Sample records for protocol ip address

  1. Network Analysis with SiLK

    DTIC Science & Technology

    2015-01-06

    Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol

  2. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  3. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  4. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    PubMed Central

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper. PMID:22164084

  5. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    PubMed

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  6. Running TCP/IP over ATM Networks.

    ERIC Educational Resources Information Center

    Witt, Michael

    1995-01-01

    Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)

  7. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  8. 47 CFR 64.613 - Numbering directory for Internet-based TRS users.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the user's Internet Protocol (IP) address. For each record associated with an IP Relay user, the URI... a VRS user's geographically appropriate NANP telephone number, the URI shall contain the IP address of the user's device. For each record associated with an IP Relay user's geographically appropriate...

  9. Packet flow monitoring tool and method

    DOEpatents

    Thiede, David R [Richland, WA

    2009-07-14

    A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

  10. A decentralized software bus based on IP multicas ting

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd

    1995-01-01

    We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.

  11. Autoconfiguration and Service Discovery

    NASA Astrophysics Data System (ADS)

    Manner, Jukka

    To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.

  12. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  13. Network Upgrade for the SLC: Control System Modifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Mackenzie, R.; Sass, R.

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  14. Technology: Cookies, Web Profilers, Social Network Cartography, and Proxy Servers

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…

  15. Bandwidth Management in Resource Constrained Networks

    DTIC Science & Technology

    2012-03-01

    Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching

  16. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  17. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP... waivers for one year because the record demonstrates that it is technologically infeasible for VRS and IP... standards for VRS and IP Relay will expire on July 1, 2011, or until the Commission addresses pending...

  18. How to Combine ChIP with qPCR.

    PubMed

    Asp, Patrik

    2018-01-01

    Chromatin immunoprecipitation (ChIP) coupled with quantitative PCR (qPCR) has in the last 15 years become a basic mainstream tool in genomic research. Numerous commercially available ChIP kits, qPCR kits, and real-time PCR systems allow for quick and easy analysis of virtually anything chromatin-related as long as there is an available antibody. However, the highly accurate quantitative dimension added by using qPCR to analyze ChIP samples significantly raises the bar in terms of experimental accuracy, appropriate controls, data analysis, and data presentation. This chapter will address these potential pitfalls by providing protocols and procedures that address the difficulties inherent in ChIP-qPCR assays.

  19. Pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wu, Shaochuan; Tan, Xuezhi

    2007-11-01

    By analyzing all kinds of address configuration algorithms, this paper provides a new pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks. Based on PRDAC, the first node that initials this network randomly chooses a nonlinear shift register that can generates an m-sequence. When another node joins this network, the initial node will act as an IP address configuration sever to compute an IP address according to this nonlinear shift register, and then allocates this address and tell the generator polynomial of this shift register to this new node. By this means, when other node joins this network, any node that has obtained an IP address can act as a server to allocate address to this new node. PRDAC can also efficiently avoid IP conflicts and deal with network partition and merge as same as prophet address (PA) allocation and dynamic configuration and distribution protocol (DCDP). Furthermore, PRDAC has less algorithm complexity, less computational complexity and more sufficient assumption than PA. In addition, PRDAC radically avoids address conflicts and maximizes the utilization rate of IP addresses. Analysis and simulation results show that PRDAC has rapid convergence, low overhead and immune from topological structures.

  20. Evaluating the Effectiveness of IP Hopping via an Address Routing Gateway

    DTIC Science & Technology

    2013-03-01

    37 DARPA Defense Advanced Research Projects Agency . . . . . . . . . . . . . . . . . . . . . . . . . . 20 DHCP Dynamic Host...Protocol ( DHCP ) to force the changes. Through the use of a slightly intelligent DHCP server that leases IPs for a only a short time frame (on the order of...tens of minutes) and only offers IPs that have not been used recently, most networks already using DHCP can quickly change to a randomized scheme. This

  1. Designing of routing algorithms in autonomous distributed data transmission system for mobile computing devices with ‘WiFi-Direct’ technology

    NASA Astrophysics Data System (ADS)

    Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.

    2017-02-01

    The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.

  2. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bauer, Gerry; et al.

    The DAQ system of the CMS experiment at CERN collects data from more than 600 custom detector Front-End Drivers (FEDs). During 2013 and 2014 the CMS DAQ system will undergo a major upgrade to address the obsolescence of current hardware and the requirements posed by the upgrade of the LHC accelerator and various detector components. For a loss-less data collection from the FEDs a new FPGA based card implementing the TCP/IP protocol suite over 10Gbps Ethernet has been developed. To limit the TCP hardware implementation complexity the DAQ group developed a simplified and unidirectional but RFC 793 compliant version ofmore » the TCP protocol. This allows to use a PC with the standard Linux TCP/IP stack as a receiver. We present the challenges and protocol modifications made to TCP in order to simplify its FPGA implementation. We also describe the interaction between the simplified TCP and Linux TCP/IP stack including the performance measurements.« less

  4. GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.

    1994-01-01

    The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number of bytes contained in each ransferred data packet. If GATEWAY detects an error during the data transfer, the sessions on both networks are terminated and the passive offer on the appropriate network is reissued. After performing the desired data transfer, one of the remote applications will send a network disconnect to the gateway to close its communication link. Upon detecting this network disconnect, GATEWAY replies with its own disconnect to ensure that the network connection has been fully terminated. Then, GATEWAY terminates its session with the other application by closing the communication link. GATEWAY has been implemented on a DEC VAX under VMS 4.7. It is written in ADA and has a central memory requirement of approximately 406K bytes. The communications protocols supported by GATEWAY are Network Systems Corporation's Network Executive (NETEX), Excelan's TCP/IP, and DECnet. GATEWAY was developed in 1988.

  5. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    PubMed Central

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  6. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    PubMed

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  7. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    NASA Astrophysics Data System (ADS)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.

  8. One Approach for Transitioning the iNET Standards into the IRIG 106 Telemetry Standards

    DTIC Science & Technology

    2015-05-26

    Protocol Suite. Figure 1 illustrates the Open Systems Interconnection ( OSI ) Model, the corresponding TCP/IP Model, and the major components of the TCP...IP Protocol Suite. Figure 2 represents the iNET-specific protocols layered onto the TCP/IP Model. Figure 1. OSI and TCP/IP Model with TCP/IP...Protocol Suite TCP/IP Protocol Suite Major Components IPv4 IPv6 TCP/IP Model OSI Model Application Presentation

  9. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  10. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...

  11. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Changeable HA to improve MIPv6 protocol

    NASA Astrophysics Data System (ADS)

    Hu, Qing-gui

    2015-12-01

    For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.

  13. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  14. Demonstrating a Realistic IP Mission Prototype

    NASA Technical Reports Server (NTRS)

    Rash, James; Ferrer, Arturo B.; Goodman, Nancy; Ghazi-Tehrani, Samira; Polk, Joe; Johnson, Lorin; Menke, Greg; Miller, Bill; Criscuolo, Ed; Hogie, Keith

    2003-01-01

    Flight software and hardware and realistic space communications environments were elements of recent demonstrations of the Internet Protocol (IP) mission concept in the lab. The Operating Missions as Nodes on the Internet (OMNI) Project and the Flight Software Branch at NASA/GSFC collaborated to build the prototype of a representative space mission that employed unmodified off-the-shelf Internet protocols and technologies for end-to-end communications between the spacecraft/instruments and the ground system/users. The realistic elements used in the prototype included an RF communications link simulator and components of the TRIANA mission flight software and ground support system. A web-enabled camera connected to the spacecraft computer via an Ethernet LAN represented an on-board instrument creating image data. In addition to the protocols at the link layer (HDLC), transport layer (UDP, TCP), and network (IP) layer, a reliable file delivery protocol (MDP) at the application layer enabled reliable data delivery both to and from the spacecraft. The standard Network Time Protocol (NTP) performed on-board clock synchronization with a ground time standard. The demonstrations of the prototype mission illustrated some of the advantages of using Internet standards and technologies for space missions, but also helped identify issues that must be addressed. These issues include applicability to embedded real-time systems on flight-qualified hardware, range of applicability of TCP, and liability for and maintenance of commercial off-the-shelf (COTS) products. The NASA Earth Science Technology Office (ESTO) funded the collaboration to build and demonstrate the prototype IP mission.

  15. A Real-Time System for Abusive Network Traffic Detection

    DTIC Science & Technology

    2011-03-01

    examine the spamming behavior at the network layer (IP layer) by correlating data collected from three sources: a sinkhole , a large e-mail provider, and...which spam originates • autonomous systems that sent spam messages to their sinkhole • BGP route announcements With respect to IP address space, their...applications or machines to communicate with each other. They exchange XML- formatted data [58] using the HTTP [59] protocol. Specifically, the client uses the

  16. Transition to an IP Environment. A Report of the Annual Aspen Institute Conference on Telecommunications Policy (15th, Aspen, Colorado, August 12-16, 2000) with Thoughts on the Implications of Technological Change for Telecommunications Policy.

    ERIC Educational Resources Information Center

    Entman, Robert M.; Katz, Michael L.

    The Aspen Institute's Communications and Society Program convened leaders and experts in the telecommunications and related fields to address telecommunications regulation in an IP (Internet Protocols) environment at the 15th annual Aspen Institute Telecommunications Policy Conference (Aspen, Colorado, August 12-16, 2000). The report from this…

  17. BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borges, Raymond; Patton, Robert M; Kettani, Houssain

    2011-01-01

    There is a large amount of illegal content being replicated through peer-to-peer (P2P) networks where BitTorrent is dominant; therefore, a framework to profile and police it is needed. The goal of this work is to explore the behavior of initial seeds and highly active peers to develop techniques to correctly identify them. We intend to establish a new methodology and software framework for profiling BitTorrent peers. This involves three steps: crawling torrent indexers for keywords in recently added torrents using Really Simple Syndication protocol (RSS), querying torrent trackers for peer list data and verifying Internet Protocol (IP) addresses from peermore » lists. We verify IPs using active monitoring methods. Peer behavior is evaluated and modeled using bitfield message responses. We also design a tool to profile worldwide file distribution by mapping IP-to-geolocation and linking to WHOIS server information in Google Earth.« less

  18. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  19. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    DTIC Science & Technology

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  20. Variation in standards of research compensation and child assent practices: a comparison of 69 institutional review board-approved informed permission and assent forms for 3 multicenter pediatric clinical trials.

    PubMed

    Kimberly, Michael B; Hoehn, K Sarah; Feudtner, Chris; Nelson, Robert M; Schreiner, Mark

    2006-05-01

    To systematically compare standards for compensation and child participant assent in informed permission, assent, and consent forms (IP-A-CFs) approved by 55 local institutional review boards (IRBs) reviewing 3 standardized multicenter research protocols. Sixty-nine principal investigators participating in any of 3 national, multicenter clinical trials submitted standardized research protocols for their trials to their local IRBs for approval. Copies of the subsequently IRB-approved IP-A-CFs were then forwarded to an academic clinical research organization. This collection of IRB-approved forms allowed for a quasiexperimental retrospective evaluation of the variation in informed permission, assent, and consent standards operationalized by the local IRBs. Standards for compensation and child participant assent varied substantially across 69 IRB-approved IP-A-CFs. Among the 48 IP-A-CFs offering compensation, monetary compensation was offered by 33 as reimbursement for travel, parking, or food expenses, whereas monetary or material compensation was offered by 22 for subject inconvenience and by 13 for subject time. Compensation ranged widely within and across studies (study 1, $180-1425; study 2, $0-500; and study 3, $0-100). Regarding child participant assent, among the 57 IP-A-CFs that included a form of assent documentation, 33 included a line for assent on the informed permission or consent form, whereas 35 included a separate form written in simplified language. Of the IP-A-CFs that stipulated the documentation of assent, 31 specified > or =1 age ranges for obtaining assent. Informed permission or consent forms were addressed either to parents or child participants. In response to identical clinical trial protocols, local IRBs generate IP-A-CFs that vary considerably regarding compensation and child participant assent.

  1. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  2. Efficient eNB inter-communication scheme in converged mobile and NG-PON2 system

    NASA Astrophysics Data System (ADS)

    Xiao, Simiao; Sun, Xiao; Zhang, Kaibin

    2016-02-01

    In LTE, a new X2-interface is defined to facilitate direct communication between neighboring eNBs. Since LTE is an all-IP network, the X2-interface traffic currently needs to be routed and transponded in L3 at the edge router by IP addressing. As mobile data increases, it is a promising trend to backhaul mobile services based on PON. In this paper, an effective approach for eNB inter-communication over TWDM-PON is proposed. By associating the IP address of eNB and the MAC address of ONU, the "inter-eNB communication in L3" can be mapped into "inter-ONU communication in L2" and transponded via the protocol of PON at the OLT. Thus, fast and cost-effective eNB inter-communication can be realized based on TWDM-PON within one wavelength channel and between different wavelength channels. The increasing data traffic pressure to the core network can also be alleviated.

  3. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...

  4. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  5. Security Analysis of Session Initiation Protocol

    DTIC Science & Technology

    2010-06-01

    traffic as Bob@biloxi.com), a VPN was established with OpenVPN 2.1_rc19 between all relevant entities. Configuration files used by the clients and...static key is created by running the command ’ openvpn --genkey --secret static.key.’ By 22 rerouting all SIP traffic through VPNs as needed, a network... OpenVPN , and VM 2’s routing table is modified so that all IP packets except those addressed to VM 1’s publicly facing IP are routed through the OpenVPN

  6. 78 FR 54201 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...

  7. Restoring Bladder Function by Spinal Cord Neuromodulation in SCI

    DTIC Science & Technology

    2016-10-01

    conduct interviews/ surveys , recruit participants, obtain consent, review records, etc. View For existing protocols: Item 2.0 has been modified and...apply: A mechanism such as Survey Monkey, Zoomerang, or an e-mail anonymizing service will be used to strip off the IP addresses for data submitted via...attach the following: Protocol, Dissertation Proposal or Study Plan Preliminary Data Surveys , Questionnaires or other instruments to be used with

  8. Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service

    DTIC Science & Technology

    2007-12-07

    MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status

  9. Analyzing multiple data sets by interconnecting RSAT programs via SOAP Web services: an example with ChIP-chip data.

    PubMed

    Sand, Olivier; Thomas-Chollier, Morgane; Vervisch, Eric; van Helden, Jacques

    2008-01-01

    This protocol shows how to access the Regulatory Sequence Analysis Tools (RSAT) via a programmatic interface in order to automate the analysis of multiple data sets. We describe the steps for writing a Perl client that connects to the RSAT Web services and implements a workflow to discover putative cis-acting elements in promoters of gene clusters. In the presented example, we apply this workflow to lists of transcription factor target genes resulting from ChIP-chip experiments. For each factor, the protocol predicts the binding motifs by detecting significantly overrepresented hexanucleotides in the target promoters and generates a feature map that displays the positions of putative binding sites along the promoter sequences. This protocol is addressed to bioinformaticians and biologists with programming skills (notions of Perl). Running time is approximately 6 min on the example data set.

  10. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  11. Approaches in highly parameterized inversion - GENIE, a general model-independent TCP/IP run manager

    USGS Publications Warehouse

    Muffels, Christopher T.; Schreuder, Willem A.; Doherty, John E.; Karanovic, Marinko; Tonkin, Matthew J.; Hunt, Randall J.; Welter, David E.

    2012-01-01

    GENIE is a model-independent suite of programs that can be used to generally distribute, manage, and execute multiple model runs via the TCP/IP infrastructure. The suite consists of a file distribution interface, a run manage, a run executer, and a routine that can be compiled as part of a program and used to exchange model runs with the run manager. Because communication is via a standard protocol (TCP/IP), any computer connected to the Internet can serve in any of the capacities offered by this suite. Model independence is consistent with the existing template and instruction file protocols of the widely used PEST parameter estimation program. This report describes (1) the problem addressed; (2) the approach used by GENIE to queue, distribute, and retrieve model runs; and (3) user instructions, classes, and functions developed. It also includes (4) an example to illustrate the linking of GENIE with Parallel PEST using the interface routine.

  12. Aerospace physiology.

    DOT National Transportation Integrated Search

    2004-01-01

    This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...

  13. Experience with Delay-Tolerant Networking from Orbit

    NASA Technical Reports Server (NTRS)

    Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.

    2010-01-01

    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol

  14. Chromatin Immunoprecipitation (ChIP) Protocol for Low-abundance Embryonic Samples.

    PubMed

    Rehimi, Rizwan; Bartusel, Michaela; Solinas, Francesca; Altmüller, Janine; Rada-Iglesias, Alvaro

    2017-08-29

    Chromatin immunoprecipitation (ChIP) is a widely-used technique for mapping the localization of post-translationally modified histones, histone variants, transcription factors, or chromatin-modifying enzymes at a given locus or on a genome-wide scale. The combination of ChIP assays with next-generation sequencing (i.e., ChIP-Seq) is a powerful approach to globally uncover gene regulatory networks and to improve the functional annotation of genomes, especially of non-coding regulatory sequences. ChIP protocols normally require large amounts of cellular material, thus precluding the applicability of this method to investigating rare cell types or small tissue biopsies. In order to make the ChIP assay compatible with the amount of biological material that can typically be obtained in vivo during early vertebrate embryogenesis, we describe here a simplified ChIP protocol in which the number of steps required to complete the assay were reduced to minimize sample loss. This ChIP protocol has been successfully used to investigate different histone modifications in various embryonic chicken and adult mouse tissues using low to medium cell numbers (5 x 10 4 - 5 x 10 5 cells). Importantly, this protocol is compatible with ChIP-seq technology using standard library preparation methods, thus providing global epigenomic maps in highly relevant embryonic tissues.

  15. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  16. Privacy/Security Policy

    Science.gov Websites

    automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system

  17. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...

  18. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  19. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. 78 FR 55696 - Request for Comment on Petition Filed by Purple Communications, Inc. Regarding the Provision of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...

  1. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  2. A Failure to Communicate

    ERIC Educational Resources Information Center

    Fredette, Michelle

    2011-01-01

    In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…

  3. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  4. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  5. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  6. Generation of Isogenic Human iPS Cell Line Precisely Corrected by Genome Editing Using the CRISPR/Cas9 System.

    PubMed

    Grobarczyk, Benjamin; Franco, Bénédicte; Hanon, Kevin; Malgrange, Brigitte

    2015-10-01

    Genome engineering and human iPS cells are two powerful technologies, which can be combined to highlight phenotypic differences and identify pathological mechanisms of complex diseases by providing isogenic cellular material. However, very few data are available regarding precise gene correction in human iPS cells. Here, we describe an optimized stepwise protocol to deliver CRISPR/Cas9 plasmids in human iPS cells. We highlight technical issues especially those associated to human stem cell culture and to the correction of a point mutation to obtain isogenic iPS cell line, without inserting any resistance cassette. Based on a two-steps clonal isolation protocol (mechanical picking followed by enzymatic dissociation), we succeed to select and expand corrected human iPS cell line with a great efficiency (more than 2% of the sequenced colonies). This protocol can also be used to obtain knock-out cell line from healthy iPS cell line by the NHEJ pathway (with about 15% efficiency) and reproduce disease phenotype. In addition, we also provide protocols for functional validation tests after every critical step.

  7. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth; Sokolova, Marina; Peyton, Liam; Neisa, Angelica; Scassa, Teresa

    2010-01-01

    Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheus. Examples of personal health and financial information being exposed have been published. We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI). Design After careful review and approval of our protocol by our institutional research ethics board, files were downloaded from peer-to-peer file sharing networks and manually analyzed for the presence of PHI and PFI. The geographic region of the IP addresses was determined, and classified as either USA or Canada. Measurement We estimated the proportion of files that contain personal health and financial information for each region. We also estimated the proportion of search terms that return files with personal health and financial information. We ascertained and discuss the ethical issues related to this study. Results Approximately 0.4% of Canadian IP addresses had PHI, as did 0.5% of US IP addresses. There was more disclosure of financial information, at 1.7% of Canadian IP addresses and 4.7% of US IP addresses. An analysis of search terms used in these file sharing networks showed that a small percentage of the terms would return PHI and PFI files (ie, there are people successfully searching for PFI and PHI on the peer-to-peer file sharing networks). Conclusion There is a real risk of inadvertent disclosure of PHI through peer-to-peer file sharing networks, although the risk is not as large as for PFI. Anyone keeping PHI on their computers should avoid installing file sharing applications on their computers, or if they have to use such tools, actively manage the risks of inadvertent disclosure of their, their family's, their clients', or patients' PHI. PMID:20190057

  8. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  9. Client/Server data serving for high performance computing

    NASA Technical Reports Server (NTRS)

    Wood, Chris

    1994-01-01

    This paper will attempt to examine the industry requirements for shared network data storage and sustained high speed (10's to 100's to thousands of megabytes per second) network data serving via the NFS and FTP protocol suite. It will discuss the current structural and architectural impediments to achieving these sorts of data rates cost effectively today on many general purpose servers and will describe and architecture and resulting product family that addresses these problems. The sustained performance levels that were achieved in the lab will be shown as well as a discussion of early customer experiences utilizing both the HIPPI-IP and ATM OC3-IP network interfaces.

  10. Induced Pluripotent Stem Cells from Nonhuman Primates.

    PubMed

    Mishra, Anuja; Qiu, Zhifang; Farnsworth, Steven L; Hemmi, Jacob J; Li, Miao; Pickering, Alexander V; Hornsby, Peter J

    2016-01-01

    Induced pluripotent stem cells from nonhuman primates (NHPs) have unique roles in cell biology and regenerative medicine. Because of the relatedness of NHPs to humans, NHP iPS cells can serve as a source of differentiated derivatives that can be used to address important questions in the comparative biology of primates. Additionally, when used as a source of cells for regenerative medicine, NHP iPS cells serve an invaluable role in translational experiments in cell therapy. Reprogramming of NHP somatic cells requires the same conditions as previously established for human cells. However, throughout the process, a variety of modifications to the human cell protocols must be made to accommodate significant species differences.

  11. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  12. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  13. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  14. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  15. Research of future network with multi-layer IP address

    NASA Astrophysics Data System (ADS)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  16. Mobile-ip Aeronautical Network Simulation Study

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  17. Internet-Based Partner Services in US Sexually Transmitted Disease Prevention Programs: 2009-2013.

    PubMed

    Moody, Victoria; Hogben, Matthew; Kroeger, Karen; Johnson, James

    2015-01-01

    Social networking sites have become increasingly popular venues for meeting sex partners. Today, some sexually transmitted disease (STD) programs conduct Internet-based partner services (IPS). The purpose of the study was to explore how the Internet is being used by STD prevention programs to perform partner services. We assessed US STD prevention programs receiving funds through the 2008-2013 Comprehensive STD Prevention Systems cooperative agreement. We (1) reviewed 2009 IPS protocols in 57 funding applications against a benchmark of national guidelines and (2) surveyed persons who conducted IPS in jurisdictions conducting IPS in 2012. Of the 57 project areas receiving Comprehensive STD Prevention Systems funds, 74% provided an IPS protocol. States with IPS protocols had larger populations and more gonorrhea and syphilis cases (t = 2.2-2.6; all Ps < .05), although not higher rates of infection. Most protocols included staffing (92%) and IPS documentation (87%) requirements, but fewer had evaluation plans (29%) or social networking site engagement strategies (16%). Authority to perform a complete range of IPS activities (send e-mail, use social networking sites) was associated with contacting more partners via IPSs (P < .05). This study provides a snapshot of IPS activities in STD programs in the United States. Further research is needed to move from assessment to generating data that can assist training efforts and program action and, finally, to enable efficient IPS programs that are integrated into STD prevention and control efforts.

  18. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    NASA Technical Reports Server (NTRS)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated independently as a simplex link. Without negotiation, the COTS routers are prevented from entering into the IP header compression mode, and no IP header compression would be performed. An algorithm is proposed to enable IP header compression in COTS routers on a simplex link with no negotiation or with a one-way messaging. In doing so, COTS routers can enter IP header compression mode without the need to handshake through a bidirectional link as required by FRF.20. This technique would spoof the routers locally and thereby allow the routers to enter into IP header compression mode without having the negotiations between routers actually occur. The spoofing function is conducted by a frame relay adapter (also COTS) with the capability to generate control messages according to the FRF.20 descriptions. Therefore, negotiation is actually performed between the FRF.20 adapter and the connecting COTS router locally and never occurs over the space link. Through understanding of the handshaking protocol described by FRF.20, the necessary FRF.20 negotiations messages can be generated to control the connecting router, not only to turn on IP header compression but also to adjust the compression parameters. The FRF.20 negotiation (or control) message is composed in the FRF.20 adapter by interpreting the incoming router request message. Many of the fields are simply transcribed from request to response while the control field indicating response and type are modified.

  19. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...

  20. ChIP-nexus: a novel ChIP-exo protocol for improved detection of in vivo transcription factor binding footprints

    PubMed Central

    He, Qiye; Johnston, Jeff; Zeitlinger, Julia

    2014-01-01

    Understanding how eukaryotic enhancers are bound and regulated by specific combinations of transcription factors is still a major challenge. To better map transcription factor binding genome-wide at nucleotide resolution in vivo, we have developed a robust ChIP-exo protocol called ChIP experiments with nucleotide resolution through exonuclease, unique barcode and single ligation (ChIP-nexus), which utilizes an efficient DNA self-circularization step during library preparation. Application of ChIP-nexus to four proteins—human TBP and Drosophila NFkB, Twist and Max— demonstrates that it outperforms existing ChIP protocols in resolution and specificity, pinpoints relevant binding sites within enhancers containing multiple binding motifs and allows the analysis of in vivo binding specificities. Notably, we show that Max frequently interacts with DNA sequences next to its motif, and that this binding pattern correlates with local DNA sequence features such as DNA shape. ChIP-nexus will be broadly applicable to studying in vivo transcription factor binding specificity and its relationship to cis-regulatory changes in humans and model organisms. PMID:25751057

  1. Micro-chromatin Immunoprecipation (μChIP) Protocol for Real-time PCR Analysis of a Limited Amount of Cells.

    PubMed

    Gillotin, Sébastien; Guillemot, François

    2016-06-20

    Chromatin immunoprecipitation followed by deep sequencing (ChIP-Seq) is an important strategy to study gene regulation. When availability of cells is limited, however, it can be useful to focus on specific genes to investigate in depth the role of transcription factors or histone marks. Unfortunately, performing ChIP experiments to study transcription factors' binding to DNA can be difficult when biological material is restricted. This protocol describes a robust method to perform μChIP for over-expressed or endogenous transcription factors using ~100,000 cells per ChIP experiment (Masserdotti et al ., 2015). We also describe optimization steps, which we think are critical for this protocol to work and which can be used to further reduce the number of cells.

  2. Research on TCP/IP network communication based on Node.js

    NASA Astrophysics Data System (ADS)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  3. Novel Duplicate Address Detection with Hash Function

    PubMed Central

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  4. BPTAP: A New Approach to IP over DTN

    NASA Technical Reports Server (NTRS)

    Tsao, Philip; Nguyen, Sam

    2012-01-01

    Traditional Internet protocols have been widely deployed for a variety of applications. However such protocols generally perform poorly in situations in which, round trip delays are very large (interplanetary distances) or . persistent connectivity is not always available (widely dispersed MANET). Delay/Disruption Tolerant Network (DTN) technology was invented to address these issues: (1) . Relay nodes "take custody" of blocks of network traffic on a hop-by -hop basis and retransmit them in cases of expected or unexpected link outage (2) Bundle lifetime may be configured for long round trip light times. BPTAP is novel by encapsulating Ethernet frames in BP

  5. Continued Development of Internet Protocols under the IBM OS/MVS Operating System

    DTIC Science & Technology

    1985-01-25

    developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP

  6. ChIP-seq.

    PubMed

    Kim, Tae Hoon; Dekker, Job

    2018-05-01

    Owing to its digital nature, ChIP-seq has become the standard method for genome-wide ChIP analysis. Using next-generation sequencing platforms (notably the Illumina Genome Analyzer), millions of short sequence reads can be obtained. The densities of recovered ChIP sequence reads along the genome are used to determine the binding sites of the protein. Although a relatively small amount of ChIP DNA is required for ChIP-seq, the current sequencing platforms still require amplification of the ChIP DNA by ligation-mediated PCR (LM-PCR). This protocol, which involves linker ligation followed by size selection, is the standard ChIP-seq protocol using an Illumina Genome Analyzer. The size-selected ChIP DNA is amplified by LM-PCR and size-selected for the second time. The purified ChIP DNA is then loaded into the Genome Analyzer. The ChIP DNA can also be processed in parallel for ChIP-chip results. © 2018 Cold Spring Harbor Laboratory Press.

  7. Validation of the Pangao PG-800A11 wrist device assessed according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Xie, Peigen; Wang, Yanling; Xu, Xiaoying; Huang, Fei; Pan, Jingru

    2015-04-01

    The objective of this study was to determine the accuracy of the Pangao PG-800A11 wrist blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the protocol of the British Hypertension Society (BHS). The device evaluations were performed in 85 participants, 33 of whom were included according to the ESH-IP revision 2010 and 52 of whom were included on the basis of the requirements of the BHS protocol. The validation procedure and data analysis followed the protocols precisely. The device achieved an A/A grading for the BHS protocol and passed all phases of the ESH-IP revision 2010 protocol. The mean difference ±SD for the ESH and BHS protocols, respectively, was -0.6±4.5 and -0.8±6.2 mmHg for systolic pressure and 1.2±4.6 and -0.5±5.1 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low, medium, and high-pressure ranges. The Pangao PG-800A11 wrist blood pressure monitor passed all requirements of the ESH-IP revision 2010 and achieved A/A grade of the BHS protocol in an adult population.

  8. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    PubMed Central

    Watzlaf, Valerie R.; Ondich, Briana

    2012-01-01

    Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194

  9. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    ERIC Educational Resources Information Center

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  10. The good, bad, and ugly of online recruitment of parents for health-related focus groups: lessons learned.

    PubMed

    Quach, Susan; Pereira, Jennifer A; Russell, Margaret L; Wormsbecker, Anne E; Ramsay, Hilary; Crowe, Lois; Quan, Sherman D; Kwong, Jeff

    2013-11-14

    We describe our experiences with identifying and recruiting Ontario parents through the Internet, primarily, as well as other modes, for participation in focus groups about adding the influenza vaccine to school-based immunization programs. Our objectives were to assess participation rates with and without incentives and software restrictions. We also plan to examine study response patterns of unique and multiple submissions and assess efficiency of each online advertising mode. We used social media, deal forum websites, online classified ads, conventional mass media, and email lists to invite parents of school-aged children from Ontario, Canada to complete an online questionnaire to determine eligibility for focus groups. We compared responses and paradata when an incentive was provided and there were no software restrictions to the questionnaire (Period 1) to a period when only a single submission per Internet protocol (IP) address (ie, software restrictions invoked) was permitted and no incentive was provided (Period 2). We also compared the median time to complete a questionnaire, response patterns, and percentage of missing data between questionnaires classified as multiple submissions from the same Internet protocol (IP) address or email versus unique submissions. Efficiency was calculated as the total number of hours study personnel devoted to an advertising mode divided by the resultant number of unique eligible completed questionnaires . Of 1346 submitted questionnaires, 223 (16.6%) were incomplete and 34 (2.52%) did not meet the initial eligibility criteria. Of the remaining 1089 questionnaires, 246 (22.6%) were not from Ontario based on IP address and postal code, and 469 (43.1%) were submitted from the same IP address or email address (multiple submissions). In Period 2 vs Period 1, a larger proportion of questionnaires were submitted from Ontario (92.8%, 141/152 vs 75.1%, 702/937, P<.001), and a smaller proportion of same IP addresses (7.9%, 12/152 vs 47.1%, 441/937, P<.001) were received. Compared to those who made unique submissions, those who made multiple submissions spent less time per questionnaire (166 vs 215 seconds, P<.001), and had a higher percentage of missing data among their responses (15.0% vs 7.6%, P=.004). Advertisements posted on RedFlagDeals were the most efficient for recruitment (0.03 hours of staff time per questionnaire), whereas those placed on Twitter were the least efficient (3.64 hours of staff time per questionnaire). Using multiple online advertising strategies was effective for recruiting a large sample of participants in a relatively short period time with minimal resources. However, risks such as multiple submissions and potentially fraudulent information need to be considered. In our study, these problems were associated with providing an incentive for responding, and could have been partially avoided by activating restrictive software features for online questionnaires.

  11. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...

  12. Preparation of Low-Input and Ligation-Free ChIP-seq Libraries Using Template-Switching Technology.

    PubMed

    Bolduc, Nathalie; Lehman, Alisa P; Farmer, Andrew

    2016-10-10

    Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) has become the gold standard for mapping of transcription factors and histone modifications throughout the genome. However, for ChIP experiments involving few cells or targeting low-abundance transcription factors, the small amount of DNA recovered makes ligation of adapters very challenging. In this unit, we describe a ChIP-seq workflow that can be applied to small cell numbers, including a robust single-tube and ligation-free method for preparation of sequencing libraries from sub-nanogram amounts of ChIP DNA. An example ChIP protocol is first presented, resulting in selective enrichment of DNA-binding proteins and cross-linked DNA fragments immobilized on beads via an antibody bridge. This is followed by a protocol for fast and easy cross-linking reversal and DNA recovery. Finally, we describe a fast, ligation-free library preparation protocol, featuring DNA SMART technology, resulting in samples ready for Illumina sequencing. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  13. Sequential ChIP Protocol for Profiling Bivalent Epigenetic Modifications (ReChIP).

    PubMed

    Desvoyes, Bénédicte; Sequeira-Mendes, Joana; Vergara, Zaida; Madeira, Sofia; Gutierrez, Crisanto

    2018-01-01

    Identification of chromatin modifications, e.g., histone acetylation and methylation, among others, is widely carried out by using a chromatin immunoprecipitation (ChIP) strategy. The information obtained with these procedures is useful to gain an overall picture of modifications present in all cells of the population under study. It also serves as a basis to figure out the mechanisms of chromatin organization and gene regulation at the population level. However, the ultimate goal is to understand gene regulation at the level of single chromatin fibers. This requires the identification of chromatin modifications that occur at a given genomic location and within the same chromatin fiber. This is achieved by following a sequential ChIP strategy using two antibodies to distinguish different chromatin modifications. Here, we describe a sequential ChIP protocol (Re-ChIP), paying special attention to the controls needed and the required steps to obtain meaningful and reproducible results. The protocol is developed for young Arabidopsis seedlings but could be adapted to other plant materials.

  14. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  15. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  16. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  17. Internet Telephony

    DTIC Science & Technology

    1999-12-01

    compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- 󈨞s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not

  18. Effectiveness of Individual Placement and Support Supported Employment for Young Adults

    PubMed Central

    Bond, Gary R.; Drake, Robert E.; Campbell, Kikuko

    2015-01-01

    Objective The Individual Placement and Support (IPS) model of supported employment was first developed in community mental health centers for adults with severe mental illness. While IPS is an established evidence-based practice in this broad population, evidence on its effectiveness focused specifically on young adults has been limited. The current study aimed to address this gap. Methods To investigate the effects of IPS on young adults, the authors conducted a secondary analysis on a pooled sample of 109 unemployed young adults (under age 30) from four randomized controlled trials employing a common research protocol that included a standardized measurement battery and rigorous fidelity monitoring. Researchers assessed these participants over 18 months on nine competitive employment outcome measures. Results On all measures the IPS group had significantly better employment outcomes. Overall, 40 (82%) of IPS participants obtained employment during follow-up compared to 25 (42%) of control participants, Χ2 =17.9, p < .001. IPS participants averaged 25.0 weeks of employment, compared to 7.0 weeks for control participants, t = 4.50, p < .001. Conclusions The current analysis supports a small number of previous studies in showing that IPS is highly effective in helping young adults to attain competitive employment. When young adults acquire competitive jobs and initiate a path toward normal adult roles, they may avoid the cycle of disability and psychiatric patient roles that are demeaning and demoralizing. PMID:25138195

  19. ACTS 118x: High Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.

  20. Enhanced International Space Station Ku-Band Telemetry Service

    NASA Technical Reports Server (NTRS)

    Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason

    2014-01-01

    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.

  1. Voice Over Internet Protocol (VoIP) in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pirani, Joseph; Calvelage, Steven

    2010-01-01

    The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.

  2. Using OpenSSH to secure mobile LAN network traffic

    NASA Astrophysics Data System (ADS)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  3. Effects of the Voice over Internet Protocol on Perturbation Analysis of Normal and Pathological Phonation

    PubMed Central

    Zhu, Yanmei; Witt, Rachel E.; MacCallum, Julia K.; Jiang, Jack J.

    2010-01-01

    Objective In this study, a Voice over Internet Protocol (VoIP) communication based on G.729 protocol was simulated to determine the effects of this system on acoustic perturbation parameters of normal and pathological voice signals. Patients and Methods: Fifty recordings of normal voice and 48 recordings of pathological voice affected by laryngeal paralysis were transmitted through a VoIP communication system. The acoustic analysis programs of CSpeech and MDVP were used to determine the percent jitter and percent shimmer from the voice samples before and after VoIP transmission. The effects of three frequently used audio compression protocols (MP3, WMA, and FLAC) on the perturbation measures were also studied. Results It was found that VoIP transmission disrupts the waveform and increases the percent jitter and percent shimmer of voice samples. However, after VoIP transmission, significant discrimination between normal and pathological voices affected by laryngeal paralysis was still possible. It was found that the lossless compression method FLAC does not exert any influence on the perturbation measures. The lossy compression methods MP3 and WMA increase percent jitter and percent shimmer values. Conclusion This study validates the feasibility of these transmission and compression protocols in developing remote voice signal data collection and assessment systems. PMID:20588051

  4. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  5. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    ERIC Educational Resources Information Center

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  6. Internet and Intranet Use with a PC: Effects of Adapter Cards, Windows Versions and TCP/IP Software on Networking Performance.

    ERIC Educational Resources Information Center

    Nieuwenhuysen, Paul

    1997-01-01

    Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…

  7. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  8. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  9. Improving the accuracy of blood pressure measurement: the influence of the European Society of Hypertension International Protocol (ESH-IP) for the validation of blood pressure measuring devices and future perspectives.

    PubMed

    Stergiou, George S; Asmar, Roland; Myers, Martin; Palatini, Paolo; Parati, Gianfranco; Shennan, Andrew; Wang, Jiguang; O'Brien, Eoin

    2018-03-01

    The European Society of Hypertension (ESH) International Protocol (ESH-IP) for the validation of blood pressure (BP) measuring devices was published in 2002, with the main objective of simplifying the validation procedures, so that more BP monitors would be subjected to independent validation. This article provides an overview of the international impact of the ESH-IP and of the lessons learned from its use, to be able to justify further developments in validation protocols. A review of published (PubMed) validation studies from 2002 to 2017 was performed. One hundred and seventy-seven validation studies using the ESH-IP, 59 using the British Hypertension Society protocol, 46 using the Association for the Advancement of Medical Instrumentation (AAMI) standard and 23 using the International Organization for Standardization (ISO) standard were identified. Lists of validated office-clinic, home and ambulatory BP monitors are provided. Of the ESH-IP studies, 93% tested oscillometric devices, 80% upper arm, 71% home, 25% office and 7% ambulatory monitors (some had more than one function). The original goal of the ESH-IP has been fulfilled in that in the last decade the number of published validation studies has more than doubled. It is now recognized that the provision of accurate devices would be best served by having a universal protocol. An international initiative has been put in place by AAMI, ESH and ISO experts aiming to reach consensus for a universal validation protocol to be accepted worldwide, which will allow a more thorough evaluation of the accuracy and performance of future BP monitors.

  10. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  11. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  12. 47 CFR 10.320 - Provider alert gateway requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... must be identified by a unique IP address or domain name. (b) Authentication and validation. The CMS... alert gateway if a validation fails. (c) Security. The CMS provider gateway must support standardized IP... CMSP Name Unique identification of CMSP. CMSP gateway Address IP address or Domain Name Alternate IP...

  13. ATM QoS Experiments Using TCP Applications: Performance of TCP/IP Over ATM in a Variety of Errored Links

    NASA Technical Reports Server (NTRS)

    Frantz, Brian D.; Ivancic, William D.

    2001-01-01

    Asynchronous Transfer Mode (ATM) Quality of Service (QoS) experiments using the Transmission Control Protocol/Internet Protocol (TCP/IP) were performed for various link delays. The link delay was set to emulate a Wide Area Network (WAN) and a Satellite Link. The purpose of these experiments was to evaluate the ATM QoS requirements for applications that utilize advance TCP/IP protocols implemented with large windows and Selective ACKnowledgements (SACK). The effects of cell error, cell loss, and random bit errors on throughput were reported. The detailed test plan and test results are presented herein.

  14. Effectiveness of individual placement and support supported employment for young adults.

    PubMed

    Bond, Gary R; Drake, Robert E; Campbell, Kikuko

    2016-08-01

    The individual placement and support (IPS) model of supported employment was first developed in community mental health centres for adults with severe mental illness. While IPS is an established evidence-based practice in this broad population, evidence on its effectiveness focused specifically on young adults has been limited. The current study aimed to address this gap. To investigate the effects of IPS on young adults, the authors conducted a secondary analysis on a pooled sample of 109 unemployed young adults (under age 30) from four randomized controlled trials employing a common research protocol that included a standardized measurement battery and rigorous fidelity monitoring. Researchers assessed these participants over 18 months on nine competitive employment outcome measures. On all measures, the IPS group had significantly better employment outcomes. Overall, 40 (82%) of IPS participants obtained employment during follow-up compared with 25 (42%) of control participants, χ(2) = 17.9, P < .001. IPS participants averaged 25.0 weeks of employment, compared with 7.0 weeks for control participants, t = 4.50, P < .001. The current analysis supports a small number of previous studies in showing that IPS is highly effective in helping young adults with severe mental illness to attain competitive employment. When young adults acquire competitive jobs and initiate a path towards normal adult roles, they may avoid the cycle of disability and psychiatric patient roles that are demeaning and demoralizing. © 2014 Wiley Publishing Asia Pty Ltd.

  15. Validation of the Tensoval Duo Control II blood pressure monitor for clinic use and self-measurement according to the British Hypertension Society protocol and the European Society of Hypertension International Protocol Revision 2010.

    PubMed

    de Greeff, Annemarie; Shennan, Andrew H

    2013-06-01

    The Tensoval Duo Control II is an automated upper arm device that uses a combination of oscillometric and auscultatory technology to determine blood pressure noninvasively. The accuracy of this device was assessed according to the British Hypertension Society (BHS) protocol and the European Society of Hypertension International Protocol revision 2010 (ESH-IP2) in an adult population. Ethical approval was obtained. Eighty-five and 33 adult individuals, respectively, were recruited to fulfil the requirements of each protocol. Trained observers took nine sequential same-arm measurements alternating between a mercury sphygmomanometer and the device. The device had to achieve at least a B grade for both systolic and diastolic pressures to pass the BHS protocol and had to fulfil the criteria of all three phases of the ESH-IP2 protocol to receive recommendation. The device achieved an A/A grading for the BHS protocol and passed all three phases of the ESH-IP2 protocol. The mean difference±SD for the BHS/ESH protocols, respectively, was -1.8±6.5/-0.7±5.7 mmHg for systolic pressure and 1.9±5.1/2.4±4.5 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low-pressure, medium-pressure and high-pressure ranges. The Tensoval Duo Control II device is recommended for clinical and home use according to both the BHS and the ESH-IP2 standard.

