed to be naturally exposed to scrapie. Occurrence of clinical or subclinical scrapie was observed in the experimentally infected goats (F0) and in only one (F1b) of the naturally exposed offspring groups. In both groups (F0 and F1b), goats carrying the R154H, H154H, R211Q, and P168Q-P240P dimorphisms died of scrapie after a longer incubation period than wild-type, G37V, Q168Q-P240P, and S240P goats. In contrast, D145D and Q222K goats were resistant to infection. The immunobiochemical signature of the scrapie isolate and its pathological aspects observed in the sheep donors were substantially maintained over 2 goat generations, i.e., after experimental and natural transmission. This demonstrates that the prion protein gene sequence, which is shared by sheep and goats, is more powerful than any possible but unknown species-related factors in determining scrapie phenotypes. With regard to genetics, our study confirms that the K222 mutation protects goats even against ovine scrapie isolates, and for the first time, a possible association of D145 mutation with scrapie resistance is shown. In addition, it is possible that the sole diverse frequencies of these genetic variants might, at least in part, shape the prevalence of scrapie among naturally exposed progenies in affected herds. This study was aimed at investigating the genetic and pathological features characterizing sheep-to-goat transmission of scrapie. We show that in goats with different prion protein gene mutations, the K222 genetic variant is associated with scrapie resistance after natural and experimental exposure to ovine prion infectivity. In addition, we observed for the first time a protective effect of the D145 goat variant against scrapie. Importantly, our results demonstrate that the phenotypic characteristic of the wild-type sheep scrapie isolate is substantially preserved in goats carrying different susceptible PRNP gene variants, thus indicating that the prion protein gene sequence, which is shared by sheep and goats, plays a fundamental role in determining scrapie phenotypes. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
Maestrale, Caterina; Cancedda, Maria G.; Pintus, Davide; Masia, Mariangela; Nonno, Romolo; Ru, Giuseppe; Carta, Antonello; Demontis, Francesca; Santucciu, Cinzia
2015-01-01
ABSTRACT Thirty-seven goats carrying different prion protein genotypes (PRNP) were orally infected with a classical scrapie brain homogenate from wild-type (ARQ/ARQ) sheep and then mated to obtain 2 additional generations of offspring, which were kept in the same environment and allowed to be naturally exposed to scrapie. Occurrence of clinical or subclinical scrapie was observed in the experimentally infected goats (F0) and in only one (F1b) of the naturally exposed offspring groups. In both groups (F0 and F1b), goats carrying the R154H, H154H, R211Q, and P168Q-P240P dimorphisms died of scrapie after a longer incubation period than wild-type, G37V, Q168Q-P240P, and S240P goats. In contrast, D145D and Q222K goats were resistant to infection. The immunobiochemical signature of the scrapie isolate and its pathological aspects observed in the sheep donors were substantially maintained over 2 goat generations, i.e., after experimental and natural transmission. This demonstrates that the prion protein gene sequence, which is shared by sheep and goats, is more powerful than any possible but unknown species-related factors in determining scrapie phenotypes. With regard to genetics, our study confirms that the K222 mutation protects goats even against ovine scrapie isolates, and for the first time, a possible association of D145 mutation with scrapie resistance is shown. In addition, it is possible that the sole diverse frequencies of these genetic variants might, at least in part, shape the prevalence of scrapie among naturally exposed progenies in affected herds. IMPORTANCE This study was aimed at investigating the genetic and pathological features characterizing sheep-to-goat transmission of scrapie. We show that in goats with different prion protein gene mutations, the K222 genetic variant is associated with scrapie resistance after natural and experimental exposure to ovine prion infectivity. In addition, we observed for the first time a protective effect of the D145 goat variant against scrapie. Importantly, our results demonstrate that the phenotypic characteristic of the wild-type sheep scrapie isolate is substantially preserved in goats carrying different susceptible PRNP gene variants, thus indicating that the prion protein gene sequence, which is shared by sheep and goats, plays a fundamental role in determining scrapie phenotypes. PMID:26202249
Under EPA's Environmental Technology Verification Program, Research Triangle Institute (RTI) will operate the Air Pollution Control Technology Center to verify the filtration efficiency and bioaerosol inactivation efficiency of heating, ventilation and air conditioning air cleane...
Efficient universal blind quantum computation.
Giovannetti, Vittorio; Maccone, Lorenzo; Morimae, Tomoyuki; Rudolph, Terry G
2013-12-06
We give a cheat sensitive protocol for blind universal quantum computation that is efficient in terms of computational and communication resources: it allows one party to perform an arbitrary computation on a second party's quantum computer without revealing either which computation is performed, or its input and output. The first party's computational capabilities can be extremely limited: she must only be able to create and measure single-qubit superposition states. The second party is not required to use measurement-based quantum computation. The protocol requires the (optimal) exchange of O(Jlog2(N)) single-qubit states, where J is the computational depth and N is the number of qubits needed for the computation.
Miyagi, Michiko; Yokoyama, Hirokazu; Hibi, Toshifumi
2007-07-01
An HPLC protocol for sugar microanalysis based on the formation of ultraviolet-absorbing benzoyl chloride derivatives was improved. Here, samples were prepared with a C-8 cartridge and analyzed with a high efficiency ODS column, in which porous spherical silica particles 3 microm in diameter were packed. These devices allowed us to simultaneously quantify multiple sugars and sugar alcohols up to 10 ng/ml and to provide satisfactory separations of some sugars, such as fructose and myo-inositol and sorbitol and mannitol. This protocol, which does not require special apparatuses, should become a powerful tool in sugar research.
Sivakumar, B; Bhalaji, N; Sivakumar, D
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.
Sivakumar, B.; Bhalaji, N.; Sivakumar, D.
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing. PMID:24790546
Felizardo, V O; Melo, C C V; Murgas, L D S; Andrade, E S; Navarro, R D; Ftreitas, T F
BACKGROUND: Cryopreserved semen could facilitate procedures during the artificial reproduction in fish. Factors affecting cryopreservation efficiency are important to define efficient protocols. This study investigated the application of cryoprotectants on the quality of piracanjuba fish semen, the sperm concentration required for oocyte fertilization and spermatic activation. We evaluated two intracellular cryoprotectant solutions (DMSO and methanol) and two extracellular cryoprotectant solutions (egg yolk and lactose) to cryopreserved piracanjuba semen. Sperm motility rate, motility duration and spermatic alterations were assessed. The protocol for piracanjuba semen cryopreservation can use solutions including either DMSO or methanol as intracellular cryoprotectant and egg yolk or lactose as extracellular cryoprotectants.
Calce, Enrica; Mercurio, Flavia Anna; Leone, Marilisa; Saviano, Michele; De Luca, Stefania
2016-06-05
An environmentally sustainable and energy-efficient synthetic process has been developed to prepare hyaluronan-based nano-sized material. It consists in a microwave-promoted acylation of the hydroxyl function of the polysaccharide with natural fatty acids, performed under solvent-free conditions. The efficient interaction of the solid reagents with the MW radiation accounts for the obtained high yielded products. The self-assembly process of the obtained compounds very fast occurred in an aqueous medium under MW-radiation, thus allowing the development of a green protocol for the nano-particles preparation. Copyright © 2016 Elsevier Ltd. All rights reserved.
