Sample records for protocol sip server

  1. Decentralized session initiation protocol solution in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  2. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. Design of SIP transformation server for efficient media negotiation

    NASA Astrophysics Data System (ADS)

    Pack, Sangheon; Paik, Eun Kyoung; Choi, Yanghee

    2001-07-01

    Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficient media negotiation architecture using the transformation server and the Intelligent Location Server (ILS). The transformation server is an extended Session Initiation Protocol (SIP) proxy server. It can modify an unacceptable session INVITE message into an acceptable one using the ILS. The ILS is a directory server based on the Lightweight Directory Access Protocol (LDAP) that keeps userí*s location information and available media information. The proposed architecture can eliminate an unnecessary response and re-INVITE messages of the standard SIP architecture. It takes only 1.5 round trip times to negotiate two different media types while the standard media negotiation mechanism takes 2.5 round trip times. The extra processing time in message handling is negligible in comparison to the reduced round trip time. The experimental results show that the session setup time in the proposed architecture is less than the setup time in the standard SIP. These results verify that the proposed media negotiation mechanism is more efficient in solving diversity problems.

  5. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  6. Nationwide SIP Telephony Network Design to Prevent Congestion Caused by Disaster

    NASA Astrophysics Data System (ADS)

    Satoh, Daisuke; Ashitagawa, Kyoko

    We present a session initiation protocol (SIP) network design for a voice-over-IP network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all of the SIP servers equally. It takes advantage of the fact that equipment for voice data packets is different from equipment for signaling packets in SIP networks. Furthermore, the design achieves simple routing on the basis of telephone numbers. We evaluated the performance of our design in preventing congestion through simulation. We showed that the proposed design has roughly 20 times more capacity, which is 57 times the normal load, than the conventional design if a disaster were to occur in Niigata Prefecture struck by the Chuetsu earthquake in 2004.

  7. Comparison of H.323 and SIP for IP telephony signaling

    NASA Astrophysics Data System (ADS)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  8. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  9. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  10. San Mateo County's Server Information Program (S.I.P.): A Community-Based Alcohol Server Training Program.

    ERIC Educational Resources Information Center

    de Miranda, John

    The field of alcohol server awareness and training has grown dramatically in the past several years and the idea of training servers to reduce alcohol problems has become a central fixture in the current alcohol policy debate. The San Mateo County, California Server Information Program (SIP) is a community-based prevention strategy designed to…

  11. Comparison of artificial intelligence classifiers for SIP attack data

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2016-05-01

    Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public IP address and uses standard SIP PBX ports. All information gathered via honeypot is periodically sent to the centralized server. This server classifies all attack data by neural network algorithm. The paper describes optimizations of a neural network classifier, which lower the classification error. The article contains the comparison of two neural network algorithm used for the classification of validation data. The first is the original implementation of the neural network described in recent work; the second neural network uses further optimizations like input normalization or cross-entropy cost function. We also use other implementations of neural networks and machine learning classification algorithms. The comparison test their capabilities on validation data to find the optimal classifier. The article result shows promise for further development of an accurate SIP attack classification engine.

  12. SIP: A Web-Based Astronomical Image Processing Program

    NASA Astrophysics Data System (ADS)

    Simonetti, J. H.

    1999-12-01

    I have written an astronomical image processing and analysis program designed to run over the internet in a Java-compatible web browser. The program, Sky Image Processor (SIP), is accessible at the SIP webpage (http://www.phys.vt.edu/SIP). Since nothing is installed on the user's machine, there is no need to download upgrades; the latest version of the program is always instantly available. Furthermore, the Java programming language is designed to work on any computer platform (any machine and operating system). The program could be used with students in web-based instruction or in a computer laboratory setting; it may also be of use in some research or outreach applications. While SIP is similar to other image processing programs, it is unique in some important respects. For example, SIP can load images from the user's machine or from the Web. An instructor can put images on a web server for students to load and analyze on their own personal computer. Or, the instructor can inform the students of images to load from any other web server. Furthermore, since SIP was written with students in mind, the philosophy is to present the user with the most basic tools necessary to process and analyze astronomical images. Images can be combined (by addition, subtraction, multiplication, or division), multiplied by a constant, smoothed, cropped, flipped, rotated, and so on. Statistics can be gathered for pixels within a box drawn by the user. Basic tools are available for gathering data from an image which can be used for performing simple differential photometry, or astrometry. Therefore, students can learn how astronomical image processing works. Since SIP is not part of a commercial CCD camera package, the program is written to handle the most common denominator image file, the FITS format.