  16. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eli Dart; Helen Chen; Jerry Friesen

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM ismore » connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.« less

  17. Achieving quality of service in IP networks

    NASA Astrophysics Data System (ADS)

    Hays, Tim

    2001-07-01

    The Internet Protocol (IP) has served global networks well, providing a standardized method to transmit data among many disparate systems. But IP is designed for simplicity, and only enables a `best effort' service that can be subject to delays and loss of data. For data networks, this is an acceptable trade-off. In the emerging world of convergence, driven by new applications such as video streaming and IP telephony, minimizing latency and packet loss as well as jitter can be critical. Simply increasing the size of the IP network `pipe' to meet those demands is not always sufficient. In this environment, vendors and standards bodies are endeavoring to create technologies and techniques to enable IP to improve the quality of service it can provide, while retaining the characteristics that has enabled it to become the dominant networking protocol.

  18. 75 FR 26701 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... Services (CTS), Internet Protocol (IP) CTS, IP Relay, and Video Relay Services (VRS), for the 2010-2011... comment on NECA's proposed compensation rates for TRS, STS, CTS, IP CTS, IP Relay, and VRS, for the 2010... interstate traditional TRS; $3.1566 for STS; $1.6951 for CTS and IP CTS; $1.2985 for IP Relay. Based on these...

  19. Prototype development and implementation of picture archiving and communications systems based on ISO-OSI standard

    NASA Astrophysics Data System (ADS)

    Martinez, Ralph; Nam, Jiseung

    1992-07-01

    Picture Archiving and Communication Systems (PACS) is an integration of digital image formation in a hospital, which encompasses various imaging equipment, image viewing workstations, image databases, and a high speed network. The integration requires a standardization of communication protocols to connect devices from different vendors. The American College of Radiology and the National Electrical Manufacturers Association (ACR- NEMA) standard Version 2.0 provides a point-to-point hardware interface, a set of software commands, and a consistent set of data formats for PACS. But, it is inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks and an approach were proposed to ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS''s capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI), TCP/IP protocols, and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the ISO-based protocol into a PACS prototype. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance comparison between the ISO and TCP/IP implementations are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is done by prototyping PACS on available platforms, which are Micro VAX II, DECstation and SUN Workstation.

  20. Open Source Cybersecurity for the 21st Century

    DTIC Science & Technology

    2013-03-01

    would eventually develop into Transmission Control Protocol/Internet Protocol ( TCP /IP) based on the following ground rules:12  Each distinct...The internet’s design permits any device conforming to modern day protocol standards ( TCP /IP being the most prevalent) to communicate across the... factors , coupled with the internet’s global reach and low cost of entry, are what make securing the cyber domain one of the most complex challenges we

  1. Telemedicine using free voice over internet protocol (VoIP) technology.

    PubMed

    Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H

    2011-01-01

    Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.

  2. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  3. 78 FR 76097 - Request for Comment on Petition Filed by Sprint Corporation for Reconsideration of Certain Rules...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...

  4. Impact of applying the more stringent validation criteria of the revised European Society of Hypertension International Protocol 2010 on earlier validation studies.

    PubMed

    Stergiou, George S; Karpettas, Nikos; Atkins, Neil; O'Brien, Eoin

    2011-04-01

    Since 2002 when the European Society of Hypertension International Protocol (ESH-IP) was published it has become the preferred protocol for validating blood pressure monitors worldwide. In 2010, a revised version of the ESH-IP with more stringent criteria was published. This study assesses the impact of applying the revised ESH-IP criteria. A systematic literature review of ESH-IP studies reported between 2002 and 2010 was conducted. The impact of applying the ESH-IP 2010 criteria retrospectively on the data reported in these studies was investigated. The performance of the oscillometric devices in the last decade was also investigated on the basis of the ESH-IP criteria. Among 119 published studies, 112 with sufficient data were analyzed. According to ESH-IP 2002, the test device failed in 19 studies, whereas by applying the ESH-IP 2010 criteria in 28 additional studies increased the failure rate from 17 to 42%. Of these 28 studies, in 20 (71%) the test device failed at part 1 (accuracy per measurement) and in 22 (79%) at part 2 (accuracy per subject). Most of the failures involved the '5 mmHg or less' criterion. In the last decade there has been a consistent trend toward improved performance of oscillometric devices assessed on the basis of the ESH-IP criteria. This retrospective analysis shows that the stricter revised ESH-IP 2010 criteria will noticeably increase the failure rate of devices being validated. Oscillometric devices are becoming more accurate, and the revised ESH-IP by acknowledging this trend will allow more accurate devices to enter the market.

  5. A Conjoint Analysis of Voice Over IP Attributes.

    ERIC Educational Resources Information Center

    Zubey, Michael L.; Wagner, William; Otto, James R.

    2002-01-01

    Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…

  6. Extending Tactical Fleet Communications Through VoIP

    DTIC Science & Technology

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  7. 106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink

    DTIC Science & Technology

    2017-07-31

    Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit

  8. Limitations and possibilities of low cell number ChIP-seq

    PubMed Central

    2012-01-01

    Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq) offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP), we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells), and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance. PMID:23171294

  9. VoIP in a Campus Environment

    ERIC Educational Resources Information Center

    Young, Dan

    2005-01-01

    Internet Protocol (IP) Telephony, or voice-over IP (VoIP), has proved to be a wise decision for many organizations. This technology crosses the boundaries of public and private networks, enterprise and residential markets, voice and data technologies, as well as local and long-distance services. The convergence of voice and data into a single,…

  10. Validation of the Pangao PG-800B26 upper arm blood pressure monitor in the general population according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Chen, Liang; Li, Jiyu; Wen, Jing; Guo, Changfeng; Zhang, Jingying; Yu, Zhen

    2018-02-01

    This study aimed to evaluate the accuracy of the automated oscillometric upper arm blood pressure monitor Pangao PG-800B26 for home blood pressure monitoring according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocols. Systolic and diastolic blood pressures were measured sequentially in 33 and 85 adults, respectively, on the basis of the ESH-IP and BHS protocols using a mercury sphygmomanometer (two observers) and the device (one supervisor). The procedures and analysis methods of the protocols were followed precisely. The device fulfilled the criteria of the ESH-IP, with device-observer differences of 1.01±5.16 and -0.58±4.17 mmHg for systolic and diastolic blood pressure, respectively. Furthermore, the A/A grade of the BHS protocol was also achieved for overall grading and for the three pressure levels, with average differences of 0.85±6.35 and -0.15±5.65 mmHg for systolic and diastolic blood pressure, respectively, which also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation. The Pangao PG-800B26 fulfilled the criteria of the ESH-IP 2010 and achieved the A/A grade of the BHS protocol, and hence can be recommended for home use in adults.

  11. Validation of the Pangao PG-800A36 automatic wrist blood pressure monitor according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Zhao, Hairong; Qiao, Weichang; Zhang, Rui; Cui, Peng; Hou, Fanglin; Zhang, Wenli

    2018-02-01

    The aim of this study was to validate the PG-800A36 automatic wrist blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocols. A total of 33 participants were initially included on the basis of the ESH-IP, followed by examination of 85 participants according to the BHS protocol. The procedures and analysis methods of the protocols were followed precisely with left arm/wrist sequential measurements by two trained observers using a mercury sphygmomanometer and one supervisor using the device. The device passed the ESH-IP with an average difference of 1.45±6.46 mmHg for systolic blood pressure and 1.25±5.10 mmHg for diastolic blood pressure. Furthermore, the A/A grade of the BHS protocol was achieved with an average difference of 1.84±6.94 mmHg for systolic blood pressure and 1.15±6.49 mmHg for diastolic blood pressure, and thus, the device also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation. The Pangao PG-800A36 passed the requirements of the ESH-IP revision 2010 and achieved the A/A grade of the BHS protocol, which can be recommended for self-measurement in the general population.

  12. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  13. 75 FR 13235 - IP-Enabled Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  14. OSI and TCP/IP

    NASA Technical Reports Server (NTRS)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  15. Network Configuration Analysis for Formation Flying Satellites

    NASA Technical Reports Server (NTRS)

    Knoblock, Eric J.; Wallett, Thomas M.; Konangi, Vijay K.; Bhasin, Kul B.

    2001-01-01

    The performance of two networks to support autonomous multi-spacecraft formation flying systems is presented. Both systems are comprised of a ten-satellite formation, with one of the satellites designated as the central or 'mother ship.' All data is routed through the mother ship to the terrestrial network. The first system uses a TCP/EP over ATM protocol architecture within the formation, and the second system uses the IEEE 802.11 protocol architecture within the formation. The simulations consist of file transfers using either the File Transfer Protocol (FTP) or the Simple Automatic File Exchange (SAFE) Protocol. The results compare the IP queuing delay, IP queue size and IP processing delay at the mother ship as well as end-to-end delay for both systems. In all cases, using IEEE 802.11 within the formation yields less delay. Also, the throughput exhibited by SAFE is better than FTP.

  16. 78 FR 78319 - Media Bureau Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips AGENCY: Federal... captioning of video clips delivered by Internet protocol (``IP''), including the extent to which industry has voluntarily captioned IP- delivered video clips. The Commission directed the Media Bureau to issue this...

  17. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  18. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  19. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  20. Research and Simulation on Application of the Mobile IP Network

    NASA Astrophysics Data System (ADS)

    Yibing, Deng; Wei, Hu; Minghui, Li; Feng, Gao; Junyi, Shen

    The paper analysed the mobile node, home agent, and foreign agent of mobile IP network firstly, some key technique, such as mobile IP network basical principle, protocol work principle, agent discovery, registration, and IP packet transmission, were discussed. Then a network simulation model was designed, validating the characteristic of mobile IP network, and some advantages, which were brought by mobile network, were testified. Finally, the conclusion is gained: mobile IP network could realize the expectation of consumer that they can communicate with others anywhere.

  1. Design of a SIP device cooperation system on OSGi service platforms

    NASA Astrophysics Data System (ADS)

    Takayama, Youji; Koita, Takahiro; Sato, Kenya

    2007-12-01

    Home networks feature such various technologies as protocols, specifications, and middleware, including HTTP, UPnP, and Jini. A service platform is required to handle such technologies to enable them to cooperate with different devices. The OSGi service platform, which meets the requirements based on service-oriented architecture, is designed and standardized by OSGi Alliance and consists of two parts: one OSGi Framework and bundles. On the OSGi service platform, APIs are defined as services that can handle these technologies and are implemented in the bundle. By using the OSGi Framework with bundles, various technologies can cooperate with each other. On the other hand, in IP networks, Session Initiation Protocol (SIP) is often used in device cooperation services to resolve an IP address, control a session between two or more devices, and easily exchange the statuses of devices. However, since many existing devices do not correspond to SIP, it cannot be used for device cooperation services. A device that does not correspond to SIP is called an unSIP device. This paper proposes and implements a prototype system that enables unSIP devices to correspond to SIP. For unSIP devices, the proposed system provides device cooperation services with SIP.

  2. Covert Channels in SIP for VoIP Signalling

    NASA Astrophysics Data System (ADS)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  3. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  4. Using the ACR/NEMA standard with TCP/IP and Ethernet

    NASA Astrophysics Data System (ADS)

    Chimiak, William J.; Williams, Rodney C.

    1991-07-01

    There is a need for a consolidated picture archival and communications system (PACS) in hospitals. At the Bowman Gray School of Medicine of Wake Forest University (BGSM), the authors are enhancing the ACR/NEMA Version 2 protocol using UNIX sockets and TCP/IP to greatly improve connectivity. Initially, nuclear medicine studies using gamma cameras are to be sent to PACS. The ACR/NEMA Version 2 protocol provides the functionality of the upper three layers of the open system interconnection (OSI) model in this implementation. The images, imaging equipment information, and patient information are then sent in ACR/NEMA format to a software socket. From there it is handed to the TCP/IP protocol, which provides the transport and network service. TCP/IP, in turn, uses the services of IEEE 802.3 (Ethernet) to complete the connectivity. The advantage of this implementation is threefold: (1) Only one I/O port is consumed by numerous nuclear medicine cameras, instead of a physical port for each camera. (2) Standard protocols are used which maximize interoperability with ACR/NEMA compliant PACSs. (3) The use of sockets allows a migration path to the transport and networking services of OSIs TP4 and connectionless network service as well as the high-performance protocol being considered by the American National Standards Institute (ANSI) and the International Standards Organization (ISO) -- the Xpress Transfer Protocol (XTP). The use of sockets also gives access to ANSI's Fiber Distributed Data Interface (FDDI) as well as other high-speed network standards.

  5. Interfacing the Controllogics PLC over Ethernet/IP.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kasemir, K. U.; Dalesio, L. R.

    2001-01-01

    The Allen-Bradley ControlLogix [1] line of programmable logic controllers (PLCs) offers several interfaces: Ethernet, ControlNet, DeviceNet, RS-232 and others. The ControlLogix Ethernet interface module 1756-ENET uses EtherNet/IP, the ControlNet protocol [2], encapsulated in Ethernet packages, with specific service codes [3]. A driver for the Experimental Physics and Industrial Control System (EPICS) has been developed that utilizes this EtherNet/IP protocol for controllers running the vxWorks RTOS as well as a Win32 and Unix/Linux test program. Features, performance and limitations of this interface are presented.

  6. Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.

  7. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  8. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  9. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  10. Impact of VoIP and QoS on Open and Distance Learning

    ERIC Educational Resources Information Center

    Saxena, P. C.; Jasola, Sanjay; Sharma, Ramesh C.

    2006-01-01

    Voice over Internet Protocol (VoIP) is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support…

  11. A subjective scheduler for subjective dedicated networks

    NASA Astrophysics Data System (ADS)

    Suherman; Fakhrizal, Said Reza; Al-Akaidi, Marwan

    2017-09-01

    Multiple access technique is one of important techniques within medium access layer in TCP/IP protocol stack. Each network technology implements the selected access method. Priority can be implemented in those methods to differentiate services. Some internet networks are dedicated for specific purpose. Education browsing or tutorial video accesses are preferred in a library hotspot, while entertainment and sport contents could be subjects of limitation. Current solution may use IP address filter or access list. This paper proposes subjective properties of users or applications are used for priority determination in multiple access techniques. The NS-2 simulator is employed to evaluate the method. A video surveillance network using WiMAX is chosen as the object. Subjective priority is implemented on WiMAX scheduler based on traffic properties. Three different traffic sources from monitoring video: palace, park, and market are evaluated. The proposed subjective scheduler prioritizes palace monitoring video that results better quality, xx dB than the later monitoring spots.

  12. Secure, Network-Centric Operations of a Space-Based Asset: Cisco Router in Low Earth Orbit (CLEO) and Virtual Mission Operations Center (VMOC)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric

    2005-01-01

    This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.

  13. The Effects of Pushing the Digital Divide to the Fighting Hole

    DTIC Science & Technology

    2006-02-03

    information technologies (IT), and new ways of horizontally fusing information across the battlespace...The opportunity to exploit this new “digital...brought technology , such as the Internet Protocol (IP), to the forefront. It is incumbent upon the leaders of the communications community to ensure...in a recent interview with SIGNAL magazine: In terms of potential, I see the fundamental technologies associated with Internet Protocol (IP

  14. From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans

    DTIC Science & Technology

    2014-06-01

    Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any

  15. 77 FR 25088 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ... Commission's rules to interconnected Voice over Internet Protocol (VoIP) service providers and defers action... to outages resulting from complete loss of service and only to interconnected VoIP services... obligations of interconnected VoIP service providers. DATES: The rules in this document contain information...

  16. VoIP to the Rescue

    ERIC Educational Resources Information Center

    Milner, Jacob

    2005-01-01

    Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…

  17. Research into alternative network approaches for space operations

    NASA Technical Reports Server (NTRS)

    Kusmanoff, Antone L.; Barton, Timothy J.

    1990-01-01

    The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.

  18. Analysis of Protein-DNA Interaction by Chromatin Immunoprecipitation and DNA Tiling Microarray (ChIP-on-chip).

    PubMed

    Gao, Hui; Zhao, Chunyan

    2018-01-01

    Chromatin immunoprecipitation (ChIP) has become the most effective and widely used tool to study the interactions between specific proteins or modified forms of proteins and a genomic DNA region. Combined with genome-wide profiling technologies, such as microarray hybridization (ChIP-on-chip) or massively parallel sequencing (ChIP-seq), ChIP could provide a genome-wide mapping of in vivo protein-DNA interactions in various organisms. Here, we describe a protocol of ChIP-on-chip that uses tiling microarray to obtain a genome-wide profiling of ChIPed DNA.

  19. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  20. Using a CLIPS expert system to automatically manage TCP/IP networks and their components

    NASA Technical Reports Server (NTRS)

    Faul, Ben M.

    1991-01-01

    A expert system that can directly manage networks components on a Transmission Control Protocol/Internet Protocol (TCP/IP) network is described. Previous expert systems for managing networks have focused on managing network faults after they occur. However, this proactive expert system can monitor and control network components in near real time. The ability to directly manage network elements from the C Language Integrated Production System (CLIPS) is accomplished by the integration of the Simple Network Management Protocol (SNMP) and a Abstract Syntax Notation (ASN) parser into the CLIPS artificial intelligence language.

  1. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  2. DDN (Defense Data Network) Protocol Implementations and Vendors Guide,

    DTIC Science & Technology

    1988-02-01

    TELNET) TCP/IP on an ethernet network. The program simulates a Hayes modem through the serial port. BWFTP is a thorough implementation of the FTP...25 IMP interface at VV from 19.2 Kbps to 56K bps. The IP, ICMP, TCP, Telnet. FFP and SMTP protocols are implemented along with R-Utxities...WANs. microcomputers, dataswitches. minicomputers. "black boxes" and modems . DOCUMENTATION: Software System Overview, Generic X.25 Porting Guide

  3. Validation of the G.LAB MD2200 wrist blood pressure monitor according to the European Society of Hypertension, the British Hypertension Society, and the International Organization for Standardization Protocols.

    PubMed

    Liu, Ze-Yu; Zhang, Qing-Han; Ye, Xiao-Lei; Liu, Da-Peng; Cheng, Kang; Zhang, Chun-Hai; Wan, Yi

    2017-04-01

    To validate the G.LAB MD2200 automated wrist blood pressure (BP) monitors according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010, the British Hypertension Society (BHS), and the International Organization for Standardization (ISO) 81060-2:2013 protocols. The device was assessed on 33 participants according to the ESH requirements and was then tested on 85 participants according to the BHS and ISO 81060-2:2013 criteria. The validation procedures and data analysis followed the protocols precisely. The G.LAB MD2200 devices passed all parts of ESH-IP revision 2010 for both systolic and diastolic BP, with a device-observer difference of 2.15±5.51 and 1.51±5.16 mmHg, respectively. The device achieved A/A grading for the BHS protocol and it also fulfilled the criteria of ISO 81060-2:2013, with mean differences of systolic and diastolic BP between the device and the observer of 2.19±5.21 and 2.11±4.70 mmHg, respectively. The G.LAB MD2200 automated wrist BP monitor passed the ESH-IP revision 2010 and the ISO 81060-2:2013 protocol, and achieved the A/A grade of the BHS protocol, which can be recommended for self-measurement in the general population.

  4. 76 FR 40729 - Sunshine Act Meeting; Open Commission Meeting; Tuesday, July 12, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-11

    ... Requirements (PS Docket Bureau. No. 07-114); E911 Requirements for IP-Enabled Service Providers (WC Docket No. 05-196); and Amending the Definition of Interconnected VoIP Service in Section 9.3 of the Commission..., including Voice over Internet Protocol (VoIP). Reforms to certain of the Commission's procedural rules took...

  5. 78 FR 53684 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ... eligibility in order to get a free IP CTS device should be made under penalty of perjury; whether to prohibit the free or significantly subsidized distribution of end user equipment by IP CTS providers; whether... and restrictions on rewards and free equipment. 4. Legal Authority. Section 225(b) of the Act directs...

  6. Technology: Technology and Common Sense

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The absence of common sense in the world of technology continues to amaze the author. Things that seem so logical to just aren nott for many people. The installation of Voice-over IP (VoIP, with IP standing for Internet Protocol) in many school districts is a good example. Schools have always had trouble with telephones. Many districts don't even…

  7. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... of 2010 (CVAA), which requires each provider of interconnected voice over Internet protocol (VoIP) service or non-interconnected VoIP service to begin participating in and contributing to the interstate... [[Page 65966

  8. Optimization of OSPF Routing in IP Networks

    NASA Astrophysics Data System (ADS)

    Bley, Andreas; Fortz, Bernard; Gourdin, Eric; Holmberg, Kaj; Klopfenstein, Olivier; Pióro, Michał; Tomaszewski, Artur; Ümit, Hakan

    The Internet is a huge world-wide packet switching network comprised of more than 13,000 distinct subnetworks, referred to as Autonomous Systems (ASs) autonomous system AS . They all rely on the Internet Protocol (IP) internet protocol IP for transport of packets across the network. And most of them use shortest path routing protocols shortest path routing!protocols , such as OSPF or IS-IS, to control the routing of IP packets routing!of IP packets within an AS. The idea of the routing is extremely simple — every packet is forwarded on IP links along the shortest route between its source and destination nodes of the AS. The AS network administrator can manage the routing of packets in the AS by supplying the so-called administrative weights of IP links, which specify the link lengths that are used by the routing protocols for their shortest path computations. The main advantage of the shortest path routing policy is its simplicity, allowing for little administrative overhead. From the network engineering perspective, however, shortest path routing can pose problems in achieving satisfactory traffic handling efficiency. As all routing paths depend on the same routing metric routing!metric , it is not possible to configure the routing paths for the communication demands between different pairs of nodes explicitly or individually; the routing can be controlled only indirectly and only as a whole by modifying the routing metric. Thus, one of the main tasks when planning such networks is to find administrative link weights that induce a globally efficient traffic routing traffic!routing configuration of an AS. It turns out that this task leads to very difficult mathematical optimization problems. In this chapter, we discuss and describe exact integer programming models and solution approaches as well as practically efficient smart heuristics for such shortest path routing problems shortest path routing!problems .

  9. NMR-based urinary profiling of lactulose/mannitol ratio used to assess the altered intestinal permeability in acute on chronic liver failure (ACLF) patients.

    PubMed

    Kumar, Dinesh; Pandey, Gaurav; Bansal, Deepak; Rawat, Atul; Kumar, Umesh; Dubey, Durgesh; Guleria, Anupam; Saraswat, Vivek Anand

    2017-04-01

    The article presents a simplified NMR-based protocol for urinary profiling of lactulose/mannitol ratio (LMR) and demonstrates here its utility to assess increased intestinal permeability (IP) in patients with acute on chronic liver failure (ACLF). ACLF is a serious clinical complication associated with chronic liver disease (cirrhosis). The major risk factor in its development is increased IP ('leaky gut'), which has been linked to disease progression and to infectious complications. However, IP has seldom been investigated in patients with ACLF, even though patients frequently report gastrointestinal disorders and associated complications. To this end, we first optimized the NMR-based targeted profiling of urinary metabolites (i.e. actulose, mannitol, and creatinine) and subsequently used this resulted protocol (a) first to evaluate the altered IP in ACLF patients and then (b) to explore its utility for monitoring the treatment response in these patients. The normal profiles were obtained for 7 age and sex matched healthy volunteers. The results revealed that the urinary LMR excretion was significantly higher in ACLF patients compared to normal controls (median ~0.7, range (0.12-2.84), vs median ~0.11, range (0.02-0.28), p < 0.001) suggesting that the ACLF patients' exhibit altered IP. However, the LMR excretion in six clinically improved follow-up ACLF patients was comparable to normal controls indicating restored IP after the treatment. The protocol-as demonstrated here with ACLF-is equally applicable for evaluating IP or mucosal barrier function in other intestinal disorders with reasonable sensitivity and specificity, highlighting its general utility. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  10. Blacklist Ecosystem Analysis Update: 2014

    DTIC Science & Technology

    2014-12-01

    example, we checked to see if any of the blacklisted IP addresses were known sinkhole IP addresses. This information would essentially invalidate the...indicator as an indicator of malicious activity, since sinkholes are operated by CERTCC-2014-82 4 Blacklist Ecosystem Analysis CERT/CC network defenders who...clean up and collect intelligence on threats. Only one list out of 67, LI_3, contained any sinkhole IP addresses and that list contained only 10. All

  11. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  12. ChIP-seq and RNA-seq methods to study circadian control of transcription in mammals

    PubMed Central

    Takahashi, Joseph S.; Kumar, Vivek; Nakashe, Prachi; Koike, Nobuya; Huang, Hung-Chung; Green, Carla B.; Kim, Tae-Kyung

    2015-01-01

    Genome-wide analyses have revolutionized our ability to study the transcriptional regulation of circadian rhythms. The advent of next-generation sequencing methods has facilitated the use of two such technologies, ChIP-seq and RNA-seq. In this chapter, we describe detailed methods and protocols for these two techniques, with emphasis on their usage in circadian rhythm experiments in the mouse liver, a major target organ of the circadian clock system. Critical factors for these methods are highlighted and issues arising with time series samples for ChIP-seq and RNA-seq are discussed. Finally detailed protocols for library preparation suitable for Illumina sequencing platforms are presented. PMID:25662462

  13. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOEpatents

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  14. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  15. Validation of the custo screen pediatric blood pressure monitor according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Beime, Beate; Deutsch, Cornelia; Krüger, Ralf; Wolf, Andreas; Müller, Peter; Hammel, Gertrud; Bramlage, Peter

    2017-05-01

    The purpose of the study was to validate the ambulatory blood pressure monitoring (ABPM) device custo screen pediatric in children aged 3 to 12 years according to the International Protocol of the European Society of Hypertension (ESH-IP revision 2010). Thirty-three children were included and systolic and diastolic blood pressure measurements were performed according to the ESH-IP. The protocol was modified for children considering data from the German Health Interview and Examination Survey for Children and Adolescents (KIGGS). The custo screen pediatric met all the requirements of the ESH-IP. The mean difference between the test device and the reference was -1.4 ± 3.0 mmHg for systolic blood pressure (SBP) and -0.7 ± 3.2 mmHg for diastolic blood pressure (DBP). For SBP and DBP, all 99 measurements were within the absolute difference of 10 mmHg between the test device and the reference. As to part 2 of the protocol, for DBP in all subjects, two out of three measurements were within 5 mmHg between the device and the standard, whereas for SBP in 32 of 33 subjects, two out of three measurements were within this range. The custo screen pediatric met all criteria of the ESH-IP review 2010, modified for children from 3 to about 12 years, and can be recommended for ABPM in children. What is Known: • Validation of blood pressure measuring devices is essential to provide patients with an accurate blood pressure measuring device. • The majority of devices has not been validated in children. What is New: • Prior to the present validation, study protocol adjustments of ESH-IP review 2010 for children were defined according to German Health Interview and Examination Survey for Children and Adolescents 2013 (KIGGS). • The custo screen pediatric test device met all criteria of ESH-IP revision 2010, modified for children, and can be recommended for ABPM in children aged 3 to about 12 years.

  16. Technology-assisted psychoanalysis.

    PubMed

    Scharff, Jill Savege

    2013-06-01

    Teleanalysis-remote psychoanalysis by telephone, voice over internet protocol (VoIP), or videoteleconference (VTC)-has been thought of as a distortion of the frame that cannot support authentic analytic process. Yet it can augment continuity, permit optimum frequency of analytic sessions for in-depth analytic work, and enable outreach to analysands in areas far from specialized psychoanalytic centers. Theoretical arguments against teleanalysis are presented and countered and its advantages and disadvantages discussed. Vignettes of analytic process from teleanalytic sessions are presented, and indications, contraindications, and ethical concerns are addressed. The aim is to provide material from which to judge the authenticity of analytic process supported by technology.

  17. Real-Time Mapping: Contemporary Challenges and the Internet of Things as the Way Forward

    NASA Astrophysics Data System (ADS)

    Bęcek, Kazimierz

    2016-12-01

    The Internet of Things (IoT) is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective `intelligent' is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that `know' the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address), which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.

  18. Optical switching using IP protocol

    NASA Astrophysics Data System (ADS)

    Utreras, Andres J.; Gusqui, Luis; Reyes, Andres; Mena, Ricardo I.; Licenko, Gennady L.; Amirgaliyev, Yedilkhan; Komada, Paweł; Luganskaya, Saule; Kashaganova, Gulzhan

    2017-08-01

    To understand and evaluate the Optical Layer, and how it will affect the IP protocols over WDM (Switching), the present analyse is proposed. Optical communications have attractive proprieties, but also have some disadvantages, so the challenge is to combine the best of both branches. In this paper, general concepts for different options of switching are reviewed as: optical burst switching (OBS) and automatically switching optical network (ASON). Specific details such as their architectures are also discussed. In addition, the relevant characteristics of each variation for switching are reviewed.

  19. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    NASA Astrophysics Data System (ADS)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  20. IP over fiber technologies: ATM/POS/SDL

    NASA Astrophysics Data System (ADS)

    Jin, Depeng; Zeng, Lieguang

    2001-10-01

    The explosive growth of Internet traffic has created the need to transport IP over high-speed links such as fiber. Three main IP over fiber technologies have been developed: ATM, POS and SDL. As ATM has been widely researched and developed, this paper mainly discusses the POS and SDL. POS is a traditional mapping method of packets, and this paper presents the realization state machine of POS and analyzes the Probability of Packet Loss. SDL is a new framing protocol for variable/fixed length of packet, which extends the HEC-liking framing mechanism used in ATM. This paper analyzes this new protocol and gives the performance results such as MTTF and PFP. Finally, the comparison of POS and SDL is provided.

  1. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  2. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  3. 77 FR 75894 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... Individuals With Hearing and Speech Disabilities; E911 Requirements for IP-Enabled Service Providers AGENCY... no uniform numbering system for iTRS services; some iTRS users were reached via an IP address, while...-digit number and his IP address, making it relatively traceable (unlike conventional PSTN spoofing...

  4. The ROI of VoIP: Everybody Says VoIP Saves Big Bucks. But Does It?

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    Advocates of Voice over Internet Protocol (VoIP) say it saves money on long distance calls by sending them over the Internet, improves communication by eliminating the Private Branch Exchange (PBX), and offers a host of neat features such as call forwarding, e-mail accessible voicemail, and more. When it comes to measuring the dollars-and-cents…

  5. Validation of the Pangao PG-800B11 blood pressure monitor according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Bing, Sen; Zhang, Cunhai; Wang, Liping; Li, Linyi; Wan, Yi

    2014-12-01

    The study aimed to determine the accuracy of the fully automated oscillometric upper-arm blood pressure (BP) monitor Pangao PG-800B11 according to the European Society of Hypertension-International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocol 1993. Data from 33 participants were initially examined according to the ESH-IP revision 2010. Furthermore, 52 participants were then enrolled to fulfill the BHS protocol requirements. In all participants, sequential left arm measurements were performed by two trained observers using a mercury sphygmomanometer and one supervisor using the device. The protocols' requirements were followed precisely. The device passed all parts of the ESH protocol for systolic blood pressure (SBP) and diastolic blood pressure (DBP) and was graded A according to the criteria of the BHS protocol for both SBP and DBP. The A/A grade was achieved in low (<130/80 mmHg), medium (130-160/80-100 mmHg), and high (>160/100 mmHg) BP categories. The mean BP difference between PG-800B11 and observers in the 85 participants was -0.6±5.0 mmHg for SBP and -0.6±4.5 mmHg for DBP; thus, the device also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation (AAMI). The Pangao PG-800B11 passed all requirements of the ESH-IP revision 2010 and achieved A/A grade of the BHS protocol across a wide range of BPs.

  6. ISS and STS Commercial Off-the-Shelf Router Testing

    NASA Technical Reports Server (NTRS)

    Ivancie, William D.; Bell, Terry L.; Shell, Dan

    2002-01-01

    This report documents the results of testing performed with commercial off-the-shelf (COTS) routers and Internet Protocols (IPs) to determine if COTS equipment and IP could be utilized to upgrade NASA's current Space Transportation System (STS), the Shuttle, and the International Space Station communication infrastructure. Testing was performed by NASA Glenn Research Center (GRC) personnel within the Electronic Systems Test Laboratory (ESTE) with cooperation from the Mission Operations Directorate (MOD) Qualification and Utilization of Electronic System Technology (QUEST) personnel. The ESTE testing occurred between November 1 and 9, 2000. Additional testing was performed at NASA Glenn Research Center in a laboratory environment with equipment configured to emulate the STS. This report documents those tests and includes detailed test procedures, equipment interface requirements, test configurations and test results. The tests showed that a COTS router and standard Transmission Control Protocols and Internet Protocols (TCP/IP) could be used for both the Shuttle and the Space Station if near-error-free radio links are provided.

  7. Chromatin immunoprecipitation in microfluidic droplets: towards fast and cheap analyses.

    PubMed

    Teste, Bruno; Champ, Jerome; Londono-Vallejo, Arturo; Descroix, Stéphanie; Malaquin, Laurent; Viovy, Jean-Louis; Draskovic, Irena; Mottet, Guillaume

    2017-01-31

    Genetic organization is governed by the interaction of DNA with histone proteins, and differential modifications of these proteins is a fundamental mechanism of gene regulation. Histone modifications are primarily studied through chromatin immunoprecipitation (ChIP) assays, however conventional ChIP procedures are time consuming, laborious and require a large number of cells. Here we report for the first time the development of ChIP in droplets based on a microfluidic platform combining nanoliter droplets, magnetic beads (MB) and magnetic tweezers (MT). The droplet approach enabled compartmentalization and improved mixing, while reducing the consumption of samples and reagents in an integrated workflow. Anti-histone antibodies grafted to MB were used as a solid support to capture and transfer the target chromatin from droplets to droplets in order to perform chromatin immunoprecipitation, washing, elution and purification of DNA. We designed a new ChIP protocol to investigate four different types of modified histones with known roles in gene activation or repression. We evaluated the performances of this new ChIP in droplet assay in comparison with conventional methods. The proposed technology dramatically reduces analytical time from a few days to 7 hours, simplifies the ChIP protocol and decreases the number of cells required by 100 fold while maintaining a high degree of sensitivity and specificity. Therefore this droplet-based ChIP assay represents a new, highly advantageous and convenient approach to epigenetic analyses.

  8. Internet Geo-Location

    DTIC Science & Technology

    2017-12-01

    space while absolutely refraining from issuing any measurement probes of its own, either before or after it is presented with the IP addresses... space , IP geolocation 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON ROBERT...since it computes predictions for the entire IP address space while absolutely refraining from issuing any measurement probes of its own, either

  9. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  10. Adaptation technology between IP layer and optical layer in optical Internet

    NASA Astrophysics Data System (ADS)

    Ji, Yuefeng; Li, Hua; Sun, Yongmei

    2001-10-01

    Wavelength division multiplexing (WDM) optical network provides a platform with high bandwidth capacity and is supposed to be the backbone infrastructure supporting the next-generation high-speed multi-service networks (ATM, IP, etc.). In the foreseeable future, IP will be the predominant data traffic, to make fully use of the bandwidth of the WDM optical network, many attentions have been focused on IP over WDM, which has been proposed as the most promising technology for new kind of network, so-called Optical Internet. According to OSI model, IP is in the 3rd layer (network layer) and optical network is in the 1st layer (physical layer), so the key issue is what adaptation technology should be used in the 2nd layer (data link layer). In this paper, firstly, we analyze and compare the current adaptation technologies used in backbone network nowadays. Secondly, aiming at the drawbacks of above technologies, we present a novel adaptation protocol (DONA) between IP layer and optical layer in Optical Internet and describe it in details. Thirdly, the gigabit transmission adapter (GTA) we accomplished based on the novel protocol is described. Finally, we set up an experiment platform to apply and verify the DONA and GTA, the results and conclusions of the experiment are given.

  11. Application of Mobile-ip to Space and Aeronautical Networks

    NASA Technical Reports Server (NTRS)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  12. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  13. Security Research on VoIP with Watermarking

    NASA Astrophysics Data System (ADS)

    Hu, Dong; Lee, Ping

    2008-11-01

    With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.

  14. Kinetic arrest of field-temperature induced first order phase transition in quasi-one dimensional spin system Ca{sub 3}Co{sub 2}O{sub 6}

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    De, Santanu, E-mail: santanujuphys91@gmail.com; Kumar, Kranti; Banerjee, A.

    We have found that the geometrically frustrated spin chain compound Ca{sub 3}Co{sub 2}O{sub 6} belonging to Ising like universality class with uniaxial anisotropy shows kinetic arrest of first order intermediate phase (IP) to ferrimagnetic (FIM) transition. In this system, dc magnetization measurements followed by different protocols suggest the coexistence of high temperature IP with equilibrium FIM phase in low temperature. Formation of metastable state due to hindered first order transition has also been probed through cooling and heating in unequal field (CHUF) protocol. Kinetically arrested high temperature IP appears to persist down to almost the spin freezing temperature in thismore » system.« less

  15. TCP/IP Interface for the Satellite Orbit Analysis Program (SOAP)

    NASA Technical Reports Server (NTRS)

    Carnright, Robert; Stodden, David; Coggi, John

    2009-01-01

    The Transmission Control Protocol/ Internet protocol (TCP/IP) interface for the Satellite Orbit Analysis Program (SOAP) provides the means for the software to establish real-time interfaces with other software. Such interfaces can operate between two programs, either on the same computer or on different computers joined by a network. The SOAP TCP/IP module employs a client/server interface where SOAP is the server and other applications can be clients. Real-time interfaces between software offer a number of advantages over embedding all of the common functionality within a single program. One advantage is that they allow each program to divide the computation labor between processors or computers running the separate applications. Secondly, each program can be allowed to provide its own expertise domain with other programs able to use this expertise.

  16. Epigenome analysis of pluripotent stem cells

    PubMed Central

    Ricupero, Christopher L.; Swerdel, Mavis R.; Hart, Ronald P.

    2015-01-01

    Summary Mis-regulation of gene expression due to epigenetic abnormalities has been linked with complex genetic disorders, psychiatric illness and cancer. In addition, the dynamic epigenetic changes that occur in pluripotent stem cells are believed to impact regulatory networks essential for proper lineage development. Chromatin immunoprecipitation (ChIP) is a technique used to isolate and enrich chromatin fragments using antibodies against specific chromatin modifications, such as DNA binding proteins or covalent histone modifications. Until recently, many ChIP protocols required millions of cells for each immunoprecipitation. This severely limited analysis of rare cell populations or post-mitotic, differentiated cell lines. Here, we describe a low cell number ChIP protocol with next generation sequencing and analysis, that has the potential to uncover novel epigenetic regulatory pathways that were previously difficult or impossible to obtain. PMID:23546758

  17. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  18. ASN reputation system model

    NASA Astrophysics Data System (ADS)

    Hutchinson, Steve; Erbacher, Robert F.

    2015-05-01

    Network security monitoring is currently challenged by its reliance on human analysts and the inability for tools to generate indications and warnings for previously unknown attacks. We propose a reputation system based on IP address set membership within the Autonomous System Number (ASN) system. Essentially, a metric generated based on the historic behavior, or misbehavior, of nodes within a given ASN can be used to predict future behavior and provide a mechanism to locate network activity requiring inspection. This will provide reinforcement of notifications and warnings and lead to inspection for ASNs known to be problematic even if initial inspection leads to interpretation of the event as innocuous. We developed proof of concept capabilities to generate the IP address to ASN set membership and analyze the impact of the results. These results clearly show that while some ASNs are one-offs with individual or small numbers of misbehaving IP addresses, there are definitive ASNs with a history of long term and wide spread misbehaving IP addresses. These ASNs with long histories are what we are especially interested in and will provide an additional correlation metric for the human analyst and lead to new tools to aid remediation of these IP address blocks.

  19. An Architecture for SCADA Network Forensics

    NASA Astrophysics Data System (ADS)

    Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.

  20. Telecare and Social Link Solution for Ambient Assisted Living Using a Robot Companion with Visiophony

    NASA Astrophysics Data System (ADS)

    Varène, Thibaut; Hillereau, Paul; Simonnet, Thierry

    An increasing number of people are in need of help at home (elderly, isolated and/or disabled persons; people with mild cognitive impairment). Several solutions can be considered to maintain a social link while providing tele-care to these people. Many proposals suggest the use of a robot acting as a companion. In this paper we will look at an environment constrained solution, its drawbacks (such as latency) and its advantages (flexibility, integration…). A key design choice is to control the robot using a unified Voice over Internet Protocol (VoIP) solution, while addressing bandwidth limitations, providing good communication quality and reducing transmission latency

  1. How To: Be VoIP-Savvy

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2005-01-01

    Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…

  2. Chromatin Immunoprecipitation in Early Mouse Embryos.

    PubMed

    García-González, Estela G; Roque-Ramirez, Bladimir; Palma-Flores, Carlos; Hernández-Hernández, J Manuel

    2018-01-01

    Epigenetic regulation is achieved at many levels by different factors such as tissue-specific transcription factors, members of the basal transcriptional apparatus, chromatin-binding proteins, and noncoding RNAs. Importantly, chromatin structure dictates the availability of a specific genomic locus for transcriptional activation as well as the efficiency with which transcription can occur. Chromatin immunoprecipitation (ChIP) is a method that allows elucidating gene regulation at the molecular level by assessing if chromatin modifications or proteins are present at a specific locus. Initially, the majority of ChIP experiments were performed on cultured cell lines and more recently this technique has been adapted to a variety of tissues in different model organisms. Using ChIP on mouse embryos, it is possible to document the presence or absence of specific proteins and chromatin modifications at genomic loci in vivo during mammalian development and to get biological meaning from observations made on tissue culture analyses. We describe here a ChIP protocol on freshly isolated mouse embryonic somites for in vivo analysis of muscle specific transcription factor binding on chromatin. This protocol has been easily adapted to other mouse embryonic tissues and has also been successfully scaled up to perform ChIP-Seq.

  3. Security in the Cache and Forward Architecture for the Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.

    The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.

  4. Communication protocol in chassis detecting wireless transmission system based on WiFi

    USDA-ARS?s Scientific Manuscript database

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  5. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  6. Network Quality of Service Monitoring for IP Telephony.

    ERIC Educational Resources Information Center

    Ghita, B. V.; Furnell, S. M.; Lines, B. M.; Le-Foll, D.; Ifeachor, E. C.

    2001-01-01

    Discusses the development of real-time applications on the Internet for telecommunications and presents a non-intrusive way of determining network performance parameters for voice packet flows within a voice over IP (Internet Protocol), or Internet telephony call. Considers measurement of quality of service and describes results of a preliminary…

  7. Enhanced service zone architecture for multiservices over IP

    NASA Astrophysics Data System (ADS)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  8. Space-Based Telemetry and Range Safety (STARS) Study

    NASA Technical Reports Server (NTRS)

    Hogie, Keith; Crisuolo, Ed; Parise, Ron

    2004-01-01

    This presentation will describe the design, development, and testing of a system to collect telemetry, format it into UDP/IP packets, and deliver it to a ground test range using standard IP technologies over a TDRSS link. This presentation will discuss the goal of the STARS IP Formatter along with the overall design. It will also present performance results of the current version of the IP formatter. Finally, it will discuss key issues for supporting constant rate telemetry data delivery when using standard components such as PCI/104 processors, the Linux operating system, Internet Protocols, and synchronous serial interfaces.

  9. Internet over the VDL-2 Subnetwork: the VDL-2/IP Aviation Datalink System

    NASA Technical Reports Server (NTRS)

    Grappel, R. D.