Evaluation of Small Intestine Grafts Decellularization Methods for Corneal Tissue Engineering
Oliveira, Ana Celeste; Garzón, Ingrid; Ionescu, Ana Maria; Carriel, Victor; Cardona, Juan de la Cruz; González-Andrades, Miguel; Pérez, María del Mar; Alaminos, Miguel; Campos, Antonio
2013-01-01
Advances in the development of cornea substitutes by tissue engineering techniques have focused on the use of decellularized tissue scaffolds. In this work, we evaluated different chemical and physical decellularization methods on small intestine tissues to determine the most appropriate decellularization protocols for corneal applications. Our results revealed that the most efficient decellularization agents were the SDS and triton X-100 detergents, which were able to efficiently remove most cell nuclei and residual DNA. Histological and histochemical analyses revealed that collagen fibers were preserved upon decellularization with triton X-100, NaCl and sonication, whereas reticular fibers were properly preserved by decellularization with UV exposure. Extracellular matrix glycoproteins were preserved after decellularization with SDS, triton X-100 and sonication, whereas proteoglycans were not affected by any of the decellularization protocols. Tissue transparency was significantly higher than control non-decellularized tissues for all protocols, although the best light transmittance results were found in tissues decellularized with SDS and triton X-100. In conclusion, our results suggest that decellularized intestinal grafts could be used as biological scaffolds for cornea tissue engineering. Decellularization with triton X-100 was able to efficiently remove all cells from the tissues while preserving tissue structure and most fibrillar and non-fibrillar extracellular matrix components, suggesting that this specific decellularization agent could be safely used for efficient decellularization of SI tissues for cornea TE applications. PMID:23799114
Role of messenger RNA-ribosome complex in complementary DNA display.
Naimuddin, Mohammed; Ohtsuka, Isao; Kitamura, Koichiro; Kudou, Motonori; Kimura, Shinnosuke
2013-07-15
In vitro display technologies such as ribosome display and messenger RNA (mRNA)/complementary DNA (cDNA) display are powerful methods that can generate library diversities on the order of 10(10-14). However, in mRNA and cDNA display methods, the end use diversity is two orders of magnitude lower than initial diversity and is dependent on the downstream processes that act as limiting factors. We found that in our previous cDNA display protocol, the purification of protein fusions by the use of streptavidin matrices from cell-free translation mixtures had poor efficiency (∼10-15%) that seriously affected the diversity of the purified library. Here, we have investigated and optimized the protocols that provided remarkable purification efficiencies. The stalled ribosome in the mRNA-ribosome complex was found to impede this purification efficiency. Among the various conditions tested, destabilization of ribosomes by appropriate concentration of metal chelating agents in combination with an optimal temperature of 30°C were found to be crucial and effective for nearly complete isolation of protein fusions from the cell-free translation system. Thus, this protocol provided 8- to 10-fold increased efficiency of purification over the previous method and results in retaining the diversity of the library by approximately an order of magnitude-important for directed evolution. We also discuss the possible effects in the fabrication of protein chips. Copyright © 2013 Elsevier Inc. All rights reserved.
Masani, Mat Yunus Abdul; Noll, Gundula A; Parveez, Ghulam Kadir Ahmad; Sambanthamurthi, Ravigadevi; Prüfer, Dirk
2014-01-01
Genetic engineering remains a major challenge in oil palm (Elaeis guineensis) because particle bombardment and Agrobacterium-mediated transformation are laborious and/or inefficient in this species, often producing chimeric plants and escapes. Protoplasts are beneficial as a starting material for genetic engineering because they are totipotent, and chimeras are avoided by regenerating transgenic plants from single cells. Novel approaches for the transformation of oil palm protoplasts could therefore offer a new and efficient strategy for the development of transgenic oil palm plants. We recently achieved the regeneration of healthy and fertile oil palms from protoplasts. Therefore, we focused on the development of a reliable PEG-mediated transformation protocol for oil palm protoplasts by establishing and validating optimal heat shock conditions, concentrations of DNA, PEG and magnesium chloride, and the transfection procedure. We also investigated the transformation of oil palm protoplasts by DNA microinjection and successfully regenerated transgenic microcalli expressing green fluorescent protein as a visible marker to determine the efficiency of transformation. We have established the first successful protocols for the transformation of oil palm protoplasts by PEG-mediated transfection and DNA microinjection. These novel protocols allow the rapid and efficient generation of non-chimeric transgenic callus and represent a significant milestone in the use of protoplasts as a starting material for the development of genetically-engineered oil palm plants.
Efficient Transformation of Oil Palm Protoplasts by PEG-Mediated Transfection and DNA Microinjection
Masani, Mat Yunus Abdul; Noll, Gundula A.; Parveez, Ghulam Kadir Ahmad; Sambanthamurthi, Ravigadevi; Prüfer, Dirk
2014-01-01
Background Genetic engineering remains a major challenge in oil palm (Elaeis guineensis) because particle bombardment and Agrobacterium-mediated transformation are laborious and/or inefficient in this species, often producing chimeric plants and escapes. Protoplasts are beneficial as a starting material for genetic engineering because they are totipotent, and chimeras are avoided by regenerating transgenic plants from single cells. Novel approaches for the transformation of oil palm protoplasts could therefore offer a new and efficient strategy for the development of transgenic oil palm plants. Methodology/Principal Findings We recently achieved the regeneration of healthy and fertile oil palms from protoplasts. Therefore, we focused on the development of a reliable PEG-mediated transformation protocol for oil palm protoplasts by establishing and validating optimal heat shock conditions, concentrations of DNA, PEG and magnesium chloride, and the transfection procedure. We also investigated the transformation of oil palm protoplasts by DNA microinjection and successfully regenerated transgenic microcalli expressing green fluorescent protein as a visible marker to determine the efficiency of transformation. Conclusions/Significance We have established the first successful protocols for the transformation of oil palm protoplasts by PEG-mediated transfection and DNA microinjection. These novel protocols allow the rapid and efficient generation of non-chimeric transgenic callus and represent a significant milestone in the use of protoplasts as a starting material for the development of genetically-engineered oil palm plants. PMID:24821306
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Goryczka, Slawomir; Xiong, Li
2016-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.
Goryczka, Slawomir; Xiong, Li
2017-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.