  13. Computational methods using weighed-extreme learning machine to predict protein self-interactions with protein evolutionary information.

    PubMed

    An, Ji-Yong; Zhang, Lei; Zhou, Yong; Zhao, Yu-Jun; Wang, Da-Fu

    2017-08-18

    Self-interactions Proteins (SIPs) is important for their biological activity owing to the inherent interaction amongst their secondary structures or domains. However, due to the limitations of experimental Self-interactions detection, one major challenge in the study of prediction SIPs is how to exploit computational approaches for SIPs detection based on evolutionary information contained protein sequence. In the work, we presented a novel computational approach named WELM-LAG, which combined the Weighed-Extreme Learning Machine (WELM) classifier with Local Average Group (LAG) to predict SIPs based on protein sequence. The major improvement of our method lies in presenting an effective feature extraction method used to represent candidate Self-interactions proteins by exploring the evolutionary information embedded in PSI-BLAST-constructed position specific scoring matrix (PSSM); and then employing a reliable and robust WELM classifier to carry out classification. In addition, the Principal Component Analysis (PCA) approach is used to reduce the impact of noise. The WELM-LAG method gave very high average accuracies of 92.94 and 96.74% on yeast and human datasets, respectively. Meanwhile, we compared it with the state-of-the-art support vector machine (SVM) classifier and other existing methods on human and yeast datasets, respectively. Comparative results indicated that our approach is very promising and may provide a cost-effective alternative for predicting SIPs. In addition, we developed a freely available web server called WELM-LAG-SIPs to predict SIPs. The web server is available at http://219.219.62.123:8888/WELMLAG/ .

  14. The Water SWITCH-ON Spatial Information Platform (SIP)

    NASA Astrophysics Data System (ADS)

    Sala Calero, J., Sr.; Boot, G., Sr.; Dihé, P., Sr.; Arheimer, B.

    2017-12-01

    The amount of hydrological open data is continually growing and providing opportunities to the scientific community. Although the existing data portals (GEOSS Portal, INSPIRE community geoportal and others) enable access to open data, many users still find browsing through them difficult. Moreover, the time spent on gathering and preparing data usually is more significant than the time spent on the experiment itself. Thus, any improvement on searching, understanding, accessing or using open data is greatly beneficial. The Spatial Information Platform (SIP) has been developed to tackle these issues within the SWITCH-ON European Commission funded FP7 project. The SIP has been designed as a set of tools based on open standards that provide to the user all the necessary functionalities as described in the Publish-Find-Bind (PFB) pattern. In other words, this means that the SIP helps users to locate relevant and suitable data for their experiments analysis, to access and transform it (filtering, extraction, selection, conversion, aggregation). Moreover, the SIP can be used to provide descriptive information about the data and to publish it so others can find and use it. The SIP is based on existing open data protocols such as the OGC/CSW, OGC/WMS, OpenDAP and open-source components like PostgreSQL/PostGIS, GeoServer and pyCSW. The SIP is divided in three main user interfaces: the BYOD (Browse your open dataset) web interface, the Expert GUI tool and the Upload Data and Metadata web interface. The BYOD HTML5 client is the main entry point for users that want to browse through open data in the SIP. The BYOD has a map interface based on Leaflet JavaScript libraries so that the users can search more efficiently. The web-based Open Data Registration Tool is a user-friendly upload and metadata description interface (geographical extent, license, DOI generation). The Expert GUI is a desktop application that provides full metadata editing capabilities for the metadata moderators of the project. In conclusion, the Spatial Information Platform (SIP) provides to its community a set of tools for better understanding and ease of use of hydrological open-data. Moreover, the SIP has been based on well-known OGC standards that will allow the connection and data harvesting from popular open data portals such as the GEOSS system of systems.

  15. Closed Conference Signalling Using the Session Initiation Protocol.

    ERIC Educational Resources Information Center

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  16. 77 FR 62449 - Approval and Promulgation of Implementation Plans; Alabama; Disapproval of 110(a)(2)(E)(ii...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-15

    ... in their comment that EPA approve a conflict of interest protocol submitted for inclusion in the SIP... that with the inclusion of this protocol in the SIP, EPA would be able to approve Alabama's 1997 annual... the State Implementation Plan (SIP) submissions, submitted by the State of Alabama, through the...