    2000-01-01

    This report describes the design to operate the standard Internet communications protocols (IP) over the VHF aviation Data Link Mode 2 (VDL-2) subnetwork. The VDL-2/IP system specified in this report can operate transparently with the current aviation users of VDL-2 (Airline Communications and Reporting System, ACARS and Aeronautical Telecommunications Network, ATN) and proposed users (Flight Information Service via Broadcast, FIS-B). The VDL-2/IP system provides a straightforward mechanisms to utilize inexpensive, commercial off-the-shelf (COTS) communications packages developed for the Internet as part of the aviation datalink system.

  10. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    PubMed Central

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  11. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    PubMed

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  12. The Aeronautical Data Link: Taxonomy, Architectural Analysis, and Optimization

    NASA Technical Reports Server (NTRS)

    Morris, A. Terry; Goode, Plesent W.

    2002-01-01

    The future Communication, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) System will rely on global satellite navigation, and ground-based and satellite based communications via Multi-Protocol Networks (e.g. combined Aeronautical Telecommunications Network (ATN)/Internet Protocol (IP)) to bring about needed improvements in efficiency and safety of operations to meet increasing levels of air traffic. This paper will discuss the development of an approach that completely describes optimal data link architecture configuration and behavior to meet the multiple conflicting objectives of concurrent and different operations functions. The practical application of the approach enables the design and assessment of configurations relative to airspace operations phases. The approach includes a formal taxonomic classification, an architectural analysis methodology, and optimization techniques. The formal taxonomic classification provides a multidimensional correlation of data link performance with data link service, information protocol, spectrum, and technology mode; and to flight operations phase and environment. The architectural analysis methodology assesses the impact of a specific architecture configuration and behavior on the local ATM system performance. Deterministic and stochastic optimization techniques maximize architectural design effectiveness while addressing operational, technology, and policy constraints.

  13. An Updated Protocol to Detect Invalid Entries in an Online Survey of Men Who Have Sex with Men (MSM): How Do Valid and Invalid Submissions Compare?

    PubMed Central

    Konstan, Joseph; Iantaffi, Alex; Wilkerson, J. Michael; Galos, Dylan; Simon Rosser, B. R.

    2017-01-01

    Researchers use protocols to screen for suspicious survey submissions in online studies. We evaluated how well a de-duplication and cross-validation process detected invalid entries. Data were from the Sexually Explicit Media Study, an Internet-based HIV prevention survey of men who have sex with men. Using our protocol, 146 (11.6 %) of 1254 entries were identified as invalid. Most indicated changes to the screening questionnaire to gain entry (n = 109, 74.7 %), matched other submissions’ payment profiles (n = 56, 41.8 %), or featured an IP address that was recorded previously (n = 43, 29.5 %). We found few demographic or behavioral differences between valid and invalid samples, however. Invalid submissions had lower odds of reporting HIV testing in the past year (OR 0.63), and higher odds of requesting no payment compared to check payments (OR 2.75). Thus, rates of HIV testing would have been underestimated if invalid submissions had not been removed, and payment may not be the only incentive for invalid participation. PMID:25805443

  14. Understanding the Relationship Between Female Sex Workers and Their Intimate Partners: Lessons and Initial Findings From Participatory Research in North Karnataka, South India.

    PubMed

    Bhattacharjee, Parinita; Campbell, Linda; Thalinja, Raghavendra; Nair, Sapna; Doddamane, Mahesh; Ramanaik, Satyanarayana; Isac, Shajy; Beattie, Tara S

    2018-04-01

    While traditional HIV prevention programs with female sex workers (FSWs) in Karnataka, India, have focused on reducing HIV transmission between FSWs and clients through increased condom use, these programs have not fully addressed the transmission risk between FSWs and their nonpaying intimate partners (IPs). Condom use is infrequent and violence is recurrent in these relationships: Furthermore, there is little evidence on the precise nature of FSW-IP relationships. Our study addresses this knowledge gap to inform HIV programs targeted at FSWs. A series of workshops, using participatory tools, was held to explore FSW-IP relationships; 31 FSWs and 37 IPs participated. Three aspects of FSW-IP relationships were examined: how FSWs and IPs understand and interpret their relationships, factors influencing condom use, and the role of violence and its consequences. FSWs wish to be perceived as their IPs' wives, while IPs expect their FSW partners to accept their dominance in the relationship. Nonuse of condoms signals fidelity and elevates the status of the relationship almost to that of marriage, which helps FSWs enter the category of "good" (married) women. Tolerating and accepting violence in these relationships is normative, as in other marital relationships; IPs justify violence as necessary to establish and maintain their power within the relationship. Both FSWs and IPs value their relationships despite the high degree of risk posed by low condom use and high levels of violence. Implications for program design include addressing current norms around masculinity and gender roles, and improving communication within relationships.

  15. Naval Postgraduate School Research. Volume 11, Number 2, June 2001

    DTIC Science & Technology

    2001-06-01

    Asynchronous Transfer Mode Protocols for Communi- cation of TCP / IP Based Voice, Video and Data over Long Delay Wireless Links.” LCDR Bermingham is...accurate, DD-21 is planned to employ an Integrated Power System ( IPS ), where both ship service and ship propulsion power are derived from a common set...electric drive and to shipboard distribu- tion. The advantages of electric drive and IPS are manifold including: a reduction in the number of prime movers

  16. Analysis of the Digital Evidence Presented in the Yahoo! Case

    NASA Astrophysics Data System (ADS)

    Kwan, Michael; Chow, Kam-Pui; Lai, Pierre; Law, Frank; Tse, Hayson

    The “Yahoo! Case” led to considerable debate about whether or not an IP address is personal data as defined by the Personal Data (Privacy) Ordinance (Chapter 486) of the Laws of Hong Kong. This paper discusses the digital evidence presented in the Yahoo! Case and evaluates the impact of the IP address on the verdict in the case. A Bayesian network is used to quantify the evidentiary strengths of hypotheses in the case and to reason about the evidence. The results demonstrate that the evidence about the IP address was significant to obtaining a conviction in the case.

  17. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    ERIC Educational Resources Information Center

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  18. Lightweight SIP/SDP compression scheme (LSSCS)

    NASA Astrophysics Data System (ADS)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  19. Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers

    DTIC Science & Technology

    2017-12-01

    PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA

  20. 76 FR 14662 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... (STS) based on the Multi-state Average Rate Structure (MARS) plan proposed by Hamilton Relay, Inc., (2... intrastate Internet-Protocol (IP) Captioned Telephone Service (IP CTS) based on the MARS plan, (3) a cost... with the MARS plan cost recovery methodology for compensation from the Fund. Specifically, TRS...

  1. 78 FR 8090 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... communicate in a manner that is functionally equivalent to communication by conventional voice telephone users... actually need the service to communicate in a manner that is functionally equivalent to communication by... equivalent to communication by conventional voice telephone users. In fact, the unobtrusive nature of IP CTS...

  2. Optimized methods of chromatin immunoprecipitation for profiling histone modifications in industrial microalgae Nannochloropsis spp.

    PubMed

    Wei, Li; Xu, Jian

    2018-06-01

    Epigenetic factors such as histone modifications play integral roles in plant development and stress response, yet their implications in algae remain poorly understood. In the industrial oleaginous microalgae Nannochloropsis spp., the lack of an efficient methodology for chromatin immunoprecipitation (ChIP), which determines the specific genomic location of various histone modifications, has hindered probing the epigenetic basis of their photosynthetic carbon conversion and storage as oil. Here, a detailed ChIP protocol was developed for Nannochloropsis oceanica, which represents a reliable approach for the analysis of histone modifications, chromatin state, and transcription factor-binding sites at the epigenetic level. Using ChIP-qPCR, genes related to photosynthetic carbon fixation in this microalga were systematically assessed. Furthermore, a ChIP-Seq protocol was established and optimized, which generated a genome-wide profile of histone modification events, using histone mark H3K9Ac as an example. These results are the first step for appreciation of the chromatin landscape in industrial oleaginous microalgae and for epigenetics-based microalgal feedstock development. © 2018 Phycological Society of America.

  3. All-IP wireless sensor networks for real-time patient monitoring.

    PubMed

    Wang, Xiaonan; Le, Deguang; Cheng, Hongbin; Xie, Conghua

    2014-12-01

    This paper proposes the all-IP WSNs (wireless sensor networks) for real-time patient monitoring. In this paper, the all-IP WSN architecture based on gateway trees is proposed and the hierarchical address structure is presented. Based on this architecture, the all-IP WSN can perform routing without route discovery. Moreover, a mobile node is always identified by a home address and it does not need to be configured with a care-of address during the mobility process, so the communication disruption caused by the address change is avoided. Through the proposed scheme, a physician can monitor the vital signs of a patient at any time and at any places, and according to the IPv6 address he can also obtain the location information of the patient in order to perform effective and timely treatment. Finally, the proposed scheme is evaluated based on the simulation, and the simulation data indicate that the proposed scheme might effectively reduce the communication delay and control cost, and lower the packet loss rate. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Advances Made in the Next Generation of Satellite Networks

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.

    1999-01-01

    Because of the unique networking characteristics of communications satellites, global satellite networks are moving to the forefront in enhancing national and global information infrastructures. Simultaneously, broadband data services, which are emerging as the major market driver for future satellite and terrestrial networks, are being widely acknowledged as the foundation for an efficient global information infrastructure. In the past 2 years, various task forces and working groups around the globe have identified pivotal topics and key issues to address if we are to realize such networks in a timely fashion. In response, industry, government, and academia undertook efforts to address these topics and issues. A workshop was organized to provide a forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. The Satellite Networks: Architectures, Applications, and Technologies Workshop was hosted by the Space Communication Program at the NASA Lewis Research Center in Cleveland, Ohio. Nearly 300 executives and technical experts from academia, industry, and government, representing the United States and eight other countries, attended the event (June 2 to 4, 1998). The program included seven panels and invited sessions and nine breakout sessions in which 42 speakers presented on technical topics. The proceedings covers a wide range of topics: access technology and protocols, architectures and network simulations, asynchronous transfer mode (ATM) over satellite networks, Internet over satellite networks, interoperability experiments and applications, multicasting, NASA interoperability experiment programs, NASA mission applications, and Transmission Control Protocol/Internet Protocol (TCP/IP) over satellite: issues, relevance, and experience.

  5. Efficient Buffering Scheme in the LMA for Seamless Handover in PMIPv6

    NASA Astrophysics Data System (ADS)

    Kim, Kwang-Ryoul; Lee, Hyo-Beom; Choi, Hyon-Young; Min, Sung-Gi; Han, Youn-Hee

    Proxy Mobile IPv6 (PMIPv6) is proposed as a new network-based local mobility protocol which does not involve the Mobile Node (MN) in mobility management. PMIPv6, which uses link-layer attachment information, reduces the movement detection time and eliminates duplicate address detection procedures in order to provide faster handover than Mobile IPv6 (MIPv6). To eliminate packet loss during the handover period, the Local Mobility Anchor (LMA) buffering scheme is proposed. In this scheme, the LMA buffers lost packets of the Mobile Access Gateway (MAG) and the MN during the handover and recovers them after handover. A new Automatic Repeat reQuest (ARQ) handler is defined which efficiently manages the LMA buffer. The ARQ handler relays ARQ result between the MAG and the MN to the LMA. The LMA removes any buffered packets which have been successfully delivered to the MN. The ARQ handler recovers the packet loss during the handover using buffered packets in the LMA. The ARQ information, between the MAG and LMA, is inserted in the outer header of IP-in-IP encapsulated packets of a standard PMIPv6 tunnel. Since the proposed scheme simply adds information to the standard operation of an IP-in-IP tunnel between the LMA and the MAG, it can be implemented seamlessly without modification to the original PMIPv6 messages and signaling sequence. Unlike other Fast Handovers for Mobile IPv6 (FMIPv6) based enhancement for PMIPv6, the proposed scheme does not require any handover related information before the actual handover.

  6. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  7. The extended TRIP supporting VoIP routing reservation with distributed QoS

    NASA Astrophysics Data System (ADS)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  8. Development and qualitative evaluation of an adapted return to work guideline for the sick-listed unemployed and temporary agency workers with minor psychological problems

    PubMed Central

    2012-01-01

    Background Among the working population, unemployed and temporary agency workers with psychological problems are a particularly vulnerable group, at risk for sickness absence and prolonged work disability. There is a need for the development of a new protocol for this group, because the existing return to work (RTW) interventions, including practice guidelines, do not address the situation when there is no workplace to return to. The purpose of this study was to (1) describe the adaptations needed in the practice guideline for employed workers to enable its use by insurance physicians (IPs) for counselling of sick-listed unemployed and temporary agency workers with minor psychological problems; and (2) evaluate the experiences of IPs when using the new guidance document for minor psychological problems (MPP guidance document). Methods The MPP guidance document for unemployed and temporary agency workers was developed through discussions with nine IPs and with the help of an expert. Semi-structured interviews with five IPs were then held to evaluate the IPs’ field experience using the MPP guidance document, in terms of (a) feasibility and (b) perceived usefulness of the MPP guidance document. Results The main adaptation introduced in the guideline is that interaction with the workplace, which is absent in this population, needed to be established in an alternative way, i.e., through the involvement of vocational rehabilitation agencies and labour experts. Overall, the guideline required minimal changes. In total, nineteen sick-listed workers were counselled using the MPP guidance document. The overall experience of the IPs was that the MPP guidance document was feasible and useful for the IP, while they had mixed responses on its usefulness for the sick-listed worker, in part due to the follow-up period of this study. Conclusions An existing practice guideline for employed workers was adapted for use as a guidance document for unemployed and temporary agency workers with minor psychological problems. IPs were positive about applying the MPP guidance document. The guidance document provides opportunities for RTW counselling for unemployed and temporary agency workers with minor psychological problems. PMID:23014258

  9. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863

  10. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  11. An overview of the DII-HEP OpenStack based CMS data analysis

    NASA Astrophysics Data System (ADS)

    Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.

    2015-05-01

    An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.

  12. Traffic-engineering-aware shortest-path routing and its application in IP-over-WDM networks [Invited

    NASA Astrophysics Data System (ADS)

    Lee, Youngseok; Mukherjee, Biswanath

    2004-03-01

    Single shortest-path routing is known to perform poorly for Internet traffic engineering (TE) where the typical optimization objective is to minimize the maximum link load. Splitting traffic uniformly over equal-cost multiple shortest paths in open shortest path first and intermediate system-intermediate system protocols does not always minimize the maximum link load when multiple paths are not carefully selected for the global traffic demand matrix. However, a TE-aware shortest path among all the equal-cost multiple shortest paths between each ingress-egress pair can be selected such that the maximum link load is significantly reduced. IP routers can use the globally optimal TE-aware shortest path without any change to existing routing protocols and without any serious configuration overhead. While calculating TE-aware shortest paths, the destination-based forwarding constraint at a node should be satisfied, because an IP router will forward a packet to the next hop toward the destination by looking up the destination prefix. We present a mathematical problem formulation for finding a set of TE-aware shortest paths for the given network as an integer linear program, and we propose a simple heuristic for solving large instances of the problem. Then we explore the usage of our proposed algorithm for the integrated TE method in IP-over-WDM networks. The proposed algorithm is evaluated through simulations in IP networks as well as in IP-over-WDM networks.

  13. Phosphoinositide and Inositol Phosphate Analysis in Lymphocyte Activation

    PubMed Central

    Sauer, Karsten; Huang, Yina Hsing; Lin, Hongying; Sandberg, Mark; Mayr, Georg W.

    2015-01-01

    Lymphocyte antigen receptor engagement profoundly changes the cellular content of phosphoinositide lipids and soluble inositol phosphates. Among these, the phosphoinositides phosphatidylinositol 4,5-bisphosphate (PIP2) and phosphatidylinositol 3,4,5-trisphosphate (PIP3) play key signaling roles by acting as pleckstrin homology (PH) domain ligands that recruit signaling proteins to the plasma membrane. Moreover, PIP2 acts as a precursor for the second messenger molecules diacylglycerol and soluble inositol 1,4,5-trisphosphate (IP3), essential mediators of PKC, Ras/Erk, and Ca2+ signaling in lymphocytes. IP3 phosphorylation by IP3 3-kinases generates inositol 1,3,4,5-tetrakisphosphate (IP4), an essential soluble regulator of PH domain binding to PIP3 in developing T cells. Besides PIP2, PIP3, IP3, and IP4, lymphocytes produce multiple other phosphoinositides and soluble inositol phosphates that could have important physiological functions. To aid their analysis, detailed protocols that allow one to simultaneously measure the levels of multiple different phosphoinositide or inositol phosphate isomers in lymphocytes are provided here. They are based on thin layer, conventional and high-performance liquid chromatographic separation methods followed by radiolabeling or non-radioactive metal-dye detection. Finally, less broadly applicable nonchromatographic methods for detection of specific phosphoinositide or inositol phosphate isomers are discussed. Support protocols describe how to obtain pure unstimulated CD4+CD8+ thymocyte populations for analyses of inositol phosphate turnover during positive and negative selection, key steps in T cell development. PMID:19918943

  14. ROVER: A DNS-Based Method to Detect and Prevent IP Hijacks

    ERIC Educational Resources Information Center

    Gersch, Joseph E.

    2013-01-01

    The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…

  15. Design and Characterization of a Secure Automatic Dependent Surveillance-Broadcast Prototype

    DTIC Science & Technology

    2015-03-26

    during the thesis process. Thank you to Mr. Dave Prentice of AFRL for providing the Aeroflex IFR 6000 baseband signals, upon which many design decisions...35 25 Example Aeroflex IFR 6000 signal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 26...Global Positioning System HDL hardware description language I in-phase IFR Instrument Flight Rules IP Internet Protocol IP intellectual property IPSec

  16. A randomized waitlist-controlled pilot trial of voice over Internet protocol-delivered behavior therapy for youth with chronic tic disorders.

    PubMed

    Ricketts, Emily J; Goetz, Amy R; Capriotti, Matthew R; Bauer, Christopher C; Brei, Natalie G; Himle, Michael B; Espil, Flint M; Snorrason, Ívar; Ran, Dagong; Woods, Douglas W

    2016-04-01

    Comprehensive Behavioral Intervention for Tics (CBIT) has been shown to be efficacious for chronic tic disorders (CTDs), but utilization is limited by a lack of treatment providers and perceived financial and time burden of commuting to treatment. A promising alternative to in-person delivery is voice over Internet protocol (VoIP), allowing for remote, real-time treatment delivery to patients' homes. However, little is known about the effectiveness of VoIP for CTDs. Therefore, the present study examined the preliminary efficacy, feasibility, and acceptability of VoIP-delivered CBIT (CBIT-VoIP). Twenty youth (8-16 years) with CTDs participated in a randomized, waitlist-controlled pilot trial of CBIT-VoIP. The main outcome was pre- to post-treatment change in clinician-rated tic severity (Yale Global Tic Severity Scale). The secondary outcome was clinical responder rate (Clinical Global Impressions - Improvement Scale), assessed using ratings of 'very much improved' or 'much improved' indicating positive treatment response. Intention-to-treat analyses with the last observation carried forward were performed. At post-treatment (10-weeks), significantly greater reductions in clinician-rated, (F(1,18) = 3.05, p < 0.05, partial η(2 )= 0.15), and parent-reported tic severity, (F(1,18) = 6.37, p < 0.05, partial η(2 )= 0.26) were found in CBIT-VoIP relative to waitlist. One-third (n = 4) of those in CBIT-VoIP were considered treatment responders. Treatment satisfaction and therapeutic alliance were high. CBIT can be delivered via VoIP with high patient satisfaction, using accessible, low-cost equipment. CBIT-VoIP was generally feasible to implement, with some audio and visual challenges. Modifications to enhance treatment delivery are suggested. © The Author(s) 2015.

  17. The effects of high intensity short rest resistance exercise on muscle damage markers in men and women.

    PubMed

    Heavens, Kristen R; Szivak, Tunde K; Hooper, David R; Dunn-Lewis, Courtenay; Comstock, Brett A; Flanagan, Shawn D; Looney, David P; Kupchak, Brian R; Maresh, Carl M; Volek, Jeff S; Kraemer, William J

    2014-04-01

    Within and between sexes, universal load prescription (as assigned in extreme conditioning programs) creates extreme ranges in individual training intensities. Exercise intensity has been proposed to be the main factor determining the degree of muscle damage. Thus, the purpose of this study was to examine markers of muscle damage in resistance-trained men (n = 9) and women (n = 9) from a high intensity (HI) short rest (SR) (HI/SR) resistance exercise protocol. The HI/SR consisted of a descending pyramid scheme starting at 10 repetitions, decreasing 1 repetition per set for the back squat, bench press, and deadlift, as fast as possible. Blood was drawn pre-exercise (pre), immediately postexercise (IP), 15 minutes postexercise (+15), 60 minutes postexercise (+60), and 24 hours postexercise (+24). Women demonstrated significant increases in interleukin 6 (IL-6; IP), creatine kinase (CK; +24), myoglobin (IP, +15, +60), and a greater relative increase when compared with men (+15, +60). Men demonstrated significant increases in myoglobin (IP, +15, +60, +24), IL-6 (IP, +15), CK (IP, +60, +24), and testosterone (IP, +15). There were significant sex interactions observed in CK (IP, +60, +24) and testosterone (IP, +15, +60, +24). Women completed the protocol faster (women: 34:04 ± 9:40 minutes, men: 39:22 ± 14:43 minutes), and at a slightly higher intensity (women: 70.1 ± 3.5%, men 68.8 ± 3.1%); however, men performed significantly more work (men: 14384.6 ± 1854.5 kg, women: 8774.7 ± 1612.7 kg). Overall, women demonstrated a faster inflammatory response with increased acute damage, whereas men demonstrated a greater prolonged damage response. Therefore, strength and conditioning professionals need to be aware of the level of stress imposed on individuals when creating such volitional high intensity metabolic type workouts and allow for adequate progression and recovery from such workouts.

  18. Non-Viral Generation of Marmoset Monkey iPS Cells by a Six-Factor-in-One-Vector Approach

    PubMed Central

    Debowski, Katharina; Warthemann, Rita; Lentes, Jana; Salinas-Riester, Gabriela; Dressel, Ralf; Langenstroth, Daniel; Gromoll, Jörg; Sasaki, Erika; Behr, Rüdiger

    2015-01-01

    Groundbreaking studies showed that differentiated somatic cells of mouse and human origin could be reverted to a stable pluripotent state by the ectopic expression of only four proteins. The resulting pluripotent cells, called induced pluripotent stem (iPS) cells, could be an alternative to embryonic stem cells, which are under continuous ethical debate. Hence, iPS cell-derived functional cells such as neurons may become the key for an effective treatment of currently incurable degenerative diseases. However, besides the requirement of efficacy testing of the therapy also its long-term safety needs to be carefully evaluated in settings mirroring the clinical situation in an optimal way. In this context, we chose the long-lived common marmoset monkey (Callithrix jacchus) as a non-human primate species to generate iPS cells. The marmoset monkey is frequently used in biomedical research and is gaining more and more preclinical relevance due to the increasing number of disease models. Here, we describe, to our knowledge, the first-time generation of marmoset monkey iPS cells from postnatal skin fibroblasts by non-viral means. We used the transposon-based, fully reversible piggyback system. We cloned the marmoset monkey reprogramming factors and established robust and reproducible reprogramming protocols with a six-factor-in-one-construct approach. We generated six individual iPS cell lines and characterized them in comparison with marmoset monkey embryonic stem cells. The generated iPS cells are morphologically indistinguishable from marmoset ES cells. The iPS cells are fully reprogrammed as demonstrated by differentiation assays, pluripotency marker expression and transcriptome analysis. They are stable for numerous passages (more than 80) and exhibit euploidy. In summary, we have established efficient non-viral reprogramming protocols for the derivation of stable marmoset monkey iPS cells, which can be used to develop and test cell replacement therapies in preclinical settings. PMID:25785453

  19. Non-viral generation of marmoset monkey iPS cells by a six-factor-in-one-vector approach.

    PubMed

    Debowski, Katharina; Warthemann, Rita; Lentes, Jana; Salinas-Riester, Gabriela; Dressel, Ralf; Langenstroth, Daniel; Gromoll, Jörg; Sasaki, Erika; Behr, Rüdiger

    2015-01-01

    Groundbreaking studies showed that differentiated somatic cells of mouse and human origin could be reverted to a stable pluripotent state by the ectopic expression of only four proteins. The resulting pluripotent cells, called induced pluripotent stem (iPS) cells, could be an alternative to embryonic stem cells, which are under continuous ethical debate. Hence, iPS cell-derived functional cells such as neurons may become the key for an effective treatment of currently incurable degenerative diseases. However, besides the requirement of efficacy testing of the therapy also its long-term safety needs to be carefully evaluated in settings mirroring the clinical situation in an optimal way. In this context, we chose the long-lived common marmoset monkey (Callithrix jacchus) as a non-human primate species to generate iPS cells. The marmoset monkey is frequently used in biomedical research and is gaining more and more preclinical relevance due to the increasing number of disease models. Here, we describe, to our knowledge, the first-time generation of marmoset monkey iPS cells from postnatal skin fibroblasts by non-viral means. We used the transposon-based, fully reversible piggyback system. We cloned the marmoset monkey reprogramming factors and established robust and reproducible reprogramming protocols with a six-factor-in-one-construct approach. We generated six individual iPS cell lines and characterized them in comparison with marmoset monkey embryonic stem cells. The generated iPS cells are morphologically indistinguishable from marmoset ES cells. The iPS cells are fully reprogrammed as demonstrated by differentiation assays, pluripotency marker expression and transcriptome analysis. They are stable for numerous passages (more than 80) and exhibit euploidy. In summary, we have established efficient non-viral reprogramming protocols for the derivation of stable marmoset monkey iPS cells, which can be used to develop and test cell replacement therapies in preclinical settings.

  20. Use of IPsec by Manned Space Missions

    NASA Technical Reports Server (NTRS)

    Pajevski, Michael J.

    2009-01-01

    NASA's Constellation Program is developing its next generation manned space systems for missions to the International Space Station (ISS) and the Moon. The Program is embarking on a path towards standards based Internet Protocol (IP) networking for space systems communication. The IP based communications will be paired with industry standard security mechanisms such as Internet Protocol Security (IPsec) to ensure the integrity of information exchanges and prevent unauthorized release of sensitive information in-transit. IPsec has been tested in simulations on the ground and on at least one Earth orbiting satellite, but the technology is still unproven in manned space mission situations and significant obstacles remain.

  1. Leo Satellite Communication through a LEO Constellation using TCP/IP Over ATM

    NASA Technical Reports Server (NTRS)

    Foore, Lawrence R.; Konangi, Vijay K.; Wallett, Thomas M.

    1999-01-01

    The simulated performance characteristics for communication between a terrestrial client and a Low Earth Orbit (LEO) satellite server are presented. The client and server nodes consist of a Transmission Control Protocol /Internet Protocol (TCP/IP) over ATM configuration. The ATM cells from the client or the server are transmitted to a gateway, packaged with some header information and transferred to a commercial LEO satellite constellation. These cells are then routed through the constellation to a gateway on the globe that allows the client/server communication to take place. Unspecified Bit Rate (UBR) is specified as the quality of service (QoS). Various data rates are considered.

  2. Validation of the Medisana MTP Plus upper arm blood pressure monitor, for self-measurement, according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Erdem, Emre; Aydogdu, Türkan; Akpolat, Tekin

    2011-02-01

    Standard validation protocols are objective guides for healthcare providers, physicians, and patients. The purpose of this study was to test validation of the Medisana MTP Plus upper arm blood pressure (BP) measuring monitor for self-measurement according to the European Society of Hypertension International Protocol (ESH-IP2) in adults. The Medisana MTP Plus monitor is an automated and oscillometric upper arm device for home BP monitoring. Nine consecutive measurements were made according to the ESH-IP2. Overseen by an independent supervisor, measurements were recorded by two observers blinded from both each other's readings and from the device readings. The Medisana MTP Plus device fulfills the validation criteria of the ESH-IP2 for the general population. The mean (standard deviation) of the difference between the observers and the device measurements was 0.6 mmHg (5.1 mmHg) for systolic and 2.7 mmHg (3.4 mmHg) for diastolic pressures, respectively. As the Medisana MTP Plus device has achieved the required standards, it is recommended for home BP monitoring in an adult population.

  3. Comparison of H.323 and SIP for IP telephony signaling

    NASA Astrophysics Data System (ADS)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  4. CoAP-Based Mobility Management for the Internet of Things

    PubMed Central

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-01-01

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214

  5. A comparative study of the use of the Istanbul Protocol amongst civil society organizations in low-income countries.

    PubMed

    Kelly, Toby; Jensen, Steffen; Koch Andersen, Morten; Christiansen, Catrine; Sharma, Jeevan Raj

    2016-01-01

    The Istanbul Protocol (IP) is one of the great success stories of the global anti-torture movement, setting out universal guidelines for the production of rigorous, objective and reliable evidence about allegations of torture and ill-treatment. The IP is explicitly designed to outline 'minimum standards for States'. However, it is all too often left to civil society organizations to investigate allegations of torture and ill-treatment. In this context, important questions remain as to how and where the IP can be used best by such organizations. These questions are particularly acute in situations where human rights groups may have limited institutional capacity. This paper explores the practical challenges faced by civil society in using the IP in Low-Income Countries. It is based on qualitative research in three case studies: Nepal, Kenya and Bangladesh. This research involved over 80 interviews with human rights practitioners. The conclusions of the paper are that the Istanbul Protocol provides a useful framework for documentation, but more comprehensive forms of documentation will often be limited to a very small - albeit important - number of legal cases. In many cases, the creation of precise and standardized forms of evidence is not necessarily the most effective form of documentation for redress or accountability. In the absence of legal systems willing and able to respond effectively to allegations of torture and ill-treatment, there are severe limitations on the practical effectiveness of detailed and technical forms of documentation.

  6. MSFC institutional area network and ATM technology

    NASA Technical Reports Server (NTRS)

    Amin, Ashok T.

    1994-01-01

    The New Institutional Area Network (NEWIAN) at Marshall supports over 5000 end users with access to 26 file servers providing work presentation services. It is comprised of some 150 Ethernet LAN's interconnected by bridges/routers which are in turn connected to servers over two dual FDDI rings. The network supports various higher level protocols such as IP, IPX, AppleTalk (AT), and DECNet. At present IPX and AT protocols packets are routed, and IP protocol packets are bridged; however, work is in progress to route all IP packets. The impact of routing IP packets on network operation is examined. Broadband Integrated Services Data Network (BISDN), presently at various stages of development, is intended to provide voice, video, and data transfer services over a single network. BISDN will use asynchronous transfer mode (ATM) as a data transfer technique which provides for transmission, multiplexing, switching, and relaying of small size data units called cells. Limited ATM Wide Area Network (WAN) services are offered by Wiltel, AT&T, Sprint, and others. NASA is testing a pilot ATM WAN with a view to provide Program Support Communication Network services using ATM. ATM supports wide range of data rates and quality of service requirements. It is expected that ATM switches will penetrate campus networks as well. However, presently products in these areas are at various stages of development and standards are not yet complete. We examine development of ATM to help assess its role in the evolution of NEWIAN.

  7. The BACnet Campus Challenge - Part 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Masica, Ken; Tom, Steve

    Here, the BACnet protocol was designed to achieve interoperability among building automation vendors and evolve over time to include new functionality as well as support new communication technologies such as the Ethernet and IP protocols as they became prevalent and economical in the market place. For large multi-building, multi-vendor campus environments, standardizing on the BACnet protocol as an implementation strategy can be a key component in meeting the challenge of an interoperable, flexible, and scalable building automation system. The interoperability of BACnet is especially important when large campuses with legacy equipment have DDC upgrades to facilities performed over different timemore » frames and use different contractors that install equipment from different vendors under the guidance of different campus HVAC project managers. In these circumstances, BACnet can serve as a common foundation for interoperability when potential variability exists in approaches to the design-build process by numerous parties over time. Likewise, BACnet support for a range of networking protocols and technologies can be a key strategy for achieving flexible and scalable automation systems as campuses and enterprises expand networking infrastructures using standard interoperable protocols like IP and Ethernet.« less

  8. Achieving High Throughput for Data Transfer over ATM Networks

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.; Townsend, Jeffrey N.

    1996-01-01

    File-transfer rates for ftp are often reported to be relatively slow, compared to the raw bandwidth available in emerging gigabit networks. While a major bottleneck is disk I/O, protocol issues impact performance as well. Ftp was developed and optimized for use over the TCP/IP protocol stack of the Internet. However, TCP has been shown to run inefficiently over ATM. In an effort to maximize network throughput, data-transfer protocols can be developed to run over UDP or directly over IP, rather than over TCP. If error-free transmission is required, techniques for achieving reliable transmission can be included as part of the transfer protocol. However, selected image-processing applications can tolerate a low level of errors in images that are transmitted over a network. In this paper we report on experimental work to develop a high-throughput protocol for unreliable data transfer over ATM networks. We attempt to maximize throughput by keeping the communications pipe full, but still keep packet loss under five percent. We use the Bay Area Gigabit Network Testbed as our experimental platform.

  9. The BACnet Campus Challenge - Part 1

    DOE PAGES

    Masica, Ken; Tom, Steve

    2015-12-01

    Here, the BACnet protocol was designed to achieve interoperability among building automation vendors and evolve over time to include new functionality as well as support new communication technologies such as the Ethernet and IP protocols as they became prevalent and economical in the market place. For large multi-building, multi-vendor campus environments, standardizing on the BACnet protocol as an implementation strategy can be a key component in meeting the challenge of an interoperable, flexible, and scalable building automation system. The interoperability of BACnet is especially important when large campuses with legacy equipment have DDC upgrades to facilities performed over different timemore » frames and use different contractors that install equipment from different vendors under the guidance of different campus HVAC project managers. In these circumstances, BACnet can serve as a common foundation for interoperability when potential variability exists in approaches to the design-build process by numerous parties over time. Likewise, BACnet support for a range of networking protocols and technologies can be a key strategy for achieving flexible and scalable automation systems as campuses and enterprises expand networking infrastructures using standard interoperable protocols like IP and Ethernet.« less

  10. Intranets: Just Another Bandwagon?

    ERIC Educational Resources Information Center

    Lynch, Gary

    1997-01-01

    Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…

  11. ChIP-Seq Analysis for Identifying Genome-Wide Histone Modifications Associated with Stress-Responsive Genes in Plants.

    PubMed

    Li, Guosheng; Jagadeeswaran, Guru; Mort, Andrew; Sunkar, Ramanjulu

    2017-01-01

    Histone modifications represent the crux of epigenetic gene regulation essential for most biological processes including abiotic stress responses in plants. Thus, identification of histone modifications at the genome-scale can provide clues for how some genes are 'turned-on' while some others are "turned-off" in response to stress. This chapter details a step-by-step protocol for identifying genome-wide histone modifications associated with stress-responsive gene regulation using chromatin immunoprecipitation (ChIP) followed by sequencing of the DNA (ChIP-seq).

  12. Multiformat decoder for a DSP-based IP set-top box

    NASA Astrophysics Data System (ADS)

    Pescador, F.; Garrido, M. J.; Sanz, C.; Juárez, E.; Samper, D.; Antoniello, R.

    2007-05-01

    Internet Protocol Set-Top Boxes (IP STBs) based on single-processor architectures have been recently introduced in the market. In this paper, the implementation of an MPEG-4 SP/ASP video decoder for a multi-format IP STB based on a TMS320DM641 DSP is presented. An initial decoder for PC platform was fully tested and ported to the DSP. Using this code an optimization process was started achieving a 90% speedup. This process allows real-time MPEG-4 SP/ASP decoding. The MPEG-4 decoder has been integrated in an IP STB and tested in a real environment using DVD movies and TV channels with excellent results.

  13. An Intensive Programme on Education for Sustainable Development: The Participants' Experience

    ERIC Educational Resources Information Center

    Biasutti, Michele

    2015-01-01

    This paper presents the framework of an intensive programme (IP) organised by UNESCO and addressed to young graduate professionals to prepare them for a career in fields related to sustainability. The aims of the IP were to address participants' environmental awareness and to develop attitudes and skills related to environmental planning and…

  14. Validation of the Andon KD-5851 upper arm blood pressure monitor, for self-measurement according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Wu, Lili; Jiao, Yinghui; Wang, Chengdong; Chen, Lei; Di, Dalin; Zhang, Haiyan

    2015-08-01

    This study aimed to validate the Andon KD-5851 upper arm blood pressure (BP) monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010. A total of 33 eligible participants were included in the study. Sequential measurements of BPs were performed using a mercury sphygmomanometer and the device, and the data analysis was carried out following precisely the ESH-IP revision 2010. The device had 82, 98, and 99 measurements within 5, 10, and 15 mmHg for systolic blood pressure and 85, 95, and 99 measurements for diastolic blood pressure, respectively. The average device-observer difference was -0.53±4.00 mmHg for systolic blood pressure and -1.15±4.06 mmHg for diastolic blood pressure. The device passed all the criteria according to the ESH-IP revision 2010. According to the validation results on the basis of the ESH-IP revision 2010, the Andon KD-5851 upper arm BP monitor can be recommended for self/home measurement in adults. Copyright © 2015 Wolters Kluwer Health, Inc. All rights reserved.

  15. cChIP-seq: a robust small-scale method for investigation of histone modifications.

    PubMed

    Valensisi, Cristina; Liao, Jo Ling; Andrus, Colin; Battle, Stephanie L; Hawkins, R David

    2015-12-21

    ChIP-seq is highly utilized for mapping histone modifications that are informative about gene regulation and genome annotations. For example, applying ChIP-seq to histone modifications such as H3K4me1 has facilitated generating epigenomic maps of putative enhancers. This powerful technology, however, is limited in its application by the large number of cells required. ChIP-seq involves extensive manipulation of sample material and multiple reactions with limited quality control at each step, therefore, scaling down the number of cells required has proven challenging. Recently, several methods have been proposed to overcome this limit but most of these methods require extensive optimization to tailor the protocol to the specific antibody used or number of cells being profiled. Here we describe a robust, yet facile method, which we named carrier ChIP-seq (cChIP-seq), for use on limited cell amounts. cChIP-seq employs a DNA-free histone carrier in order to maintain the working ChIP reaction scale, removing the need to tailor reactions to specific amounts of cells or histone modifications to be assayed. We have applied our method to three different histone modifications, H3K4me3, H3K4me1 and H3K27me3 in the K562 cell line, and H3K4me1 in H1 hESCs. We successfully obtained epigenomic maps for these histone modifications starting with as few as 10,000 cells. We compared cChIP-seq data to data generated as part of the ENCODE project. ENCODE data are the reference standard in the field and have been generated starting from tens of million of cells. Our results show that cChIP-seq successfully recapitulates bulk data. Furthermore, we showed that the differences observed between small-scale ChIP-seq data and ENCODE data are largely to be due to lab-to-lab variability rather than operating on a reduced scale. Data generated using cChIP-seq are equivalent to reference epigenomic maps from three orders of magnitude more cells. Our method offers a robust and straightforward approach to scale down ChIP-seq to as low as 10,000 cells. The underlying principle of our strategy makes it suitable for being applied to a vast range of chromatin modifications without requiring expensive optimization. Furthermore, our strategy of a DNA-free carrier can be adapted to most ChIP-seq protocols.

  16. Network and User-Perceived Performance of Web Page Retrievals

    NASA Technical Reports Server (NTRS)

    Kruse, Hans; Allman, Mark; Mallasch, Paul

    1998-01-01

    The development of the HTTP protocol has been driven by the need to improve the network performance of the protocol by allowing the efficient retrieval of multiple parts of a web page without the need for multiple simultaneous TCP connections between a client and a server. We suggest that the retrieval of multiple page elements sequentially over a single TCP connection may result in a degradation of the perceived performance experienced by the user. We attempt to quantify this perceived degradation through the use of a model which combines a web retrieval simulation and an analytical model of TCP operation. Starting with the current HTTP/l.1 specification, we first suggest a client@side heuristic to improve the perceived transfer performance. We show that the perceived speed of the page retrieval can be increased without sacrificing data transfer efficiency. We then propose a new client/server extension to the HTTP/l.1 protocol to allow for the interleaving of page element retrievals. We finally address the issue of the display of advertisements on web pages, and in particular suggest a number of mechanisms which can make efficient use of IP multicast to send advertisements to a number of clients within the same network.

  17. Chromatin analyses of Zymoseptoria tritici: Methods for chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq).

    PubMed

    Soyer, Jessica L; Möller, Mareike; Schotanus, Klaas; Connolly, Lanelle R; Galazka, Jonathan M; Freitag, Michael; Stukenbrock, Eva H

    2015-06-01

    The presence or absence of specific transcription factors, chromatin remodeling machineries, chromatin modification enzymes, post-translational histone modifications and histone variants all play crucial roles in the regulation of pathogenicity genes. Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) provides an important tool to study genome-wide protein-DNA interactions to help understand gene regulation in the context of native chromatin. ChIP-seq is a convenient in vivo technique to identify, map and characterize occupancy of specific DNA fragments with proteins against which specific antibodies exist or which can be epitope-tagged in vivo. We optimized existing ChIP protocols for use in the wheat pathogen Zymoseptoria tritici and closely related sister species. Here, we provide a detailed method, underscoring which aspects of the technique are organism-specific. Library preparation for Illumina sequencing is described, as this is currently the most widely used ChIP-seq method. One approach for the analysis and visualization of representative sequence is described; improved tools for these analyses are constantly being developed. Using ChIP-seq with antibodies against H3K4me2, which is considered a mark for euchromatin or H3K9me3 and H3K27me3, which are considered marks for heterochromatin, the overall distribution of euchromatin and heterochromatin in the genome of Z. tritici can be determined. Our ChIP-seq protocol was also successfully applied to Z. tritici strains with high levels of melanization or aberrant colony morphology, and to different species of the genus (Z. ardabiliae and Z. pseudotritici), suggesting that our technique is robust. The methods described here provide a powerful framework to study new aspects of chromatin biology and gene regulation in this prominent wheat pathogen. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments

    PubMed Central

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert

    2017-01-01

    Abstract ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. PMID:28911122

  19. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    PubMed

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  20. The Internet and Education: Some Lessons on Privacy and Pitfalls.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1997-01-01

    Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…

  1. WebTag: Web browsing into sensor tags over NFC.

    PubMed

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.

  2. WebTag: Web Browsing into Sensor Tags over NFC

    PubMed Central

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Álvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm. PMID:23012511

  3. Improving Service Management in the Internet of Things

    PubMed Central

    Sammarco, Chiara; Iera, Antonio

    2012-01-01

    In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).