Network and User-Perceived Performance of Web Page Retrievals
NASA Technical Reports Server (NTRS)
Kruse, Hans; Allman, Mark; Mallasch, Paul
1998-01-01
The development of the HTTP protocol has been driven by the need to improve the network performance of the protocol by allowing the efficient retrieval of multiple parts of a web page without the need for multiple simultaneous TCP connections between a client and a server. We suggest that the retrieval of multiple page elements sequentially over a single TCP connection may result in a degradation of the perceived performance experienced by the user. We attempt to quantify this perceived degradation through the use of a model which combines a web retrieval simulation and an analytical model of TCP operation. Starting with the current HTTP/l.1 specification, we first suggest a client@side heuristic to improve the perceived transfer performance. We show that the perceived speed of the page retrieval can be increased without sacrificing data transfer efficiency. We then propose a new client/server extension to the HTTP/l.1 protocol to allow for the interleaving of page element retrievals. We finally address the issue of the display of advertisements on web pages, and in particular suggest a number of mechanisms which can make efficient use of IP multicast to send advertisements to a number of clients within the same network.
Swartz, Elliot W; Baek, Jaeyun; Pribadi, Mochtar; Wojta, Kevin J; Almeida, Sandra; Karydas, Anna; Gao, Fen-Biao; Miller, Bruce L; Coppola, Giovanni
2016-11-01
: Induced pluripotent stem cells (iPSCs) offer an unlimited resource of cells to be used for the study of underlying molecular biology of disease, therapeutic drug screening, and transplant-based regenerative medicine. However, methods for the directed differentiation of skeletal muscle for these purposes remain scarce and incomplete. Here, we present a novel, small molecule-based protocol for the generation of multinucleated skeletal myotubes using eight independent iPSC lines. Through combinatorial inhibition of phosphoinositide 3-kinase (PI3K) and glycogen synthase kinase 3β (GSK3β) with addition of bone morphogenic protein 4 (BMP4) and fibroblast growth factor 2 (FGF2), we report up to 64% conversion of iPSCs into the myogenic program by day 36 as indicated by MYOG + cell populations. These cells began to exhibit spontaneous contractions as early as 34 days in vitro in the presence of a serum-free medium formulation. We used this protocol to obtain iPSC-derived muscle cells from frontotemporal dementia (FTD) patients harboring C9orf72 hexanucleotide repeat expansions (rGGGGCC), sporadic FTD, and unaffected controls. iPSCs derived from rGGGGCC carriers contained RNA foci but did not vary in differentiation efficiency when compared to unaffected controls nor display mislocalized TDP-43 after as many as 120 days in vitro. This study presents a rapid, efficient, and transgene-free method for generating multinucleated skeletal myotubes from iPSCs and a resource for further modeling the role of skeletal muscle in amyotrophic lateral sclerosis and other motor neuron diseases. Protocols to produce skeletal myotubes for disease modeling or therapy are scarce and incomplete. The present study efficiently generates functional skeletal myotubes from human induced pluripotent stem cells using a small molecule-based approach. Using this strategy, terminal myogenic induction of up to 64% in 36 days and spontaneously contractile myotubes within 34 days were achieved. Myotubes derived from patients carrying the C9orf72 repeat expansion show no change in differentiation efficiency and normal TDP-43 localization after as many as 120 days in vitro when compared to unaffected controls. This study provides an efficient, novel protocol for the generation of skeletal myotubes from human induced pluripotent stem cells that may serve as a valuable tool in drug discovery and modeling of musculoskeletal and neuromuscular diseases. ©AlphaMed Press.
Design and Evaluation of Complex Moving HIFU Treatment Protocols
NASA Astrophysics Data System (ADS)
Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.
2005-03-01
The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Near-optimal protocols in complex nonequilibrium transformations
Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...
2016-08-29
The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less
Multiparty Quantum Key Agreement Based on Quantum Search Algorithm
Cao, Hao; Ma, Wenping
2017-01-01
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610
An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks.
Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal
2015-11-17
Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.
An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks
Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal
2015-01-01
Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics. PMID:26593924
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Analysis of energy efficient routing protocols for implementation of a ubiquitous health system
NASA Astrophysics Data System (ADS)
Kwon, Jongwon; Park, Yongman; Koo, Sangjun; Ayurzana, Odgeral; Kim, Hiesik
2007-12-01
The innovative Ubiquitous-Health was born through convergence of medical service, with development of up to date information technologies and ubiquitous IT. The U-Health can be applied to a variety of special situations for managing functions of each medical center efficiently. This paper focuses on estimation of various routing protocols for implementation of U-health monitoring system. In order to facilitate wireless communication over the network, a routing protocol on the network layer is used to establish precise and efficient route between sensor nodes so that information acquired from sensors may be delivered in a timely manner. A route establishment should be considered to minimize overhead, data loss and power consumption because wireless networks for U-health are organized by a large number of sensor nodes which are small in size and have limited processing power, memory and battery life. In this paper a overview of wireless sensor network technologies commonly known is described as well as evaluation of three multi hop routing protocols which are flooding, gossiping and modified low energy adaptive clustering hierarchy(LEACH) for use with these networks using TOSSIM simulator. As a result of evaluation the integrated wireless sensor board was developed in particular. The board is embedded device based on AVR128 porting TinyOS. Also it employs bio sensor measures blood pressure, pulse frequency and ZigBee module for wireless communication. This paper accelerates the digital convergence age through continual research and development of technologies related the U-Health.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-03-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-06-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Scalability enhancement of AODV using local link repairing
NASA Astrophysics Data System (ADS)
Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.
2014-09-01
Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.
NASA Astrophysics Data System (ADS)
Yang, YuGuang; Zhang, YuChen; Xu, Gang; Chen, XiuBo; Zhou, Yi-Hua; Shi, WeiMin
2018-03-01
Li et al. first proposed a quantum hash function (QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or π-phase interactions at each iteration depends on a message bit. In this paper, we propose an efficient QHF by dense coding of coin operators in discrete-time quantum walk. Compared with existing QHFs, our protocol has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved. It is a clue to apply the dense coding technique to quantum cryptographic protocols, especially to the applications with restricted quantum resources.
Efficiency and large deviations in time-asymmetric stochastic heat engines
Gingrich, Todd R.; Rotskoff, Grant M.; Vaikuntanathan, Suriyanarayanan; ...
2014-10-24
In a stochastic heat engine driven by a cyclic non-equilibrium protocol, fluctuations in work and heat give rise to a fluctuating efficiency. Using computer simulations and tools from large deviation theory, we have examined these fluctuations in detail for a model two-state engine. We find in general that the form of efficiency probability distributions is similar to those described by Verley et al (2014 Nat. Commun. 5 4721), in particular featuring a local minimum in the long-time limit. In contrast to the time-symmetric engine protocols studied previously, however, this minimum need not occur at the value characteristic of a reversible Carnot engine. Furthermore, while the local minimum may reside at the global minimum of a large deviation rate function, it does not generally correspond to the least likely efficiency measured over finite time. Lastly, we introduce a general approximation for the finite-time efficiency distribution,more » $$P(\\eta )$$, based on large deviation statistics of work and heat, that remains very accurate even when $$P(\\eta )$$ deviates significantly from its large deviation form.« less
Manhães, Ana Marcia E de A; de Oliveira, Marcos V V; Shan, Libo
2015-01-01
Several VIGS protocols have been established for high-throughput functional genomic screens as it bypasses the time-consuming and laborious process of generation of transgenic plants. The silencing efficiency in this approach is largely hindered by a technically demanding step in which the first pair of newly emerged true leaves at the 2-week-old stage are infiltrated with a needleless syringe. To further optimize VIGS efficiency and achieve rapid inoculation for a large-scale functional genomic study, here we describe a protocol of an efficient VIGS assay in Arabidopsis using Agrobacterium-mediated rubbing infection. The Agrobacterium inoculation is performed by simply rubbing the leaves with Filter Agent Celite(®) 545. The highly efficient and uniform silencing effect was indicated by the development of a visibly albino phenotype due to silencing of the Cloroplastos alterados 1 (CLA1) gene in the newly emerged leaves. In addition, the albino phenotype could be observed in stems and flowers, indicating its potential application for gene functional studies in the late vegetative development and flowering stages.