  17. Antenatal magnesium sulfate and spontaneous intestinal perforation in infants less than 25 weeks gestation.

    PubMed

    Rattray, B N; Kraus, D M; Drinker, L R; Goldberg, R N; Tanaka, D T; Cotten, C M

    2014-11-01

    Evaluate spontaneous intestinal perforation (SIP)/death among extremely low birthweight (ELBW) infants before, during and after initiation of an antenatal magnesium for neuroprotection protocol (MgPro). We tested associations between SIP/death and magnesium exposure, gestational age (GA) and interactions with GA and magnesium exposure in a cohort of inborn ELBW infants before, during and after MgPro. One hundred and fifty-five ELBW infants were included, 81 before, 23 during and 51 after MgPro. ELBW infants (78.3%) were exposed to Mg during MgPro compared with 50.6% and 60.8% before and after, respectively. Incidence of SIP on protocol was 30.4% vs 12.9% off protocol (P=0.03). GA was strongly associated with SIP (P<0.01). Antenatal Mg dose was also associated with SIP/death regardless of epoch (odds ratio 9.3 (1.04-104.6)), but increased SIP/death was limited to those <25 weeks gestation. Higher Mg dose was associated with higher SIP and death risk among infants with the lowest birthweights. Validation of this observation in larger populations is warranted.

  18. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Voice Call Analysis

    DTIC Science & Technology

    2015-09-01

    Gateway 2 4. Voice Packet Flow: SIP , Session Description Protocol (SDP), and RTP 3 5. Voice Data Analysis 5 6. Call Analysis 6 7. Call Metrics 6...analysis processing is designed for a general VoIP system architecture based on Session Initiation Protocol ( SIP ) for negotiating call sessions and...employs Skinny Client Control Protocol for network communication between the phone and the local CallManager (e.g., for each dialed digit), SIP

  19. Lightweight SIP/SDP compression scheme (LSSCS)

    NASA Astrophysics Data System (ADS)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  20. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  1. Design of a SIP device cooperation system on OSGi service platforms

    NASA Astrophysics Data System (ADS)

    Takayama, Youji; Koita, Takahiro; Sato, Kenya

    2007-12-01

    Home networks feature such various technologies as protocols, specifications, and middleware, including HTTP, UPnP, and Jini. A service platform is required to handle such technologies to enable them to cooperate with different devices. The OSGi service platform, which meets the requirements based on service-oriented architecture, is designed and standardized by OSGi Alliance and consists of two parts: one OSGi Framework and bundles. On the OSGi service platform, APIs are defined as services that can handle these technologies and are implemented in the bundle. By using the OSGi Framework with bundles, various technologies can cooperate with each other. On the other hand, in IP networks, Session Initiation Protocol (SIP) is often used in device cooperation services to resolve an IP address, control a session between two or more devices, and easily exchange the statuses of devices. However, since many existing devices do not correspond to SIP, it cannot be used for device cooperation services. A device that does not correspond to SIP is called an unSIP device. This paper proposes and implements a prototype system that enables unSIP devices to correspond to SIP. For unSIP devices, the proposed system provides device cooperation services with SIP.

  2. DNA stable-isotope probing (DNA-SIP).

    PubMed

    Dunford, Eric A; Neufeld, Josh D

    2010-08-02

    DNA stable-isotope probing (DNA-SIP) is a powerful technique for identifying active microorganisms that assimilate particular carbon substrates and nutrients into cellular biomass. As such, this cultivation-independent technique has been an important methodology for assigning metabolic function to the diverse communities inhabiting a wide range of terrestrial and aquatic environments. Following the incubation of an environmental sample with stable-isotope labelled compounds, extracted nucleic acid is subjected to density gradient ultracentrifugation and subsequent gradient fractionation to separate nucleic acids of differing densities. Purification of DNA from cesium chloride retrieves labelled and unlabelled DNA for subsequent molecular characterization (e.g. fingerprinting, microarrays, clone libraries, metagenomics). This JoVE video protocol provides visual step-by-step explanations of the protocol for density gradient ultracentrifugation, gradient fractionation and recovery of labelled DNA. The protocol also includes sample SIP data and highlights important tips and cautions that must be considered to ensure a successful DNA-SIP analysis.

  3. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    NASA Astrophysics Data System (ADS)

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.