  4. Talk Is Cheap: Skype Can Make VoIP a Very Real Communication Option for Your School

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2007-01-01

    There have been many tools that people can use to get connected with each other worldwide. Cell phones, blogs, wikis, podcasts, e-mail--the world hinges upon people's ability to connect, share, collaborate, and communicate. Voice over Internet Protocol (VoIP) is another tool schools can use to help their students get connected with the world. One…

  5. On Representative Spaceflight Instrument and Associated Instrument Sensor Web Framework

    NASA Technical Reports Server (NTRS)

    Kizhner, Semion; Patel, Umeshkumar; Vootukuru, Meg

    2007-01-01

    Sensor Web-based adaptation and sharing of space flight mission resources, including those of the Space-Ground and Control-User communication segment, could greatly benefit from utilization of heritage Internet Protocols and devices applied for Spaceflight (SpaceIP). This had been successfully demonstrated by a few recent spaceflight experiments. However, while terrestrial applications of Internet protocols are well developed and understood (mostly due to billions of dollars in investments by the military and industry), the spaceflight application of Internet protocols is still in its infancy. Progress in the developments of SpaceIP-enabled instrument components will largely determine the SpaceIP utilization of those investments and acceptance in years to come. Likewise SpaceIP, the development of commercial real-time and instrument colocated computational resources, data compression and storage, can be enabled on-board a spacecraft and, in turn, support a powerful application to Sensor Web-based design of a spaceflight instrument. Sensor Web-enabled reconfiguration and adaptation of structures for hardware resources and information systems will commence application of Field Programmable Arrays (FPGA) and other aerospace programmable logic devices for what this technology was intended. These are a few obvious potential benefits of Sensor Web technologies for spaceflight applications. However, they are still waiting to be explored. This is because there is a need for a new approach to spaceflight instrumentation in order to make these mature sensor web technologies applicable for spaceflight. In this paper we present an approach in developing related and enabling spaceflight instrument-level technologies based on the new concept of a representative spaceflight Instrument Sensor Web (ISW).

  6. A Filtration-based Method of Preparing High-quality Nuclei from Cross-linked Skeletal Muscle for Chromatin Immunoprecipitation.

    PubMed

    Nohara, Kazunari; Chen, Zheng; Yoo, Seung-Hee

    2017-07-06

    Chromatin immunoprecipitation (ChIP) is a powerful method to determine protein binding to chromatin DNA. Fiber-rich skeletal muscle, however, has been a challenge for ChIP due to technical difficulty in isolation of high-quality nuclei with minimal contamination of myofibrils. Previous protocols have attempted to purify nuclei before cross-linking, which incurs the risk of altered DNA-protein interaction during the prolonged nuclei preparation process. In the current protocol, we first cross-linked the skeletal muscle tissue collected from mice, and the tissues were minced and sonicated. Since we found that ultracentrifugation was not able to separate nuclei from myofibrils using cross-linked muscle tissue, we devised a sequential filtration procedure to obtain high-quality nuclei devoid of significant myofibril contamination. We subsequently prepared chromatin by using an ultrasonicator, and ChIP assays with anti-BMAL1 antibody revealed robust circadian binding pattern of BMAL1 to target gene promoters. This filtration protocol constitutes an easily applicable method to isolate high-quality nuclei from cross-linked skeletal muscle tissue, allowing consistent sample processing for circadian and other time-sensitive studies. In combination with next-generation sequencing (NGS), our method can be deployed for various mechanistic and genomic studies focusing on skeletal muscle function.

  7. Chromatin Immunoprecipitation Sequencing (ChIP-Seq) for Transcription Factors and Chromatin Factors in Arabidopsis thaliana Roots: From Material Collection to Data Analysis.

    PubMed

    Cortijo, Sandra; Charoensawan, Varodom; Roudier, François; Wigge, Philip A

    2018-01-01

    Chromatin immunoprecipitation combined with next-generation sequencing (ChIP-seq) is a powerful technique to investigate in vivo transcription factor (TF) binding to DNA, as well as chromatin marks. Here we provide a detailed protocol for all the key steps to perform ChIP-seq in Arabidopsis thaliana roots, also working on other A. thaliana tissues and in most non-ligneous plants. We detail all steps from material collection, fixation, chromatin preparation, immunoprecipitation, library preparation, and finally computational analysis based on a combination of publicly available tools.

  8. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    NASA Astrophysics Data System (ADS)

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  9. A data transmission method for particle physics experiments based on Ethernet physical layer

    NASA Astrophysics Data System (ADS)

    Huang, Xi-Ru; Cao, Ping; Zheng, Jia-Jun

    2015-11-01

    Due to its advantages of universality, flexibility and high performance, fast Ethernet is widely used in readout system design for modern particle physics experiments. However, Ethernet is usually used together with the TCP/IP protocol stack, which makes it difficult to implement readout systems because designers have to use the operating system to process this protocol. Furthermore, TCP/IP degrades the transmission efficiency and real-time performance. To maximize the performance of Ethernet in physics experiment applications, a data readout method based on the physical layer (PHY) is proposed. In this method, TCP/IP is replaced with a customized and simple protocol, which makes it easier to implement. On each readout module, data from the front-end electronics is first fed into an FPGA for protocol processing and then sent out to a PHY chip controlled by this FPGA for transmission. This kind of data path is fully implemented by hardware. From the side of the data acquisition system (DAQ), however, the absence of a standard protocol causes problems for the network related applications. To solve this problem, in the operating system kernel space, data received by the network interface card is redirected from the traditional flow to a specified memory space by a customized program. This memory space can easily be accessed by applications in user space. For the purpose of verification, a prototype system has been designed and implemented. Preliminary test results show that this method can meet the requirements of data transmission from the readout module to the DAQ with an efficient and simple manner. Supported by National Natural Science Foundation of China (11005107) and Independent Projects of State Key Laboratory of Particle Detection and Electronics (201301)

  10. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  11. 76 FR 5394 - Notice of Proposed Information Collection for Public Comment; Memorandum of Agreement (MOA) and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-31

    ... Information Collection for Public Comment; Memorandum of Agreement (MOA) and Improvement Plan (IP) in...: Title of Proposal: Memorandum of Agreement (MOA), Progress Report and Improvement Plan (IP). OMB Control... 60% is required to submit an Improvement Plan (IP). These plans are designed to address deficiencies...

  12. The role of the human papillomavirus in the pathogenesis of Schneiderian inverted papillomas: an analytic overview of the evidence.

    PubMed

    Lawson, William; Schlecht, Nicolas F; Brandwein-Gensler, Margaret

    2008-06-01

    Evidence of an etiological role for human papillomavirus (HPV) in Schneiderian inverted papillomas IP arose in the late 1980's; yet almost three decades later, the association between HPV and IP has yet to be universally accepted. This is probably due to the disparate HPV detection rates in IP reported in the literature. We analyzed the weight of published data in order to address the following questions: why do the HPV detection rates in IP vary so greatly? What is the relationship between low-risk (LR) and high-risk (HR) HPV types and HPV detection rates in IP? Is there a relationship between the presence and type of HPV in IP and recurrence and malignant progression? A search using the Pubmed search engine was performed to identify studies published in English from 01/87 through 12/06 using the MeSH terms ''HPV'' and ''Inverted", "Exophytic", "Oncocytic Schneiderian" or "Fungiform papilloma''. Data was abstracted from publications including histology, HPV target, HPV type, method of detection, etc. HPV results were stratified by histology and other variables. Tests for heterogeneity (between-study variability) were conducted, and weighted prevalence (WP) estimates and 95% confidence intervals (CI) were calculated using a random-effects inverse-variance model stratified on study. The association between HPV IP recurrence was estimated by random-effects inverse-variance weighted odds ratio (OR). Weighted estimates revealed similar detection rates across detection methods, 26.8% (95%CI 16.4-37.2%) by ISH, 25.2% (95%CI 14.7-35.6%) by consensus PCR, and 23.6% (95%CI 12.2-35.0%) by type-specific PCR. A preponderance of HPV 6/11 is found in IP as compared to HPV 16/18; the overall unadjusted ratio of LR to high-risk HR HPV types is 2.8:1 The HPV detection rates significantly increase (Wald t-test P < 0.02) in IPs with high-grade dysplasia (WP 55.8%, 95%CI 30.5-81.0%) and carcinoma (WP 55.1%, 95%CI 37.0-73.2%) as compared to IPs with no dysplasia or mild dysplasia (WP 22.3%, 95%CI 15.9-28.6%). Furthermore, the preponderance of LR HPV in benign IP (ratio LR/HR = 4.8:1) shifts in dysplastic and malignant IP. The LR/HR ratio is 1.1:1 for IPs with high-grade dysplasias, this ratio is inverted to favor HR HPV (1:2.4) for malignant IP. Recurrences developed in 44 of 236 patients; HPV was detected in 27 of 44 IPs (WP 57.9%, 95%CI 31.6-84.2%) that developed recurrences and in 24 of 192 IPs (WP 9.7%, 95%CI 4.4-15.0%) that did not develop recurrence. The presence of HPV was significantly associated with the likelihood of developing recurrence (weighted OR of 10.2, 95%CI 3.2-32.8). We hypothesize that LR HPV may induce IP formation, and then are lost as infected cells are shed, as a "hit and run" phenomenon. HPV detection rates increase in dysplastic IP and SCC-ex-IP with increasing ratio of HR to LR HPV types, compared to nondysplastic IP. We believe that one explanation for the variation in HPV detection rates between different studies may be the actual histologic composition of the cohort. That is, if one series contains a higher frequency of dysplastic and malignant IP, it may have a higher detection rate than another series which contains only nondysplastic IP. We hypothesize that the higher rates of HPV detection in dysplastic and malignant IP may be related to HPV integration. The implication of this is that HPV sub-type testing may identify patients at risk for recurrence, or progression to dysplasia and malignancy, and thus may impact surveillance protocols.

  13. Peri-implant assessment via cone beam computed tomography and digital periapical radiography: an ex vivo study.

    PubMed

    Silveira-Neto, Nicolau; Flores, Mateus Ericson; De Carli, João Paulo; Costa, Max Dória; Matos, Felipe de Souza; Paranhos, Luiz Renato; Linden, Maria Salete Sandini

    2017-11-01

    This research evaluated detail registration in peri-implant bone using two different cone beam computer tomography systems and a digital periapical radiograph. Three different image acquisition protocols were established for each cone beam computer tomography apparatus, and three clinical situations were simulated in an ex vivo fresh pig mandible: buccal bone defect, peri-implant bone defect, and bone contact. Data were subjected to two analyses: quantitative and qualitative. The quantitative analyses involved a comparison of real specimen measures using a digital caliper in three regions of the preserved buccal bone - A, B and E (control group) - to cone beam computer tomography images obtained with different protocols (kp1, kp2, kp3, ip1, ip2, and ip3). In the qualitative analyses, the ability to register peri-implant details via tomography and digital periapical radiography was verified, as indicated by twelve evaluators. Data were analyzed with ANOVA and Tukey's test (α=0.05). The quantitative assessment showed means statistically equal to those of the control group under the following conditions: buccal bone defect B and E with kp1 and ip1, peri-implant bone defect E with kp2 and kp3, and bone contact A with kp1, kp2, kp3, and ip2. Qualitatively, only bone contacts were significantly different among the assessments, and the p3 results differed from the p1 and p2 results. The other results were statistically equivalent. The registration of peri-implant details was influenced by the image acquisition protocol, although metal artifacts were produced in all situations. The evaluators preferred the Kodak 9000 3D cone beam computer tomography in most cases. The evaluators identified buccal bone defects better with cone beam computer tomography and identified peri-implant bone defects better with digital periapical radiography.

  14. Design and implementation of a unified certification management system based on seismic business

    NASA Astrophysics Data System (ADS)

    Tang, Hongliang

    2018-04-01

    Many business software for seismic systems are based on web pages, users can simply open a browser and enter their IP address. However, how to achieve unified management and security management of many IP addresses, this paper introduces the design concept based on seismic business and builds a unified authentication management system using ASP technology.

  15. The introduction of new vaccines into developing countries. III. The role of intellectual property.

    PubMed

    Mahoney, Richard T; Pablos-Mendez, Ariel; Ramachandran, S

    2004-01-26

    The development of new vaccines that address the particular needs of developing countries has been proceeding slowly. A number of new public sector vaccine research and development initiatives have been launched to address this problem. These new initiatives find that they often wish to collaborate with the private sector and, in collaborating with the private sector, they must address issues of intellectual property (IP) management. It has not been well understood why IP management is important and how such management by public sector groups can best be conducted. IP management has become very important because vaccine research and development is driven by the regulatory process. The regulatory process has increased the cost of vaccine development to very high levels especially for the highly sophisticated new vaccines currently under development. Thus, investors seek IP protection for the required large investments. Conversely, we assert this concept as a new insight, IP rights are essential for mobilizing the significant funds necessary to meet regulatory requirements. Thus, IP rights are of value not only for investors but also for the public at large. In the absence of public sector mechanisms to carry out the functions that the private sector currently conducts, the public sector needs to increase its sophistication in IP management and needs to identify and implement strategies that will help the public sector to achieve its public health goals, especially for the poor and, among these individuals, the poor in developing countries. This paper suggests some strategies that might be used by the public sector to help achieve its public health goals, especially for the poor.

  16. An assessment of ten ocean reanalyses in the polar regions

    NASA Astrophysics Data System (ADS)

    Uotila, Petteri

    2017-04-01

    Ocean reanalysis (ORA) combines observations either statistically or with a hydrodynamical model, to reconstruct historical changes in the ocean. Global and regional ORA products are increasingly used in polar research, but their quality remains to be systematically assessed. To address this, the Polar ORA Intercomparison Project (PORA-IP) has been established following on from the ORA-IP project (Balmaseda et al. 2015, with other papers in a special issue of Climate Dynamics). The PORA-IP is constituted under the COST EOS initiative with plans to review reanalyses products in both the Arctic and Antarctic, and is endorsed by YOPP - the Year of Polar Prediction project. Currently, the PORA-IP team consists of 21 researchers from 15 institutes and universities. The ORA-IP products with polar physics, such as sea ice, have been updated where necessary and collected in a public database. In addition to model output, available observational polar climatologies are collected and used in the assessments. Due to the extensive variety of products, this database should become a valuable resource outside the PORA-IP community. For a comprehensive evaluation of the ten ORA products (CGLORSv5, ECDA3.1, GECCO2, Glorys2v4, GloSea5_GO5, MOVEG2i, ORAP5, SODA3.3.1, TOPAZ4 and UR025.4) in the Arctic and Southern Oceans several specific diagnostics are assessed. The PORA-IP diagnostics target the following topics: hydrography; heat, salinity and freshwater content; ocean transports and surface currents; mixed layer depth; sea-ice concentration and thickness; and snow thickness over sea ice. Based on these diagnostics, ORA product biases against observed data and their mutual spread are quantified, and possible reasons for discrepancies discussed. So far, we have identified product outliers and evaluated the multi-model mean. We have identified the importance of the atmospheric forcing, air-ocean coupling protocol and sea-ice data assimilation for the product performance. Moreover, we are investigating co-variability between the Arctic Ocean heat content and the North Atlantic heat transport, and between the mixed layer depth, oceanic convection, the upper ocean hydrography and sea ice. We will also present other diagnostic results which provide closely related information for those interested in enhancing model predictive skill over a range of time scales, including seasonal to decadal.

  17. Design of real-time voice over internet protocol system under bandwidth network

    NASA Astrophysics Data System (ADS)

    Zhang, Li; Gong, Lina

    2017-04-01

    With the increasing bandwidth of the network and network convergence accelerating, VoIP means of communication across the network is becoming increasingly popular phenomenon. The real-time identification and analysis for VOIP flow over backbone network become the urgent needs and research hotspot of network operations management. Based on this, the paper proposes a VoIP business management system over backbone network. The system first filters VoIP data stream over backbone network and further resolves the call signaling information and media voice. The system can also be able to design appropriate rules to complete real-time reduction and presentation of specific categories of calls. Experimental results show that the system can parse and process real-time backbone of the VoIP call, and the results are presented accurately in the management interface, VoIP-based network traffic management and maintenance provide the necessary technical support.

  18. Fingerprinting Software Defined Networks and Controllers

    DTIC Science & Technology

    2015-03-01

    24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined

  19. 78 FR 39619 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...

  20. ChIP-chip.

    PubMed

    Kim, Tae Hoon; Dekker, Job

    2018-05-01

    ChIP-chip can be used to analyze protein-DNA interactions in a region-wide and genome-wide manner. DNA microarrays contain PCR products or oligonucleotide probes that are designed to represent genomic sequences. Identification of genomic sites that interact with a specific protein is based on competitive hybridization of the ChIP-enriched DNA and the input DNA to DNA microarrays. The ChIP-chip protocol can be divided into two main sections: Amplification of ChIP DNA and hybridization of ChIP DNA to arrays. A large amount of DNA is required to hybridize to DNA arrays, and hybridization to a set of multiple commercial arrays that represent the entire human genome requires two rounds of PCR amplifications. The relative hybridization intensity of ChIP DNA and that of the input DNA is used to determine whether the probe sequence is a potential site of protein-DNA interaction. Resolution of actual genomic sites bound by the protein is dependent on the size of the chromatin and on the genomic distance between the probes on the array. As with expression profiling using gene chips, ChIP-chip experiments require multiple replicates for reliable statistical measure of protein-DNA interactions. © 2018 Cold Spring Harbor Laboratory Press.

  1. Chicken Induced Pluripotent Stem Cells: Establishment and Characterization.

    PubMed

    Fuet, Aurelie; Pain, Bertrand

    2017-01-01

    In mammals, the introduction of the OSKM (Oct4, Sox2, Klf4, and c-Myc) genes into somatic cells has allowed generating induced pluripotent stem (iPS) cells. So far, this process has been only clearly demonstrated in mammals. Here, using chicken as an avian model, we describe a set of protocols allowing the establishment, characterization, maintenance, differentiation, and injection of putative reprogrammed chicken Induced Pluripotent Stem (iPS) cells.

  2. Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David

    2003-09-01

    As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, whichmore » determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept were developed, and results from this research were transferred to industry via standards in the Optical Internetworking Forum (OIF).« less

  3. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    DTIC Science & Technology

    2017-03-22

    Technical Approach and Justification IP reuse is a cornerstone of the commercial electronics market particularly in the digital domain...even in the digital domain. Significant investments in custom ASIC designs have been made by the government, but the IP resulting from such... approach to address requirements for that program. Research Plan The original vision for the HIER activity involved the evaluation

  4. 47 CFR 1.47 - Service of documents and proof of service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VoIP provider, as defined in § 54.5 of this chapter, that is subject to the Communications Act of... of the Commission may be made for and on behalf of such carrier or interconnected VoIP provider in... interconnected VoIP provider and its designated agents, a name, business address, telephone or voicemail number...

  5. 47 CFR 1.47 - Service of documents and proof of service.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... carrier and interconnected VoIP provider, as defined in § 54.5 of this chapter, that is subject to the... requirements of the Commission may be made for and on behalf of such carrier or interconnected VoIP provider in... interconnected VoIP provider and its designated agents, a name, business address, telephone or voicemail number...

  6. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  7. Delayed early passive motion is harmless to shoulder rotator cuff healing in a rabbit model.

    PubMed

    Zhang, Shurong; Li, Hong; Tao, Hongyue; Li, Hongyun; Cho, Samson; Hua, Yinghui; Chen, Jiwu; Chen, Shiyi; Li, Yunxia

    2013-08-01

    Postoperative passive motion is the most widely accepted rehabilitation protocol after rotator cuff repair; however, a rotator cuff retear remains a frequent surgical complication. Clinical outcomes indicate that early passive motion is harmless to rotator cuff healing, but no laboratory evidence supports this proposition. (1) Immediate postoperative immobilization improves rotator cuff healing in rabbits. (2) Early passive motion after short-term immobilization does not harm rotator cuff healing in rabbits. Controlled laboratory study. An injury to the supraspinatus tendon was created and repaired in 90 New Zealand White rabbits, after which they were randomly separated into 3 groups: (1) nonimmobilization (NI; n = 30), (2) continuous immobilization (IM; n = 30), and (3) immobilization with early passive motion (IP; n = 30). At 3, 6, and 12 weeks postoperatively, 5 rabbits from each group were sacrificed for histological evaluation, biomechanical testing, and magnetic resonance imaging. The histological study demonstrated better postoperative healing in the IM and IP groups, with clusters of chondrocytes accumulated at the tendon-bone junction. Magnetic resonance imaging illustrated that the tendon-bone junction was intact in the IM and IP groups. The magnetic resonance quantification analysis showed that the signal-to-noise quotient (SNQ) of the NI group was not significantly higher than that of the immobilization groups at 3 weeks (P = .232) or 6 weeks (P = .117), but it was significantly different at 12 weeks (NI vs IM, P = .006; NI vs IP, P = .009). At 12 weeks, the failure load was significantly higher in the IM and IP groups than in the NI group (NI vs IM, P = .002; NI vs IP, P = .002), but no difference was found between the IM and IP groups (P = .599). Immediate postoperative immobilization led to better tendon-bone healing than immediate postoperative mobilization, and under immobilization, early passive motion was harmless to tendon-bone healing in this study. The results have an implication in supporting the rehabilitation protocol of early passive motion after rotator cuff repair.

  8. Questionable accuracy of home blood pressure measurements in the obese population - Validation of the Microlife WatchBP O3® and Omron RS6® devices according to the European Society of Hypertension-International Protocol.

    PubMed

    Azaki, Alaa; Diab, Reem; Harb, Aya; Asmar, Roland; Chahine, Mirna N

    2017-01-01

    Two oscillometric devices, the Microlife WatchBP O3 ® and the Omron RS6 ® , designed for self-blood pressure measurement were evaluated according to the European Society of Hypertension (ESH)-International Protocol (IP) Revision 2010 in the obese population. The Microlife WatchBP O3 measures blood pressure (BP) at the brachial level and the Omron RS6 measures BP at the wrist level. The ESH-IP revision 2010 includes a total of 33 subjects. The difference between observers' and device BP values was calculated for each measure. A total of 99 pairs of BP differences were classified into three categories (≤5, ≤10, and ≤15 mmHg). The protocol procedures were followed precisely in each of the two studies. Microlife WatchBP O3 and Omron RS6 failed to fulfill the criteria of the ESH-IP. The mean differences between the device and the mercury readings were: 0.3±7.8 mmHg and -1.9±6.4 mmHg for systolic BP and diastolic BP, respectively, for Microlife WatchBP O3, and 2.7±9.9 mmHg for SBP and 3.5±11.1 mmHg for diastolic BP for Omron RS6. Microlife WatchBP O3 and Omron RS6 readings differing from the mercury standard by more than 5, 10, and 15 mmHg failed to fulfill the ESH-IP revision 2010 requirements in obese subjects. Therefore, the two devices cannot be recommended for use in obese subjects.

  9. Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection

    DTIC Science & Technology

    2003-06-01

    Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA

  10. Secure Networks for First Responders and Special Forces

    NASA Technical Reports Server (NTRS)

    2005-01-01

    When NASA needed help better securing its communications with orbiting satellites, the Agency called on Western DataCom Co., Inc., to help develop a prototype Internet Protocol (IP) router. Westlake, Ohio-based Western DataCom designs, develops, and manufactures hardware that secures voice, video, and data transmissions over any IP-based network. The technology that it jointly developed with NASA is now serving as a communications solution in military and first-response situations.

  11. Study of Adversarial and Defensive Components in an Experimental Machinery Control Systems Laboratory Environment

    DTIC Science & Technology

    2014-09-01

    prevention system (IPS), capable of performing real-time traffic analysis and packet logging on IP networks [25]. Snort’s features include protocol... analysis and content searching/matching. Snort can detect a variety of attacks and network probes, such as buffer overflows, port scans and OS...www.digitalbond.com/tools/the- rack/jtr-s7-password-cracking/ Kismet Mike Kershaw Cross- platform Open source wireless network detector and wireless sniffer

  12. TCP Performance Enhancement Over Iridium

    NASA Technical Reports Server (NTRS)

    Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James

    2007-01-01

    In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.

  13. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  14. Validation of the Grandway MD2301 digital automatic blood pressure monitor according to the European Society of Hypertension International Protocol.

    PubMed

    Chen, Wan; Zeng, Zhao-Lin; Bing, Sen; Li, Lin-Yi; Wang, Rui; Wan, Yi

    2016-08-01

    The aim of the present study was to validate the Grandway MD2301 digital automatic blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010. The ESH-IP revision 2010 for the validation of blood pressure-measuring devices in adults was followed precisely. Systolic and diastolic blood pressure (SBP and DBP, respectively) were measured sequentially in 33 adult patients and compared with a standard mercury sphygmomanometer (two observers). A total of 99 comparison pairs were obtained. The device produced 78, 95 and 99 measurements within 5, 10, and 15 mmHg for SBP and 83, 96, and 99 for DBP, respectively. The average device-observer difference was -1.81±4.22 mmHg for SBP and -0.15±3.93 mmHg for DBP. All of the data were within the standards requirements to pass the testing. The Grandway MD2301 digital automatic blood pressure monitor meets the standards of the ESH-IP revision 2010 and can be recommended for self/home measurement in the general population.

  15. Validation of the Omron M3 Intellisense (HEM-7051-E) upper arm blood pressure monitor, for self-measurement, according to the European Society of Hypertension International Protocol revision 2010 in a stage 3-5 chronic kidney disease population.

    PubMed

    Akpolat, Tekin; Erdem, Emre; Aydogdu, Türkan

    2012-01-01

    Encouragement of home blood pressure (BP) monitoring has a great potential to improve hypertension control rates. The purpose of this study was to test validation of the Omron M3 Intellisense (HEM-7051-E) upper arm BP measuring monitor for self-measurement according to the European Society of Hypertension International Protocol revision 2010 (ESH-IP2) in stage 3-5 chronic kidney disease (CKD) patients. 66 patients having CKD stage 3-5 were included in the study. Nine consecutive measurements were made according to the ESH-IP2 protocol. The Omron M3 Intellisense device fulfills the validation criteria of the ESH-IP2 for stage 3-5 CKD patients. Although arterial stiffness can affect accurate BP measurement, there are limited data regarding the use of automated oscillometric devices in CKD. To our knowledge, this is the first study investigating validation of an oscillometric device in stage 3-5 predialysis CKD patients. This study validates the Omron M3 Intellisense upper arm device for stage 3-5 CKD patients. New validation studies investigating other oscillometric sphygmomanometers for CKD patients and involvement of nephrologists in these studies have great potential to increase patient care in CKD. Copyright © 2011 S. Karger AG, Basel.

  16. Gigabit Network Communications Research

    DTIC Science & Technology

    1992-12-31

    additional BPF channels, raw bytesync support for video codecs, and others. All source file modifications were logged with RCS. Source and object trees were...34 (RFCs). 20 RFCs were published this quarter: RFC 1366: Gerich, E., " Guidelines for Management of IP Address Space", Merit, October 1992. RFC 1367...Topolcic, C., "Schedule for IP Address Space Management Guidelines ", CNRI, October 1992. RFC 1368: McMaster, D. (Synoptics Communications, Inc.), K

  17. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  18. Automated Synthesis of Long Communication Delays for Testing

    NASA Technical Reports Server (NTRS)

    Seibert, Marc; McKim, James

    2005-01-01

    Planetary-Ohio Network Emulator (p- ONE) is a computer program for local laboratory testing of high bandwidth data-communication systems subject to long delays in propagation over interplanetary distances. p-ONE is installed on a personal computer connected to two bidirectional Ethernet interfaces, denoted A and B, that represent local-area networks at opposite ends of a long propagation path. Traffic that is to be passed between A and B is encapsulated in IP (Internet Protocol) packets (e.g., User Data Protocol, UDP). Intercepting this traffic between A and B in both directions, p-ONE time-tags each packet and stores it in memory or on the hard disk of the computer for a user-specified interval that equals the propagation delay to be synthesized. At the expiration of its storage time, each such packet is sent to its destination (that is, if it was received from A, it is sent to B, or vice versa). The accuracy of the p-ONE software is very high, with zero packet loss through the system and negligible latency. Optionally, p-ONE can be configured to delay all network traffic to and from all network addresses on each Ethernet interface or to selectively delay traffic between specific addresses or traffic of specific types. p-ONE works well with Linux and is also designed to be compatible with other operating systems.

  19. Real-time services in IP network architectures

    NASA Astrophysics Data System (ADS)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  20. Design and implementation of a VoIP broadcasting service over embedded systems in a heterogeneous network environment.

    PubMed

    Leu, Jenq-Shiou; Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source-Linphone-in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation.

  1. Design and Implementation of a VoIP Broadcasting Service over Embedded Systems in a Heterogeneous Network Environment

    PubMed Central

    Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source—Linphone—in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation. PMID:25300280

  2. 47 CFR 54.503 - Other supported special services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...

  3. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  4. Genome-wide profiling of DNA-binding proteins using barcode-based multiplex Solexa sequencing.

    PubMed

    Raghav, Sunil Kumar; Deplancke, Bart

    2012-01-01

    Chromatin immunoprecipitation (ChIP) is a commonly used technique to detect the in vivo binding of proteins to DNA. ChIP is now routinely paired to microarray analysis (ChIP-chip) or next-generation sequencing (ChIP-Seq) to profile the DNA occupancy of proteins of interest on a genome-wide level. Because ChIP-chip introduces several biases, most notably due to the use of a fixed number of probes, ChIP-Seq has quickly become the method of choice as, depending on the sequencing depth, it is more sensitive, quantitative, and provides a greater binding site location resolution. With the ever increasing number of reads that can be generated per sequencing run, it has now become possible to analyze several samples simultaneously while maintaining sufficient sequence coverage, thus significantly reducing the cost per ChIP-Seq experiment. In this chapter, we provide a step-by-step guide on how to perform multiplexed ChIP-Seq analyses. As a proof-of-concept, we focus on the genome-wide profiling of RNA Polymerase II as measuring its DNA occupancy at different stages of any biological process can provide insights into the gene regulatory mechanisms involved. However, the protocol can also be used to perform multiplexed ChIP-Seq analyses of other DNA-binding proteins such as chromatin modifiers and transcription factors.

  5. Speech transport for packet telephony and voice over IP

    NASA Astrophysics Data System (ADS)

    Baker, Maurice R.

    1999-11-01

    Recent advances in packet switching, internetworking, and digital signal processing technologies have converged to allow realizable practical implementations of packet telephony systems. This paper provides a tutorial on transmission engineering for packet telephony covering the topics of speech coding/decoding, speech packetization, packet data network transport, and impairments which may negatively impact end-to-end system quality. Particular emphasis is placed upon Voice over Internet Protocol given the current popularity and ubiquity of IP transport.

  6. Constructing Cost-Effective and Targetable ICS Honeypots Suited for Production Networks

    DTIC Science & Technology

    2015-03-26

    introducing Honeyd+ has a marginal impact on performance. Notable findings are that the Raspberry Pi is the preferred hosting platform for the EtherNet/IP... Raspberry Pi or Gumstix, which is a low-cost approach to replicating multiple decoys. One hidden drawback to low- interaction honeypots is the extensive time...EtherNet/IP industrial protocol. Honeyd+ is hosted on a low-cost computing platform ( Raspberry Pi running Raspbian, approximately $50) and a high-cost

  7. Using Chromatin Immunoprecipitation in Toxicology: A Step-by-Step Guide to Increasing Efficiency, Reducing Variability, and Expanding Applications.

    PubMed

    McCullough, Shaun D; On, Doan M; Bowers, Emma C

    2017-05-02

    Histone modifications work in concert with DNA methylation to regulate cellular structure, function, and response to environmental stimuli. More than 130 unique histone modifications have been described to date, and chromatin immunoprecipitation (ChIP) allows for the exploration of their associations with the regulatory regions of target genes and other DNA/chromatin-associated proteins across the genome. Many variations of ChIP have been developed in the 30 years since its earliest version came into use, which makes it challenging for users to integrate the procedure into their research programs. Furthermore, the differences in ChIP protocols can confound efforts to increase reproducibility across studies. The streamlined ChIP procedure presented here can be readily applied to samples from a wide range of in vitro studies (cell lines and primary cells) and clinical samples (peripheral leukocytes) in toxicology. We also provide detailed guidance on the optimization of critical protocol parameters, such as chromatin fixation, fragmentation, and immunoprecipitation, to increase efficiency and improve reproducibility. Expanding toxicoepigenetic studies to more readily include histone modifications will facilitate a more comprehensive understanding of the role of the epigenome in environmental exposure effects and the integration of epigenetic data in mechanistic toxicology, adverse outcome pathways, and risk assessment. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  8. Design of SIP transformation server for efficient media negotiation

    NASA Astrophysics Data System (ADS)

    Pack, Sangheon; Paik, Eun Kyoung; Choi, Yanghee

    2001-07-01

    Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficient media negotiation architecture using the transformation server and the Intelligent Location Server (ILS). The transformation server is an extended Session Initiation Protocol (SIP) proxy server. It can modify an unacceptable session INVITE message into an acceptable one using the ILS. The ILS is a directory server based on the Lightweight Directory Access Protocol (LDAP) that keeps userí*s location information and available media information. The proposed architecture can eliminate an unnecessary response and re-INVITE messages of the standard SIP architecture. It takes only 1.5 round trip times to negotiate two different media types while the standard media negotiation mechanism takes 2.5 round trip times. The extra processing time in message handling is negligible in comparison to the reduced round trip time. The experimental results show that the session setup time in the proposed architecture is less than the setup time in the standard SIP. These results verify that the proposed media negotiation mechanism is more efficient in solving diversity problems.

  9. Evaluation of the Presentation of Network Data via Visualization Tools for Network Analysts

    DTIC Science & Technology

    2014-03-01

    A. (eds.) The Human Computer Interaction Handbook, pp.544–582. Lawrence Erlbaum Associates, Mawah, NJ, 2003. 4. Goodall , John R. Introduction to...of either display type being used in the analysis of cyber security tasks. Goodall (19) is one of few whose work focused on comparing user...relating source IP address to destination IP address and time, Goodall remains the only known approach comparing tabular and graphical displays

  10. Hybrid model for wireless mobility management using IPv6

    NASA Astrophysics Data System (ADS)

    Howie, Douglas P.; Sun, Junzhao; Koivisto, Antti T.

    2001-07-01

    Within the coming decade, there will be a dramatic increase in the availability of inexpensive, computationally powerful mobile devices running applications which use the Internet Protocol (IP) to access multimedia services over broad-band wireless connections. To this end, there has been extensive research and standardization in the areas of Mobile IP and IPv6. The purpose of this paper is to apply this work to the issues involved in designing a mobility model able to adapt to different wireless mobile IP scenarios. We describe the usefulness of this model in the 4th generation mobile multimedia systems to come. This new model has been synthesized through a comparative analysis of current mobile IP models where particular attention has been given to the problems of mobile IP handoff and mobility management and their impact on QoS. By applying a unique perspective to these problems, our model is used to set a roadmap for future mobile IPv6 testbed construction.

  11. Telebation: next-generation telemedicine in remote airway management using current wireless technologies.

    PubMed

    Mosier, Jarrod; Joseph, Bellal; Sakles, John C

    2013-02-01

    Since the first remote intubation with telemedicine guidance, wireless technology has advanced to enable more portable methods of telemedicine involvement in remote airway management. Three voice over Internet protocol (VoIP) services were evaluated for quality of image transmitted, data lag, and audio quality with remotely observed and assisted intubations in an academic emergency department. The VoIP clients evaluated were Apple (Cupertino, CA) FaceTime(®), Skype™ (a division of Microsoft, Luxembourg City, Luxembourg), and Tango(®) (TangoMe, Palo Alto, CA). Each client was tested over a Wi-Fi network as well as cellular third generation (3G) (Skype and Tango). All three VoIP clients provided acceptable image and audio quality. There is a significant data lag in image transmission and quality when VoIP clients are used over cellular broadband (3G) compared with Wi-Fi. Portable remote telemedicine guidance is possible with newer technology devices such as a smartphone or tablet, as well as VoIP clients used over Wi-Fi or cellular broadband.

  12. Motif-based analysis of large nucleotide data sets using MEME-ChIP

    PubMed Central

    Ma, Wenxiu; Noble, William S; Bailey, Timothy L

    2014-01-01

    MEME-ChIP is a web-based tool for analyzing motifs in large DNA or RNA data sets. It can analyze peak regions identified by ChIP-seq, cross-linking sites identified by cLIP-seq and related assays, as well as sets of genomic regions selected using other criteria. MEME-ChIP performs de novo motif discovery, motif enrichment analysis, motif location analysis and motif clustering, providing a comprehensive picture of the DNA or RNA motifs that are enriched in the input sequences. MEME-ChIP performs two complementary types of de novo motif discovery: weight matrix–based discovery for high accuracy; and word-based discovery for high sensitivity. Motif enrichment analysis using DNA or RNA motifs from human, mouse, worm, fly and other model organisms provides even greater sensitivity. MEME-ChIP’s interactive HTML output groups and aligns significant motifs to ease interpretation. this protocol takes less than 3 h, and it provides motif discovery approaches that are distinct and complementary to other online methods. PMID:24853928

  13. IP Network Design and Implementation for the Caltech-USGS Element of TriNet

    NASA Astrophysics Data System (ADS)

    Johnson, M. L.; Busby, R.; Watkins, M.; Schwarz, S.; Hauksson, E.

    2001-12-01

    The new seismic network IP numbering scheme for the Caltech-USGS element of TriNet is designed to provide emergency response plans for computer outages and/or telemetry circuit failures so that data acquisition may continue with minimal interruption. IP numbers from the seismic stations through the Caltech acquisition machines are numbered using private, non-routable IP addresses, which allows the network administrator to create redundancy in the network design, more freedom in choosing IP numbers, and uniformity in the LAN and WAN network addressing. The network scheme used by the Caltech-USGS element of TriNet is designed to create redundancy and load sharing over three or more T1 circuits. A T1 circuit can support 80 dataloggers sending data at a design rate of 19.2 kbps or 120 dataloggers transmitting at a nominal rate of 12.8 kbps. During a circuit detour, the 80 dataloggers on the failed T1 are equally divided between the remaining two circuits. This increases the loads on the remaining two circuits to 120 dataloggers, which is the maximum load each T1 can handle at the nominal rate. Each T1 circuit has a router interface onto a LAN at Caltech with an independent subnet address. Some devices, such as Solaris computers, allow a single interface to be numbered with several IP addresses, a so called "multinetted" interface. This allows the central acquisition computers to appear with distinct addresses that are routable via different T1 circuits, but simplifies the physical cables between devices. We identify these T1 circuits as T1-1, T1-2, and T1-3. At the remote end, each Frame Relay Access Device (FRAD) and connected datalogger(s) is a subnetted LAN. The numbering is arranged so the second octet in the LAN IP address of the FRAD and datalogger identify the datalogger's primary and alternate T1 circuits. For example; a LAN with an IP address of 10.12.0.0/24 has T1-1 as its primary T1, and T1-2 as its alternate circuit. Stations with this number scheme are sometimes referred to as group "12". LANs with IP addresses of 10.23.0.0/24 have T1-2 as the primary circuit, and T1-3 as the alternate circuit. Static routes on the acquisition system are used to direct traffic through the primary T1. The network can operate in one of three modes. The most common and desirable mode is "normal", where all three T1's are operational and Caltech has both a primary and secondary central acquisition system running. The second mode is a "failover", where the primary acquisition system is down (due to maintenance or failure) and the secondary acquisition system assumes the primary role. This includes sending acknowledgments to dataloggers and multicasts to the rest of the network. The third mode is a circuit detour. The port numbers on the central acquisition system for the dataloggers on the failed T1 are changed to match the auxiliary ports on the dataloggers. This allows for the auxiliary ports on the dataloggers to receive acknowledgements from the acquiring system through the detoured circuit. The static routes on the system are changed to go through the detoured circuit as specified by the group's IP numbers. At this point the two working T1's will be running at full capacity but the data acquisition will continue with minimal interruption while the third T1 is being restored. The primary acquisition computer continues to listen for data on the failed T1 should things improve spontaneously.

  14. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Voice Call Analysis

    DTIC Science & Technology

    2015-09-01

    Gateway 2 4. Voice Packet Flow: SIP , Session Description Protocol (SDP), and RTP 3 5. Voice Data Analysis 5 6. Call Analysis 6 7. Call Metrics 6...analysis processing is designed for a general VoIP system architecture based on Session Initiation Protocol ( SIP ) for negotiating call sessions and...employs Skinny Client Control Protocol for network communication between the phone and the local CallManager (e.g., for each dialed digit), SIP

  15. Network Upgrade for the SLC: PEP II Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Call, M.; Clark, S.

    2011-09-09

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status informationmore » is included.« less

  16. 47 CFR 52.35 - Porting Intervals.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... “telecommunications carrier” includes an interconnected Voice over Internet Protocol (VoIP) provider as that term in... ports” includes (i) Wireline-to-wireless ports; (ii) Wireless-to-wireline ports; and (iii) Ports...

  17. Delay and Disruption Tolerant Networking MACHETE Model

    NASA Technical Reports Server (NTRS)

    Segui, John S.; Jennings, Esther H.; Gao, Jay L.

    2011-01-01

    To verify satisfaction of communication requirements imposed by unique missions, as early as 2000, the Communications Networking Group at the Jet Propulsion Laboratory (JPL) saw the need for an environment to support interplanetary communication protocol design, validation, and characterization. JPL's Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in Simulator of Space Communication Networks (NPO-41373) NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various commercial, non-commercial, and in-house custom tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. As NASA is expanding its Space Communications and Navigation (SCaN) capabilities to support planned and future missions, building infrastructure to maintain services and developing enabling technologies, an important and broader role is seen for MACHETE in design-phase evaluation of future SCaN architectures. To support evaluation of the developing Delay Tolerant Networking (DTN) field and its applicability for space networks, JPL developed MACHETE models for DTN Bundle Protocol (BP) and Licklider/Long-haul Transmission Protocol (LTP). DTN is an Internet Research Task Force (IRTF) architecture providing communication in and/or through highly stressed networking environments such as space exploration and battlefield networks. Stressed networking environments include those with intermittent (predictable and unknown) connectivity, large and/or variable delays, and high bit error rates. To provide its services over existing domain specific protocols, the DTN protocols reside at the application layer of the TCP/IP stack, forming a store-and-forward overlay network. The key capabilities of the Bundle Protocol include custody-based reliability, the ability to cope with intermittent connectivity, the ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses.

  18. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    NASA Astrophysics Data System (ADS)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  19. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  20. Using a Simple, Free Voice-over-Internet Protocol Service to Add Interest to Lectures and Enhance Student Engagement

    ERIC Educational Resources Information Center

    Beaton, Susan J.; Forster, Peter M.

    2013-01-01

    A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…

  1. Performance analysis of signaling protocols on OBS switches

    NASA Astrophysics Data System (ADS)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  2. DROMPA: easy-to-handle peak calling and visualization software for the computational analysis and validation of ChIP-seq data.

    PubMed

    Nakato, Ryuichiro; Itoh, Tahehiko; Shirahige, Katsuhiko

    2013-07-01

    Chromatin immunoprecipitation with high-throughput sequencing (ChIP-seq) can identify genomic regions that bind proteins involved in various chromosomal functions. Although the development of next-generation sequencers offers the technology needed to identify these protein-binding sites, the analysis can be computationally challenging because sequencing data sometimes consist of >100 million reads/sample. Herein, we describe a cost-effective and time-efficient protocol that is generally applicable to ChIP-seq analysis; this protocol uses a novel peak-calling program termed DROMPA to identify peaks and an additional program, parse2wig, to preprocess read-map files. This two-step procedure drastically reduces computational time and memory requirements compared with other programs. DROMPA enables the identification of protein localization sites in repetitive sequences and efficiently identifies both broad and sharp protein localization peaks. Specifically, DROMPA outputs a protein-binding profile map in pdf or png format, which can be easily manipulated by users who have a limited background in bioinformatics. © 2013 The Authors Genes to Cells © 2013 by the Molecular Biology Society of Japan and Wiley Publishing Asia Pty Ltd.

  3. Use of the Delay-Tolerant Networking Bundle Protocol from Space

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex

    2009-01-01

    The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.