Management of Energy Consumption on Cluster Based Routing Protocol for MANET
NASA Astrophysics Data System (ADS)
Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi
The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Romberger, Jeff
The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions.
NASA Astrophysics Data System (ADS)
Guiraldello, Rafael T.; Martins, Marcelo L.; Mancera, Paulo F. A.
2016-08-01
We present a mathematical model based on partial differential equations that is applied to understand tumor development and its response to chemotherapy. Our primary aim is to evaluate comparatively the efficacies of two chemotherapeutic protocols, Maximum Tolerated Dose (MTD) and metronomic, as well as two methods of drug delivery. Concerning therapeutic outcomes, the metronomic protocol proves more effective in prolonging the patient's life than MTD. Moreover, a uniform drug delivery method combined with the metronomic protocol is the most efficient strategy to reduce tumor density.
Private database queries based on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Jia-Li; Guo, Fen-Zhuo; Gao, Fei; Liu, Bin; Wen, Qiao-Yan
2013-08-01
Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve quantum private database queries, which is a theoretical study of how counterfactuality can be employed beyond counterfactual quantum key distribution (QKD). By adding crucial detecting apparatus to the device of QKD, the privacy of both the distrustful user and the database owner can be guaranteed. Furthermore, the proposed private-database-query protocol makes full use of the low efficiency in the counterfactual QKD, and by adjusting the relevant parameters, the protocol obtains excellent flexibility and extensibility.
NASA Astrophysics Data System (ADS)
Zhou, Zheng; Liu, Chen; Shen, Wensheng; Dong, Zhen; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan; Kang, Jinfeng
2017-04-01
A binary spike-time-dependent plasticity (STDP) protocol based on one resistive-switching random access memory (RRAM) device was proposed and experimentally demonstrated in the fabricated RRAM array. Based on the STDP protocol, a novel unsupervised online pattern recognition system including RRAM synapses and CMOS neurons is developed. Our simulations show that the system can efficiently compete the handwritten digits recognition task, which indicates the feasibility of using the RRAM-based binary STDP protocol in neuromorphic computing systems to obtain good performance.
Turf Conversion Measurement and Verification Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge
This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.
Social Protocols for Agile Virtual Teams
NASA Astrophysics Data System (ADS)
Picard, Willy
Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.
Remote Entanglement by Coherent Multiplication of Concurrent Quantum Signals
NASA Astrophysics Data System (ADS)
Roy, Ananda; Jiang, Liang; Stone, A. Douglas; Devoret, Michel
2015-10-01
Concurrent remote entanglement of distant, noninteracting quantum entities is a crucial function for quantum information processing. In contrast with the existing protocols which employ the addition of signals to generate entanglement between two remote qubits, the continuous variable protocol we present is based on the multiplication of signals. This protocol can be straightforwardly implemented by a novel Josephson junction mixing circuit. Our scheme would be able to generate provable entanglement even in the presence of practical imperfections: finite quantum efficiency of detectors and undesired photon loss in current state-of-the-art devices.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Song, Fang
2016-06-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.
Yang, Wei; Huang, Liusheng; Song, Fang
2016-06-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.
Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay
Yang, Wei; Huang, Liusheng; Song, Fang
2016-01-01
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078
40 CFR 52.320 - Identification of plan.
Code of Federal Regulations, 2012 CFR
2012-07-01
... of Group II VOC sources were submitted on January 6, 1981, and the supplemental information received... Gasoline Transfer at Bulk Plants-Vapor Balance System), and D (Test Procedures for Annual Pressure/Vacuum... recent EPA capture efficiency protocols, and the commitment to adopt federal capture efficiency test...
40 CFR 52.320 - Identification of plan.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of Group II VOC sources were submitted on January 6, 1981, and the supplemental information received... at Bulk Plants-Vapor Balance System), and D (Test Procedures for Annual Pressure/Vacuum Testing of... recent EPA capture efficiency protocols, and the commitment to adopt federal capture efficiency test...
40 CFR 52.320 - Identification of plan.
Code of Federal Regulations, 2013 CFR
2013-07-01
... of Group II VOC sources were submitted on January 6, 1981, and the supplemental information received... at Bulk Plants-Vapor Balance System), and D (Test Procedures for Annual Pressure/Vacuum Testing of... recent EPA capture efficiency protocols, and the commitment to adopt federal capture efficiency test...
DOE Office of Scientific and Technical Information (OSTI.GOV)
J. Dentz, F. Conlin, D. Podorson, and K. Alaigh
2014-08-01
In this project, Building America team ARIES worked with two public housing authorities (PHA) to develop packages of energy efficiency retrofit measures the PHAs can cost effectively implement at the time when units are refurbished between occupancies.
Necessary detection efficiencies for secure quantum key distribution and bound randomness
NASA Astrophysics Data System (ADS)
Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul
2016-01-01
In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.
Wang, Gang; Yang, Luhan; Grishin, Dennis; Rios, Xavier; Ye, Lillian Y; Hu, Yong; Li, Kai; Zhang, Donghui; Church, George M; Pu, William T
2017-01-01
Genome editing of human induced pluripotent stem cells (hiPSCs) offers unprecedented opportunities for in vitro disease modeling and personalized cell replacement therapy. The introduction of Cas9-directed genome editing has expanded adoption of this approach. However, marker-free genome editing using standard protocols remains inefficient, yielding desired targeted alleles at a rate of ∼1-5%. We developed a protocol based on a doxycycline-inducible Cas9 transgene carried on a piggyBac transposon to enable robust and highly efficient Cas9-directed genome editing, so that a parental line can be expeditiously engineered to harbor many separate mutations. Treatment with doxycycline and transfection with guide RNA (gRNA), donor DNA and piggyBac transposase resulted in efficient, targeted genome editing and concurrent scarless transgene excision. Using this approach, in 7 weeks it is possible to efficiently obtain genome-edited clones with minimal off-target mutagenesis and with indel mutation frequencies of 40-50% and homology-directed repair (HDR) frequencies of 10-20%.