  4. The extended TRIP supporting VoIP routing reservation with distributed QoS

    NASA Astrophysics Data System (ADS)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  5. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  6. Instant Messaging by SIP

    NASA Astrophysics Data System (ADS)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  7. 76 FR 41424 - Finding of Substantial Inadequacy of Implementation Plan; Call for Iowa State Implementation Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-14

    ... modeling requirement for this SIP call should allow for the use of the modeling protocol developed by Iowa... is making a finding that the Iowa State Implementation Plan (SIP) is substantially inadequate to... ) in Muscatine County, Iowa. The specific SIP deficiencies needing revision are described below. EPA is...

  8. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  9. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  10. Development of a multilocus-based approach for sponge (phylum Porifera) identification: refinement and limitations.

    PubMed

    Yang, Qi; Franco, Christopher M M; Sorokin, Shirley J; Zhang, Wei

    2017-02-02

    For sponges (phylum Porifera), there is no reliable molecular protocol available for species identification. To address this gap, we developed a multilocus-based Sponge Identification Protocol (SIP) validated by a sample of 37 sponge species belonging to 10 orders from South Australia. The universal barcode COI mtDNA, 28S rRNA gene (D3-D5), and the nuclear ITS1-5.8S-ITS2 region were evaluated for their suitability and capacity for sponge identification. The highest Bit Score was applied to infer the identity. The reliability of SIP was validated by phylogenetic analysis. The 28S rRNA gene and COI mtDNA performed better than the ITS region in classifying sponges at various taxonomic levels. A major limitation is that the databases are not well populated and possess low diversity, making it difficult to conduct the molecular identification protocol. The identification is also impacted by the accuracy of the morphological classification of the sponges whose sequences have been submitted to the database. Re-examination of the morphological identification further demonstrated and improved the reliability of sponge identification by SIP. Integrated with morphological identification, the multilocus-based SIP offers an improved protocol for more reliable and effective sponge identification, by coupling the accuracy of different DNA markers.

  11. Development of a multilocus-based approach for sponge (phylum Porifera) identification: refinement and limitations

    PubMed Central

    Yang, Qi; Franco, Christopher M. M.; Sorokin, Shirley J.; Zhang, Wei

    2017-01-01

    For sponges (phylum Porifera), there is no reliable molecular protocol available for species identification. To address this gap, we developed a multilocus-based Sponge Identification Protocol (SIP) validated by a sample of 37 sponge species belonging to 10 orders from South Australia. The universal barcode COI mtDNA, 28S rRNA gene (D3–D5), and the nuclear ITS1-5.8S-ITS2 region were evaluated for their suitability and capacity for sponge identification. The highest Bit Score was applied to infer the identity. The reliability of SIP was validated by phylogenetic analysis. The 28S rRNA gene and COI mtDNA performed better than the ITS region in classifying sponges at various taxonomic levels. A major limitation is that the databases are not well populated and possess low diversity, making it difficult to conduct the molecular identification protocol. The identification is also impacted by the accuracy of the morphological classification of the sponges whose sequences have been submitted to the database. Re-examination of the morphological identification further demonstrated and improved the reliability of sponge identification by SIP. Integrated with morphological identification, the multilocus-based SIP offers an improved protocol for more reliable and effective sponge identification, by coupling the accuracy of different DNA markers. PMID:28150727

  12. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  13. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.

    PubMed

    Yang, Li; Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.

  14. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments

    PubMed Central

    Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085

  15. Presence Management and Merging Presence Information for NGN Services

    NASA Astrophysics Data System (ADS)

    Schumann, Sebastian; Mikoczy, Eugen; Podhradsky, Pavol; Muruchi, Feliciano; Maruschke, Michael

    This paper describes an approach for interworking scenarios between Session Initiation Protocol (SIP) based and non SIP based frameworks (e.g. web services) in case of the presence management service. The characteristics of the concept of a centralized presence management will be introduced.

  16. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  17. Capsule endoscopy for the detection of oesophageal mucosal disorders: a comparison of two different ingestion protocols.