  4. A TMS Investigation on the Role of Lateral Occipital Complex and Caudal Intraparietal Sulcus in the Perception of Object Form and Orientation.

    PubMed

    Chouinard, Philippe A; Meena, Deiter K; Whitwell, Robert L; Hilchey, Matthew D; Goodale, Melvyn A

    2017-05-01

    We used TMS to assess the causal roles of the lateral occipital (LO) and caudal intraparietal sulcus (cIPS) areas in the perceptual discrimination of object features. All participants underwent fMRI to localize these areas using a protocol in which they passively viewed images of objects that varied in both form and orientation. fMRI identified six significant brain regions: LO, cIPS, and the fusiform gyrus, bilaterally. In a separate experimental session, we applied TMS to LO or cIPS while the same participants performed match-to-sample form or orientation discrimination tasks. Compared with sham stimulation, TMS to either the left or right LO increased RTs for form but not orientation discrimination, supporting a critical role for LO in form processing for perception- and judgment-based tasks. In contrast, we did not observe any effects when we applied TMS to cIPS. Thus, despite the clear functional evidence of engagement for both LO and cIPS during the passive viewing of objects in the fMRI experiment, the TMS experiment revealed that cIPS is not critical for making perceptual judgments about their form or orientation.

  5. 78 FR 75573 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-12

    ..., facsimile number (202) 646-3347, or email address [email protected] (HSEEP) After Action Report (AAR) Improvement Plan (IP). Type of Information Collection: Revision of a... Exercise and Evaluation Program (HSEEP) After Action Report (AAR) Improvement Plan (IP). Abstract: The...

  6. Validation of the custo screen 400 ambulatory blood pressure-monitoring device according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Bramlage, Peter; Deutsch, Cornelia; Krüger, Ralf; Wolf, Andreas; Müller, Peter; Zwingers, Thomas; Beime, Beate; Mengden, Thomas

    2014-01-01

    The aim of the present study was to validate the custo screen 400 ambulatory blood pressure-monitoring (ABPM) device according to the 2010 International Protocol revision of the European Society of Hypertension (ESH-IP). The device can be used for ABPM for up to 72 hours. Systolic and diastolic blood pressure (SBP and DBP, respectively) were sequentially measured in 33 adult subjects (13 males and 20 females) and compared with a standard mercury sphygmomanometer (two observers). A total of 99 comparison pairs were obtained. The custo screen 400 met the requirements of parts 1 and 2 of the ESH-IP revision 2010. The mean difference between the device and reference sphygmomanometer readings was -0.5±4.5 mmHg for SBP and -0.1±3.3 mmHg for DBP. All but one measurement were within the absolute difference of 10 mmHg between the device and the observers for SBP and DBP. The number of absolute differences between the device and the observers within a range of 5 mmHg was 84 of 99 readings for SBP, and 93 of 99 readings for DBP. The custo screen 400 ABPM device met the requirements of the 2010 ESH-IP revision, and hence can be recommended for ABPM in adults. To our knowledge, the custo screen 400 is the first device to pass the revised ESH-IP 2010.

  7. Validation of the blood pressure measurement device Erkameter 125 PRO according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Beime, Beate; Deutsch, Cornelia; Krüger, Ralf; Zimmermann, Erik; Bramlage, Peter

    2016-12-01

    The aim of the present study was to validate the blood pressure (BP) measurement device Erkameter 125 PRO according to the International Protocol revision 2010 of the European Society of Hypertension (ESH-IP2). In 33 patients aged 32-79 years, BP measurements were performed alternately using the Erkameter 125 PRO and the reference mercury sphygmomanometer according to ESH-IP revision 2010. For the analysis, a total of 99 comparisons were included. All absolute differences between the test device and the reference were within 10 mmHg for systolic blood pressure (SBP), and all except one for diastolic blood pressure (DBP). A total of 93 out of 99 comparisons for SBP showed an absolute difference within 5 mmHg and 92 out of 99 for DBP. The mean±SD difference between the Erkameter 125 PRO and the standard reference was -0.5±3.5 mmHg for SBP and 0.5±3.5 mmHg for DBP. As to part 2 of ESH-IP 2010, all patients had a minimum of two out of three measurements within 5 mmHg difference for SBP and 31 out of 33 patients for DBP. The Erkameter 125 PRO fulfilled the requirements of parts 1 and 2 of the ESH-IP revision 2010 and can be recommended for office BP measurements in adults.

  8. Validation of the custo screen 400 ambulatory blood pressure-monitoring device according to the European Society of Hypertension International Protocol revision 2010

    PubMed Central

    Bramlage, Peter; Deutsch, Cornelia; Krüger, Ralf; Wolf, Andreas; Müller, Peter; Zwingers, Thomas; Beime, Beate; Mengden, Thomas

    2014-01-01

    Objective The aim of the present study was to validate the custo screen 400 ambulatory blood pressure-monitoring (ABPM) device according to the 2010 International Protocol revision of the European Society of Hypertension (ESH-IP). The device can be used for ABPM for up to 72 hours. Materials and methods Systolic and diastolic blood pressure (SBP and DBP, respectively) were sequentially measured in 33 adult subjects (13 males and 20 females) and compared with a standard mercury sphygmomanometer (two observers). A total of 99 comparison pairs were obtained. Results The custo screen 400 met the requirements of parts 1 and 2 of the ESH-IP revision 2010. The mean difference between the device and reference sphygmomanometer readings was −0.5±4.5 mmHg for SBP and −0.1±3.3 mmHg for DBP. All but one measurement were within the absolute difference of 10 mmHg between the device and the observers for SBP and DBP. The number of absolute differences between the device and the observers within a range of 5 mmHg was 84 of 99 readings for SBP, and 93 of 99 readings for DBP. Conclusion The custo screen 400 ABPM device met the requirements of the 2010 ESH-IP revision, and hence can be recommended for ABPM in adults. To our knowledge, the custo screen 400 is the first device to pass the revised ESH-IP 2010. PMID:24868162

  9. Deployment of 802.15.4 Sensor Networks for C4ISR Operations

    DTIC Science & Technology

    2006-06-01

    43 Figure 20.MSP410CA Dense Grid Monitoring (Crossbow User’s Manual, 2005). ....................................44 Figure 21.(a)MICA2 without...Deployment of Sensor Grid (COASTS OPORD, 2006). ...56 Figure 27.Topology View of Two Nodes and Base Station .......57 Figure 28.Nodes Employing Multi...Random Access Memory TCP/IP Transmission Control Protocol/Internet Protocol TinyOS Tiny Micro Threading Operating System UARTs Universal

  10. Validation of BP devices QardioArm® in the general population and Omron M6 Comfort® in type II diabetic patients according to the European Society of Hypertension International Protocol (ESH-IP).

    PubMed

    Chahine, Mirna N; Topouchian, Jirar; Zelveian, Parounak; Hakobyan, Zoya; Melkonyan, Arevik; Azaki, Alaa; Diab, Reem; Harb, Aya; Asmar, Roland

    2018-01-01

    Following the European Society of Hypertension International Protocol (ESH-IP) Revision 2010, QardioArm ® and Omron M6 Comfort IT ® oscillometric devices were evaluated in the general population and in patients with type II diabetes, respectively, for self-blood pressure (BP) measurement. Both devices, QardioArm ® and Omron M6 Comfort ® , measure BP at the brachial level. The ESH-IP Revision 2010 includes a total number of 33 subjects. For each measure, the difference between observer and device BP values was calculated. In all, 99 pairs of BP differences are classified into three categories (≤5, ≤10, and ≤15 mmHg). The protocol procedures were followed precisely. QardioArm ® and Omron M6 Comfort ® fulfilled the requirements of the ESH-IP and passed the validation process successfully. For QardioArm ® , a total of 69 out of 99 comparisons for systolic blood pressure (SBP) showed an absolute difference within 5 mmHg and 82 out of 99 for diastolic blood pressure (DBP). As for Omron M6 Comfort ® , a total of 83 out of 99 comparisons for SBP showed an absolute difference within 5 mmHg and 77 out of 99 for DBP. The mean differences between the device and mercury readings were 0.7±5.9 mmHg for SBP and 0.3±4.1 mmHg for DBP for QardioArm ® and -1.4±4.7 mmHg for SBP and -2.1±4.3 mmHg for DBP for Omron M6 Comfort ® . With regard to part 2 of ESH-IP 2010, 27 out of 33 subjects had a minimum of two out of three measurements within 5 mmHg difference for SBP and 31 out of 33 subjects for DBP for the QardioArm ® , and 29 out of 33 patients had a minimum of two out of three measurements within 5 mmHg difference for SBP and 26 out of 33 patients for DBP for Omron M6 Comfort ® . QardioArm ® and Omron M6 Comfort ® readings differing from the mercury standard by <5, 10, and 15 mmHg fulfill the ESH-IP Revision 2010 requirements. Consequently, these two devices are suitable for use in the general population and non-insulin-dependent type II diabetic patients, respectively.

  11. Validation of BP devices QardioArm® in the general population and Omron M6 Comfort® in type II diabetic patients according to the European Society of Hypertension International Protocol (ESH-IP)

    PubMed Central

    Chahine, Mirna N; Topouchian, Jirar; Zelveian, Parounak; Hakobyan, Zoya; Melkonyan, Arevik; Azaki, Alaa; Diab, Reem; Harb, Aya; Asmar, Roland

    2018-01-01

    Background Following the European Society of Hypertension International Protocol (ESH-IP) Revision 2010, QardioArm® and Omron M6 Comfort IT® oscillometric devices were evaluated in the general population and in patients with type II diabetes, respectively, for self-blood pressure (BP) measurement. Methods Both devices, QardioArm® and Omron M6 Comfort®, measure BP at the brachial level. The ESH-IP Revision 2010 includes a total number of 33 subjects. For each measure, the difference between observer and device BP values was calculated. In all, 99 pairs of BP differences are classified into three categories (≤5, ≤10, and ≤15 mmHg). The protocol procedures were followed precisely. Results: QardioArm® and Omron M6 Comfort® fulfilled the requirements of the ESH-IP and passed the validation process successfully. For QardioArm®, a total of 69 out of 99 comparisons for systolic blood pressure (SBP) showed an absolute difference within 5 mmHg and 82 out of 99 for diastolic blood pressure (DBP). As for Omron M6 Comfort®, a total of 83 out of 99 comparisons for SBP showed an absolute difference within 5 mmHg and 77 out of 99 for DBP. The mean differences between the device and mercury readings were 0.7±5.9 mmHg for SBP and 0.3±4.1 mmHg for DBP for QardioArm® and −1.4±4.7 mmHg for SBP and −2.1±4.3 mmHg for DBP for Omron M6 Comfort®. With regard to part 2 of ESH-IP 2010, 27 out of 33 subjects had a minimum of two out of three measurements within 5 mmHg difference for SBP and 31 out of 33 subjects for DBP for the QardioArm®, and 29 out of 33 patients had a minimum of two out of three measurements within 5 mmHg difference for SBP and 26 out of 33 patients for DBP for Omron M6 Comfort®. Conclusion: QardioArm® and Omron M6 Comfort® readings differing from the mercury standard by <5, 10, and 15 mmHg fulfill the ESH-IP Revision 2010 requirements. Consequently, these two devices are suitable for use in the general population and non-insulin-dependent type II diabetic patients, respectively. PMID:29343992

  12. Analysis of ChIP-seq Data in R/Bioconductor.

    PubMed

    de Santiago, Ines; Carroll, Thomas

    2018-01-01

    The development of novel high-throughput sequencing methods for ChIP (chromatin immunoprecipitation) has provided a very powerful tool to study gene regulation in multiple conditions at unprecedented resolution and scale. Proactive quality-control and appropriate data analysis techniques are of critical importance to extract the most meaningful results from the data. Over the last years, an array of R/Bioconductor tools has been developed allowing researchers to process and analyze ChIP-seq data. This chapter provides an overview of the methods available to analyze ChIP-seq data based primarily on software packages from the open-source Bioconductor project. Protocols described in this chapter cover basic steps including data alignment, peak calling, quality control and data visualization, as well as more complex methods such as the identification of differentially bound regions and functional analyses to annotate regulatory regions. The steps in the data analysis process were demonstrated on publicly available data sets and will serve as a demonstration of the computational procedures routinely used for the analysis of ChIP-seq data in R/Bioconductor, from which readers can construct their own analysis pipelines.

  13. Single-cell imaging techniques for the real-time detection of IP₃ in live cells.

    PubMed

    Nelson, Carl P

    2013-01-01

    Inositol 1,4,5-trisphosphate (IP(3)) is a ubiquitous second messenger, derived from the hydrolysis of phosphatidylinositol 4,5-bisphosphate (PIP(2)) by enzymes of the phospholipase C (PLC) family. Binding of IP(3) to its cognate receptor in the endoplasmic reticulum membrane leads to release of Ca(2+) into the cytoplasm, which is involved in the regulation of an array of cellular functions. Traditional techniques for the detection of IP(3) have required the extraction of a large number of cells, with limitations in the time resolution of changes in IP(3) and an inability to obtain detailed information on the dynamics of this second messenger in single cells. Recent progress in this field has led to the development of a number of genetically encoded fluorescent biosensors, which upon recombinant expression are able selectively to detect real-time changes in IP(3) in single live cells. In this chapter, I detail protocols for the expression, visualization (by confocol or fluorescence microscopy), and interpretation of data obtained with such biosensors expressed in mammalian cells.

  14. Evolution of interprofessional learning: Dalhousie University's "From Family Violence to Health" module.

    PubMed

    Johnston, Grace M; Ryding, Helen A; Campbell, Lindsay M

    2003-11-01

    At Dalhousie University, interprofessional (IP) learning modules are used to help future health care professionals learn to work together in resolving complex problems. One module, "From Family Violence to Health," features the role of dental professionals. This paper describes the evolution of this module from the year 2000. By February 2003, 1,182 students from 15 health care professions had completed the module. Qualitative evaluation in years 1 and 2 of the program (2000 and 2001) revealed that, before participating in the IP module, many students were able to identify a role for themselves in the recognition of family violence and knew their responsibility to report incidents. However, after participating in the module, they had a greater understanding of the reporting of family violence, a more comprehensive and supportive perspective, increased recognition of how health care professionals could work together and improved awareness of the roles of other professions. In a quantitative evaluation in year 3 (2002), mean student ratings on a scale of 1 to 5 indicated that the IP module was relevant (4.2), increased their understanding of family violence (4.0), and had some impact in promoting IP learning (3.8). As health care delivery becomes more focused on care teams and system thinking, the provision of IP training is expected to increase. The Dalhousie University IP modules (available at http://www.dal.ca/~fhp/ipl/index.html) address health and social problems for which it is critical that health care and other professionals work together. Feedback from practitioners on the development of IP education is welcomed, particularly with regard to the IP module addressing family violence.

  15. Transition plan.

    DOT National Transportation Integrated Search

    2009-02-02

    Although the 9-1-1 system has been a success for nearly 40 years, changes in the publics use of : technology, the saturation of the mobile market, and the spread of Voice over Internet Protocol (VoIP) : telephony over broadband are contributing to...

  16. The 10 Hottest Technologies in Telecom.

    ERIC Educational Resources Information Center

    Flanagan, Patrick

    1997-01-01

    Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…

  17. X-Windows Socket Widget Class

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Socket Widget Class ("Class" is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing network connections for graphical-user-interface (GUI) computer programs. UNIX Transmission Control Protocol/Internet Protocol (TCP/IP) socket programming libraries require many method calls to configure, operate, and destroy sockets. Most X Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Socket Widget Class encapsulates UNIX TCP/IP socket-management tasks within the framework of an X Windows widget. Using the widget framework, X Windows GUI programs can treat one or more network socket instances in the same manner as that of other graphical widgets, making it easier to program sockets. Wrapping ISP socket programming libraries inside a widget framework enables a programmer to treat a network interface as though it were a GUI.

  18. Integrating policy-based management and SLA performance monitoring

    NASA Astrophysics Data System (ADS)

    Liu, Tzong-Jye; Lin, Chin-Yi; Chang, Shu-Hsin; Yen, Meng-Tzu

    2001-10-01

    Policy-based management system provides the configuration capability for the system administrators to focus on the requirements of customers. The service level agreement performance monitoring mechanism helps system administrators to verify the correctness of policies. However, it is difficult for a device to process the policies directly because the policies are the management concept. This paper proposes a mechanism to decompose a policy into rules that can be efficiently processed by a device. Thus, the device may process the rule and collect the performance statistics information efficiently; and the policy-based management system may collect these performance statistics information and report the service-level agreement performance monitoring information to the system administrator. The proposed policy-based management system achieves both the policy configuration and service-level agreement performance monitoring requirements. A policy consists of a condition part and an action part. The condition part is a Boolean expression of a source host IP group, a destination host IP group, etc. The action part is the parameters of services. We say that an address group is compact if it only consists of a range of IP address that can be denoted by a pair of IP address and corresponding IP mask. If the condition part of a policy only consists of the compact address group, we say that the policy is a rule. Since a device can efficiently process a compact address and a system administrator prefers to define a range of IP address, the policy-based management system has to translate policy into rules and supplements the gaps between policy and rules. The proposed policy-based management system builds the relationships between VPN and policies, policy and rules. Since the system administrator wants to monitor the system performance information of VPNs and policies, the proposed policy-based management system downloads the relationships among VPNs, policies and rules to the SNMP agents. The SNMP agents build the management information base (MIB) of all VPNs, policies and rules according to the relationships obtained from the management server. Thus, the proposed policy-based management system may get all performance monitoring information of VPNs and policies from agents. The proposed policy-based manager achieves two goals: a) provide a management environment for the system administrator to configure their network only considering the policy requirement issues and b) let the device have only to process the packet and then collect the required performance information. These two things make the proposed management system satisfy both the user and device requirements.

  19. Accelerating Climate and Weather Simulations through Hybrid Computing

    NASA Technical Reports Server (NTRS)

    Zhou, Shujia; Cruz, Carlos; Duffy, Daniel; Tucker, Robert; Purcell, Mark

    2011-01-01

    Unconventional multi- and many-core processors (e.g. IBM (R) Cell B.E.(TM) and NVIDIA (R) GPU) have emerged as effective accelerators in trial climate and weather simulations. Yet these climate and weather models typically run on parallel computers with conventional processors (e.g. Intel, AMD, and IBM) using Message Passing Interface. To address challenges involved in efficiently and easily connecting accelerators to parallel computers, we investigated using IBM's Dynamic Application Virtualization (TM) (IBM DAV) software in a prototype hybrid computing system with representative climate and weather model components. The hybrid system comprises two Intel blades and two IBM QS22 Cell B.E. blades, connected with both InfiniBand(R) (IB) and 1-Gigabit Ethernet. The system significantly accelerates a solar radiation model component by offloading compute-intensive calculations to the Cell blades. Systematic tests show that IBM DAV can seamlessly offload compute-intensive calculations from Intel blades to Cell B.E. blades in a scalable, load-balanced manner. However, noticeable communication overhead was observed, mainly due to IP over the IB protocol. Full utilization of IB Sockets Direct Protocol and the lower latency production version of IBM DAV will reduce this overhead.

  20. Protocol for the Individual Placement and Support (IPS) in Pain Trial: A randomized controlled trial investigating the effectiveness of IPS for patients with chronic pain.

    PubMed

    Linnemørken, Lene Therese B; Sveinsdottir, Vigdis; Knutzen, Thomas; Rødevand, Linn; Hernæs, Kjersti Helene; Reme, Silje Endresen

    2018-02-13

    Work disability involves large costs to the society as well as to the individual. Work disability is common among people with chronic pain conditions, yet few effective interventions exist. Individual Placement and Support (IPS) is an evidence-based work rehabilitation model originally developed to help people with severe mental illness obtain and maintain employment. The effectiveness of IPS for patients with severe mental illness is well documented, but the model has never before been tested for patients with chronic pain. The aim of the IPS in Pain trial is to investigate the effectiveness of IPS as an integrated part of the interdisciplinary treatment for patients with chronic pain in a hospital outpatient clinic. The study is a randomized controlled trial comparing pain treatment with integrated IPS to treatment as usual in unemployed patients suffering from various chronic pain conditions. The primary outcome of the study is labor market participation during 12 months after enrollment, and secondary outcomes include physical and mental health and well-being, collected at baseline, 6, and 12 months. Finally, there will be an additional long-term follow-up for the primary outcome, which will be collected through a brief phone interview at 24 months. The IPS in Pain trial will be the first report of the effectiveness of the IPS model of supported employment applied in an outpatient setting for chronic pain patients. It will thus provide important information about the effectiveness of repurposing IPS to a new patient group in great need of job support. Clinicaltrials.gov: NCT02697656 . Registered January 15th, 2016.

  1. Multi-board kernel communication using socket programming for embedded applications

    NASA Astrophysics Data System (ADS)

    Mishra, Ashish; Girdhar, Neha; Krishnia, Nikita

    2016-03-01

    It is often seen in large application projects, there is a need to communicate between two different processors or two different kernels. The aim of this paper is to communicate between two different kernels and use efficient method to do so. The TCP/IP protocol is implemented to communicate between two boards via the Ethernet port and use lwIP (lightweight IP) stack, which is a smaller independent implementation of the TCP/IP stack suitable for use in embedded systems. While retaining TCP/IP functionality, lwIP stack reduces the use of memory and even size of the code. In this process of communication we made Raspberry pi as an active client and Field programmable gate array(FPGA) board as a passive server and they are allowed to communicate via Ethernet. Three applications based on TCP/IP client-server network communication have been implemented. The Echo server application is used to communicate between two different kernels of two different boards. Socket programming is used as it is independent of platform and programming language used. TCP transmit and receive throughput test applications are used to measure maximum throughput of the transmission of data. These applications are based on communication to an open source tool called iperf. It is used to measure the throughput transmission rate by sending or receiving some constant piece of data to the client or server according to the test application.

  2. Multisites Coordination in Shared Multicast Trees

    DTIC Science & Technology

    1999-01-01

    conferencing, distributed interactive simulations, and collaborative systems. We de- scribe a novel protocol to coordinate multipoint groupwork in the IP...multicast framework. The pro- tocol supports Internet-wide coordination for large and highly-interactive groupwork , relying on trans- mission of

  3. Final system design document.

    DOT National Transportation Integrated Search

    2009-02-01

    The Next Generation 9-1-1 (NG9-1-1) Initiative is a research and development project funded by the US Department of Transportation (USDOT) to define the framework and plan to deploy Internet Protocol (IP)-based emergency communications across the nat...

  4. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  5. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  6. ChIP-seq guidelines and practices of the ENCODE and modENCODE consortia.

    PubMed

    Landt, Stephen G; Marinov, Georgi K; Kundaje, Anshul; Kheradpour, Pouya; Pauli, Florencia; Batzoglou, Serafim; Bernstein, Bradley E; Bickel, Peter; Brown, James B; Cayting, Philip; Chen, Yiwen; DeSalvo, Gilberto; Epstein, Charles; Fisher-Aylor, Katherine I; Euskirchen, Ghia; Gerstein, Mark; Gertz, Jason; Hartemink, Alexander J; Hoffman, Michael M; Iyer, Vishwanath R; Jung, Youngsook L; Karmakar, Subhradip; Kellis, Manolis; Kharchenko, Peter V; Li, Qunhua; Liu, Tao; Liu, X Shirley; Ma, Lijia; Milosavljevic, Aleksandar; Myers, Richard M; Park, Peter J; Pazin, Michael J; Perry, Marc D; Raha, Debasish; Reddy, Timothy E; Rozowsky, Joel; Shoresh, Noam; Sidow, Arend; Slattery, Matthew; Stamatoyannopoulos, John A; Tolstorukov, Michael Y; White, Kevin P; Xi, Simon; Farnham, Peggy J; Lieb, Jason D; Wold, Barbara J; Snyder, Michael

    2012-09-01

    Chromatin immunoprecipitation (ChIP) followed by high-throughput DNA sequencing (ChIP-seq) has become a valuable and widely used approach for mapping the genomic location of transcription-factor binding and histone modifications in living cells. Despite its widespread use, there are considerable differences in how these experiments are conducted, how the results are scored and evaluated for quality, and how the data and metadata are archived for public use. These practices affect the quality and utility of any global ChIP experiment. Through our experience in performing ChIP-seq experiments, the ENCODE and modENCODE consortia have developed a set of working standards and guidelines for ChIP experiments that are updated routinely. The current guidelines address antibody validation, experimental replication, sequencing depth, data and metadata reporting, and data quality assessment. We discuss how ChIP quality, assessed in these ways, affects different uses of ChIP-seq data. All data sets used in the analysis have been deposited for public viewing and downloading at the ENCODE (http://encodeproject.org/ENCODE/) and modENCODE (http://www.modencode.org/) portals.

  7. ChIP-seq guidelines and practices of the ENCODE and modENCODE consortia

    PubMed Central

    Landt, Stephen G.; Marinov, Georgi K.; Kundaje, Anshul; Kheradpour, Pouya; Pauli, Florencia; Batzoglou, Serafim; Bernstein, Bradley E.; Bickel, Peter; Brown, James B.; Cayting, Philip; Chen, Yiwen; DeSalvo, Gilberto; Epstein, Charles; Fisher-Aylor, Katherine I.; Euskirchen, Ghia; Gerstein, Mark; Gertz, Jason; Hartemink, Alexander J.; Hoffman, Michael M.; Iyer, Vishwanath R.; Jung, Youngsook L.; Karmakar, Subhradip; Kellis, Manolis; Kharchenko, Peter V.; Li, Qunhua; Liu, Tao; Liu, X. Shirley; Ma, Lijia; Milosavljevic, Aleksandar; Myers, Richard M.; Park, Peter J.; Pazin, Michael J.; Perry, Marc D.; Raha, Debasish; Reddy, Timothy E.; Rozowsky, Joel; Shoresh, Noam; Sidow, Arend; Slattery, Matthew; Stamatoyannopoulos, John A.; Tolstorukov, Michael Y.; White, Kevin P.; Xi, Simon; Farnham, Peggy J.; Lieb, Jason D.; Wold, Barbara J.; Snyder, Michael

    2012-01-01

    Chromatin immunoprecipitation (ChIP) followed by high-throughput DNA sequencing (ChIP-seq) has become a valuable and widely used approach for mapping the genomic location of transcription-factor binding and histone modifications in living cells. Despite its widespread use, there are considerable differences in how these experiments are conducted, how the results are scored and evaluated for quality, and how the data and metadata are archived for public use. These practices affect the quality and utility of any global ChIP experiment. Through our experience in performing ChIP-seq experiments, the ENCODE and modENCODE consortia have developed a set of working standards and guidelines for ChIP experiments that are updated routinely. The current guidelines address antibody validation, experimental replication, sequencing depth, data and metadata reporting, and data quality assessment. We discuss how ChIP quality, assessed in these ways, affects different uses of ChIP-seq data. All data sets used in the analysis have been deposited for public viewing and downloading at the ENCODE (http://encodeproject.org/ENCODE/) and modENCODE (http://www.modencode.org/) portals. PMID:22955991

  8. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  9. A toolbox of immunoprecipitation-grade monoclonal antibodies to human transcription factors.

    PubMed

    Venkataraman, Anand; Yang, Kun; Irizarry, Jose; Mackiewicz, Mark; Mita, Paolo; Kuang, Zheng; Xue, Lin; Ghosh, Devlina; Liu, Shuang; Ramos, Pedro; Hu, Shaohui; Bayron Kain, Diane; Keegan, Sarah; Saul, Richard; Colantonio, Simona; Zhang, Hongyan; Behn, Florencia Pauli; Song, Guang; Albino, Edisa; Asencio, Lillyann; Ramos, Leonardo; Lugo, Luvir; Morell, Gloriner; Rivera, Javier; Ruiz, Kimberly; Almodovar, Ruth; Nazario, Luis; Murphy, Keven; Vargas, Ivan; Rivera-Pacheco, Zully Ann; Rosa, Christian; Vargas, Moises; McDade, Jessica; Clark, Brian S; Yoo, Sooyeon; Khambadkone, Seva G; de Melo, Jimmy; Stevanovic, Milanka; Jiang, Lizhi; Li, Yana; Yap, Wendy Y; Jones, Brittany; Tandon, Atul; Campbell, Elliot; Montelione, Gaetano T; Anderson, Stephen; Myers, Richard M; Boeke, Jef D; Fenyö, David; Whiteley, Gordon; Bader, Joel S; Pino, Ignacio; Eichinger, Daniel J; Zhu, Heng; Blackshaw, Seth

    2018-03-19

    A key component of efforts to address the reproducibility crisis in biomedical research is the development of rigorously validated and renewable protein-affinity reagents. As part of the US National Institutes of Health (NIH) Protein Capture Reagents Program (PCRP), we have generated a collection of 1,406 highly validated immunoprecipitation- and/or immunoblotting-grade mouse monoclonal antibodies (mAbs) to 737 human transcription factors, using an integrated production and validation pipeline. We used HuProt human protein microarrays as a primary validation tool to identify mAbs with high specificity for their cognate targets. We further validated PCRP mAbs by means of multiple experimental applications, including immunoprecipitation, immunoblotting, chromatin immunoprecipitation followed by sequencing (ChIP-seq), and immunohistochemistry. We also conducted a meta-analysis that identified critical variables that contribute to the generation of high-quality mAbs. All validation data, protocols, and links to PCRP mAb suppliers are available at http://proteincapture.org.

  10. HNP renumbering support in PMIPv6

    NASA Astrophysics Data System (ADS)

    Yan, Zhiwei; Geng, Guanggang; Lee, Xiaodong

    2015-12-01

    In the basic PMIPv6 (Proxy Mobile IPv6), the MN (Mobile Node) is assigned with a 64-bit HNP (Home Network Prefix) during the initial attachment for the HoA (Home Address) configuration. During the movements of MN, this prefix is assumed to be unchanged and then the upper layer applications do not have to use the reconfigured HoA and then the handover is transparent at the IP and above layers. However, the current protocol does not specify the related operation to support the MN to timely receive the new HNP and configure the new HoA when its HNP is renumbered. In this paper, this problem is discussed and a possible solution is proposed based on some simple extensions of the basic PMIPv6. Our analysis demonstrates that the proposed scheme can effectively discover the HNP renumbering and keep lower signaling cost, compared with the basic PMIPv6.

  11. Management of ATM-based networks supporting multimedia medical information systems

    NASA Astrophysics Data System (ADS)

    Whitman, Robert A.; Blaine, G. James; Fritz, Kevin; Goodgold, Ken; Heisinger, Patrick

    1997-05-01

    Medical information systems are acquiring the ability to collect and deliver many different types of medical information. In support of the increased network demands necessitated by these expanded capabilities, asynchronous transfer mode (ATM) based networks are being deployed in medical care systems. While ATM supplies a much greater line rate than currently deployed networks, the management and standards surrounding ATM are yet to mature. This paper explores the management and control issues surrounding an ATM network supporting medical information systems, and examines how management impacts network performance and robustness. A multivendor ATM network at the BJC Health System/Washington University and the applications using the network are discussed. Performance information for specific applications is presented and analyzed. Network management's influence on application reliability is outlined. The information collected is used to show how ATM network standards and management tools influence network reliability and performance. Performance of current applications using the ATM network is discussed. Special attention is given to issues encountered in implementation of hypertext transfer protocol over ATM internet protocol (IP) communications. A classical IP ATM implementation yields greater than twenty percent higher network performance over LANE. Maximum performance for a host's suite of applications can be obtained by establishing multiple individually engineered IP links through its ATM network connection.

  12. Engraftment of donor mesenchymal stem cells in chimeric BXSB includes vascular endothelial cells and hepatocytes.

    PubMed

    Jones, Olcay Y; Gok, Faysal; Rushing, Elisabeth J; Horkayne-Szakaly, Iren; Ahmed, Atif A

    2011-01-01

    Somatic tissue engraftment was studied in BXSB mice treated with mesenchymal stem cell transplantation. Hosts were conditioned with nonlethal radiation prior to introducing donor cells from major histocompatibility complex-matched green fluorescent protein transgenic mice. Transplant protocols differed for route of injection, ie, intravenous (i.v.) versus intraperitoneal (i.p.), and source of mesenchymal stem cells, ie, unfractionated bone marrow cells, ex vivo expanded mesenchymal stem cells, or bone chips. Tissue chimerism was determined after short (10-12 weeks) or long (62 weeks) posttransplant follow-up by immunohistochemistry for green fluorescent protein. Engraftment of endothelial cells was seen in several organs including liver sinusoidal cells in i.v. treated mice with ex vivo expanded mesenchymal stem cells or with unfractionated bone marrow cells. Periportal engraftment of liver hepatocytes, but not engraftment of endothelial cells, was found in mice injected i.p. with bone chips. Engraftment of adipocytes was a common denominator in both i.v. and i.p. routes and occurred during early phases post-transplant. Disease control was more robust in mice that received both i.v. bone marrow and i.p. bone chips compared to mice that received i.v. bone marrow alone. Thus, the data support potential use of mesenchymal stem cell transplant for treatment of severe lupus. Future studies are needed to optimize transplant conditions and tailor protocols that may in part be guided by fat and endothelial biomarkers. Furthermore, the role of liver chimerism in disease control and the nature of cellular communication among donor hematopoietic and mesenchymal stem cells in a chimeric host merit further investigation.

  13. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  14. Space Internet-Embedded Web Technologies Demonstration

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2001-01-01

    The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.

  15. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.

  16. [Unresolved issues in the evaluation of research projects involving induced pluripotent stem cells (iPS)].

    PubMed

    Casado, María; de Lecuona, Itziar

    2013-01-01

    This paper identifies problems and analyzes those conflicts posed by the evaluation of research projects involving the collection and use of human induced pluripotent stem cells (iPS) in Spain. Current legislation is causing problems of interpretation, circular and unnecessary referrals, legal uncertainty and undue delays. Actually, this situation may cause a lack of control and monitoring, and even some paralysis in regenerative medicine and cell therapy research, that is a priority nowadays. The analysis of the current legislation and its bioethical implications, led us to conclude that the review of iPS research projects cannot be assimilated to the evaluation of research projects that involve human embryonic stem cell (hESC). In this context, our proposal is based on the review by the Research Ethics Committees and the checkout by the Spanish Comission of Guarantees for Donation and Use of Human Cells and Tissues (CGDUCTH) of human iPS cells research projects. Moreover, this article claims for a more transparent research system, by effectively articulating the Registry on Research Projects. Finally, a model of verification protocol (checklist) for checking out biomedical research projects involving human iPS cells is suggested.

  17. Picking ChIP-seq peak detectors for analyzing chromatin modification experiments

    PubMed Central

    Micsinai, Mariann; Parisi, Fabio; Strino, Francesco; Asp, Patrik; Dynlacht, Brian D.; Kluger, Yuval

    2012-01-01

    Numerous algorithms have been developed to analyze ChIP-Seq data. However, the complexity of analyzing diverse patterns of ChIP-Seq signals, especially for epigenetic marks, still calls for the development of new algorithms and objective comparisons of existing methods. We developed Qeseq, an algorithm to detect regions of increased ChIP read density relative to background. Qeseq employs critical novel elements, such as iterative recalibration and neighbor joining of reads to identify enriched regions of any length. To objectively assess its performance relative to other 14 ChIP-Seq peak finders, we designed a novel protocol based on Validation Discriminant Analysis (VDA) to optimally select validation sites and generated two validation datasets, which are the most comprehensive to date for algorithmic benchmarking of key epigenetic marks. In addition, we systematically explored a total of 315 diverse parameter configurations from these algorithms and found that typically optimal parameters in one dataset do not generalize to other datasets. Nevertheless, default parameters show the most stable performance, suggesting that they should be used. This study also provides a reproducible and generalizable methodology for unbiased comparative analysis of high-throughput sequencing tools that can facilitate future algorithmic development. PMID:22307239

  18. Picking ChIP-seq peak detectors for analyzing chromatin modification experiments.

    PubMed

    Micsinai, Mariann; Parisi, Fabio; Strino, Francesco; Asp, Patrik; Dynlacht, Brian D; Kluger, Yuval

    2012-05-01

    Numerous algorithms have been developed to analyze ChIP-Seq data. However, the complexity of analyzing diverse patterns of ChIP-Seq signals, especially for epigenetic marks, still calls for the development of new algorithms and objective comparisons of existing methods. We developed Qeseq, an algorithm to detect regions of increased ChIP read density relative to background. Qeseq employs critical novel elements, such as iterative recalibration and neighbor joining of reads to identify enriched regions of any length. To objectively assess its performance relative to other 14 ChIP-Seq peak finders, we designed a novel protocol based on Validation Discriminant Analysis (VDA) to optimally select validation sites and generated two validation datasets, which are the most comprehensive to date for algorithmic benchmarking of key epigenetic marks. In addition, we systematically explored a total of 315 diverse parameter configurations from these algorithms and found that typically optimal parameters in one dataset do not generalize to other datasets. Nevertheless, default parameters show the most stable performance, suggesting that they should be used. This study also provides a reproducible and generalizable methodology for unbiased comparative analysis of high-throughput sequencing tools that can facilitate future algorithmic development.

  19. Q-nexus: a comprehensive and efficient analysis pipeline designed for ChIP-nexus.

    PubMed

    Hansen, Peter; Hecht, Jochen; Ibn-Salem, Jonas; Menkuec, Benjamin S; Roskosch, Sebastian; Truss, Matthias; Robinson, Peter N

    2016-11-04

    ChIP-nexus, an extension of the ChIP-exo protocol, can be used to map the borders of protein-bound DNA sequences at nucleotide resolution, requires less input DNA and enables selective PCR duplicate removal using random barcodes. However, the use of random barcodes requires additional preprocessing of the mapping data, which complicates the computational analysis. To date, only a very limited number of software packages are available for the analysis of ChIP-exo data, which have not yet been systematically tested and compared on ChIP-nexus data. Here, we present a comprehensive software package for ChIP-nexus data that exploits the random barcodes for selective removal of PCR duplicates and for quality control. Furthermore, we developed bespoke methods to estimate the width of the protected region resulting from protein-DNA binding and to infer binding positions from ChIP-nexus data. Finally, we applied our peak calling method as well as the two other methods MACE and MACS2 to the available ChIP-nexus data. The Q-nexus software is efficient and easy to use. Novel statistics about duplication rates in consideration of random barcodes are calculated. Our method for the estimation of the width of the protected region yields unbiased signatures that are highly reproducible for biological replicates and at the same time very specific for the respective factors analyzed. As judged by the irreproducible discovery rate (IDR), our peak calling algorithm shows a substantially better reproducibility. An implementation of Q-nexus is available at http://charite.github.io/Q/ .

  20. Design of a Decentralized Asynchronous Membership Protocol and an Implementation of Its Communications Layer

    DTIC Science & Technology

    1993-03-01

    sstm[MAXFD], stpm [MAXFD]; u-short fport,bport; char sfport[MLAXPORTI, sbport[MAXPORTII; int childpid; char my~name[MAXHOSTNAME+ 1 ], *ip~add&, char my...34, "tpm", stpm , (char*) NULL); printf ("Error executing tpm\

  1. Client Location in 802.11 Networks

    DTIC Science & Technology

    2007-03-01

    The Encyclopedia of Networking. 1995. Alameda. 3. Forouzan, Behrouz A. TCP/IP Protocol Suite. 2nd ed. New York: Mc- Graw Hill, 2003. 4. Holt, Keith...Proceedings. April 2003: 1353-1358. 18. Willingham, Stephen . Navy Pursuing ‘Smaller, Deployable, Interactive’ Networked Systems. Nov 2000. National

  2. NG9-1-1 preliminary transition plan.

    DOT National Transportation Integrated Search

    2008-04-01

    Although the 9-1-1 system has been an unqualified success story for more than 30 years, changes in the : publics use of technology, the saturation of the mobile market, and the spread of Voice over Internet : Protocol (VoIP) telephony over broadba...

  3. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed

    Duncan, R G; Shabot, M M

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR).

  4. Aeronautical Related Applications Using ATN and TCP/IP Research Report

    NASA Technical Reports Server (NTRS)

    Dhas, C.; Mulkerin, T.; Wargo, C.; Nielsen, R.; Gaughan, T.; Griner, James H., Jr. (Technical Monitor)

    2000-01-01

    The course for the future aeronautical communications architecture has been defined for more than 10 years and is known as the Aeronautical Telecommunication Network (ATN). However, the operational implementations of making use of the ATN remain 3-5 years away, and these implementations are still only in the early phases of long-range projects. Thus, it is an objective of this effort to consider what the potential outcome within the air transport industry may be, given the rapid growth in commercial-off-the-shelf (COTS) products, networks, and services that are based upon the Internet TCP/IP protocol suite.

  5. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed Central

    Duncan, R. G.; Shabot, M. M.

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  6. Impact of a New Teaching and Learning Approach in an Introductory Programming Course

    ERIC Educational Resources Information Center

    Iqbal Malik, Sohail; Coldwell-Neilson, Jo

    2017-01-01

    High failure and dropout rates are reported in introductory programming (IP) courses in different studies despite extensive research attempting to address the issue. In this study, we introduced an ADRI (Approach, Deployment, Result, Improvement) approach in the teaching and learning process of an IP course to improve learning and success rates.…

  7. 76 FR 45796 - Information Collection Being Submitted to the Office of Management and Budget for Review and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-01

    ... organizational structure, including the names of its executives, officers, partners, and board of directors; A... Control Number: 3060-1145. Title: Structure and Practices of the Video Relay Service Program, CG Docket No... end times; (5) incoming telephone number and IP address (if call originates with an IP-based device...

  8. Purification of nanogram-range immunoprecipitated DNA in ChIP-seq application.

    PubMed

    Zhong, Jian; Ye, Zhenqing; Lenz, Samuel W; Clark, Chad R; Bharucha, Adil; Farrugia, Gianrico; Robertson, Keith D; Zhang, Zhiguo; Ordog, Tamas; Lee, Jeong-Heon

    2017-12-21

    Chromatin immunoprecipitation-sequencing (ChIP-seq) is a widely used epigenetic approach for investigating genome-wide protein-DNA interactions in cells and tissues. The approach has been relatively well established but several key steps still require further improvement. As a part of the procedure, immnoprecipitated DNA must undergo purification and library preparation for subsequent high-throughput sequencing. Current ChIP protocols typically yield nanogram quantities of immunoprecipitated DNA mainly depending on the target of interest and starting chromatin input amount. However, little information exists on the performance of reagents used for the purification of such minute amounts of immunoprecipitated DNA in ChIP elution buffer and their effects on ChIP-seq data. Here, we compared DNA recovery, library preparation efficiency, and ChIP-seq results obtained with several commercial DNA purification reagents applied to 1 ng ChIP DNA and also investigated the impact of conditions under which ChIP DNA is stored. We compared DNA recovery of ten commercial DNA purification reagents and phenol/chloroform extraction from 1 to 50 ng of immunopreciptated DNA in ChIP elution buffer. The recovery yield was significantly different with 1 ng of DNA while similar in higher DNA amounts. We also observed that the low nanogram range of purified DNA is prone to loss during storage depending on the type of polypropylene tube used. The immunoprecipitated DNA equivalent to 1 ng of purified DNA was subject to DNA purification and library preparation to evaluate the performance of four better performing purification reagents in ChIP-seq applications. Quantification of library DNAs indicated the selected purification kits have a negligible impact on the efficiency of library preparation. The resulting ChIP-seq data were comparable with the dataset generated by ENCODE consortium and were highly correlated between the data from different purification reagents. This study provides comparative data on commercial DNA purification reagents applied to nanogram-range immunopreciptated ChIP DNA and evidence for the importance of storage conditions of low nanogram-range purified DNA. We verified consistent high performance of a subset of the tested reagents. These results will facilitate the improvement of ChIP-seq methodology for low-input applications.