2014-01-01
This article attempts to define terminology and to describe a process for writing adaptive, early phase study protocols which are transparent, self-intuitive and uniform. It provides a step by step guide, giving templates from projects which received regulatory authorisation and were successfully performed in the UK. During adaptive studies evolving data is used to modify the trial design and conduct within the protocol-defined remit. Adaptations within that remit are documented using non-substantial protocol amendments which do not require regulatory or ethical review. This concept is efficient in gathering relevant data in exploratory early phase studies, ethical and time- and cost-effective. PMID:24980283
Borrás-Blasco, Joaquín; Casterá, M Dolores-Elvira; Cortes, Xavier; Rosique-Robles, J Dolores; Abad, F Javier
2014-11-01
Until 2010 the cost of biological treatments in Rheumatoid Arthritis (RA) was increasing annually by 15% in our hospital. In 1st January 2011, a Hospital Commission of Biological Therapies involving rheumatology and pharmacy services was created to improve the management of biological drugs and a biological therapy prioritization protocol in RA patients was also established to improve the efficient usage of biological drugs in RA. To evaluate the economic impact associated with a biological therapy prioritization protocol for RA patients in the Hospital of Sagunto. Observational, ambispective study comparing the associated cost of RA patients treated with biological drugs in the pre-protocol (2009 - 2010) versus post-protocol periods (2011 - 2012). RA patients treated with Abatacept (ABA), Adalimumab (ADA), Etanercept (ETN) or Infliximab (IFX) for at least 6 months during the study period (2009 - 2012) were included. In 2012, Tocilizumab (TCZ) was also included in the prioritization protocol. Prioritization protocol was established based on both clinical and economical aspects and supervised case by case by our Commission. Cost savings and economic impact were calculated using Spanish official prices. In the pre-protocol period (2009 - 2010), total expenses were increasing by €110,000, up to €1,761,000 in 2010 (€11,362 pat/year). After protocol implementation, total expenses decreased by 53,676€ on the 2010 - 2011 period, and 149,200€ on the 2011 - 2012 period. On the 2010 - 2011 period the cost of biological therapy per patient-year decreased 355€ (11,007€ pat/year) and additional 653€ (up to 10,354€ pat/year) by 2012, with a cumulative effect of the protocol implementation of 1,008€ per patient-year. In the pre-protocol period (2009), the annual cost/patient was 10.812€ with ETN, 10.942€ with IFX, 12.961€ with ADA and 12.739€ with ABA. By 1st January 2013, the annual cost per patient was 9,469€ with ETN, 10,579€ with IFX, 11,117€ with ADA, 13,540€ with ABA and 14,932€ with TCZ. The creation of our Commission of Biological Therapies is key to rational management of RA patients and optimization of resources, allowing us to save 200,000€ after 2-year efficiency protocol implementation.
Konishi, Tatsunori; Harata, Masahiko
2014-01-01
We show here that the transformation efficiency of Saccharomyces cerevisiae is improved by altering carbon sources in media for pre-culturing cells prior to the transformation reactions. The transformation efficiency was increased up to sixfold by combination with existing transformation protocols. This method is widely applicable for yeast research since efficient transformation can be performed easily without changing any of the other procedures in the transformation.
A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-12-01
Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.
Privacy-Preserving Classifier Learning
NASA Astrophysics Data System (ADS)
Brickell, Justin; Shmatikov, Vitaly
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database held by a remote server without learning any additional information about the records held in the database. The server does not learn anything about the constructed classifier, not even the user’s choice of feature and class attributes.
Diagnostic multiplex PCR for toxin genotyping of Clostridium perfringens isolates.
Baums, Christoph G; Schotte, Ulrich; Amtsberg, Gunter; Goethe, Ralph
2004-05-20
In this study we provide a protocol for genotyping Clostridium perfringens with a new multiplex PCR. This PCR enables reliable and specific detection of the toxin genes cpa, cpb, etx, iap, cpe and cpb2 from heat lysed bacterial suspensions. The efficiency of the protocol was demonstrated by typing C. perfringens reference strains and isolates from veterinary bacteriological routine diagnostic specimens.
Khazaei, Mohamad; Ahuja, Christopher S; Fehlings, Michael G
2017-08-14
This unit describes protocols for the efficient generation of oligodendrogenic neural progenitor cells (o-NPCs) from human induced pluripotent stem cells (hiPSCs). Specifically, detailed methods are provided for the maintenance and differentiation of hiPSCs, human induced pluripotent stem cell-derived neural progenitor cells (hiPS-NPCs), and human induced pluripotent stem cell-oligodendrogenic neural progenitor cells (hiPSC-o-NPCs) with the final products being suitable for in vitro experimentation or in vivo transplantation. Throughout, cell exposure to growth factors and patterning morphogens has been optimized for both concentration and timing, based on the literature and empirical experience, resulting in a robust and highly efficient protocol. Using this derivation procedure, it is possible to obtain millions of oligodendrogenic-NPCs within 40 days of initial cell plating which is substantially shorter than other protocols for similar cell types. This protocol has also been optimized to use translationally relevant human iPSCs as the parent cell line. The resultant cells have been extensively characterized both in vitro and in vivo and express key markers of an oligodendrogenic lineage. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley and Sons, Inc.
Towards an improved LAI collection protocol via simulated field-based PAR sensing
Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; ...
2016-07-14
In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopymore » gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R 2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m 2/m 2)).« less
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan
2018-03-02
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
Ding, Jie; Zhu, Feng; Wang, Ruchuan
2018-01-01
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security. PMID:29498684
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-01-01
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142
A rapid and efficient SDS-based RNA isolation protocol from different tissues of coffee.
Huded, Arun Kumar C; Jingade, Pavankumar; Mishra, Manoj Kumar
2018-03-01
Isolation of high-quality RNA from coffee is challenging because of high level of polysaccharides, polyphenols and other secondary metabolites. In the present study, a rapid and efficient RNA extraction protocol from different tissues of coffee was optimized. Sufficiently high quality and quantity (225.6-454.8 µg/g) of RNA was obtained by using the optimized protocol. The presence of two distinct bands of 28S rRNA and 18S rRNA in agarose gel proved the intactness of the RNA samples. The average spectrophotometric values of the isolated RNA ranged from 1.96 to 2.02 ( A 260/280 ) and 1.95 to 2.14 ( A 260/230 ), indicating the high quality of RNA devoid of polyphenols, polysaccharides and protein contamination. In the optimized protocol, addition of PVPP to the extraction buffer and a brief incubation of samples at 65 °C and subsequent purification with potassium acetate resulted in good-quality RNA isolation. The suitability of RNA for downstream processing was confirmed by PCR amplification with cytochrome c oxidase gene-specific primers. The amplification of a single 392 bp fragment using cDNA and 1.5 kb fragment using genomic DNA samples confirmed the absence of DNA contamination. The present protocol is rapid and yielded good quality and quantity of RNA suitable for functional genomics studies.