    PubMed

    De Jonge, Pieter J F; Van Eijck, Brechje C; Geldof, Han; Bekkering, Frank C; Essink-Bot, Marie-Louise; Polinder, Suzanne; Kuipers, Ernst J; Siersema, Peter D

    2008-01-01

    To assess the accuracy of a new ingestion protocol for capsule endoscopy (CE) in evaluating patients with gastro-oesophageal reflux disease (GORD). Oesophago-gastroduodenoscopy (OGD) was performed 1 week prior to CE. The first 28 subjects swallowed the capsule following the original ingestion protocol (OIP) and the subsequent 30 subjects following a simplified ingestion protocol (SIP). CE videos were reviewed by two independent investigators who were blinded to the OGD findings. Of 48 patients included, 24 were diagnosed with reflux oesophagitis (67% male, mean age 49.5+/-13 years) and 24 with Barrett oesophagus (BO) (88% male, 55.6+/-10 years) by OGD. In addition, 10 asymptomatic healthy controls (50% male, 45.8+/-7.1 years) were included. Oesophageal transit time was faster in patients using the SIP compared to the OIP (126+/-26 s versus 214+/-33; p=0.04). Complete evaluation of the Z-line was possible in 19/28 (68%) of the OIPs compared to 28/30 (93%) of the SIPs (p=0.04). Sensitivity for detecting any oesophageal abnormality was higher in the SIP group than in the OIP group (97% versus 89%; p=0.11). Overall, CE detected oesophagitis in 22/24 patients (sensitivity, 92%; specificity, 88%) and BO in 23/24 patients (sensitivity, 96%; specificity, 91%). Furthermore, 41/44 (93%) preferred CE over OGD and experienced less discomfort and pain during CE. CE is an accurate method for detecting mucosal oesophageal abnormalities. The new ingestion protocol improves the visualization of the Z-line, which is likely to increase the diagnostic yield of CE.

  18. A response strategy predicts acquisition of schedule-induced polydipsia in rats.

    PubMed

    Gregory, James Gardner; Hawken, Emily R; Banasikowski, Tomek J; Dumont, Eric C; Beninger, Richard J

    2015-08-03

    Schedule-induced polydipsia (SIP) is excessive, non-regulatory drinking. We aimed to identify phenotypic learning traits representative of neural circuitry that underlies SIP and hypothesized that rats that are response-learners will be more susceptible in developing compulsive water drinking. Using the Y-maze, the rats were characterized as either place- or response-learners. They were exposed to the SIP protocol for a period of 21days. Subsequent histological staining for FosB/ΔFosB examined neuronal activation associated with SIP in several brain regions. The rats with a preference for a response-learning strategy were more likely to develop SIP than the rats using a place-learning strategy. Furthermore amphetamine sensitization, observed to increase SIP, also shifted learning strategy to a response-learning strategy. No differences were observed in FosB/ΔFosB expression between SIP and non-SIP rats in the dorsolateral striatum (DLS) and CA1 region of the hippocampus. However, SIP rats had greater FosB/ΔFosB expression in prefrontal cortex regions. The rats that develop SIP have a preference for response-learning strategies and increased neuronal activation in frontal cortical regions associated with habit formation and compulsion. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  20. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  1. Quantum processing by remote quantum control

    NASA Astrophysics Data System (ADS)

    Qiang, Xiaogang; Zhou, Xiaoqi; Aungskunsiri, Kanin; Cable, Hugo; O'Brien, Jeremy L.

    2017-12-01

    Client-server models enable computations to be hosted remotely on quantum servers. We present a novel protocol for realizing this task, with practical advantages when using technology feasible in the near term. Client tasks are realized as linear combinations of operations implemented by the server, where the linear coefficients are hidden from the server. We report on an experimental demonstration of our protocol using linear optics, which realizes linear combination of two single-qubit operations by a remote single-qubit control. In addition, we explain when our protocol can remain efficient for larger computations, as well as some ways in which privacy can be maintained using our protocol.

  2. Multi-server blind quantum computation over collective-noise channels

    NASA Astrophysics Data System (ADS)

    Xiao, Min; Liu, Lin; Song, Xiuli

    2018-03-01

    Blind quantum computation (BQC) enables ordinary clients to securely outsource their computation task to costly quantum servers. Besides two essential properties, namely correctness and blindness, practical BQC protocols also should make clients as classical as possible and tolerate faults from nonideal quantum channel. In this paper, using logical Bell states as quantum resource, we propose multi-server BQC protocols over collective-dephasing noise channel and collective-rotation noise channel, respectively. The proposed protocols permit completely or almost classical client, meet the correctness and blindness requirements of BQC protocol, and are typically practical BQC protocols.

  3. The amphetamine sensitization model of schizophrenia symptoms and its effect on schedule-induced polydipsia in the rat.