  9. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  10. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  11. Kinetic Description of the Impedance Probe

    NASA Astrophysics Data System (ADS)

    Oberrath, Jens; Lapke, Martin; Mussenbrock, Thomas; Brinkmann, Ralf

    2011-10-01

    Active plasma resonance spectroscopy is a well known diagnostic method. Many concepts of this method are theoretically investigated and realized as a diagnostic tool, one of which is the impedance probe (IP). The application of such a probe in plasmas with pressures of a few Pa raises the question whether kinetic effects have to be taken into account or not. To address this question a kinetic model is necessary. A general kinetic model for an electrostatic concept of active plasma spectroscopy was presented by R.P. Brinkmann and can be used to describe the multipole resonance probe (MRP). In principle the IP is interpretable as a special case of the MRP in lower order. Thus, we are able to describe the IP by the kinetic model of the MRP. Based on this model we derive a solution to investigate the influence of kinetic effects to the resonance behavior of the IP. Active plasma resonance spectroscopy is a well known diagnostic method. Many concepts of this method are theoretically investigated and realized as a diagnostic tool, one of which is the impedance probe (IP). The application of such a probe in plasmas with pressures of a few Pa raises the question whether kinetic effects have to be taken into account or not. To address this question a kinetic model is necessary. A general kinetic model for an electrostatic concept of active plasma spectroscopy was presented by R.P. Brinkmann and can be used to describe the multipole resonance probe (MRP). In principle the IP is interpretable as a special case of the MRP in lower order. Thus, we are able to describe the IP by the kinetic model of the MRP. Based on this model we derive a solution to investigate the influence of kinetic effects to the resonance behavior of the IP. The authors acknowledge the support by the Deutsche Forschungsgemeinschaft (DFG) via the Ruhr University Research School and the Federal Ministry of Education and Research in frame of the PluTO project.

  12. Considerations on Experimental Design and Data Analysis of Chromatin Immunoprecipitation Experiments.

    PubMed

    Jordán-Pla, Antonio; Visa, Neus

    2018-01-01

    Arguably one of the most valuable techniques to study chromatin organization, ChIP is the method of choice to map the contacts established between proteins and genomic DNA. Ever since its inception, more than 30 years ago, ChIP has been constantly evolving, improving, and expanding its capabilities and reach. Despite its widespread use by many laboratories across a wide variety of disciplines, ChIP assays can be sometimes challenging to design, and are often sensitive to variations in practical implementation.In this chapter, we provide a general overview of the ChIP method and its most common variations, with a special focus on ChIP-seq. We try to address some of the most important aspects that need to be taken into account in order to design and perform experiments that generate the most reproducible, high-quality data. Some of the main topics covered include the use of properly characterized antibodies, alternatives to chromatin preparation, the need for proper controls, and some recommendations about ChIP-seq data analysis.

  13. [External lumbar drainage with volumetric continuing infusion pump in patients with cerebrospinal fluid leak. A case series].

    PubMed

    Manso Melgosa, Ana Belén; García Gutiérrez, Helena; Fernández Porras, Mónica; Castrillo Manero, Ana Berta; Pérez Marijuán, Belén

    To describe the incidence and complications arising in a number of cases of patients with cerebrospinal fluid leak treated by external lumbar drainage with infusion pump (IP) volumetric continuous from 2001 to 2014. Quantify cerebrospinal fluid leak closed by lumbar drainage with IP. Retrospective descriptive case series study. patients undergoing transsphenoidal pituitary surgery, Chiari surgery and laminectomy, that developed postoperative cerebrospinal fluid leak treated with continuous external lumbar drainage by IP. age, sex, type of intervention, variables related to the practice of the pump and complications. Average and medians were calculated for quantitative variables, frequencies and percentages for qualitative. Sample: 11 subjects. Incidence in running IP: disconnection, occlusion and acoustic alarm activation. Most frequently complication is headache; a case of pneumocephalus. The small number of subjects and the heterogeneity of these do not allow for comparison or establishing associations between variables. The resolution of the cerebrospinal fluid leak with continuous IP is lower in this study than others, and may be influenced by the small number of subjects. It should be noted the frequent activation of the pump alarm for no apparent cause. Protocol would be developed for preparing the IP team to reduce the acoustic alarm activation, and would make a prospective multicenter study. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.

  14. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  15. 3D spheroid culture of hESC/hiPSC-derived hepatocyte-like cells for drug toxicity testing.

    PubMed

    Takayama, Kazuo; Kawabata, Kenji; Nagamoto, Yasuhito; Kishimoto, Keisuke; Tashiro, Katsuhisa; Sakurai, Fuminori; Tachibana, Masashi; Kanda, Katsuhiro; Hayakawa, Takao; Furue, Miho Kusuda; Mizuguchi, Hiroyuki

    2013-02-01

    Although it is expected that hepatocyte-like cells differentiated from human embryonic stem (ES) cells or induced pluripotent stem (iPS) cells will be utilized in drug toxicity testing, the actual applicability of hepatocyte-like cells in this context has not been well examined so far. To generate mature hepatocyte-like cells that would be applicable for drug toxicity testing, we established a hepatocyte differentiation method that employs not only stage-specific transient overexpression of hepatocyte-related transcription factors but also a three-dimensional spheroid culture system using a Nanopillar Plate. We succeeded in establishing protocol that could generate more matured hepatocyte-like cells than our previous protocol. In addition, our hepatocyte-like cells could sensitively predict drug-induced hepatotoxicity, including reactive metabolite-mediated toxicity. In conclusion, our hepatocyte-like cells differentiated from human ES cells or iPS cells have potential to be applied in drug toxicity testing. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Scalable SCPPM Decoder

    NASA Technical Reports Server (NTRS)

    Quir, Kevin J.; Gin, Jonathan W.; Nguyen, Danh H.; Nguyen, Huy; Nakashima, Michael A.; Moision, Bruce E.

    2012-01-01

    A decoder was developed that decodes a serial concatenated pulse position modulation (SCPPM) encoded information sequence. The decoder takes as input a sequence of four bit log-likelihood ratios (LLR) for each PPM slot in a codeword via a XAUI 10-Gb/s quad optical fiber interface. If the decoder is unavailable, it passes the LLRs on to the next decoder via a XAUI 10-Gb/s quad optical fiber interface. Otherwise, it decodes the sequence and outputs information bits through a 1-GB/s Ethernet UDP/IP (User Datagram Protocol/Internet Protocol) interface. The throughput for a single decoder unit is 150-Mb/s at an average of four decoding iterations; by connecting a number of decoder units in series, a decoding rate equal to that of the aggregate rate is achieved. The unit is controlled through a 1-GB/s Ethernet UDP/IP interface. This ground station decoder was developed to demonstrate a deep space optical communication link capability, and is unique in the scalable design to achieve real-time SCPP decoding at the aggregate data rate.

  17. Application of SNMP on CATV

    NASA Astrophysics Data System (ADS)

    Huang, Hong-bin; Liu, Wei-ping; Chen, Shun-er; Zheng, Liming

    2005-02-01

    A new type of CATV network management system developed by universal MCU, which supports SNMP, is proposed in this paper. From the point of view in both hardware and software, the function and method of every modules inside the system, which include communications in the physical layer, protocol process, data process, and etc, are analyzed. In our design, the management system takes IP MAN as data transmission channel and every controlled object in the management structure has a SNMP agent. In the SNMP agent developed, there are four function modules, including physical layer communication module, protocol process module, internal data process module and MIB management module. In the paper, the structure and function of every module are designed and demonstrated while the related hardware circuit, software flow as well as the experimental results are tested. Furthermore, by introducing RTOS into the software programming, the universal MCU procedure can conducts such multi-thread management as fast Ethernet controller driving, TCP/IP process, serial port signal monitoring and so on, which greatly improves efficiency of CPU.

  18. The anti-CMS technique for genome-wide mapping of 5-hydroxymethylcytosine.

    PubMed

    Huang, Yun; Pastor, William A; Zepeda-Martínez, Jorge A; Rao, Anjana

    2012-10-01

    5-Hydroxymethylcytosine (5hmC) is a recently discovered base in the mammalian genome, produced upon oxidation of 5-methylcytosine (5mC) in a process catalyzed by TET proteins. The biological functions of 5hmC and further oxidation products of 5mC are under intense investigation, as they are likely intermediates in DNA demethylation pathways. Here we describe a novel protocol to profile 5hmC at a genome-wide scale. This approach is based on sodium bisulfite-mediated conversion of 5hmC to cytosine-5-methylenesulfonate (CMS); CMS-containing DNA fragments are then immunoprecipitated using a CMS-specific antiserum. The anti-CMS technique is highly specific with a low background, and is much less dependent on 5hmC density than anti-5hmC immunoprecipitation (IP). Moreover, it does not enrich for CA and CT repeats, as noted for 5hmC DNA IP using antibodies to 5hmC. The anti-CMS protocol takes 3 d to complete.

  19. An evaluation of the opportunities for collaborative practice occurring in and the impact of interprofessional education on advanced pharmacy practice experiences.

    PubMed

    Umland, Elena M; Valenzano, Jonathan; Brown, Caitlin; Giordano, Carolyn

    2017-05-01

    To evaluate the impact of interprofessional (IP) education (IPE) programs during the first three years of a four-year doctor of pharmacy program on student preparedness and ability to function as a collaborative team member and to garner student feedback on collaboration experienced during the Advanced Pharmacy Practice Experiences (APPEs). Likert scale based statements and open-ended questions were added to the student course evaluations for the APPEs for two graduating classes of students. Quantitative data were analyzed using SPSS (repeated measures ANOVA and MANOVA). Thematic analysis by three reviewers reaching consensus was used to evaluate the qualitative data. Students reported being well prepared for IP collaboration (average ratings ranged from a mean of 3.37-3.46 on a scale of 1-4; 1=not at all prepared and 4=very well prepared). On average, students spent 26-50% of their time working with colleagues from other healthcare professions. In describing their preparedness for IP collaboration, the IP core competency of teams/teamwork was addressed in 50% of the submitted responses. The competencies of values/ethics, roles/responsibilities and IP communication were addressed by 2%, 20% and 28% of the written responses, respectively. Required longitudinal IP programs in the first three years of the pharmacy curriculum contribute to the students' perceived preparedness for collaborative practice during their APPEs. Developing practice sites to increase the opportunities for students to practice collaboratively is key. Further education of and emphasis by preceptors relative to the IPE competencies is desired. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. β-Hydroxy-β-methylbutyrate (HMB)-free acid attenuates circulating TNF-α and TNFR1 expression postresistance exercise.

    PubMed

    Townsend, Jeremy R; Fragala, Maren S; Jajtner, Adam R; Gonzalez, Adam M; Wells, Adam J; Mangine, Gerald T; Robinson, Edward H; McCormack, William P; Beyer, Kyle S; Pruna, Gabriel J; Boone, Carleigh H; Scanlon, Tyler M; Bohner, Jonathan D; Stout, Jeffrey R; Hoffman, Jay R

    2013-10-15

    The purpose of this study was to examine the effect of β-hydroxy-β-methylbutyrate-free acid (HMB-FA) and cold-water immersion (CWI) on circulating concentrations of TNF-α and monocyte TNF-α receptor 1 (TNFR1) expression. Forty resistance-trained men (22.3 ± 2.4 yr) were randomized into four groups [placebo (PL), HMB-FA, CWI, and HMB-FA-CWI] and performed an acute, intense exercise protocol (four sets of up to 10 repetitions of the squat, dead lift, and split squat). Participants also performed four sets of up to 10 repetitions of the squat at 24 and 48 h following the initial exercise bout. Blood was sampled before exercise (PRE), immediately postexercise (IP), and 30 min, 24 h, and 48 h postexercise (30P, 24P, and 48P, respectively). Circulating TNF-α was assayed, and TNFR1 expression on CD14+ monocytes was measured by flow cytometry. The exercise protocol significantly elevated TNF-α in only PL (P = 0.006) and CWI (P = 0.045) IP. Mean percent changes show that TNF-α significantly increased from PRE to IP for only PL and CWI groups (P < 0.05), whereas the percent change of TNF-α for HMB-FA and HMB-FA-CWI was not significant. TNFR1 expression was elevated in PL (P = 0.023) and CWI (P = 0.02) at 30P compared with PRE, whereas both HMB-FA-treated groups did not increase significantly. In conclusion, HMB-FA attenuated circulating TNF-α IP and TNFR1 expression during recovery compared with PL and CWI. HMB-FA supplementation may attenuate the initial immune response to intense exercise, which may reduce recovery time following intense exercise.

  1. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets

    PubMed Central

    Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently. PMID:28968450

  2. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    PubMed

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  3. Incommunicado detention and torture in Spain:Part I: The Istanbul Protocol Project in the Basque Country.

    PubMed

    2016-01-01

    There is increasing evidence to show that torture is a serious problem in the Basque Country. Whilst such evidence can be found in reports of international human rights monitoring bodies, sentences of Spanish and international courts, and empirical studies, they are limited in not having followed the Istanbul Protocol (IP) in order to evaluate the reliability of torture. A working group composed of professional associations of psychiatrists, psychologists, physicians and lawyers, in collaboration with the University of the Basque Country, conducted a four-year study on the medical and psychological consequences of torture in incommunicado detainees, including an assessment of credibility in line with the IP. The methodological design included a multi-level peerreviewed blind assessment and input by an external expert (from the Independent Forensic Expert Group facilitated by International Rehabilitation Council for Torture Victims (IRCT)). A sample of 45 Basque people held in short-term incommunicado detention under anti-terrorist legislation (between 1980 and 2012) in Spain who had reported ill-treatment or torture was selected. The findings are divided into four papers: the present introductory paper; the second analyses the credibility of the allegations of torture and introduces an innovative methodology that enhances the IP, the Standardized Evaluation Form (SEC); the third provides an analysis of the methods of torture and introduces the concept of Torturing Environments; and, in the last paper, the psychological and psychiatric consequences of incommunicado detention are analyzed. The collection of papers are intended to be useful not only in the documentation of torture in the Basque Country and Spain, but also as an innovative example of how the IP can be used for research purposes.

  4. Validation of the Beneware model ABP-021 ambulatory blood pressure monitor according to the revised 2010 European Society of hypertension international protocol.

    PubMed

    Pereira, Telmo; Guimarães, João

    2018-06-11

    This study aimed to evaluate the accuracy of the Beneware model ABP-021 oscillometric blood pressure monitor in the general population according to the European Society of Hypertension International Protocol (ESH-IP). The accuracy of the device was assessed in relation to various clinical variables, including age, sex, BMI, and arm circumference. Thirty-three individuals (18 men and 15 women), with a mean age of 36±14 years (age range: 20-68 years), were studied according to the recommendations of the ESH-IP. Sequential same-arm blood pressure measurements were performed, alternating between a mercury standard and the automatic device. The differences among the test-control measurements were assessed and divided into categorization zones of 5, 10, and 15 mmHg discrepancy. The device complied with the quality requirements of the ESH-IP. The device-observer disagreement was -1.2±4.7 mmHg for systolic blood pressure (SBP) and -1.7±4.3 mmHg for diastolic blood pressure (DBP). The device produced 77, 93, and 98 measurements, respectively, within the 5, 10, and 15 mmHg discrepancy limits for SBP. For DBP, 80, 97, and 99 measurements were observed within the 5, 10, and 15 mmHg discrepancy limits. The number of participants with two or three of the device-observer differences within 5 mmHg was 26 for SBP and 29 for DBP, whereas there were only two participants with no device-observer differences within 5 mmHg for DBP. These data show that the Beneware model ABP-021 monitor meets the requirements of the ESH-IP, in static conditions, indicating its suitability for measuring blood pressure in the general adult population.

  5. Validation of the iHealth BP5 wireless upper arm blood pressure monitor for self-measurement according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Shang, Fujun; Zhu, Yizheng; Zhu, Zhenlai; Liu, Lei; Wan, Yi

    2013-10-01

    The aim of this study was to validate the iHealth BP5 wireless upper arm blood pressure (BP) monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010. The ESH-IP revision 2010 for validation of BP measuring devices in adults was followed precisely. A total of 99 pairs of test device and reference BP measurements (three pairs for each of the 33 participants) were obtained in the study. The device produced 71, 89, and 97 measurements within 5, 10, and 15 mmHg for systolic blood pressure (SBP) and 73, 90, and 99 mmHg for diastolic blood pressure (DBP), respectively. The mean ± SD device-observer difference was -1.21 ± 5.87 mmHg for SBP and -1.04 ± 5.28 mmHg for DBP. The number of participants with two or three device-observer differences within 5 mmHg was 25 for SBP and 28 for DBP. In addition, three participants had no device-observer difference within 5 mmHg for SBP and none of the participants had the same for DBP. According to the validation results on the basis of the ESH-IP revision 2010, the iHealth BP5 wireless upper arm BP monitor can be recommended for self/home measurement in an adult population.

  6. Validation of the Medipro MediCare 100f upper arm blood pressure monitor, for self-measurement, according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Yi, Jun; Wan, Yi; Pan, Feng; Yu, Xiaorong; Zhao, Huadong; Shang, Fujun; Xu, Yongyong

    2011-08-01

    The validation of sphygmomanometer is important in accurate blood pressure measurement. This study presents the validation results by the Medipro MediCare 100f upper arm blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010. The ESH-IP revision 2010 for the validation of blood pressure measuring devices in adults was followed precisely. A total of 99 couples of test device and reference blood pressure measurements were obtained during the study (three pairs for each of the 33 participants). The device produced 73, 93, and 98 measurements within 5, 10, and 15 mmHg for systolic blood pressure (SBP) and 79, 93, and 96 for diastolic blood pressure (DBP), respectively. The mean standard deviation device-observer difference was 1.4 ± 5.2 mmHg for SBP and 0.02±5.8 mmHg for DBP. The number of participants with two or three of the device-observer differences within 5 mmHg was 24 for SBP and 30 for DBP, whereas there was no participant with none of the device-observer differences within 5 mmHg. According to the results of the validation study based on the ESH-IP revision 2010, the Medipro MediCare 100f can be recommended for self-measurement in an adult population.

  7. Data transmission protocol for Pi-of-the-Sky cameras

    NASA Astrophysics Data System (ADS)

    Uzycki, J.; Kasprowicz, G.; Mankiewicz, M.; Nawrocki, K.; Sitek, P.; Sokolowski, M.; Sulej, R.; Tlaczala, W.

    2006-10-01

    The large amount of data collected by the automatic astronomical cameras has to be transferred to the fast computers in a reliable way. The method chosen should ensure data streaming in both directions but in nonsymmetrical way. The Ethernet interface is very good choice because of its popularity and proven performance. However it requires TCP/IP stack implementation in devices like cameras for full compliance with existing network and operating systems. This paper describes NUDP protocol, which was made as supplement to standard UDP protocol and can be used as a simple-network protocol. The NUDP does not need TCP protocol implementation and makes it possible to run the Ethernet network with simple devices based on microcontroller and/or FPGA chips. The data transmission idea was created especially for the "Pi of the Sky" project.

  8. Mobile Router Developed and Tested

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2002-01-01

    The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP subnetworks. This is essential in many wireless networks. A mobile router, unlike a mobile IP node, allows entire networks to roam. Hence, a device connected to the mobile router does not need to be a mobile node because the mobile router provides the roaming capabilities. There are three basic elements in the mobile IP: the home agent, the foreign agent, and the mobile node. The home agent is a router on a mobile node's home network that tunnels datagrams for delivery to the mobile node when it is away from home. The foreign agent is a router on a remote network that provides routing services to a registered mobile node. The mobile node is a host or router that changes its point of attachment from one network or subnetwork to another. In mobile routing, virtual communications are maintained by the home agent, which forwards all packets for the mobile networks to the foreign agent. The foreign agent passes the packets to the mobile router, which then forwards the packets to the devices on its networks. As the mobile router moves, it will register with its home agent on its whereabouts via the foreign agent to assure continuous connectivity.

  9. 47 CFR 54.500 - Terms and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and state agencies that provides free or reduced price lunches to economically disadvantaged children... Management and Budget is eligible for a free lunch. (j) Pre-discount price. The “pre-discount price” means... service such as cellular, interconnected voice over Internet protocol (VoIP), and the circuit capacity...

  10. Research of x-ray nondestructive detector for high-speed running conveyor belt with steel wire ropes

    NASA Astrophysics Data System (ADS)

    Wang, Junfeng; Miao, Changyun; Wang, Wei; Lu, Xiaocui

    2008-03-01

    An X-ray nondestructive detector for high-speed running conveyor belt with steel wire ropes is researched in the paper. The principle of X-ray nondestructive testing (NDT) is analyzed, the general scheme of the X-ray nondestructive testing system is proposed, and the nondestructive detector for high-speed running conveyor belt with steel wire ropes is developed. The hardware of system is designed with Xilinx's VIRTEX-4 FPGA that embeds PowerPC and MAC IP core, and its network communication software based on TCP/IP protocol is programmed by loading LwIP to PowerPC. The nondestructive testing of high-speed conveyor belt with steel wire ropes and network transfer function are implemented. It is a strong real-time system with rapid scanning speed, high reliability and remotely nondestructive testing function. The nondestructive detector can be applied to the detection of product line in industry.

  11. Voice over internet protocol with prepaid calling card solutions

    NASA Astrophysics Data System (ADS)

    Gunadi, Tri

    2001-07-01

    The VoIP technology is growing up rapidly, it has big network impact on PT Telkom Indonesia, the bigger telecommunication operator in Indonesia. Telkom has adopted VoIP and one other technology, Intelligent Network (IN). We develop those technologies together in one service product, called Internet Prepaid Calling Card (IPCC). IPCC is becoming new breakthrough for the Indonesia telecommunication services especially on VoIP and Prepaid Calling Card solutions. Network architecture of Indonesia telecommunication consists of three layer, Local, Tandem and Trunck Exchange layer. Network development researches for IPCC architecture are focus on network overlay hierarchy, Internet and PSTN. With this design hierarchy the goal of Interworking PSTN, VoIP and IN calling card, become reality. Overlay design for IPCC is not on Trunck Exchange, this is the new architecture, these overlay on Tandem and Local Exchange, to make the faster call processing. The nodes added: Gateway (GW) and Card Management Center (CMC) The GW do interfacing between PSTN and Internet Network used ISDN-PRA and Ethernet. The other functions are making bridge on circuit (PSTN) with packet (VoIP) based and real time billing process. The CMC used for data storage, pin validation, report activation, tariff system, directory number and all the administration transaction. With two nodes added the IPCC service offered to the market.

  12. Filtering SPAM in P2PSIP Communities with Web of Trust

    NASA Astrophysics Data System (ADS)

    Heikkilä, Juho; Gurtov, Andrei

    Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.

  13. SU-C-9A-06: The Impact of CT Image Used for Attenuation Correction in 4D-PET

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Y; Bowsher, J; Yan, S

    2014-06-01

    Purpose: To evaluate the appropriateness of using 3D non-gated CT image for attenuation correction (AC) in a 4D-PET (gated PET) imaging protocol used in radiotherapy treatment planning simulation. Methods: The 4D-PET imaging protocol in a Siemens PET/CT simulator (Biograph mCT, Siemens Medical Solutions, Hoffman Estates, IL) was evaluated. CIRS Dynamic Thorax Phantom (CIRS Inc., Norfolk, VA) with a moving glass sphere (8 mL) in the middle of its thorax portion was used in the experiments. The glass was filled with {sup 18}F-FDG and was in a longitudinal motion derived from a real patient breathing pattern. Varian RPM system (Varian Medicalmore » Systems, Palo Alto, CA) was used for respiratory gating. Both phase-gating and amplitude-gating methods were tested. The clinical imaging protocol was modified to use three different CT images for AC in 4D-PET reconstruction: first is to use a single-phase CT image to mimic actual clinical protocol (single-CT-PET); second is to use the average intensity projection CT (AveIP-CT) derived from 4D-CT scanning (AveIP-CT-PET); third is to use 4D-CT image to do the phase-matched AC (phase-matching- PET). Maximum SUV (SUVmax) and volume of the moving target (glass sphere) with threshold of 40% SUVmax were calculated for comparison between 4D-PET images derived with different AC methods. Results: The SUVmax varied 7.3%±6.9% over the breathing cycle in single-CT-PET, compared to 2.5%±2.8% in AveIP-CT-PET and 1.3%±1.2% in phasematching PET. The SUVmax in single-CT-PET differed by up to 15% from those in phase-matching-PET. The target volumes measured from single- CT-PET images also presented variations up to 10% among different phases of 4D PET in both phase-gating and amplitude-gating experiments. Conclusion: Attenuation correction using non-gated CT in 4D-PET imaging is not optimal process for quantitative analysis. Clinical 4D-PET imaging protocols should consider phase-matched 4D-CT image if available to achieve better accuracy.« less

  14. The effectiveness of augmented versus standard individual placement and support programs in terms of employment: a systematic literature review.

    PubMed

    Dewa, Carolyn S; Loong, Desmond; Trojanowski, Lucy; Bonato, Sarah

    2018-04-01

    The Individual Placement and Support (IPS) program is a well-studied vocational rehabilitation program. Although it is more effective than usual care, it is not effective for everyone. This offers an opportunity for program improvement. This systematic literature review examines the state of knowledge regarding the effectiveness of augmented versus standard IPS for people with severe mental illness (SMI). We address the questions, "What IPS augmentations have been tested?" and "What is the evidence for the effectiveness of augmented IPS versus standard IPS in terms of employment?" This systematic literature review used publically available peer-reviewed studies published between January 2002 and January 2016 in either: (1) Medline Current, (2) Medline In-process, (3) PsycINFO, (4) Econlit or (5) Web of Science. 5718 unique citations were identified; seven articles from five studies were included. Of these studies, four were rated as having moderate risk of bias and one as having high risk. The results suggest that augmentations of IPS focusing on cognitive and psychosocial skills training, may have additional effects to standard IPS. Areas in need of further research related to the process and targeting of those interventions are discussed.

  15. Quality of Service in Networks Supporting Cultural Multimedia Applications

    ERIC Educational Resources Information Center

    Kanellopoulos, Dimitris N.

    2011-01-01

    Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…

  16. Enhancing Online Education Using Collaboration Solutions

    ERIC Educational Resources Information Center

    Ge, Shuzhi Sam; Tok, Meng Yong

    2003-01-01

    With the advances in Internet technologies, online education is fast gaining ground as an extension to traditional education. Webcast allows lectures conducted on campus to be viewed by students located at remote sites by streaming the audio and video content over Internet Protocol (IP) networks. However when used alone, webcast does not provide…

  17. Audio/ Videoconferencing Packages: Low Cost

    ERIC Educational Resources Information Center

    Treblay, Remy; Fyvie, Barb; Koritko, Brenda

    2005-01-01

    A comparison was conducted of "Voxwire MeetingRoom" and "iVocalize" v4.1.0.3, both Web-conferencing products using voice-over-Internet protocol (VoIP) to provide unlimited, inexpensive, international audio communication, and high-quality Web-conferencing fostering collaborative learning. The study used the evaluation criteria used in earlier…

  18. Surveillance Jumps on the Network

    ERIC Educational Resources Information Center

    Raths, David

    2011-01-01

    Internet protocol (IP) network-based cameras and digital video management software are maturing, and many issues that have surrounded them, including bandwidth, data storage, ease of use, and integration are starting to become clearer as the technology continues to evolve. Prices are going down and the number of features is going up. Many school…

  19. CALEA: Prepare for the Worst, Hope for the Best

    ERIC Educational Resources Information Center

    Wigen, Wendy

    2006-01-01

    On August 5, 2005, nearly a year since requesting public comment on the issue, the Federal Communications Commission (FCC) voted to extend the Communications Assistance for Law Enforcement Act (CALEA) to broadband Internet and interconnected Voice-over-Internet Protocol (VoIP) providers. This includes college and university campus networks, as…

  20. Effective Leadership and Management of an ACS Injury Prevention Program: Current Opinions and Perspectives From Where the Rubber Meets the Road.

    PubMed

    Wolfe, Elizabeth S; Bryant, Elizabeth A

    The American College of Surgeons (ACS) mandates that each verified trauma center must have an injury prevention coordinator (IPC); however, Chapter 18 in the Resources for Optimal Care of the Injured Patient (2014) provides minimal information on how to effectively lead or manage an injury prevention (IP) program. This opinion article addresses 3 fundamental components of an effective IP program: (1) construction of an innovative vision of IP programming using current technology; (2) intentional investment and involvement; and (3) stakeholder leadership, engagement, and sustainability. This article also provides leadership and management methods from other professions both within and outside of the health care field that can be translated into sustainable IP program planning, implementation, and longevity.

  1. Improved Peritoneal Cavity and Abdominal Organ Imaging Using a Biphasic Contrast Agent Protocol and Spectral Photon Counting Computed Tomography K-Edge Imaging.

    PubMed

    Si-Mohamed, Salim; Thivolet, Arnaud; Bonnot, Pierre-Emmanuel; Bar-Ness, Daniel; Képénékian, Vahan; Cormode, David P; Douek, Philippe; Rousset, Pascal

    2018-05-23

    To validate in vitro the capability of a high-spatial-resolution prototype spectral photon-counting computed tomography (SPCCT) scanner to differentiate between 2 contrast agents and to assess in vivo the image quality and the feasibility to image the peritoneal cavity in rats using the 2 contrast agents simultaneously within the vascular and peritoneal compartments. The authors performed SPCCT imaging (100 mAs, 120 kVp) with energy bin thresholds set to 30, 51, 64, 72, and 85 keV in vitro on a custom-made polyoxymethylene cylindrical phantom consisting of tubes with dilutions of both contrast agents and in vivo on 2 groups of adult rats using 2 injection protocols. Approval from the institutional animal ethics committee was obtained. One group received macrocylic gadolinium chelate intraperitoneal (IP) and iodine intravenous (IV) injections (protocol A, n = 3), whereas the second group received iodine IP and gadolinium IV (protocol B, n = 3). Helical scans were performed 35 minutes after IP injection and 20 seconds after IV injection. The SPCCT and contrast material images, that is, iodine and gadolinium maps, were reconstructed with a field of view of 160 mm, an isotropic voxel size of 250 μm, and a matrix size of 640 × 640 pixels using a soft reconstruction kernel. The SPCCT images were reconstructed with 2 different spatial resolutions to compare the image quality (sharpness, diagnostic quality, and organ visualization) of SPCCT (250 μm) with single-energy computed tomography (CT) (600 μm). Two radiologists evaluated the peritoneal opacification index in 13 regions (score = 0-3 per region) on each type of image. Concentrations of contrast agents were measured in the organs of interest. In vitro, the concentration measurements correlated well with the expected concentrations. The linear regressions both had R values of 0.99, slopes of 0.84 and 0.87, and offsets at -0.52 and -0.38 mg/mL for iodine and gadolinium, respectively. In vivo, the SPCCT images were of better diagnostic quality, with increased sharpness compared with the CT-like images (P < 0.0001). Intraperitoneal diffusion was excellent, with similar peritoneal opacification index on SPCCT images and overlay of contrast material maps (P = 1) without a significant difference between protocol A (37.0 ± 1.7) and protocol B (35.3 ± 1.5) (P = 0.34). Only the contrast material maps demonstrated clear visual separation of the contrast agents, allowing specific quantification of the physiological enhancement in the liver, spleen, and kidney and the urinary clearance in the renal pelvis and bladder. Renal excretion of the contrast agents injected IP was observed and was consistent with blood diffusion. Spectral photon-counting CT can be used to perform a complete peritoneal dual-contrast protocol, enabling a good assessment of the peritoneal cavity and abdominal organs in rats.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.

  2. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  3. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  4. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  5. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  6. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  7. A Multidisciplinary Biospecimen Bank of Renal Cell Carcinomas Compatible with Discovery Platforms at Mayo Clinic, Scottsdale, Arizona

    PubMed Central

    Ho, Thai H.; Nateras, Rafael Nunez; Yan, Huihuang; Park, Jin G.; Jensen, Sally; Borges, Chad; Lee, Jeong Heon; Champion, Mia D.; Tibes, Raoul; Bryce, Alan H.; Carballido, Estrella M.; Todd, Mark A.; Joseph, Richard W.; Wong, William W.; Parker, Alexander S.; Stanton, Melissa L.; Castle, Erik P.

    2015-01-01

    To address the need to study frozen clinical specimens using next-generation RNA, DNA, chromatin immunoprecipitation (ChIP) sequencing and protein analyses, we developed a biobank work flow to prospectively collect biospecimens from patients with renal cell carcinoma (RCC). We describe our standard operating procedures and work flow to annotate pathologic results and clinical outcomes. We report quality control outcomes and nucleic acid yields of our RCC submissions (N=16) to The Cancer Genome Atlas (TCGA) project, as well as newer discovery platforms, by describing mass spectrometry analysis of albumin oxidation in plasma and 6 ChIP sequencing libraries generated from nephrectomy specimens after histone H3 lysine 36 trimethylation (H3K36me3) immunoprecipitation. From June 1, 2010, through January 1, 2013, we enrolled 328 patients with RCC. Our mean (SD) TCGA RNA integrity numbers (RINs) were 8.1 (0.8) for papillary RCC, with a 12.5% overall rate of sample disqualification for RIN <7. Banked plasma had significantly less albumin oxidation (by mass spectrometry analysis) than plasma kept at 25°C (P<.001). For ChIP sequencing, the FastQC score for average read quality was at least 30 for 91% to 95% of paired-end reads. In parallel, we analyzed frozen tissue by RNA sequencing; after genome alignment, only 0.2% to 0.4% of total reads failed the default quality check steps of Bowtie2, which was comparable to the disqualification ratio (0.1%) of the 786-O RCC cell line that was prepared under optimal RNA isolation conditions. The overall correlation coefficients for gene expression between Mayo Clinic vs TCGA tissues ranged from 0.75 to 0.82. These data support the generation of high-quality nucleic acids for genomic analyses from banked RCC. Importantly, the protocol does not interfere with routine clinical care. Collections over defined time points during disease treatment further enhance collaborative efforts to integrate genomic information with outcomes. PMID:26181416

  8. Effect of aerobic recovery intensity on delayed-onset muscle soreness and strength.

    PubMed

    Tufano, James J; Brown, Lee E; Coburn, Jared W; Tsang, Kavin K W; Cazas, Vanessa L; LaPorta, Joe W

    2012-10-01

    Because of the performance decrements associated with delayed-onset muscle soreness (DOMS), a treatment to alleviate its symptoms is of great interest. The purpose of this study was to investigate the effect of low vs. moderate-intensity aerobic recovery on DOMS and strength. Twenty-six women (22.11 ± 2.49 years; 60.33 ± 8.37 kg; and 163.83 ± 7.29 cm) were split into 3 different groups and performed a DOMS-inducing protocol of 60 eccentric actions of the knee extensors followed by 1 of three 20-minute recovery interventions: moderate-intensity cycling (n = 10), low-intensity cycling (LIC; n = 10), or seated rest (CON; n = 6) after the eccentric protocol. Pain scale (PS), isometric strength (ISO), and dynamic strength (PT) were recorded before (PRE), immediately post (IP), 24- (24h), 48- (48h), 72- (72h), and 96- (96h) hours after exercise. For PT, PRE, 48h, 72h, and 96h were significantly (p < 0.05) greater than IP values but not different from 24h. For PS, IP (4.83 ± 0.36) was greater than that for all other time periods, whereas 24h (2.91 ± 0.42), 48h (2.62 ± 0.53), and 72h (1.97 ± 0.49) were all greater than PRE (0.44 ± 0.19) values. Also, 24h and 48h were not different but were both greater than 72h and 96h (1.13 ± 0.32), whereas 72h was >96h. For ISO, neither CON nor LIC showed any significant difference across time. Moderate-intensity cycling showed no difference between PRE (189.88 ± 40.68), IP (193.75 ± 47.24), 24h (186.52 ± 53.55), or 48h (195.36 ± 55.06), but 72h (210.05 ± 53.57) and 96h (207.78 ± 59.99) were significantly >24h. The 72h was also greater than IP. Therefore, moderate-intensity aerobic recovery may be suggested after eccentric muscle actions.

  9. Intraperitoneal bupivacaine with or without incisional bupivacaine for postoperative analgesia in dogs undergoing ovariohysterectomy.

    PubMed

    Kalchofner Guerrero, Karin S; Campagna, Ivo; Bruhl-Day, Rodolfo; Hegamin-Younger, Cecilia; Guerrero, Tomas G

    2016-09-01

    Intraperitoneal (IP) bupivacaine provides postoperative analgesia in dogs undergoing ovariohysterectomy (OHE) alone or in combination with incisional (INC) bupivacaine. This study investigated whether the combination of INC and IP bupivacaine is superior to IP bupivacaine alone. Prospective, randomized, blinded clinical study. Thirty-nine privately owned dogs undergoing OHE, aged 25 ± 23 months and weighing 11.8 ± 5.7 kg. Dogs were premedicated with acepromazine (0.05 mg kg(-1) ) and morphine (0.5 mg kg(-1) ) intramuscularly (IM); anaesthesia was induced with propofol and maintained with isoflurane in oxygen. Carprofen (4 mg kg(-1) ) was administered subcutaneously (SC) after intubation. Bupivacaine (3 mg kg(-1) ) IP was administered before complete closure of the linea alba to all dogs. Dogs were randomly assigned into two groups: group B received bupivacaine (n = 20; 1 mg kg(-1) ) and group S received saline (n = 19; 0.2 mL kg(-1) ) INC as a subcutaneous 'splash' before skin closure. Postoperative analgesia was assessed with a dynamic interactive visual analogue scale, the short form of the Glasgow Composite Pain Scale, and mechanical nociceptive threshold (MNT) measurement at 0.5, 1, 2, 4, 6, 8, 12 and 20 hours after surgery by one blinded observer. Parametric data were tested using t-test; nonparametric data were analysed using the two-sample Wilcoxon test (p < 0.05). There was no significant difference between groups with regard to age, weight, surgical and anaesthetic duration, incision length, sedation and pain scores. MNT values decreased in both groups at all time points as compared with the baseline. No dog required rescue analgesia. No postoperative complications were observed. Bupivacaine IP and carprofen SC after morphine IM did provide satisfactory postoperative analgesia in dogs undergoing OHE with the anaesthetic protocol used. There appears to be no clinical advantage to adding bupivacaine INC. Neither protocol could prevent the development of primary hyperalgesia. © 2016 Association of Veterinary Anaesthetists and the American College of Veterinary Anesthesia and Analgesia.

  10. Chromatin immunoprecipitation (ChIP) method for non-model fruit flies (Diptera: Tephritidae) and evidence of histone modifications.

    PubMed

    Nagalingam, Kumaran; Lorenc, Michał T; Manoli, Sahana; Cameron, Stephen L; Clarke, Anthony R; Dudley, Kevin J

    2018-01-01

    Interactions between DNA and proteins located in the cell nucleus play an important role in controlling physiological processes by specifying, augmenting and regulating context-specific transcription events. Chromatin immunoprecipitation (ChIP) is a widely used methodology to study DNA-protein interactions and has been successfully used in various cell types for over three decades. More recently, by combining ChIP with genomic screening technologies and Next Generation Sequencing (e.g. ChIP-seq), it has become possible to profile DNA-protein interactions (including covalent histone modifications) across entire genomes. However, the applicability of ChIP-chip and ChIP-seq has rarely been extended to non-model species because of a number of technical challenges. Here we report a method that can be used to identify genome wide covalent histone modifications in a group of non-model fruit fly species (Diptera: Tephritidae). The method was developed by testing and refining protocols that have been used in model organisms, including Drosophila melanogaster. We demonstrate that this method is suitable for a group of economically important pest fruit fly species, viz., Bactrocera dorsalis, Ceratitis capitata, Zeugodacus cucurbitae and Bactrocera tryoni. We also report an example ChIP-seq dataset for B. tryoni, providing evidence for histone modifications in the genome of a tephritid fruit fly for the first time. Since tephritids are major agricultural pests globally, this methodology will be a valuable resource to study taxa-specific evolutionary questions and to assist with pest management. It also provides a basis for researchers working with other non-model species to undertake genome wide DNA-protein interaction studies.

  11. Structural Exploration of Quinazolin-4(3H)-ones as Anticonvulsants: Rational Design, Synthesis, Pharmacological Evaluation, and Molecular Docking Studies.

    PubMed

    Ugale, Vinod G; Bari, Sanjay B

    2016-11-01

    Anticonvulsants effective against multiple seizures are of wide interest as antiepileptic drugs, especially if active against pharmaco-resistant seizures. Herein, we synthesized 16 different, rationally designed 2-((6,7-dimethoxy-4-oxo-2-phenylquinazolin-3(4H)-yl)amino)-N-(substituted phenyl)acetamides and screened for anticonvulsant activities through in vivo experiments. Compound 4d emerged as prototype with excellent anti-seizure action in mice against electroshock, chemically induced and pharmaco-resistant 6-Hz seizure models with no symptoms of neurotoxicity and hepatotoxicity (ED 50  = 23.5 mg/kg, MES, mice, i.p.; ED 50  = 32.6 mg/kg, scPTZ, mice, i.p.; ED 50  = 45.2 mg/kg, 6-Hz, mice, i.p.; TD 50  = 325.9 mg/kg, mice, i.p.). In addition, investigation of compound 4l in mice for its pharmacological profile proved it as safer anticonvulsant, devoid of the side effects such as motor dysfunction and hepatotoxicity of classical antiepileptic drugs (ED 50  = 26.1 mg/kg, MES, mice, i.p.; ED 50  = 79.4 mg/kg, scPTZ, mice, i.p.; TD 50  = 361.2 mg/kg, mice, i.p.). We also predicted physiochemical and pharmacokinetic properties of structurally optimized quinazolin-4(3H)-ones by a computational protocol. A combination of in vivo anticonvulsant profile, ex vivo toxicity, and in silico studies suggested that the synthesized compounds may be useful as broad-spectrum anti-seizure drug candidates with favorable pharmacokinetic parameters. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Effects of β-Hydroxy-β-methylbutyrate Free Acid Ingestion and Resistance Exercise on the Acute Endocrine Response

    PubMed Central

    Townsend, Jeremy R.; Hoffman, Jay R.; Gonzalez, Adam M.; Jajtner, Adam R.; Boone, Carleigh H.; Robinson, Edward H.; Mangine, Gerald T.; Wells, Adam J.; Fragala, Maren S.; Fukuda, David H.; Stout, Jeffrey R.