Chang, Yuchao; Tang, Hongying; Cheng, Yongbo; Zhao, Qin; Yuan, Baoqing Li andXiaobing
2017-07-19
Routing protocols based on topology control are significantly important for improving network longevity in wireless sensor networks (WSNs). Traditionally, some WSN routing protocols distribute uneven network traffic load to sensor nodes, which is not optimal for improving network longevity. Differently to conventional WSN routing protocols, we propose a dynamic hierarchical protocol based on combinatorial optimization (DHCO) to balance energy consumption of sensor nodes and to improve WSN longevity. For each sensor node, the DHCO algorithm obtains the optimal route by establishing a feasible routing set instead of selecting the cluster head or the next hop node. The process of obtaining the optimal route can be formulated as a combinatorial optimization problem. Specifically, the DHCO algorithm is carried out by the following procedures. It employs a hierarchy-based connection mechanism to construct a hierarchical network structure in which each sensor node is assigned to a special hierarchical subset; it utilizes the combinatorial optimization theory to establish the feasible routing set for each sensor node, and takes advantage of the maximum-minimum criterion to obtain their optimal routes to the base station. Various results of simulation experiments show effectiveness and superiority of the DHCO algorithm in comparison with state-of-the-art WSN routing algorithms, including low-energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering (HEED), genetic protocol-based self-organizing network clustering (GASONeC), and double cost function-based routing (DCFR) algorithms.
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-06-17
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.
An ultra-low power wireless sensor network for bicycle torque performance measurements.
Gharghan, Sadik K; Nordin, Rosdiadee; Ismail, Mahamod
2015-05-21
In this paper, we propose an energy-efficient transmission technique known as the sleep/wake algorithm for a bicycle torque sensor node. This paper aims to highlight the trade-off between energy efficiency and the communication range between the cyclist and coach. Two experiments were conducted. The first experiment utilised the Zigbee protocol (XBee S2), and the second experiment used the Advanced and Adaptive Network Technology (ANT) protocol based on the Nordic nRF24L01 radio transceiver chip. The current consumption of ANT was measured, simulated and compared with a torque sensor node that uses the XBee S2 protocol. In addition, an analytical model was derived to correlate the sensor node average current consumption with a crank arm cadence. The sensor node achieved 98% power savings for ANT relative to ZigBee when they were compared alone, and the power savings amounted to 30% when all components of the sensor node are considered. The achievable communication range was 65 and 50 m for ZigBee and ANT, respectively, during measurement on an outdoor cycling track (i.e., velodrome). The conclusions indicate that the ANT protocol is more suitable for use in a torque sensor node when power consumption is a crucial demand, whereas the ZigBee protocol is more convenient in ensuring data communication between cyclist and coach.
An Ultra-Low Power Wireless Sensor Network for Bicycle Torque Performance Measurements
Gharghan, Sadik K.; Nordin, Rosdiadee; Ismail, Mahamod
2015-01-01
In this paper, we propose an energy-efficient transmission technique known as the sleep/wake algorithm for a bicycle torque sensor node. This paper aims to highlight the trade-off between energy efficiency and the communication range between the cyclist and coach. Two experiments were conducted. The first experiment utilised the Zigbee protocol (XBee S2), and the second experiment used the Advanced and Adaptive Network Technology (ANT) protocol based on the Nordic nRF24L01 radio transceiver chip. The current consumption of ANT was measured, simulated and compared with a torque sensor node that uses the XBee S2 protocol. In addition, an analytical model was derived to correlate the sensor node average current consumption with a crank arm cadence. The sensor node achieved 98% power savings for ANT relative to ZigBee when they were compared alone, and the power savings amounted to 30% when all components of the sensor node are considered. The achievable communication range was 65 and 50 m for ZigBee and ANT, respectively, during measurement on an outdoor cycling track (i.e., velodrome). The conclusions indicate that the ANT protocol is more suitable for use in a torque sensor node when power consumption is a crucial demand, whereas the ZigBee protocol is more convenient in ensuring data communication between cyclist and coach. PMID:26007728
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-02
... Efficiency IMO International Maritime Organization MARPOL Protocol International Convention for the... rule. On July 15, 2011, in resolution MEPC.203(62), the International Maritime Organization's (IMO... think that your business, organization, or governmental jurisdiction qualifies as a small entity and...
N-aryl azacycloalkanes, an important class of building blocks in natural product and pharmaceuticals, are synthesized via an efficient and simple eco-friendly protocol that involves double N-alkylation of aniline derivatives. The reaction is accelerated by exposure to microwaves ...
An Efficient In Vitro Regeneration System for Ornamental Ginger (Hedychium spp.)
USDA-ARS?s Scientific Manuscript database
An improved and efficient regeneration protocol was established for Hedychium via somatic embryogenesis. The plant material used consisted of 11 species and 9 cultivars of Hedychium. The explants consisted of young leaves taken from lateral or terminal shoots of mature greenhouse grown plants. These...
An optimized immunohistochemistry protocol for detecting the guidance cue Netrin-1 in neural tissue.
Salameh, Samer; Nouel, Dominique; Flores, Cecilia; Hoops, Daniel
2018-01-01
Netrin-1, an axon guidance protein, is difficult to detect using immunohistochemistry. We performed a multi-step, blinded, and controlled protocol optimization procedure to establish an efficient and effective fluorescent immunohistochemistry protocol for characterizing Netrin-1 expression. Coronal mouse brain sections were used to test numerous antigen retrieval methods and combinations thereof in order to optimize the stain quality of a commercially available Netrin-1 antibody. Stain quality was evaluated by experienced neuroanatomists for two criteria: signal intensity and signal-to-noise ratio. After five rounds of testing protocol variants, we established a modified immunohistochemistry protocol that produced a Netrin-1 signal with good signal intensity and a high signal-to-noise ratio. The key protocol modifications are as follows: •Use phosphate buffer (PB) as the blocking solution solvent.•Use 1% sodium dodecyl sulfate (SDS) treatment for antigen retrieval. The original protocol was optimized for use with the Netrin-1 antibody produced by Novus Biologicals. However, we subsequently further modified the protocol to work with the antibody produced by Abcam. The Abcam protocol uses PBS as the blocking solution solvent and adds a citrate buffer antigen retrieval step.
Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-01-01
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415
Performance improvement in geographic routing for Vehicular Ad Hoc Networks.