    2015-01-01

    Objective. To examine the endocrine response to a bout of heavy resistance exercise following acute β-hydroxy-β-methylbutyrate free acid (HMB-FA) ingestion. Design. Twenty resistance trained men were randomized and consumed either 1 g of HMB-FA (BetaTor) or placebo (PL) 30 min prior to performing an acute heavy resistance exercise protocol. Blood was obtained before (PRE), immediately after (IP), and 30 min after exercise (30P). Circulating concentrations of testosterone, growth hormone (GH), insulin-like growth factor (IGF-1), and insulin were assayed. Data were analyzed with a repeated measures ANOVA and area under the curve (AUC) was analyzed by the trapezoidal rule. Results. The resistance exercise protocol resulted in significant elevations from PRE in testosterone (P < 0.01), GH (P < 0.01), and insulin (P = 0.05) at IP, with GH (P < 0.01) and insulin (P < 0.01) remaining elevated at 30P. A significant interaction was noted between groups in the plasma GH response at IP, which was significantly higher following HMB-FA compared to PL (P < 0.01). AUC analysis revealed an elevated GH and IGF-1 response in the HMB-FA group compared to PL. Conclusion. HMB-FA prior to resistance exercise augments the GH response to high volume resistance exercise compared to PL. These findings provide further support for the potential anabolic benefits associated with HMB supplementation. PMID:25792982

  13. Adaptation of Hybridization Capture of Chromatin-associated Proteins for Proteomics to Mammalian Cells.

    PubMed

    Guillen-Ahlers, Hector; Rao, Prahlad K; Perumalla, Danu S; Montoya, Maria J; Jadhav, Avinash Y L; Shortreed, Michael R; Smith, Lloyd M; Olivier, Michael

    2018-06-01

    The hybridization capture of chromatin-associated proteins for proteomics (HyCCAPP) technology was initially developed to uncover novel DNA-protein interactions in yeast. It allows analysis of a target region of interest without the need for prior knowledge about likely proteins bound to the target region. This, in theory, allows HyCCAPP to be used to analyze any genomic region of interest, and it provides sufficient flexibility to work in different cell systems. This method is not meant to study binding sites of known transcription factors, a task better suited for Chromatin Immunoprecipitation (ChIP) and ChIP-like methods. The strength of HyCCAPP lies in its ability to explore DNA regions for which there is limited or no knowledge about the proteins bound to it. It can also be a convenient method to avoid biases (present in ChIP-like methods) introduced by protein-based chromatin enrichment using antibodies. Potentially, HyCCAPP can be a powerful tool to uncover truly novel DNA-protein interactions. To date, the technology has been predominantly applied to yeast cells or to high copy repeat sequences in mammalian cells. In order to become the powerful tool we envision, HyCCAPP approaches need to be optimized to efficiently capture single-copy loci in mammalian cells. Here, we present our adaptation of the initial yeast HyCCAPP capture protocol to human cell lines, and show that single-copy chromatin regions can be efficiently isolated with this modified protocol.

  14. 78 FR 8030 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Copy and Printing, Inc., Portals II, 445 12th Street, SW., Room CY-B402, Washington, DC 20554... . To request materials in accessible formats for people with disabilities (Braille, large print..., 127 F.3d 90, 94 (DC Cir. 1997) (``an interpretive rule can construe an agency's substantive regulation...

  15. We'll Take It from Here: Further Developments We'd Like To See in Virtual Reference Software.

    ERIC Educational Resources Information Center

    Coffman, Steven

    2001-01-01

    Discussion of virtual reference services focuses on software that is currently available and further developments that are needed. Topics include co-browsing and collaboration capabilities; communications technology, including chat technology and voice over Internet protocol (VoIP); networked reference services; and online reference collections…

  16. One Server Fits All

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    The benefits of deploying a communications system that runs over the Internet Protocol are well documented. Sending voice over the Internet, a process commonly known as VoIP, has been shown to save money on long distance calls, make voice mail more accessible, and enable users to answer their phones from anywhere. The technology also makes adding…

  17. On the verification of intransitive noninterference in mulitlevel security.

    PubMed

    Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez

    2005-10-01

    We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.

  18. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  19. Architectural and engineering issues for building an optical Internet

    NASA Astrophysics Data System (ADS)

    St. Arnaud, Bill

    1998-10-01

    Recent developments in high density Wave Division Multiplexing fiber systems allows for the deployment of a dedicated optical Internet network for large volume backbone pipes that does not require an underlying multi-service SONET/SDH and ATM transport protocol. Some intrinsic characteristics of Internet traffic such as its self similar nature, server bound congestion, routing and data asymmetry allow for highly optimized traffic engineered networks using individual wavelengths. By transmitting GigaBit Ethernet or SONET/SDH frames natively over WDM wavelengths that directly interconnect high performance routers the original concept of the Internet as an intrinsically survivable datagram network is possible. Traffic engineering, restoral, protection and bandwidth management of the network must now be carried out at the IP layer and so new routing or switching protocols such as MPLS that allow for uni- directional paths with fast restoral and protection at the IP layer become essential for a reliable production network. The deployment of high density WDM municipal and campus networks also gives carriers and ISPs the flexibility to offer customers as integrated and seamless set of optical Internet services.

  20. Highly Expandable Human iPS Cell-Derived Neural Progenitor Cells (NPC) and Neurons for Central Nervous System Disease Modeling and High-Throughput Screening.

    PubMed

    Cheng, Chialin; Fass, Daniel M; Folz-Donahue, Kat; MacDonald, Marcy E; Haggarty, Stephen J

    2017-01-11

    Reprogramming of human somatic cells into induced pluripotent stem (iPS) cells has greatly expanded the set of research tools available to investigate the molecular and cellular mechanisms underlying central nervous system (CNS) disorders. Realizing the promise of iPS cell technology for the identification of novel therapeutic targets and for high-throughput drug screening requires implementation of methods for the large-scale production of defined CNS cell types. Here we describe a protocol for generating stable, highly expandable, iPS cell-derived CNS neural progenitor cells (NPC) using multi-dimensional fluorescence activated cell sorting (FACS) to purify NPC defined by cell surface markers. In addition, we describe a rapid, efficient, and reproducible method for generating excitatory cortical-like neurons from these NPC through inducible expression of the pro-neural transcription factor Neurogenin 2 (iNgn2-NPC). Finally, we describe methodology for the use of iNgn2-NPC for probing human neuroplasticity and mechanisms underlying CNS disorders using high-content, single-cell-level automated microscopy assays. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  1. A native IP satellite communications system

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner-Puschl, S.; Riedler, W.

    2004-08-01

    ≪ In the framework of ESA's ARTES-5 program the Institute of Applied Systems Technology (Joanneum Research) in cooperation with the Department of Communications and Wave Propagation has developed a novel meshed satellite communications system which is optimised for Internet traffic and applications (L*IP—Local Network Interconnection via Satellite Systems Using the IP Protocol Suite). Both symmetrical and asymmetrical connections are supported. Bandwidth on demand and guaranteed quality of service are key features of the system. A novel multi-frequency TDMA access scheme utilises efficient methods of IP encapsulation. In contrast to other solutions it avoids legacy transport network techniques. While the DVB-RCS standard is based on ATM or MPEG transport cells, the solution of the L*IP system uses variable-length cells which reduces the overhead significantly. A flexible and programmable platform based on Linux machines was chosen to allow the easy implementation and adaptation to different standards. This offers the possibility to apply the system not only to satellite communications, but provides seamless integration with terrestrial fixed broadcast wireless access systems. The platform is also an ideal test-bed for a variety of interactive broadband communications systems. The paper describes the system architecture and the key features of the system.

  2. Generic learning skills in academically-at-risk medical students: a development programme bridges the gap.

    PubMed

    Burch, Vanessa C; Sikakana, Cynthia N T; Gunston, Geney D; Shamley, Delva R; Murdoch-Eaton, Deborah

    2013-08-01

    Widening access to medical students from diverse educational backgrounds is a global educational mandate. The impact, on students' generic learning skills profiles, of development programmes designed for students at risk of attrition is unknown. This study investigated the impact of a 12-month Intervention Programme (IP) on the generic learning skills profile of academically-at-risk students who, after failing at the end of the first semester, completed the IP before entering the second semester of a conventional medical training programme. This prospective study surveyed medical students admitted in 2009 and 2010, on entry and on completion of first year, on their reported practice and confidence in information handling, managing own learning, technical and numeracy, computer, organisational and presentation skills. Of 414 first year students, 80 (19%) entered the IP. Levels of practice and confidence for five of the six skills categories were significantly poorer at entry for IP students compared to conventional stream students. In four categories these differences were no longer statistically significant after students had completed the IP; 62 IP students (77.5%) progressed to second year. A 12-month development programme, the IP, effectively addressed generic learning skills deficiencies present in academically-at-risk students entering medical school.

  3. A novel pentadecapeptide, BPC 157, blocks the stereotypy produced acutely by amphetamine and the development of haloperidol-induced supersensitivity to amphetamine.

    PubMed

    Jelovac, N; Sikirić, P; Rucman, R; Petek, M; Perović, D; Konjevoda, P; Marović, A; Seiwerth, S; Grabarević, Z; Sumajstorcić, J; Dodig, G; Perić, J

    1998-04-01

    A novel gastric pentadecapeptide, BPC 157, has been shown to attenuate different lesions (i.e., gastrointestinal tract, liver, pancreas, somatosensory neurons). This suggests an interaction with the dopamine system. When used alone, BPC 157 does not affect gross behavior or induce stereotypy. We first investigated the effect of pentadecapeptide BPC 157 on stereotypy and acoustic startle response in rats, given as either a prophylactic (10 micrograms/kg i.p.) or therapeutic (10 ng/kg i.p.) regimen, with the dopamine indirect agonist amphetamine (10 mg/kg i.p.). There was a marked attenuation of stereotypic behavior and acoustic startle response. When the medication was given at the time of maximum amphetamine-induced excitability, there was a reversal of this behavior. A further focus was on the effect of this pentadecapeptide on increased climbing behavior in mice pretreated with the dopamine antagonist haloperidol (5.0 mg/kg i.p.), and subsequently treated with amphetamine (20 mg/kg i.p. challenge 1, 2, 4, and 10 days after haloperidol pretreatment). This protocol is usually used for the study of behavioral supersensitivity to the amphetamine stimulating effect. An almost complete reversal was noted when pentadecapeptide was coadministered with haloperidol. Together, these data provide compelling evidence for the interaction of pentadecapeptide BPC 157 with the dopamine system.

  4. Preparation of pancreatic β-cells from human iPS cells with small molecules

    PubMed Central

    2012-01-01

    Human induced pluripotent stem (iPS) cells obtained from patients are expected to be a useful source for cell transplantation therapy, because many patients (including those with type 1 diabetes and severe type 2 diabetes) are on waiting lists for transplantation for a long time due to the shortage of donors. At present, many concerns related to clinical application of human iPS cells have been raised, but rapid development of methods for the establishment, culture, and standardization of iPS cells will lead autologous cell therapy to be realistic sooner or later. However, establishment of a method for preparing some of desired cell types is still challenging. Regarding pancreatic β-cells, there have been many reports about differentiation of these cells from human embryonic stem (ES)/iPS cells, but a protocol for clinical application has still not been established. Since there is clear proof that cell transplantation therapy is effective for diabetes based on the results of clinical islet transplantation, pancreatic β-cells prepared from human iPS cells are considered likely to be effective for reducing the burden on patients. In this article, the current status of procedures for preparing pancreatic β-cells from human ES/iPS cells, including effective use of small molecules, is summarized, and some of the problems that still need to be overcome are discussed. PMID:22722666

  5. Arpeggio: harmonic compression of ChIP-seq data reveals protein-chromatin interaction signatures

    PubMed Central

    Stanton, Kelly Patrick; Parisi, Fabio; Strino, Francesco; Rabin, Neta; Asp, Patrik; Kluger, Yuval

    2013-01-01

    Researchers generating new genome-wide data in an exploratory sequencing study can gain biological insights by comparing their data with well-annotated data sets possessing similar genomic patterns. Data compression techniques are needed for efficient comparisons of a new genomic experiment with large repositories of publicly available profiles. Furthermore, data representations that allow comparisons of genomic signals from different platforms and across species enhance our ability to leverage these large repositories. Here, we present a signal processing approach that characterizes protein–chromatin interaction patterns at length scales of several kilobases. This allows us to efficiently compare numerous chromatin-immunoprecipitation sequencing (ChIP-seq) data sets consisting of many types of DNA-binding proteins collected from a variety of cells, conditions and organisms. Importantly, these interaction patterns broadly reflect the biological properties of the binding events. To generate these profiles, termed Arpeggio profiles, we applied harmonic deconvolution techniques to the autocorrelation profiles of the ChIP-seq signals. We used 806 publicly available ChIP-seq experiments and showed that Arpeggio profiles with similar spectral densities shared biological properties. Arpeggio profiles of ChIP-seq data sets revealed characteristics that are not easily detected by standard peak finders. They also allowed us to relate sequencing data sets from different genomes, experimental platforms and protocols. Arpeggio is freely available at http://sourceforge.net/p/arpeggio/wiki/Home/. PMID:23873955

  6. Arpeggio: harmonic compression of ChIP-seq data reveals protein-chromatin interaction signatures.

    PubMed

    Stanton, Kelly Patrick; Parisi, Fabio; Strino, Francesco; Rabin, Neta; Asp, Patrik; Kluger, Yuval

    2013-09-01

    Researchers generating new genome-wide data in an exploratory sequencing study can gain biological insights by comparing their data with well-annotated data sets possessing similar genomic patterns. Data compression techniques are needed for efficient comparisons of a new genomic experiment with large repositories of publicly available profiles. Furthermore, data representations that allow comparisons of genomic signals from different platforms and across species enhance our ability to leverage these large repositories. Here, we present a signal processing approach that characterizes protein-chromatin interaction patterns at length scales of several kilobases. This allows us to efficiently compare numerous chromatin-immunoprecipitation sequencing (ChIP-seq) data sets consisting of many types of DNA-binding proteins collected from a variety of cells, conditions and organisms. Importantly, these interaction patterns broadly reflect the biological properties of the binding events. To generate these profiles, termed Arpeggio profiles, we applied harmonic deconvolution techniques to the autocorrelation profiles of the ChIP-seq signals. We used 806 publicly available ChIP-seq experiments and showed that Arpeggio profiles with similar spectral densities shared biological properties. Arpeggio profiles of ChIP-seq data sets revealed characteristics that are not easily detected by standard peak finders. They also allowed us to relate sequencing data sets from different genomes, experimental platforms and protocols. Arpeggio is freely available at http://sourceforge.net/p/arpeggio/wiki/Home/.

  7. Chromatin immunoprecipitation assays: application of ChIP-on-chip for defining dynamic transcriptional mechanisms in bone cells.

    PubMed

    van der Deen, Margaretha; Hassan, Mohammad Q; Pratap, Jitesh; Teplyuk, Nadiya M; Young, Daniel W; Javed, Amjad; Zaidi, Sayyed K; Lian, Jane B; Montecino, Martin; Stein, Janet L; Stein, Gary S; van Wijnen, Andre J

    2008-01-01

    Normal cell growth and differentiation of bone cells requires the sequential expression of cell type specific genes to permit lineage specification and development of cellular phenotypes. Transcriptional activation and repression of distinct sets of genes support the anabolic functions of osteoblasts and the catabolic properties of osteoclasts. Furthermore, metastasis of tumors to the bone environment is controlled by transcriptional mechanisms. Insights into the transcriptional regulation of genes in bone cells may provide a conceptual basis for improved therapeutic approaches to treat bone fractures, genetic osteopathologies, and/or cancer metastases to bone. Chromatin immunoprecipitation (ChIP) is a powerful technique to establish in vivo binding of transcription factors to the promoters of genes that are either activated or repressed in bone cells. Combining ChIP with genomic microarray analysis, colloquially referred to as "ChIP-on-chip," has become a valuable method for analysis of endogenous protein/DNA interactions. This technique permits assessment of chromosomal binding sites for transcription factors or the location of histone modifications at a genomic scale. This chapter discusses protocols for performing chromatin immunoprecipitation experiments, with a focus on ChIP-on-chip analysis. The information presented is based on the authors' experience with defining interactions of Runt-related (RUNX) transcription factors with bone-related genes within the context of the native nucleosomal organization of intact osteoblastic cells.

  8. Perioperative haemostatic management of haemophilic mice using normal mouse plasma.

    PubMed

    Tatsumi, K; Ohashi, K; Kanegae, K; Shim, I K; Okano, T

    2013-11-01

    Intense haemostatic interventions are required to avoid bleeding complications when surgical procedures are performed on haemophilia patients. The objective of this study was to establish an appropriate protocol for perioperative haemostatic management of haemophilic mice. We assessed the prophylactic haemostatic effects of normal mouse plasma (NMP) on haemophilia B (HB) mice for both a skin flap procedure and a laparotomy. When 500 μL of NMP was administered to the mice, plasma factor IX (FIX:C) levels peaked at 15.1% immediately after intravenous (IV) administration, at 6.1% 2 h after intraperitoneal (IP) administration and at 2.7% 6 h after subcutaneous administration. Administering 500 μL of NMP via IP or IV 30 min in advance enabled the skin flap procedure to be performed safely without any complications. After the laparotomy procedure, several mice in the IP administration group exhibited lethal bleeding, but all mice survived in the IV administration group. Anti-mouse FIX inhibitors did not develop, even after repetitive administrations of NMP. However, human FIX concentrates, especially plasma-derived concentrates, elicited the anti-human FIX inhibitors. The results show that administering 500 μL of NMP via IV or IP 30 min in advance enables surgical procedures to be safely performed on HB mice, and that IV administration is more desirable than IP if the procedure requires opening of the abdominal wall. © 2013 John Wiley & Sons Ltd.

  9. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  10. An analysis of root cause identification and continuous quality improvement in public health H1N1 after-action reports.

    PubMed

    Singleton, Christa-Marie; Debastiani, Summer; Rose, Dale; Kahn, Emily B

    2014-01-01

    To identify the extent to which the Homeland Security Exercise and Evaluation Program's (HSEEP) After Action Report/Improvement Plan (AAR/IP) template was followed by public health entities and facilitated the identification of detailed corrective actions and continuous improvement. Data were drawn from the US H1N1 Public Health Emergency Response (PHER) federal grant awardees (n = 62). After action report/improvement plan text was examined to identify the presence of AAR/IP HSEEP elements and characterized as "minimally complete," "partially complete," or "complete." Corrective actions (CA) and recommendations within the IP focusing on performance deficits were coded as specific, measurable, and time-bound, and whether they were associated with a problem that met root cause criteria and whether the CA/recommendation was intended to address or fix the root cause. A total of 2619 CA/recommendations were identified. More than half (n = 1480, 57%) addressed root causes. Corrective actions/recommendations associated with complete AARs more frequently addressed root cause (58% vs 51%, χ = 9.1, P < 0.003) and were more specific (34% vs 23%, χ = 32.3, P < 0.0001), measurable (30% vs 18%, χ = 37.9, P < 0.0001), and time-bound (38% vs 15%, χ = 115.5, P < 0.0001) than partially complete AARs. The same pattern was not observed with completeness of IPs. Corrective actions and recommendations were similarly specific and measurable. Recommendations significantly addressed root cause more than CAs. Our analysis indicates a possible lack of awardee distinction between CA and recommendations in AARs. As HSEEP adapts to align with the 2011 National Preparedness Goal and National Preparedness System, future HSEEP documents should emphasize the importance of root cause analysis as a required element within AAR documents and templates in the exercise and real incident environment, as well as the need for specific and measurable CAs.

  11. Interobserver reliability of the 'Welfare Quality(®) Animal Welfare Assessment Protocol for Growing Pigs'.

    PubMed

    Czycholl, I; Kniese, C; Büttner, K; Beilage, E Grosse; Schrader, L; Krieter, J

    2016-01-01

    The present paper focuses on evaluating the interobserver reliability of the 'Welfare Quality(®) Animal Welfare Assessment Protocol for Growing Pigs'. The protocol for growing pigs mainly consists of a Qualitative Behaviour Assessment (QBA), direct behaviour observations (BO) carried out by instantaneous scan sampling and checks for different individual parameters (IP), e.g. presence of tail biting, wounds and bursitis. Three trained observers collected the data by performing 29 combined assessments, which were done at the same time and on the same animals; but they were carried out completely independent of each other. The findings were compared by the calculation of Spearman Rank Correlation Coefficients (RS), Intraclass Correlation Coefficients (ICC), Smallest Detectable Changes (SDC) and Limits of Agreements (LoA). There was no agreement found concerning the adjectives belonging to the QBA (e.g. active: RS: 0.50, ICC: 0.30, SDC: 0.38, LoA: -0.05 to 0.45; fearful: RS: 0.06, ICC: 0.0, SDC: 0.26, LoA: -0.20 to 0.30). In contrast, the BO showed good agreement (e.g. social behaviour: RS: 0.45, ICC: 0.50, SDC: 0.09, LoA: -0.09 to 0.03 use of enrichment material: RS: 0.75, ICC: 0.68, SDC: 0.06, LoA: -0.03 to 0.03). Overall, observers agreed well in the IP, e.g. tail biting (RS: 0.52, ICC: 0.88; SDC: 0.05, LoA: -0.01 to 0.02) and wounds (RS: 0.43, ICC: 0.59, SDC: 0.10, LoA: -0.09 to 0.10). The parameter bursitis showed great differences (RS: 0.10, ICC: 0.0, SDC: 0.35, LoA: -0.37 to 0.40), which can be explained by difficulties in the assessment when the animals moved around quickly or their legs were soiled. In conclusion, the interobserver reliability was good in the BO and most IP, but not for the parameter bursitis and the QBA.

  12. Rescuing Joint Personnel Recovery: Using Air Force Capability to Address Joint Shortfalls

    DTIC Science & Technology

    2011-06-01

    of an IP, the IP is not successfully reintegrated or the lessons learned are not incorporated into other operations. Adversaries will benefit from...Washington, D.C.: Office of Air Force History , United States Air Force, 1980, 117. 47 Durant , Michael J. In the Company of Heroes, Penguin Group... Lessons Learned, 22 September 2005, 3. 2 US Joint Task Force Katrina. The Federal Response to Hurricane Katrina Lessons Learned, February 2006, 54

  13. Full Spectrum Information Operations and the Information Professional Officer Intermediate Qualification Process: Filling the Gap to Ensure the Continued Leadership of the Information Professional Community in the Area of Information Dominance

    DTIC Science & Technology

    2005-09-01

    information dominance . This thesis provides recommended line items for injection into the IP IQ in the appropriate format with discussions and definitions that address the specific line items. The thesis also provides further recommendations for the continuing improvement and refinement of the IP qualification process, especially in the area of

  14. Safety management of Ethernet broadband access based on VLAN aggregation

    NASA Astrophysics Data System (ADS)

    Wang, Li

    2004-04-01

    With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.

  15. SEnviro: a sensorized platform proposal using open hardware and open standards.

    PubMed

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-03-06

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and theWeb of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented.

  16. SEnviro: A Sensorized Platform Proposal Using Open Hardware and Open Standards

    PubMed Central

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-01-01

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and the Web of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented. PMID:25756864

  17. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  18. Protocol for the effect evaluation of Individual Placement and Support (IPS): a randomized controlled multicenter trial of IPS versus treatment as usual for patients with moderate to severe mental illness in Norway.

    PubMed

    Sveinsdottir, Vigdis; Løvvik, Camilla; Fyhn, Tonje; Monstad, Karin; Ludvigsen, Kari; Øverland, Simon; Reme, Silje Endresen

    2014-11-18

    Roughly one third of disability pensions in Norway are issued for mental and behavioral disorders, and vocational rehabilitation offered to this group has traditionally been dominated by train-and-place approaches with assisted or sheltered employment. Based on a more innovative place-and-train approach, Individual Placement and Support (IPS) involves supported employment in real-life competitive work settings, and has shown great promise for patients with severe mental illness. The study is a multicenter Randomized Controlled Trial (RCT) of IPS in a Norwegian context, involving an effect evaluation, a process evaluation, and a cost/benefit analysis. IPS will be compared to high quality treatment as usual (TAU), with labor market participation and educational activity at 12 months post inclusion as the primary outcome. The primary outcome will be measured using register data, and the project will also include complete follow-up up to 4 years after inclusion for long-term outcome data. Secondary outcomes include mental health status, disability and quality of life, collected through survey questionnaires at baseline, and after 6 and 12 months. Participants will include patients undergoing treatment for moderate to severe mental illness who are either unemployed or on sickness or social benefits. The estimated total sample size of 400-500 will be randomly assigned to the interventions. To be eligible, participants must have an expressed desire to work, and sufficient Norwegian reading and writing skills to fill out the questionnaires. The Effect Evaluation of Individual Placement and Support (IPS) will be one of the largest randomized controlled trials to date investigating the effectiveness of IPS on competitive employment, and the first study to evaluate the effectiveness of IPS for patients with moderate to severe mental illness within a Norwegian context. Clinicaltrials.gov: NCT01964092 . Registered October 16th, 2013.

  19. MicroRNA‐199b Modulates Vascular Cell Fate During iPS Cell Differentiation by Targeting the Notch Ligand Jagged1 and Enhancing VEGF Signaling

    PubMed Central

    Chen, Ting; Kelaini, Sophia; Cochrane, Amy; Guha, Shaunta T.; Hu, Yanhua; Stitt, Alan W.; Xu, Qingbo

    2015-01-01

    Abstract Aims: Recent ability to derive endothelial cells (ECs) from induced pluripotent stem (iPS) cells holds a great therapeutic potential for personalized medicine and stem cell therapy. We aimed that better understanding of the complex molecular signals that are evoked during iPS cell differentiation toward ECs may allow specific targeting of their activities to enhance cell differentiation and promote tissue regeneration. Methods and Results: In this study, we have generated mouse iPS cells from fibroblasts using established protocol. When iPS cells were cultivated on type IV mouse collagen‐coated dishes in differentiation medium, cell differentiation toward vascular lineages were observed. To study the molecular mechanisms of iPS cell differentiation, we found that miR‐199b is involved in EC differentiation. A step‐wise increase in expression of miR‐199 was detected during EC differentiation. Notably, miR‐199b targeted the Notch ligand JAG1, resulting in vascular endothelial growth factor (VEGF) transcriptional activation and secretion through the transcription factor STAT3. Upon shRNA‐mediated knockdown of the Notch ligand JAG1, the regulatory effect of miR‐199b was ablated and there was robust induction of STAT3 and VEGF during EC differentiation. Knockdown of JAG1 also inhibited miR‐199b‐mediated inhibition of iPS cell differentiation toward smooth muscle markers. Using the in vitro tube formation assay and implanted Matrigel plugs, in vivo, miR‐199b also regulated VEGF expression and angiogenesis. Conclusions: This study indicates a novel role for miR‐199b as a regulator of the phenotypic switch during vascular cell differentiation derived from iPS cells by regulating critical signaling angiogenic responses. Stem Cells 2015;33:1405–1418 PMID:25535084

  20. Excision of a viral reprogramming cassette by delivery of synthetic Cre mRNA

    PubMed Central

    Loh, Yuin-Han; Yang, Jimmy Chen; De Los Angeles, Alejandro; Guo, Chunguang; Cherry, Anne; Rossi, Derrick J.; Park, In-Hyun; Daley, George Q.

    2012-01-01

    The generation of patient-specific induced pluripotent stem (iPS) cells provides an invaluable resource for cell therapy, in vitro modeling of human disease, and drug screening. To date, most human iPS cells have been generated with integrating retro- and lenti-viruses and are limited in their potential utility because residual transgene expression may alter their differentiation potential or induce malignant transformation. Alternatively, transgene-free methods using adenovirus and protein transduction are limited by low efficiency. This report describes a protocol for the generation of transgene-free human induced pluripotent stem cells using retroviral transfection of a single vector, which includes the coding sequences of human OCT4, SOX2, KLF4, and cMYC linked with picornaviral 2A plasmids. Moreover, after reprogramming has been achieved, this cassette can be removed using mRNA transfection of Cre recombinase. The method described herein to excise reprogramming factors with ease and efficiency facilitates the experimental generation and use of transgene-free human iPS cells. PMID:22605648

  1. Classifier fusion for VoIP attacks classification

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  2. MDCT of acute pancreatitis: Intraindividual comparison of single-phase versus dual-phase MDCT for initial assessment of acute pancreatitis using different CT scoring systems.

    PubMed

    Avanesov, Maxim; Weinrich, Julius M; Kraus, Thomas; Derlin, Thorsten; Adam, Gerhard; Yamamura, Jin; Karul, Murat

    2016-11-01

    The purpose of the retrospective study was to evaluate the additional value of dual-phase multidetector computed tomography (MDCT) protocols over a single-phase protocol on initial MDCT in patients with acute pancreatitis using three CT-based pancreatitis severity scores with regard to radiation dose. In this retrospective, IRB approved study MDCT was performed in 102 consecutive patients (73 males; 55years, IQR48-64) with acute pancreatitis. Inclusion criteria were CT findings of interstitial edematous pancreatitis (IP) or necrotizing pancreatitis (NP) and a contrast-enhanced dual-phase (arterial phase and portal-venous phase) abdominal CT performed at ≥72h after onset of symptoms. The severity of pancreatic and extrapancreatic changes was independently assessed by 2 observers using 3 validated CT-based scoring systems (CTSI, mCTSI, EPIC). All scores were applied to arterial phase and portal venous phase scans and compared to score results of portal venous phase scans, assessed ≥14days after initial evaluation. For effective dose estimation, volume CT dose index (CTDIvol) and dose length product (DLP) were recorded in all examinations. In neither of the CT severity scores a significant difference was observed after application of a dual-phase protocol compared with a single-phase protocol (IP: CTSI: 2.7 vs. 2.5, p=0.25; mCTSI: 4.0 vs. 4.0, p=0.10; EPIC: 2.0 vs. 2.0, p=0.41; NP: CTSI: 8.0 vs. 7.0, p=0.64; mCTSI: 8.0 vs. 8.0, p=0.10; EPIC: 3.0 vs. 3.0, p=0.06). The application of a single-phase CT protocol was associated with a median effective dose reduction of 36% (mean dose reduction 31%) compared to a dual-phase CT scan. An initial dual-phase abdominal CT after ≥72h after onset of symptoms of acute pancreatitis was not superior to a single-phase protocol for evaluation of the severity of pancreatic and extrapancreatic changes. However, the effective radiation dose may be reduced by 36% using a single-phase protocol. Copyright © 2016. Published by Elsevier Ireland Ltd.

  3. A methodological comparison of customer service analysis techniques

    Treesearch

    James Absher; Alan Graefe; Robert Burns

    2003-01-01

    Techniques used to analyze customer service data need to be studied. Two primary analysis protocols, importance-performance analysis (IP) and gap score analysis (GA), are compared in a side-by-side comparison using data from two major customer service research projects. A central concern is what, if any, conclusion might be different due solely to the analysis...

  4. iChat[TM] Do You? Using Desktop Web Conferencing in Education

    ERIC Educational Resources Information Center

    Bell, Randy L.; Garofalo, Joe

    2006-01-01

    Videoconferencing is not a new technology and it has been widely used in educational settings since the mid-1980s. Videoconferencing has evolved into the integration of personal computers to what is now referred to as Web conferencing. In the mid-1990s, Internet Protocol (IP) was introduced into the mainstream but the educational community has…

  5. 78 FR 8032 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... believe that this growth is being caused by the offering of incentives for referrals to use this service... precipitated largely by new referral programs that offer monetary rewards for the referral of customers who... cost to the consumer. In short, offering such rewards may have the effect of enlisting customers who...

  6. Advance Planning Briefing for Industry. Technology Requirements Briefings

    DTIC Science & Technology

    2009-02-17

    procedure drills through complex multiplayer interactions representative of a motorcade under heavy attack. The tool shall provide a first-person...Integrated Munitions Effect Assessment IMI Interactive Multimedia Instruction IP Internet Protocol IPE Intelligence Preparation of the Environment IR...CTTSO Programs and Mission Areas/Subgroups 13 Requirement Descriptions Blast Effects and Mitigation (BX) 16 Chemical, Biological, Radiological, and

  7. The Behavior of TCP and Its Extensions in Space

    NASA Technical Reports Server (NTRS)

    Wang, Ruhai; Horan, Stephen

    2001-01-01

    The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.

  8. The Development of the Command and Control Centre for Trial Kondari

    DTIC Science & Technology

    2010-07-01

    the C2 centre inside a blue bubble whose modems have privately assigned IP addresses which are authenticated by Telstra’s radius server. No other sim...cards can communicate on this private network unless authorised by the radius server. The Next IP network is a network bubble within the larger Next...for all machines on the network.  EPLRS Network Manager (ENM) radio – authenticates and manages all the EPLRS radios. The basic plan’s final

  9. A New IMS Based Inter-working Solution

    NASA Astrophysics Data System (ADS)

    Zhu, Zhongwen; Brunner, Richard

    With the evolution of third generation network, more and more multimedia services are developed and deployed. Any new service to be deployed in IMS network is required to inter-work with existing Internet communities or legacy terminal users in order to appreciate the end users, who are the main drivers for the service to succeed. The challenge for Inter-working between IMS (IP Multimedia Subsystem) and non-IMS network is “how to handle recipient’s address”. This is because each network has its own routable address schema. For instance, the address for Google Talk user is xmpp:xyz@google.com, which is un-routable in IMS network. Hereafter a new Inter-working (IW) solution between IMS and non-IMS network is proposed for multimedia services that include Instant Messaging, Chat, and File transfer, etc. It is an end-to-end solution built on IMS infrastructure. The Public Service Identity (PSI) defined in 3GPP standard (3rd Generation Partnership Project) is used to allow terminal clients to allocate this IW service. When sending the SIP (Session Initial Protocol) request out for multimedia services, the terminal includes the recipient’s address in the payload instead of the “Request-URI” header. In the network, the proposed solution provides the mapping rules between different networks in MM-IW (Multimedia IW). The detailed technical description and the corresponding use cases are present. The comparison with other alternatives is made. The benefits of the proposed solution are highlighted.

  10. Collaborative Falls Prevention: Interprofessional Team Formation, Implementation, and Evaluation.

    PubMed

    Lasater, Kathie; Cotrell, Victoria; McKenzie, Glenise; Simonson, William; Morgove, Megan W; Long, Emily E; Eckstrom, Elizabeth

    2016-12-01

    As health care rapidly evolves to promote person-centered care, evidence-based practice, and team-structured environments, nurses must lead interprofessional (IP) teams to collaborate for optimal health of the populations and more cost-effective health care. Four professions-nursing, medicine, social work, and pharmacy-formed a teaching team to address fall prevention among older adults in Oregon using an IP approach. The teaching team developed training sessions that included interactive, evidence-based sessions, followed by individualized team coaching. This article describes how the IP teaching team came together to use a unique cross-training approach to teach each other. They then taught and coached IP teams from a variety of community practice settings to foster their integration of team-based falls-prevention strategies into practice. After coaching 25 teams for a year each, the authors present the lessons learned from the teaching team's formation and experiences, as well as feedback from practice team participants that can provide direction for other IP teams. J Contin Educ Nurs. 2016;47(12):545-550. Copyright 2016, SLACK Incorporated.

  11. iASeq: integrative analysis of allele-specificity of protein-DNA interactions in multiple ChIP-seq datasets

    PubMed Central

    2012-01-01

    Background ChIP-seq provides new opportunities to study allele-specific protein-DNA binding (ASB). However, detecting allelic imbalance from a single ChIP-seq dataset often has low statistical power since only sequence reads mapped to heterozygote SNPs are informative for discriminating two alleles. Results We develop a new method iASeq to address this issue by jointly analyzing multiple ChIP-seq datasets. iASeq uses a Bayesian hierarchical mixture model to learn correlation patterns of allele-specificity among multiple proteins. Using the discovered correlation patterns, the model allows one to borrow information across datasets to improve detection of allelic imbalance. Application of iASeq to 77 ChIP-seq samples from 40 ENCODE datasets and 1 genomic DNA sample in GM12878 cells reveals that allele-specificity of multiple proteins are highly correlated, and demonstrates the ability of iASeq to improve allelic inference compared to analyzing each individual dataset separately. Conclusions iASeq illustrates the value of integrating multiple datasets in the allele-specificity inference and offers a new tool to better analyze ASB. PMID:23194258

  12. Continuously Connected With Mobile IP

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  13. Blocking adenylyl cyclase inhibits olfactory generator currents induced by "IP(3)-odors".

    PubMed

    Chen, S; Lane, A P; Bock, R; Leinders-Zufall, T; Zufall, F

    2000-07-01

    Vertebrate olfactory receptor neurons (ORNs) transduce odor stimuli into electrical signals by means of an adenylyl cyclase/cAMP second messenger cascade, but it remains widely debated whether this cAMP cascade mediates transduction for all odorants or only certain odor classes. To address this problem, we have analyzed the generator currents induced by odors that failed to produce cAMP in previous biochemical assays but instead produced IP(3) ("IP(3)-odors"). We show that in single salamander ORNs, sensory responses to "cAMP-odors" and IP(3)-odors are not mutually exclusive but coexist in the same cells. The currents induced by IP(3)-odors exhibit identical biophysical properties as those induced by cAMP odors or direct activation of the cAMP cascade. By disrupting adenylyl cyclase to block cAMP formation using two potent antagonists of adenylyl cyclase, SQ22536 and MDL12330A, we show that this molecular step is necessary for the transduction of both odor classes. To assess whether these results are also applicable to mammals, we examine the electrophysiological responses to IP(3)-odors in intact mouse main olfactory epithelium (MOE) by recording field potentials. The results show that inhibition of adenylyl cyclase prevents EOG responses to both odor classes in mouse MOE, even when "hot spots" with heightened sensitivity to IP(3)-odors are examined.

  14. Data Transfer Efficiency Over Satellite Circuits Using a Multi-Socket Extension to the File Transfer Protocol (FTP)

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn; Kruse, Hans

    1996-01-01

    In several experiments using NASA's Advanced Communications Technology Satellite (ACTS), investigators have reported disappointing throughput using the transmission control protocol/Internet protocol (TCP/IP) protocol suite over 1.536Mbit/sec (T1) satellite circuits. A detailed analysis of file transfer protocol (FTP) file transfers reveals that both the TCP window size and the TCP 'slow starter' algorithm contribute to the observed limits in throughput. In this paper we summarize the experimental and and theoretical analysis of the throughput limit imposed by TCP on the satellite circuit. We then discuss in detail the implementation of a multi-socket FTP, XFTP client and server. XFTP has been tested using the ACTS system. Finally, we discuss a preliminary set of tests on a link with non-zero bit error rates. XFTP shows promising performance under these conditions, suggesting the possibility that a multi-socket application may be less effected by bit errors than a single, large-window TCP connection.

  15. The effectiveness of individual placement and support for people with mental illness new on social benefits: a study protocol

    PubMed Central

    2013-01-01

    Background In Switzerland, people with a severe mental illness and unable to work receive disability benefits (‘IV-pension’). Once they are granted these benefits, the chances to regain competitive employment are usually small. However, previous studies have shown that individual placement and support (IPS) supports a successful reintegration into competitive employment. This study focuses on the integration of newly appointed IV-pensioners, who have received an IV-pension for less than a year. Method/design The present pilot project ZHEPP (Zürcher Eingliederungs-Pilot Projekt; engl.: Zurich integration pilot project) is a randomized controlled trial (RCT). The 250 participants will be randomized to either the intervention or the control group. The intervention group receives support of a job coach according to the approach of IPS. Participants in the control group do not receive IPS support. Participation takes a total of two years for each participant. Each group is interviewed every six months (T0-T4). A two-factor analysis of variance will be conducted with the two factors group (intervention versus control group) and outcome (employment yes/no). The main criterion of the two-factor analysis will be the number of competitive employment contracts in each group. Discussion This study will focus on the impact of IPS on new IV-pensioners and aims to identify predictors for a successful integration. Furthermore, we will examine the effect of IPS on stigma variables and recovery orientation. Trial registration ISRCTN54951166 PMID:23883137

  16. Mobile Vehicle Teleoperated Over Wireless IP

    DTIC Science & Technology

    2007-06-13

    VideoLAN software suite. The VLC media player portion of this suite handles net- work streaming of video, as well as the receipt and display of the video...is found in appendix C.7. Video Display The video feed is displayed for the operator using VLC opened independently from the control sending program...This gives the operator the most choice in how to configure the display. To connect VLC to the feed all you need is the IP address from the Java

  17. Cell Penetrating Peptides and Cationic Antibacterial Peptides

    PubMed Central

    Rodriguez Plaza, Jonathan G.; Morales-Nava, Rosmarbel; Diener, Christian; Schreiber, Gabriele; Gonzalez, Zyanya D.; Lara Ortiz, Maria Teresa; Ortega Blake, Ivan; Pantoja, Omar; Volkmer, Rudolf; Klipp, Edda; Herrmann, Andreas; Del Rio, Gabriel

    2014-01-01

    Cell penetrating peptides (CPP) and cationic antibacterial peptides (CAP) have similar physicochemical properties and yet it is not understood how such similar peptides display different activities. To address this question, we used Iztli peptide 1 (IP-1) because it has both CPP and CAP activities. Combining experimental and computational modeling of the internalization of IP-1, we show it is not internalized by receptor-mediated endocytosis, yet it permeates into many different cell types, including fungi and human cells. We also show that IP-1 makes pores in the presence of high electrical potential at the membrane, such as those found in bacteria and mitochondria. These results provide the basis to understand the functional redundancy of CPPs and CAPs. PMID:24706763

  18. Using Human Induced Pluripotent Stem Cells to Model Skeletal Diseases.

    PubMed

    Barruet, Emilie; Hsiao, Edward C

    2016-01-01

    Musculoskeletal disorders affecting the bones and joints are major health problems among children and adults. Major challenges such as the genetic origins or poor diagnostics of severe skeletal disease hinder our understanding of human skeletal diseases. The recent advent of human induced pluripotent stem cells (human iPS cells) provides an unparalleled opportunity to create human-specific models of human skeletal diseases. iPS cells have the ability to self-renew, allowing us to obtain large amounts of starting material, and have the potential to differentiate into any cell types in the body. In addition, they can carry one or more mutations responsible for the disease of interest or be genetically corrected to create isogenic controls. Our work has focused on modeling rare musculoskeletal disorders including fibrodysplasia ossificans progressive (FOP), a congenital disease of increased heterotopic ossification. In this review, we will discuss our experiences and protocols differentiating human iPS cells toward the osteogenic lineage and their application to model skeletal diseases. A number of critical challenges and exciting new approaches are also discussed, which will allow the skeletal biology field to harness the potential of human iPS cells as a critical model system for understanding diseases of abnormal skeletal formation and bone regeneration.

  19. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

    PubMed Central

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. PMID:25945177

  20. Effect finishing and polishing procedures on the surface roughness of IPS Empress 2 ceramic.

    PubMed

    Boaventura, Juliana Maria Capelozza; Nishida, Rodrigo; Elossais, André Afif; Lima, Darlon Martins; Reis, José Mauricio Santos Nunes; Campos, Edson Alves; de Andrade, Marcelo Ferrarezi

    2013-01-01

    To evaluate the surface roughness of IPS Empress 2 ceramic when treated with different finishing/polishing protocols. Sixteen specimens of IPS Empress 2 ceramic were made from wax patterns obtained using a stainless steel split mold. The specimens were glazed (Stage 0-S0, control) and divided into two groups. The specimens in Group 1 (G1) were finished/polished with a KG Sorensen diamond point (S1), followed by KG Sorensen siliconized points (S2) and final polishing with diamond polish paste (S3). In Group 2 (G2), the specimens were finished/polished using a Shofu diamond point (S1), as well as Shofu siliconized points (S2) and final polishing was performed using Porcelize paste (S3). After glazing (S0) and following each polishing procedure (S1, S2 or S3), the surface roughness was measured using TALYSURF Series 2. The average surface roughness results were analyzed using ANOVA followed by Tukey post-hoc tests (α = 0.01) RESULTS: All of the polishing procedures yielded higher surface roughness values when compared to the control group (S0). S3 yielded lower surface roughness values when compared to S1 and S2. The proposed treatments negatively affected the surface roughness of the glazed IPS Empress 2 ceramic.