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-11-25
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
Fayos, Oreto; Vallés, María P; Garcés-Claver, Ana; Mallor, Cristina; Castillo, Ana M
2015-01-01
The use of doubled haploids in onion breeding is limited due to the low gynogenesis efficiency of this species. Gynogenesis capacity from Spanish germplasm, including the sweet cultivar Fuentes de Ebro, the highly pungent landrace BGHZ1354 and the two Valenciana type commercial varieties Recas and Rita, was evaluated and optimized in this study. The OH-1 population, characterized by a high gynogenesis induction, was used as control. Growing conditions of the donor plants were tested with a one-step protocol and field plants produced a slightly higher percentage of embryogenesis induction than growth chamber plants. A one-step protocol was compared with a two-step protocol for embryogenesis induction. Spanish germplasm produced a 2-3 times higher percentage of embryogenesis with the two-step protocol, Recas showing the highest percentage (2.09%) and Fuentes de Ebro the lowest (0.53%). These percentages were significantly lower than those from the OH-1 population, with an average of 15% independently of the protocol used. The effect of different containers on plant regeneration was tested using both protocols. The highest percentage of acclimated plants was obtained with the two-step protocol in combination with Eco2box (70%), whereas the lowest percentage was observed with glass tubes in the two protocols (20-23%). Different amiprofos-methyl (APM) treatments were applied to embryos for chromosome doubling. A similar number of doubled haploid plants were recovered with 25 or 50 μM APM in liquid medium. However, the application of 25 μM in solid medium for 24 h produced the highest number of doubled haploid plants. Somatic regeneration from flower buds of haploid and mixoploid plants proved to be a successful approach for chromosome doubling, since diploid plants were obtained from the four regenerated lines. In this study, doubled haploid plants were produced from the four Spanish cultivars, however further improvements are needed to increase their gynogenesis efficiency.
Optimization of Agrobacterium-Mediated Transformation in Soybean.
Li, Shuxuan; Cong, Yahui; Liu, Yaping; Wang, Tingting; Shuai, Qin; Chen, Nana; Gai, Junyi; Li, Yan
2017-01-01
High transformation efficiency is a prerequisite for study of gene function and molecular breeding. Agrobacterium tumefaciens -mediated transformation is a preferred method in many plants. However, the transformation efficiency in soybean is still low. The objective of this study is to optimize Agrobacterium -mediated transformation in soybean by improving the infection efficiency of Agrobacterium and regeneration efficiency of explants. Firstly, four factors affecting Agrobacterium infection efficiency were investigated by estimation of the rate of GUS transient expression in soybean cotyledonary explants, including Agrobacterium concentrations, soybean explants, Agrobacterium suspension medium, and co-cultivation time. The results showed that an infection efficiency of over 96% was achieved by collecting the Agrobacterium at a concentration of OD 650 = 0.6, then using an Agrobacterium suspension medium containing 154.2 mg/L dithiothreitol to infect the half-seed cotyledonary explants (from mature seeds imbibed for 1 day), and co-cultured them for 5 days. The Agrobacterium infection efficiencies for soybean varieties Jack Purple and Tianlong 1 were higher than the other six varieties. Secondly, the rates of shoot elongation were compared among six different concentration combinations of gibberellic acid (GA 3 ) and indole-3-acetic acid (IAA). The shoot elongation rate of 34 and 26% was achieved when using the combination of 1.0 mg/L GA 3 and 0.1 mg/L IAA for Jack Purple and Tianlong 1, respectively. This rate was higher than the other five concentration combinations of GA 3 and IAA, with an 18 and 11% increase over the original laboratory protocol (a combination of 0.5 mg/L GA 3 and 0.1 mg/L IAA), respectively. The transformation efficiency was 7 and 10% for Jack Purple and Tianlong 1 at this optimized hormone concentration combination, respectively, which was 2 and 6% higher than the original protocol, respectively. Finally, GUS histochemical staining, PCR, herbicide (glufosinate) painting, and QuickStix Kit for Liberty Link ( bar ) were used to verify the positive transgenic plants, and absolute quantification PCR confirmed the exogenous gene existed as one to three copies in the soybean genome. This study provides an improved protocol for Agrobacterium -mediated transformation in soybean and a useful reference to improve the transformation efficiency in other plant species.
Secure and Efficient k-NN Queries⋆
Asif, Hafiz; Vaidya, Jaideep; Shafiq, Basit; Adam, Nabil
2017-01-01
Given the morass of available data, ranking and best match queries are often used to find records of interest. As such, k-NN queries, which give the k closest matches to a query point, are of particular interest, and have many applications. We study this problem in the context of the financial sector, wherein an investment portfolio database is queried for matching portfolios. Given the sensitivity of the information involved, our key contribution is to develop a secure k-NN computation protocol that can enable the computation k-NN queries in a distributed multi-party environment while taking domain semantics into account. The experimental results show that the proposed protocols are extremely efficient. PMID:29218333
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs
NASA Astrophysics Data System (ADS)
Mudassir, Mumajjed Ul; Akram, Adeel
In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.
Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang
2016-02-19
Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain.
Zinchenko, Anatoly A; Maeda, Noriko; Pu, Shengyan; Murata, Shizuaki
2013-05-07
We report a protocol for entrapping of various water-dispersed nanomaterials: fullerenes, multiwall carbon nanotubes, quantum dots (semiconductor nanoparticles), and gold nanorods, into a DNA-chitosan complex. In contrast to small-size nanomaterial particles, the bulky DNA-chitosan interpolyelectrolyte complex incorporating the dispersed nanomaterials can be easily separated from aqueous media by centrifugation, filtration, or decantation. While the removal of nanoparticles by centrifugation is equally efficient for every type of nanoparticles and reaches 100%, the higher efficiency of the nanomaterials removal by other two methods is favored by larger size of nanoparticles. The application of this entrapping protocol for removal of nanomaterials from water is discussed.
A review of recommendations for sequencing receptive and expressive language instruction.
Petursdottir, Anna Ingeborg; Carr, James E
2011-01-01
We review recommendations for sequencing instruction in receptive and expressive language objectives in early and intensive behavioral intervention (EIBI) programs. Several books recommend completing receptive protocols before introducing corresponding expressive protocols. However, this recommendation has little empirical support, and some evidence exists that the reverse sequence may be more efficient. Alternative recommendations include teaching receptive and expressive skills simultaneously (M. L. Sundberg & Partington, 1998) and building learning histories that lead to acquisition of receptive and expressive skills without direct instruction (Greer & Ross, 2008). Empirical support for these recommendations also is limited. Future research should assess the relative efficiency of receptive-before-expressive, expressive-before-receptive, and simultaneous training with children who have diagnoses of autism spectrum disorders. In addition, further evaluation is needed of the potential benefits of multiple-exemplar training and other variables that may influence the efficiency of receptive and expressive instruction.
Fast and efficient three-step target-specific curing of a virulence plasmid in Salmonella enterica.
de Moraes, Marcos H; Teplitski, Max
2015-12-01
Virulence plasmids borne by serovars of Salmonella enterica carry genes involved in its pathogenicity, as well as other functions. Characterization of phenotypes associated with virulence plasmids requires a system for efficiently curing strains of their virulence plasmids. Here, we developed a 3-step protocol for targeted curing of virulence plasmids. The protocol involves insertion of an I-SecI restriction site linked to an antibiotic resistance gene into the target plasmid using λ-Red mutagenesis, followed by the transformation with a temperature-sensitive auxiliary plasmid which carries I-SecI nuclease expressed from a tetracycline-inducible promoter. Finally, the auxiliary plasmid is removed by incubation at 42 °C and the plasmid-less strains are verified on antibiotic-containing media. This method is fast and very efficient: over 90 % of recovered colonies lacked their virulence plasmid.