  1. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    PubMed

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  2. Efficient generation of rat induced pluripotent stem cells using a non-viral inducible vector.

    PubMed

    Merkl, Claudia; Saalfrank, Anja; Riesen, Nathalie; Kühn, Ralf; Pertek, Anna; Eser, Stefan; Hardt, Markus Sebastian; Kind, Alexander; Saur, Dieter; Wurst, Wolfgang; Iglesias, Antonio; Schnieke, Angelika

    2013-01-01

    Current methods of generating rat induced pluripotent stem cells are based on viral transduction of pluripotency inducing genes (Oct4, Sox2, c-myc and Klf4) into somatic cells. These activate endogenous pluripotency genes and reprogram the identity of the cell to an undifferentiated state. Epigenetic silencing of exogenous genes has to occur to allow normal iPS cell differentiation. To gain more control over the expression of exogenous reprogramming factors, we used a novel doxycycline-inducible plasmid vector encoding Oct4, Sox2, c-Myc and Klf4. To ensure efficient and controlled generation of iPS cells by plasmid transfection we equipped the reprogramming vector with a bacteriophage φC31 attB site and used a φC31 integrase expression vector to enhance vector integration. A series of doxycycline-independent rat iPS cell lines were established. These were characterized by immunocytochemical detection of Oct4, SSEA1 and SSEA4, alkaline phosphatase staining, methylation analysis of the endogenous Oct4 promoter and RT-PCR analysis of endogenous rat pluripotency genes. We also determined the number of vector integrations and the extent to which reprogramming factor gene expression was controlled. Protocols were developed to generate embryoid bodies and rat iPS cells demonstrated as pluripotent by generating derivatives of all three embryonic germ layers in vitro, and teratoma formation in vivo. All data suggest that our rat iPS cells, generated by plasmid based reprogramming, are similar to rat ES cells. Methods of DNA transfection, protein transduction and feeder-free monolayer culture of rat iPS cells were established to enable future applications.

  3. Transplantation of neurons derived from human iPS cells cultured on collagen matrix into guinea-pig cochleae.

    PubMed

    Ishikawa, Masaaki; Ohnishi, Hiroe; Skerleva, Desislava; Sakamoto, Tatsunori; Yamamoto, Norio; Hotta, Akitsu; Ito, Juichi; Nakagawa, Takayuki

    2017-06-01

    The present study examined the efficacy of a neural induction method for human induced pluripotent stem (iPS) cells to eliminate undifferentiated cells and to determine the feasibility of transplanting neurally induced cells into guinea-pig cochleae for replacement of spiral ganglion neurons (SGNs). A stepwise method for differentiation of human iPS cells into neurons was used. First, a neural induction method was established on Matrigel-coated plates; characteristics of cell populations at each differentiation step were assessed. Second, neural stem cells were differentiated into neurons on a three-dimensional (3D) collagen matrix, using the same protocol of culture on Matrigel-coated plates; neuron subtypes in differentiated cells on a 3D collagen matrix were examined. Then, human iPS cell-derived neurons cultured on a 3D collagen matrix were transplanted into intact guinea-pig cochleae, followed by histological analysis. In vitro analyses revealed successful induction of neural stem cells from human iPS cells, with no retention of undifferentiated cells expressing OCT3/4. After the neural differentiation of neural stem cells, approximately 70% of cells expressed a neuronal marker, 90% of which were positive for vesicular glutamate transporter 1 (VGLUT1). The expression pattern of neuron subtypes in differentiated cells on a 3D collagen matrix was identical to that of the differentiated cells on Matrigel-coated plates. In addition, the survival of transplant-derived neurons was achieved when inflammatory responses were appropriately controlled. Our preparation method for human iPS cell-derived neurons efficiently eliminated undifferentiated cells and contributed to the settlement of transplant-derived neurons expressing VGLUT1 in guinea-pig cochleae. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  4. Triazolophostins: a library of novel and potent agonists of IP3 receptors.

    PubMed

    Vibhute, Amol M; Konieczny, Vera; Taylor, Colin W; Sureshan, Kana M

    2015-06-28

    IP3 receptors are channels that mediate the release of Ca(2+) from the intracellular stores of cells stimulated by hormones or neurotransmitters. Adenophostin A (AdA) is the most potent agonist of IP3 receptors, with the β-anomeric adenine contributing to the increased potency. The potency of AdA and its stability towards the enzymes that degrade IP3 have aroused interest in AdA analogs for biological studies. The complex structure of AdA poses problems that have necessitated optimization of synthetic conditions for each analog. Such lengthy one-at-a-time syntheses limit access to AdA analogs. We have addressed this problem by synthesizing a library of triazole-based AdA analogs, triazolophostins, by employing click chemistry. An advanced intermediate having all the necessary phosphates and a β-azide at the anomeric position was reacted with various alkynes under Cu(i) catalysis to yield triazoles, which upon deprotection gave triazolophostins. All eleven triazolophostins synthesized are more potent than IP3 and some are equipotent with AdA in functional analyses of IP3 receptors. We show that a triazole ring can replace adenine without compromising the potency of AdA and provide facile routes to novel AdA analogs.

  5. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  6. From Telecommunications to Networking: The MELVYL Online Union Catalog and the Development of Intercampus Networks at the University of California.

    ERIC Educational Resources Information Center

    Lynch, Clifford A.

    1989-01-01

    Reviews the history of the network that supports the MELVYL online union catalog, describes current technological and policy issues, and discusses the role the network plays in integrating local automation, the union catalog, access to resource databases, and other initiatives. Sidebars by Mark Needleman discuss the TCP/IP protocol suite, internet…

  7. An efficient in vitro shoot regeneration from leaf petiolar explants and ex vitro rooting of Bixa orellana L.- A dye yielding plant.

    PubMed

    Mohammed, Arifullah; Chiruvella, Kishore K; Namsa, Nima D; Ghanta, Rama Gopal

    2015-07-01

    Bixa orellana L. (Bixaceae) is a multipurpose tree grown for the production of commercially important dyes. In the present study, an efficient, reproducible protocol was developed for direct plant regeneration from in vitro derived petiole explants of Bixa orellana L. Murashige and Skoog medium (MS) supplemented with 2-isopentenyl adenine (9.8 μM) and naphthalene acetic acid (10.7 μM) was found to be optimum for production of high frequency of shoot organogenesis. Subculturing of the shoots onto the fresh MS medium containing similar concentrations of 2-iP (9.8 μM) and NAA (10.7 μM) produced elongated shoots. Elongated shoots when placed onto MS medium supplemented with 1.7 μM indole-3-acetic acid and 14.7 μM 2-iP produced optimal rooting. Rooted plantlets were acclimatized and transplanted to the field successfully. Histological investigation revealed the origin of shoot primordia, from sub-epidermal cells of petiole explants. The regeneration protocol developed in this study can be useful for mass in vitro propagation and effective genetic transformation of commercially important edible dye yielding tree species.

  8. IPTV multicast with peer-assisted lossy error control

    NASA Astrophysics Data System (ADS)

    Li, Zhi; Zhu, Xiaoqing; Begen, Ali C.; Girod, Bernd

    2010-07-01

    Emerging IPTV technology uses source-specific IP multicast to deliver television programs to end-users. To provide reliable IPTV services over the error-prone DSL access networks, a combination of multicast forward error correction (FEC) and unicast retransmissions is employed to mitigate the impulse noises in DSL links. In existing systems, the retransmission function is provided by the Retransmission Servers sitting at the edge of the core network. In this work, we propose an alternative distributed solution where the burden of packet loss repair is partially shifted to the peer IP set-top boxes. Through Peer-Assisted Repair (PAR) protocol, we demonstrate how the packet repairs can be delivered in a timely, reliable and decentralized manner using the combination of server-peer coordination and redundancy of repairs. We also show that this distributed protocol can be seamlessly integrated with an application-layer source-aware error protection mechanism called forward and retransmitted Systematic Lossy Error Protection (SLEP/SLEPr). Simulations show that this joint PARSLEP/ SLEPr framework not only effectively mitigates the bottleneck experienced by the Retransmission Servers, thus greatly enhancing the scalability of the system, but also efficiently improves the resistance to the impulse noise.

  9. Network-wide BGP route prediction for traffic engineering

    NASA Astrophysics Data System (ADS)

    Feamster, Nick; Rexford, Jennifer

    2002-07-01

    The Internet consists of about 13,000 Autonomous Systems (AS's) that exchange routing information using the Border Gateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS's. However, BGP is a complicated, policy-based protocol that does not include any direct support for traffic engineering. In previous work, we have demonstrated that network operators can adapt the flow of traffic in an efficient and predictable fashion through careful adjustments to the BGP policies running on their edge routers. Nevertheless, many details of the BGP protocol and decision process make predicting the effects of these policy changes difficult. In this paper, we describe a tool that predicts traffic flow at network exit points based on the network topology, the import policy associated with each BGP session, and the routing advertisements received from neighboring AS's. We present a linear-time algorithm that computes a network-wide view of the best BGP routes for each destination prefix given a static snapshot of the network state, without simulating the complex details of BGP message passing. We describe how to construct this snapshot using the BGP routing tables and router configuration files available from operational routers. We verify the accuracy of our algorithm by applying our tool to routing and configuration data from AT&T's commercial IP network. Our route prediction techniques help support the operation of large IP backbone networks, where interdomain routing is an important aspect of traffic engineering.

  10. Validation of the Omron HEM-7201 upper arm blood pressure monitor, for self-measurement in a high-altitude environment, according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Cho, K; Tian, M; Lan, Y; Zhao, X; Yan, L L

    2013-08-01

    Few studies have been conducted on blood pressure monitors and their use at high altitude. This study is the first to evaluate the accuracy of an automatic blood pressure monitor in a high-altitude environment following a standard validation protocol. The Omron HEM-7201 upper arm blood pressure monitor was tested for accuracy in Lhasa, Tibet, China (3650 m above sea level) according to the European Society of Hypertension International Protocol revision 2010 (ESH-IP2). Thirty-three participants received 9-10 sequential blood pressure measurements alternating between a mercury sphygmomanometer and the device. The mean device-observer measurement difference was 1.0±5.9 mm Hg for systolic blood pressure (SBP) and -3.1±4.6 mm Hg for diastolic blood pressure (DBP). Of the 99 measurement pairs analyzed, 72, 90 and 97 device readings were within 5, 10 and 15 mm Hg, respectively, of the observer measurements for SBP, and 68, 92 and 99 readings for DBP. The number of participants with at least two out of three measurements within 5 mm Hg was 27 for SBP and 25 for DBP. Three participants had no measurements within 5 mm Hg for either SBP or DBP. As a result, the Omron HEM-7201 passes the ESH-IP2 validation criteria and can therefore be recommended for use in adults in this setting.

  11. Validation of the iHealth BP3 upper-arm blood pressure monitor, for clinic use and self-measurement, according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Chen, Can; Shang, Fujun; Wang, Jiepin; Chen, Jianghong; Ji, Na; Wan, Yi

    2012-12-01

    This study aimed to evaluate the performance of the iHealth BP3 upper-arm blood pressure monitor, which is designed for clinic use and self-measurement of blood pressure using Apple touch devices as an interface. The European Society of Hypertension International Protocol (ESH-IP) revision 2010 for the validation of blood pressure measuring devices in adults was followed precisely. Ninty-nine couples of test device and reference blood pressure measurements were obtained during the study (three pairs for each of the 33 participants). The 33 participants, age 47.1±12.3 years (age range 27-69 years) and arm circumference 30.0±4.4 cm, had a mean systolic blood pressure (SBP) of 143.9±27.4 mmHg and a mean diastolic blood pressure (DBP) of 90.1±18.3 mmHg. The device passed all of the requirements fulfilling the standards of the protocol, and the mean±SD device-observer difference was 2.8±4.2 mmHg for SBP and -0.4±3.5 mmHg for DBP. According to the results of the validation study on the basis of the ESH-IP revision 2010, the iHealth BP3 can be recommended for clinic use and self-measurement in an adult population. © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins.

  12. Speech perception benefits of internet versus conventional telephony for hearing-impaired individuals.

    PubMed

    Mantokoudis, Georgios; Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco; Senn, Pascal

    2012-07-16

    Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3-3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1-8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%-53%), 10.6% (4%-46%), and 8.8% (7%-33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and were 36% (P = .001) for cochlear implant users, 18% (P = .002) for hearing aid users, and 53% (P = .001) for normal-hearing adults. With a packet loss of 10%, the maximum benefits were 30% (P = .002) for cochlear implant users, 6% (P = .38) for hearing aid users, and 33% (P = .002) for normal-hearing adults. VoIP offers a speech perception benefit over conventional telephone quality, even when mild or moderate packet loss scenarios are created in the laboratory. VoIP, therefore, has the potential to significantly improve telecommunication abilities for the large community of hearing-impaired individuals.

  13. Speech Perception Benefits of Internet Versus Conventional Telephony for Hearing-Impaired Individuals

    PubMed Central

    Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco

    2012-01-01

    Background Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3–3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1–8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. Objective To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. Methods We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Results Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%–53%), 10.6% (4%–46%), and 8.8% (7%–33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and were 36% (P = .001) for cochlear implant users, 18% (P = .002) for hearing aid users, and 53% (P = .001) for normal-hearing adults. With a packet loss of 10%, the maximum benefits were 30% (P = .002) for cochlear implant users, 6% (P = .38) for hearing aid users, and 33% (P = .002) for normal-hearing adults. Conclusions VoIP offers a speech perception benefit over conventional telephone quality, even when mild or moderate packet loss scenarios are created in the laboratory. VoIP, therefore, has the potential to significantly improve telecommunication abilities for the large community of hearing-impaired individuals. PMID:22805169

  14. INTELLECTUAL PROPERTY IN THE TWENTY-FIRST CENTURY: WILL THE DEVELOPING COUNTRIES LEAD OR FOLLOW?

    PubMed Central

    Reichman, Jerome H.

    2010-01-01

    Developing countries, particularly the BRIC countries of Brazil, Russia, India, and China, should accommodate their national systems of innovation to the worldwide intellectual property (IP) regime emerging after the adoption of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) in a way that maximizes global economic welfare in the foreseeable future. As many developed countries’ experience demonstrates, badly configured, over-protectionist IP regimes stifle innovation by making inputs to future innovation too costly and too cumbersome to sustain over time. More carefully considered IP regimes, however, are an important way to protect innovative small- and medium-sized firms from predatory, larger competitors. The challenge is for emerging economies to capture the benefits of IP without importing the serious problems that developed countries have themselves failed to solve. Emerging economies can attain this balance by pursuing a policy of counter-harmonization in which they take advantage of existing exemptions in international agreements governing IP to establish regional, local, and international practices that promote more innovative, flexible uses of IP. Such practices include a research exemption for experimental uses of IP, government imposed nonexclusive licensing, anti-blocking provisions, an essential facilities doctrine, and compulsory licenses. Additional tools include an ex ante regime of compensatory liability rules for small scale innovation and sensible exceptions, particularly for science as well as general fair use provisions, to the exclusive rights of domestic copyright laws. Emerging economies will have to overcome strong economic pressure to accept more restrictive IP regimes as part of free trade agreements as well as a lack of technical expertise and internal government coordination. However, emerging economies have already accrued enough experience to be aware of the strengths and weaknesses of various IP schemes and their own ability to tailor IP to local needs. Developing countries will need to take advantage of that experience and defend innovative practices at international dispute resolution forums. Through creative, determined efforts, the developing countries can avoid other countries’ IP excesses while establishing the kind of IP norms that address the real conditions of creativity and innovation in today’s digitally empowered universe of scientific discourse. PMID:21423816

  15. INTELLECTUAL PROPERTY IN THE TWENTY-FIRST CENTURY: WILL THE DEVELOPING COUNTRIES LEAD OR FOLLOW?

    PubMed

    Reichman, Jerome H

    2009-01-31

    Developing countries, particularly the BRIC countries of Brazil, Russia, India, and China, should accommodate their national systems of innovation to the worldwide intellectual property (IP) regime emerging after the adoption of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) in a way that maximizes global economic welfare in the foreseeable future. As many developed countries' experience demonstrates, badly configured, over-protectionist IP regimes stifle innovation by making inputs to future innovation too costly and too cumbersome to sustain over time. More carefully considered IP regimes, however, are an important way to protect innovative small- and medium-sized firms from predatory, larger competitors. The challenge is for emerging economies to capture the benefits of IP without importing the serious problems that developed countries have themselves failed to solve. Emerging economies can attain this balance by pursuing a policy of counter-harmonization in which they take advantage of existing exemptions in international agreements governing IP to establish regional, local, and international practices that promote more innovative, flexible uses of IP. Such practices include a research exemption for experimental uses of IP, government imposed nonexclusive licensing, anti-blocking provisions, an essential facilities doctrine, and compulsory licenses. Additional tools include an ex ante regime of compensatory liability rules for small scale innovation and sensible exceptions, particularly for science as well as general fair use provisions, to the exclusive rights of domestic copyright laws. Emerging economies will have to overcome strong economic pressure to accept more restrictive IP regimes as part of free trade agreements as well as a lack of technical expertise and internal government coordination. However, emerging economies have already accrued enough experience to be aware of the strengths and weaknesses of various IP schemes and their own ability to tailor IP to local needs. Developing countries will need to take advantage of that experience and defend innovative practices at international dispute resolution forums. Through creative, determined efforts, the developing countries can avoid other countries' IP excesses while establishing the kind of IP norms that address the real conditions of creativity and innovation in today's digitally empowered universe of scientific discourse.

  16. SSL - THE SIMPLE SOCKETS LIBRARY

    NASA Technical Reports Server (NTRS)

    Campbell, C. E.

    1994-01-01

    The Simple Sockets Library (SSL) allows C programmers to develop systems of cooperating programs using Berkeley streaming Sockets running under the TCP/IP protocol over Ethernet. The SSL provides a simple way to move information between programs running on the same or different machines and does so with little overhead. The SSL can create three types of Sockets: namely a server, a client, and an accept Socket. The SSL's Sockets are designed to be used in a fashion reminiscent of the use of FILE pointers so that a C programmer who is familiar with reading and writing files will immediately feel comfortable with reading and writing with Sockets. The SSL consists of three parts: the library, PortMaster, and utilities. The user of the SSL accesses it by linking programs to the SSL library. The PortMaster initializes connections between clients and servers. The PortMaster also supports a "firewall" facility to keep out socket requests from unapproved machines. The "firewall" is a file which contains Internet addresses for all approved machines. There are three utilities provided with the SSL. SKTDBG can be used to debug programs that make use of the SSL. SPMTABLE lists the servers and port numbers on requested machine(s). SRMSRVR tells the PortMaster to forcibly remove a server name from its list. The package also includes two example programs: multiskt.c, which makes multiple accepts on one server, and sktpoll.c, which repeatedly attempts to connect a client to some server at one second intervals. SSL is a machine independent library written in the C-language for computers connected via Ethernet using the TCP/IP protocol. It has been successfully compiled and implemented on a variety of platforms, including Sun series computers running SunOS, DEC VAX series computers running VMS, SGI computers running IRIX, DECstations running ULTRIX, DEC alpha AXPs running OSF/1, IBM RS/6000 computers running AIX, IBM PC and compatibles running BSD/386 UNIX and HP Apollo 3000/4000/9000/400T computers running HP-UX. SSL requires 45K of RAM to run under SunOS and 80K of RAM to run under VMS. For use on IBM PC series computers and compatibles running DOS, SSL requires Microsoft C 6.0 and the Wollongong TCP/IP package. Source code for sample programs and debugging tools are provided. The documentation is available on the distribution medium in TeX and PostScript formats. The standard distribution medium for SSL is a .25 inch streaming magnetic tape cartridge (QIC-24) in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format and a 5.25 inch 360K MS-DOS format diskette. The SSL was developed in 1992 and was updated in 1993.

  17. Assessing hospital emergency management plans: a guide for infection preventionists.

    PubMed

    Rebmann, Terri

    2009-11-01

    Hospital emergency management plans are essential and must include input from an infection preventionist (IP). Multiple hospital planning documents exist, but many do not address infection prevention issues, combine them with noninfection prevention issues, or are disease/event specific. An all-encompassing emergency management planning guide for IPs is needed. A literature review and Internet search were conducted in December 2008. Data from relevant sources were extracted. A spreadsheet was created that delineated hospital emergency management plan components of interest to IPs. Of the sources screened, 49 were deemed relevant. Eleven domains were identified: (1) having a plan; (2) assessing hospital readiness; (3) having infection prevention policies and procedures; (4) having occupational health policies and procedures; (5) conducting surveillance and triage; (6) reporting incidents, having a communication plan, and managing information; (7) having laboratory support; (8) addressing surge capacity issues; (9) having anti-infective therapy and/or vaccines; (10) providing infection prevention education; and (11) managing physical plant issues. Infection preventionists should use this article as an assessment tool for evaluating their hospital emergency management plan and for developing policies and procedures that will decrease the risk of infection transmission during a mass casualty event.

  18. The incubation period of Buruli ulcer (Mycobacterium ulcerans infection).

    PubMed

    Trubiano, Jason A; Lavender, Caroline J; Fyfe, Janet A M; Bittmann, Simone; Johnson, Paul D R

    2013-01-01

    Buruli Ulcer (BU) is caused by the environmental microbe Mycobacterium ulcerans. Despite unclear transmission, contact with a BU endemic region is the key known risk factor. In Victoria, Australia, where endemic areas have been carefully mapped, we aimed to estimate the Incubation Period (IP) of BU by interviewing patients who reported defined periods of contact with an endemic area prior to BU diagnosis. A retrospective review was undertaken of 408 notifications of BU in Victoria from 2002 to 2012. Telephone interviews using a structured questionnaire and review of notification records were performed. Patients with a single visit exposure to a defined endemic area were included and the period from exposure to disease onset determined (IP). We identified 111 of 408 notified patients (27%) who had a residential address outside a known endemic area, of whom 23 (6%) reported a single visit exposure within the previous 24 months. The median age of included patients was 30 years (range: 6 to 73) and 65% were male. 61% had visited the Bellarine Peninsula, currently the most active endemic area. The median time from symptom onset to diagnosis was 71 days (range: 34-204 days). The midpoint of the reported IP range was utilized to calculate a point estimate of the IP for each case. Subsequently, the mean IP for the cohort was calculated at 135 days (IQR: 109-160; CI 95%: 113.9-156), corresponding to 4.5 months or 19.2 weeks. The shortest IP recorded was 32 days and longest 264 days (Figure 1 & 2). IP did not vary for variables investigated. The estimated mean IP of BU in Victoria is 135 days (IQR: 109-160 days), 4.5 months. The shortest recorded was IP 34 days and longest 264 days. A greater understanding of BU IP will aid clinical risk assessment and future research.

  19. IP-Based Video Modem Extender Requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, L G; Boorman, T M; Howe, R E

    2003-12-16

    Visualization is one of the keys to understanding large complex data sets such as those generated by the large computing resources purchased and developed by the Advanced Simulation and Computing program (aka ASCI). In order to be convenient to researchers, visualization data must be distributed to offices and large complex visualization theaters. Currently, local distribution of the visual data is accomplished by distance limited modems and RGB switches that simply do not scale to hundreds of users across the local, metropolitan, and WAN distances without incurring large costs in fiber plant installation and maintenance. Wide Area application over the DOEmore » Complex is infeasible using these limited distance RGB extenders. On the other hand, Internet Protocols (IP) over Ethernet is a scalable well-proven technology that can distribute large volumes of data over these distances. Visual data has been distributed at lower resolutions over IP in industrial applications. This document describes requirements of the ASCI program in visual signal distribution for the purpose of identifying industrial partners willing to develop products to meet ASCI's needs.« less

  20. A mathematical model for maximizing the value of phase 3 drug development portfolios incorporating budget constraints and risk.

    PubMed

    Patel, Nitin R; Ankolekar, Suresh; Antonijevic, Zoran; Rajicic, Natasa

    2013-05-10

    We describe a value-driven approach to optimizing pharmaceutical portfolios. Our approach incorporates inputs from research and development and commercial functions by simultaneously addressing internal and external factors. This approach differentiates itself from current practices in that it recognizes the impact of study design parameters, sample size in particular, on the portfolio value. We develop an integer programming (IP) model as the basis for Bayesian decision analysis to optimize phase 3 development portfolios using expected net present value as the criterion. We show how this framework can be used to determine optimal sample sizes and trial schedules to maximize the value of a portfolio under budget constraints. We then illustrate the remarkable flexibility of the IP model to answer a variety of 'what-if' questions that reflect situations that arise in practice. We extend the IP model to a stochastic IP model to incorporate uncertainty in the availability of drugs from earlier development phases for phase 3 development in the future. We show how to use stochastic IP to re-optimize the portfolio development strategy over time as new information accumulates and budget changes occur. Copyright © 2013 John Wiley & Sons, Ltd.

  1. LIS–lnterlink—connecting laboratory information systems to remote primary health–care centres via the Internet

    PubMed Central

    Clark, Barry; Wachowiak, Bartosz; Crawford, Ewan W.; Jakubowski, Zenon; Kabata, Janusz

    1998-01-01

    A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLinkTM LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP ‘get’ and ‘post’ operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols. PMID:18924820

  2. Architecting Communication Network of Networks for Space System of Systems

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  3. LIS-lnterlink-connecting laboratory information systems to remote primary health-care centres via the Internet.

    PubMed

    Clark, B; Wachowiak, B; Crawford, E W; Jakubowski, Z; Kabata, J

    1998-01-01

    A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLink(TM) LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP 'get' and 'post' operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols.

  4. Proposed DoD (Department of Defense) Internet Protocol Standard.

    DTIC Science & Technology

    1982-07-06

    parameters fall into two categories: service quality parameters and service options. Service quality parameters influence the transmission service provided...Corporation 6 July 1982 -7- TM-7172/481/OO o Service Quality Parameters - Precedence : attempts preferential treatment for high importance datagrams...select the transmission quality. IP passes the type of service (TOS) command set for service quality to the SNP where it is mapped into subnetwork

  5. U.S. Army War College: Key Strategic Issues List

    DTIC Science & Technology

    2006-07-01

    Protocol (EoIP) b. Soldier vs contractor operated and maintained tactical equipment. Are the new soldier systems so “ high tech ” that we cannot fight...approaches to meet the high tech skills demanded by our transformation TOEs? (G-3 ACD) 9. War and Society: a. Has the Army adapted from Industrial-Age to...61 United States Military Academy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65 U.S. Army Corps of Engineers

  6. Four Core Questions for U.S. Cyberattack Guidance

    DTIC Science & Technology

    2013-03-01

    Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting...Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an...TCP/IP) had become the standard networking protocol, microprocessors had been developed, personal computers had come to market , and the first graphical

  7. Meeting the Challenge of Distributed Real-Time & Embedded (DRE) Systems

    DTIC Science & Technology

    2012-05-10

    IP RTOS Middleware Middleware Services DRE Applications Operating Sys & Protocols Hardware & Networks Middleware Middleware Services DRE...Services COTS & standards-based middleware, language, OS , network, & hardware platforms • Real-time CORBA (TAO) middleware • ADAPTIVE Communication...SPLs) F-15 product variant A/V 8-B product variant F/A 18 product variant UCAV product variant Software Produce-Line Hardware (CPU, Memory, I/O) OS

  8. Team Faces Tough Odds to Implement New Phone Network | Poster

    Cancer.gov

    It was a Saturday, in the final stretch of winter in late February, and the temperature peaked to a pleasant 66 degrees. Many people were outside enjoying the spring-like weather; however, the Voice over Internet Protocol (VoIP) Deployment Team was hard at work at Industry Lane. The team of 10 was installing the new voice-only network, including deploying 145 phones, switching

  9. Identity Management Task Force Report 2008

    DTIC Science & Technology

    2008-01-01

    Telecommunication Grid ( GTG ) consists of the public- switched telecommunications network (PSTN), various forms of Internet protocol (IP) networks...to network providers) to a large community of nomadic users and access devices over a wide range of access technologies. The GTG is notional, and...DOC Dr. Myra Gray , DOD Greg Hall, DNI Celia Hanley, DOD Patrick Hannon, DNI James Hass, IC Linda Hill, SSA Bobby Jones, DOC Patrick Hannon

  10. Generic Bluetooth Data Module

    DTIC Science & Technology

    2002-09-01

    to Ref (1). 34 RS232.java Serial Coomunication port class To Bluetooth module HCI.java Host Control Interface class L2CAP.java Logical Link Control...standard protocol for transporting IP datagrams over point-to-point link . It is designed to run over RFCOMM to accomplish point-to-point connections...Control and Adaption Host Controller Interface Link Manager Baseband / Link Controller Radio Figure 2. Bluetooth layers (From Ref. [3].) C

  11. Using somatic-cell nuclear transfer to study aging.

    PubMed

    Kishigami, Satoshi; Lee, Ah Reum; Wakayama, Teruhiko

    2013-01-01

    In mammals, a diploid genome following fertilization of haploid cells, an egg, and a spermatozoon is unique and irreproducible. This implies that the generated unique diploid genome is doomed with the individual's inevitable demise. Since it was first reported in 1997 that Dolly the sheep had been cloned, many mammalian species have been cloned successfully using somatic-cell nuclear transfer (SCNT). The success of SCNT in mammals enables us not only to reproduce offspring without germ cells, that is, to "passage" a unique diploid genome, but also to address valuable biological questions on development, nuclear reprogramming, and epigenetic memory. Successful cloning can also support epigenetic reprogramming where the aging clock is reset or reversed. Recent work using iPS cell technology has explored the practicality and led to the recapitulation of premature aging with iPSCs from progeroid laminopathies. As a result, reprogramming tools are also expected to contribute to studying biological age. However, the efficiency of animal cloning is still low in most cases and the mechanism of reprogramming in cloned embryos is still largely unclear. Here, based on recent advances, we describe an improved, more efficient mouse cloning protocol using histone deacetylase inhibitors (HDACis) and latrunculin A, which increases the success rates of producing cloned mice or establishing ES cells fivefold. This improved method of cloning will provide a strong tool to address many issues including biological aging more easily and with lower cost.

  12. Accounting for GC-content bias reduces systematic errors and batch effects in ChIP-seq data.

    PubMed

    Teng, Mingxiang; Irizarry, Rafael A

    2017-11-01

    The main application of ChIP-seq technology is the detection of genomic regions that bind to a protein of interest. A large part of functional genomics' public catalogs is based on ChIP-seq data. These catalogs rely on peak calling algorithms that infer protein-binding sites by detecting genomic regions associated with more mapped reads (coverage) than expected by chance, as a result of the experimental protocol's lack of perfect specificity. We find that GC-content bias accounts for substantial variability in the observed coverage for ChIP-seq experiments and that this variability leads to false-positive peak calls. More concerning is that the GC effect varies across experiments, with the effect strong enough to result in a substantial number of peaks called differently when different laboratories perform experiments on the same cell line. However, accounting for GC content bias in ChIP-seq is challenging because the binding sites of interest tend to be more common in high GC-content regions, which confounds real biological signals with unwanted variability. To account for this challenge, we introduce a statistical approach that accounts for GC effects on both nonspecific noise and signal induced by the binding site. The method can be used to account for this bias in binding quantification as well to improve existing peak calling algorithms. We use this approach to show a reduction in false-positive peaks as well as improved consistency across laboratories. © 2017 Teng and Irizarry; Published by Cold Spring Harbor Laboratory Press.

  13. Antibacterial Efficacy of Several Surgical Hand Preparation Products Used by Veterinary Students.

    PubMed

    Chou, Po-Yen; Doyle, Aimie J; Arai, Shiori; Burke, Pierre J; Bailey, Trina R

    2016-05-01

    To compare the antibacterial efficacy of different surgical hand antisepsis protocols used by veterinary students. Prospective, randomized, controlled study. Third year veterinary students (n=45). The participants were randomly assigned to 4 of the following 12 hand preparation product/time combinations: nonabrasive hand scrub method with 4% chlorhexidine gluconate (CH); hand rub with a mixture of 30% 1-propanol and 45% 2-propanol solution (MPS), 70% 2-propanol solution (IPS), or 61% ethanol solution with 1% chlorhexidine gluconate (ES/CH), with a contact time of 1.5, 3, or 5 minutes. Antibacterial efficacy was assessed after surgical hand preparation and at the end of surgery. Log reductions of total bacterial colony forming unit (CFU)/mL and positive aerobic culture rates were compared using multivariable analysis of variance and multivariable logistic regression, respectively. After surgical hand preparation, CH and ES/CH provided significantly higher log CFU reduction and lower positive culture rate for Gram-positive and spore-forming bacteria compared to MPS and IPS. Increase in contact time did not provide significant improvement in bacterial reduction. At the end of surgery, ES/CH provided significantly higher log CFU reduction compared to IPS and lower positive culture rate for Gram-positive bacteria compared to CH, MPS, and IPS. Increase in contact time significantly improved log CFU reduction in ES/CH and MPS groups. In our population of veterinary students ES/CH hand rubs or CH scrubs were more effective in reducing bacterial CFU during surgical hand preparation than MPS or IPS. © Copyright 2016 by The American College of Veterinary Surgeons.

  14. Strand-Specific Analysis of DNA Synthesis and Proteins Association with DNA Replication Forks in Budding Yeast.

    PubMed

    Yu, Chuanhe; Gan, Haiyun; Zhang, Zhiguo

    2018-01-01

    DNA replication initiates at DNA replication origins after unwinding of double-strand DNA(dsDNA) by replicative helicase to generate single-stranded DNA (ssDNA) templates for the continuous synthesis of leading-strand and the discontinuous synthesis of lagging-strand. Therefore, methods capable of detecting strand-specific information will likely yield insight into the association of proteins at leading and lagging strand of DNA replication forks and the regulation of leading and lagging strand synthesis during DNA replication. The enrichment and Sequencing of Protein-Associated Nascent DNA (eSPAN), which measure the relative amounts of proteins at nascent leading and lagging strands of DNA replication forks, is a step-wise procedure involving the chromatin immunoprecipitation (ChIP) of a protein of interest followed by the enrichment of protein-associated nascent DNA through BrdU immunoprecipitation. The isolated ssDNA is then subjected to strand-specific sequencing. This method can detect whether a protein is enriched at leading or lagging strand of DNA replication forks. In addition to eSPAN, two other strand-specific methods, (ChIP-ssSeq), which detects potential protein-ssDNA binding and BrdU-IP-ssSeq, which can measure synthesis of both leading and lagging strand, were developed along the way. These methods can provide strand-specific and complementary information about the association of the target protein with DNA replication forks as well as synthesis of leading and lagging strands genome wide. Below, we describe the detailed eSPAN, ChIP-ssSeq, and BrdU-IP-ssSeq protocols.

  15. Proteomics to study DNA-bound and chromatin-associated gene regulatory complexes

    PubMed Central

    Wierer, Michael; Mann, Matthias

    2016-01-01

    High-resolution mass spectrometry (MS)-based proteomics is a powerful method for the identification of soluble protein complexes and large-scale affinity purification screens can decode entire protein interaction networks. In contrast, protein complexes residing on chromatin have been much more challenging, because they are difficult to purify and often of very low abundance. However, this is changing due to recent methodological and technological advances in proteomics. Proteins interacting with chromatin marks can directly be identified by pulldowns with synthesized histone tails containing posttranslational modifications (PTMs). Similarly, pulldowns with DNA baits harbouring single nucleotide polymorphisms or DNA modifications reveal the impact of those DNA alterations on the recruitment of transcription factors. Accurate quantitation – either isotope-based or label free – unambiguously pinpoints proteins that are significantly enriched over control pulldowns. In addition, protocols that combine classical chromatin immunoprecipitation (ChIP) methods with mass spectrometry (ChIP-MS) target gene regulatory complexes in their in-vivo context. Similar to classical ChIP, cells are crosslinked with formaldehyde and chromatin sheared by sonication or nuclease digested. ChIP-MS baits can be proteins in tagged or endogenous form, histone PTMs, or lncRNAs. Locus-specific ChIP-MS methods would allow direct purification of a single genomic locus and the proteins associated with it. There, loci can be targeted either by artificial DNA-binding sites and corresponding binding proteins or via proteins with sequence specificity such as TAL or nuclease deficient Cas9 in combination with a specific guide RNA. We predict that advances in MS technology will soon make such approaches generally applicable tools in epigenetics. PMID:27402878

  16. Validation of the TONOPORT VI ambulatory blood pressure monitor in adults according to the European Society of Hypertension International Protocol revision 2010.

    PubMed

    Abou-Dakn, M; Döhmen, C; Wenzel, S

    2017-02-01

    The present study aims to examine the performance of the TONOPORT VI ambulatory blood pressure (BP) monitor in the inflation and deflation measurement methods, according to the European Society of Hypertension International Protocol revision 2010 (ESH-IP 2010). Systolic and diastolic blood pressures (SBP and DBP, respectively) of 33 subjects (23 female, 10 male) were sequentially measured and compared with reference measurements obtained by two observers using a standard mercury sphygmomanometer. The subjects were selected according to the recruitment instructions of the ESH-IP 2010. Three comparative readings were performed per subject. Among the 99 readings in the inflation measurement method were 92/94 (SBP/DBP) with differences ⩽5, 97/99 ⩽10 and 98/99 ⩽15 mm Hg. All of the 33 subjects had at least 2 out of 3 comparative readings with differences ⩽5 mm Hg and 0/0 of the subjects had no reading ⩽15 mm Hg. The validation of the deflation measurement method resulted in differences where 93/91 were ⩽5, 98/98 were ⩽10, and 99/99 were ⩽15 mm Hg. Thirty-two of the 33 subjects had at least 2 out of 3 comparative readings ⩽5 mm Hg and 0/0 of the subjects had no reading ⩽15 mm Hg. In conclusion, the TONOPORT VI, respectively, in the inflation and deflation measurement methods met all requirements of Part 1 and 2 of the ESH-IP 2010. Based on the study results, the TONOPORT VI can be recommended for BP measurements in adults.

  17. Lack of validation of the Dixtal (DX 2020) upper arm blood pressure monitor, in oscillometric mode, for clinical use in an intensive care unit, according to the European Society of Hypertension-International Protocol revision 2010.

    PubMed

    Gothardo, Ana C L O; Savioli, Amanda F; Santos, Dayanna S; Lamas, José L T

    2013-08-01

    The aim of the study was to evaluate the accuracy of the oscillometric blood pressure section in the DX 2020 Dixtal multiparametric monitor in adults according to the European Society of Hypertension-International Protocol as revised in 2010 (ESH-IP 2010). The blood pressure was sequentially verified in 33 individuals admitted to an adult ICU (18 men, mean age 44 years) with a mercury column sphygmomanometer (two observers) and the DX 2020 test device (one supervisor). Ninety-nine pairs of differences were obtained. Data analysis followed the ESH-IP 2010 requirements. In the first requirement, the DX 2020 device failed in the validation study in the 5, 10, and 15 mmHg ranges. From the 99 pairs of differences, only 43/73, 69/87, and 81/96 were obtained for systolic blood pressure and 29/65, 56/81, and 71/93 were obtained for diastolic blood pressure. In the second requirement, at least 24 individuals should have, from their comparisons, two under 0-5 mmHg ranges, which was observed only with 16 individuals in the systolic and nine in the diastolic range. Moreover, at maximum, only three readings could have differences of more than 5 mmHg, and this was observed in 10 individuals in the systolic range and 17 individuals in the diastolic range. The DX 2020 automatic multiparametric monitor for blood pressure measurement has not been recommended for clinical use according to the ESH-IP 2010. It is important to highlight that this work refers only to a blood pressure measurement module and that the same conclusion cannot be drawn for its other functions.

  18. Assessment of the accuracy and consistency in the application of standardized surveillance definitions: A summary of the American Journal of Infection Control and National Healthcare Safety Network case studies, 2010-2016.

    PubMed

    Wright, Marc-Oliver; Allen-Bridson, Katherine; Hebden, Joan N

    2017-06-01

    The Centers for Disease Control and Prevention (CDC) National Healthcare Safety Network (NHSN) surveillance definitions are the most widely used criteria for health care-associated infection (HAI) surveillance. NHSN participants agree to conduct surveillance in accordance with the NHSN protocol and criteria. To assess the application of these standardized surveillance specifications and offer infection preventionists (IPs) opportunities for ongoing education, a series of case studies, with questions related to NHSN definitions and criteria were published. Beginning in 2010, case studies with multiple-choice questions based on standard surveillance criteria and protocols were written and published in the American Journal of Infection Control with a link to an online survey. Participants anonymously submitted their responses before receiving the correct answers. The 22 case studies had 7,950 respondents who provided 27,790 responses to 75 questions during the first 6 years. Correct responses were selected 62.5% of the time (17,376 out of 27,290), but ranged widely (16%-87%). In a subset analysis, 93% of participants self-identified as IPs (3,387 out of 3,640), 4.5% were public health professionals (163 out of 3,640), and 2.5% were physicians (90 out of 3,640). IPs responded correctly (62%) more often than physicians (55%) (P = .006). Among a cohort of voluntary participants, accurate application of surveillance criteria to case studies was suboptimal, highlighting the need for continuing education, competency development, and auditing. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.

  19. Analysis of In Vivo Chromatin and Protein Interactions of Arabidopsis Transcript Elongation Factors.

    PubMed

    Pfab, Alexander; Antosz, Wojciech; Holzinger, Philipp; Bruckmann, Astrid; Griesenbeck, Joachim; Grasser, Klaus D

    2017-01-01

    A central step to elucidate the function of proteins commonly comprises the analysis of their molecular interactions in vivo. For nuclear regulatory proteins this involves determining protein-protein interactions as well as mapping of chromatin binding sites. Here, we present two protocols to identify protein-protein and chromatin interactions of transcript elongation factors (TEFs) in Arabidopsis. The first protocol (Subheading 3.1) describes protein affinity-purification coupled to mass spectrometry (AP-MS) that utilizes suspension cultured cells as experimental system. This approach provides an unbiased view of proteins interacting with epitope-tagged TEFs. The second protocol (Subheading 3.2) depicts details about a chromatin immunoprecipitation (ChIP) procedure to characterize genomic binding sites of TEFs. These methods should be valuable tools for the analysis of a broad variety of nuclear proteins.

  20. Infection prevention workforce: Potential benefits to educational diversity.

    PubMed

    Reese, Sara M; Gilmartin, Heather M

    2017-06-01

    Nurses have historically occupied the infection preventionist (IP) role. As the knowledge and skills needed to advance the field expand, professionals from public health and the laboratory sciences have become IPs. Our study describes the characteristics of current IPs and assesses for relationships between background, certification, experience, and type of work performed. The data were drawn from an existing dataset collected in the conduct of the Association for Professionals in Infection Control and Epidemiology (APIC) MegaSurvey. Descriptive statistics were computed. Associations were calculated using χ 2 or Cochran-Mantel-Haenszel tests. Characteristics of IPs were stratified by work-related activities to allow for comparisons between groups. Of the 13,050 active APIC members, 4,079 participated in the survey (31% response rate). The primary job activity for nurses (97.9%; n = 2,434) was preventing and controlling the transmission of infectious agents or health care-associated infections, for laboratory scientists (97.5%; n = 307) it was the interpretation of surveillance data, and for public health professionals (96.1%; n = 136) it was management and communication: feedback. Infection control departments would benefit from hiring IPs with diverse education and training to address the expanding roles and responsibilities of IPs. This may facilitate the implementation of novel and innovative processes that will impact patient care. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.

Top