A REVIEW OF RECOMMENDATIONS FOR SEQUENCING RECEPTIVE AND EXPRESSIVE LANGUAGE INSTRUCTION
Petursdottir, Anna Ingeborg; Carr, James E
2011-01-01
We review recommendations for sequencing instruction in receptive and expressive language objectives in early and intensive behavioral intervention (EIBI) programs. Several books recommend completing receptive protocols before introducing corresponding expressive protocols. However, this recommendation has little empirical support, and some evidence exists that the reverse sequence may be more efficient. Alternative recommendations include teaching receptive and expressive skills simultaneously (M. L. Sundberg & Partington, 1998) and building learning histories that lead to acquisition of receptive and expressive skills without direct instruction (Greer & Ross, 2008). Empirical support for these recommendations also is limited. Future research should assess the relative efficiency of receptive-before-expressive, expressive-before-receptive, and simultaneous training with children who have diagnoses of autism spectrum disorders. In addition, further evaluation is needed of the potential benefits of multiple-exemplar training and other variables that may influence the efficiency of receptive and expressive instruction. PMID:22219535
Shi, L; Fan, J Q; Hu, C G; Luo, J; Yao, J L
2012-02-03
The establishment of high-efficiency Agrobacterium-mediated transformation techniques could improve the production of Dioscorea zingiberensis, a medicinal species with a high diosgenin content. We co-cultivated embryogenic calli induced from mature seeds with A. tumefaciens strain EHA105. A binary vector, pCAMBIA1381, which contains the gfp and hpt genes under the control of the ubiquitin promoter and the CaMV 35S promoter, respectively, was used for transformation. Pre-culture, basic medium, acetosyringone, and bacterial density were evaluated to establish the most efficient protocol. The optimal conditions consisted of MS medium without CaCl(2) for pre- and co-cultivation, three days for pre-culture, addition of 200 μM AS, and an OD(600) of 0.5. The transgenic plants grown under selection were confirmed by PCR analysis and Southern blot analysis. This protocol produced transgenic D. zingiberensis plants in seven months, with a transformation efficiency of 6%.
Teleportation-based continuous variable quantum cryptography
NASA Astrophysics Data System (ADS)
Luiz, F. S.; Rigolin, Gustavo
2017-03-01
We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob. This protocol preserves the efficient detection schemes of current CV technology (no single-photon detection techniques) and, at the same time, has efficient error correction and privacy amplification schemes due to the binary modulation of the key. We show that for a certain type of incoherent attack, it is secure for almost any value of the transmittance of the optical line used by Alice to share entangled two-mode squeezed states with Bob (no 3 dB or 50% loss limitation characteristic of beam splitting attacks). The present CVQKD protocol works deterministically (no postselection needed) with efficient direct reconciliation techniques (no reverse reconciliation) in order to generate a secure key and beyond the 50% loss case at the incoherent attack level.
Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6
Jebaseeli Samuelraj, Ananthi; Jayapal, Sundararajan
2015-01-01
Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point. PMID:26366431
In Vitro Mass Propagation of Cymbopogon citratus Stapf., a Medicinal Gramineae.
Quiala, Elisa; Barbón, Raúl; Capote, Alina; Pérez, Naivy; Jiménez, Elio
2016-01-01
Cymbopogon citratus (D.C.) Stapf. is a medicinal plant source of lemon grass oils with multiple uses in the pharmaceutical and food industry. Conventional propagation in semisolid culture medium has become a fast tool for mass propagation of lemon grass, but the production cost must be lower. A solution could be the application of in vitro propagation methods based on liquid culture advantages and automation. This chapter provides two efficient protocols for in vitro propagation via organogenesis and somatic embryogenesis of this medicinal plant. Firstly, we report the production of shoots using a temporary immersion system (TIS). Secondly, a protocol for somatic embryogenesis using semisolid culture for callus formation and multiplication, and liquid culture in a rotatory shaker and conventional bioreactors for the maintenance of embryogenic culture, is described. Well-developed plants can be achieved from both protocols. Here we provide a fast and efficient technology for mass propagation of this medicinal plant taking the advantage of liquid culture and automation.
Multiple Object Based RFID System Using Security Level
NASA Astrophysics Data System (ADS)
Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha
2007-12-01
RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.
Medverd, Jonathan R; Cross, Nathan M; Font, Frank; Casertano, Andrew
2013-08-01
Radiologists routinely make decisions with only limited information when assigning protocol instructions for the performance of advanced medical imaging examinations. Opportunity exists to simultaneously improve the safety, quality and efficiency of this workflow through the application of an electronic solution leveraging health system resources to provide concise, tailored information and decision support in real-time. Such a system has been developed using an open source, open standards design for use within the Veterans Health Administration. The Radiology Protocol Tool Recorder (RAPTOR) project identified key process attributes as well as inherent weaknesses of paper processes and electronic emulators of paper processes to guide the development of its optimized electronic solution. The design provides a kernel that can be expanded to create an integrated radiology environment. RAPTOR has implications relevant to the greater health care community, and serves as a case model for modernization of legacy government health information systems.
Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Na; Goel, Supriya; Makhmalbaf, Atefe
The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in amore » way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.« less
Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.
Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan
2015-01-01
Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.
Single-Cell Semiconductor Sequencing
Kohn, Andrea B.; Moroz, Tatiana P.; Barnes, Jeffrey P.; Netherton, Mandy; Moroz, Leonid L.
2014-01-01
RNA-seq or transcriptome analysis of individual cells and small-cell populations is essential for virtually any biomedical field. It is especially critical for developmental, aging, and cancer biology as well as neuroscience where the enormous heterogeneity of cells present a significant methodological and conceptual challenge. Here we present two methods that allow for fast and cost-efficient transcriptome sequencing from ultra-small amounts of tissue or even from individual cells using semiconductor sequencing technology (Ion Torrent, Life Technologies). The first method is a reduced representation sequencing which maximizes capture of RNAs and preserves transcripts’ directionality. The second, a template-switch protocol, is designed for small mammalian neurons. Both protocols, from cell/tissue isolation to final sequence data, take up to 4 days. The efficiency of these protocols has been validated with single hippocampal neurons and various invertebrate tissues including individually identified neurons within a simpler memory-forming circuit of Aplysia californica and early (1-, 2-, 4-, 8-cells) embryonic and developmental stages from basal metazoans. PMID:23929110
An expeditious and efficient protocol for the synthesis of naphthopyrans has been developed that proceeds via one-pot three-component sequential reaction in water catalyzed by hydroxyapatite or sodium-modified-hydroxyapatite. The title compounds have been obtained in high yield a...
USDA-ARS?s Scientific Manuscript database
One refined and 2 crude glycerol samples were utilized to produce poly(3-hydroxybutyrate) (PHB) by Pseudomonas oleovorans NRRL B-14682. Fermentation conditions were determined to efficiently utilize glycerol while maintaining PHB yields. A batch culture protocol including 1% glycerol and an aerati...
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga
2016-10-01
Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.