    PubMed

    Hawken, Emily R; Beninger, Richard J

    2014-05-01

    Amphetamine enhances dopamine (DA) transmission and induces psychotic states or exacerbates psychosis in at-risk individuals. Amphetamine sensitization of the DA system has been proposed as a rodent model of schizophrenia-like symptoms. In humans, excessive nonphysiologic drinking or primary polydipsia is significantly associated with a diagnosis of schizophrenia. In rodents, nonphysiologic drinking can be induced by intermittent presentation of food in the presence of a drinking spout to a hungry animal; this phenomenon is termed, "schedule-induced polydipsia" (SIP). This study aims to determine the effects of amphetamine sensitization on SIP. We injected rats with amphetamine (1.5 mg/kg) daily for 5 days. Following 4 weeks of withdrawal, animals were food restricted and exposed to the SIP protocol (noncontingent fixed-time 1-min food schedule) for daily 2-h sessions for 24 days. Results showed that previously amphetamine-injected animals drank more in the SIP protocol and drank more than controls when the intermittent food presentation schedule was removed. These findings suggest that hyperdopaminergia associated with schizophrenia may contribute to the development of polydipsia in this population. Whether animals that develop SIP have DA dysfunction or aberrant activity of other circuits that modulate DA activity has yet to be clearly defined.

  4. Applications of DNA-Stable Isotope Probing in Bioremediation Studies

    NASA Astrophysics Data System (ADS)

    Chen, Yin; Vohra, Jyotsna; Murrell, J. Colin

    DNA-stable isotope probing, a method to identify active microorganisms without the prerequisite of cultivation, has been widely applied in the study of microorganisms involved in the degradation of environmental pollutants. Recent advances and technique considerations in applying DNA-SIP in bioremediation are highlighted. A detailed protocol of a DNA-SIP experiment is provided.

  5. Applications of DNA-stable isotope probing in bioremediation studies.

    PubMed

    Chen, Yin; Vohra, Jyotsna; Murrell, J Colin

    2010-01-01

    DNA-stable isotope probing, a method to identify active microorganisms without the prerequisite of cultivation, has been widely applied in the study of microorganisms involved in the degradation of environmental pollutants. Recent advances and technique considerations in applying DNA-SIP in bioremediation are highlighted. A detailed protocol of a DNA-SIP experiment is provided.

  6. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  7. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  8. Greenberger-Horne-Zeilinger states-based blind quantum computation with entanglement concentration.

    PubMed

    Zhang, Xiaoqian; Weng, Jian; Lu, Wei; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing

    2017-09-11

    In blind quantum computation (BQC) protocol, the quantum computability of servers are complicated and powerful, while the clients are not. It is still a challenge for clients to delegate quantum computation to servers and keep the clients' inputs, outputs and algorithms private. Unfortunately, quantum channel noise is unavoidable in the practical transmission. In this paper, a novel BQC protocol based on maximally entangled Greenberger-Horne-Zeilinger (GHZ) states is proposed which doesn't need a trusted center. The protocol includes a client and two servers, where the client only needs to own quantum channels with two servers who have full-advantage quantum computers. Two servers perform entanglement concentration used to remove the noise, where the success probability can almost reach 100% in theory. But they learn nothing in the process of concentration because of the no-signaling principle, so this BQC protocol is secure and feasible.

  9. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  10. Blind quantum computation with identity authentication

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  11. Improving Internet Archive Service through Proxy Cache.

    ERIC Educational Resources Information Center

    Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming

    2003-01-01

    Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…

  12. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  13. Covert Channels in SIP for VoIP Signalling

    NASA Astrophysics Data System (ADS)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  14. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  15. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  16. [The ISP (Safe Insertion of PICCs) protocol: a bundle of 8 recommendations to minimize the complications related to the peripherally inserted central venous catheters (PICC)].

    PubMed

    Emoli, Alessandro; Cappuccio, Serena; Marche, Bruno; Musarò, Andrea; Scoppettuolo, Giancarlo; Pittiruti, Mauro

    2014-01-01

    The ISP (Safe Insertion of PICCs) protocol: a bundle of 8 recommendations to minimize the complications related to the peripherally inserted central venous catheters (PICC). The insertion of a peripherally inserted central venous catheter (PICC) is not without risks. The Italian Group for the Study of Long-Term Central Venous Access Devices (GAVeCeLT) has developed a protocol (SIP: Safe Implantation of PICCs) with the aim of minimizing the risks which may be associated with the placement of PICCs. The protocol is based on recommendations available in the literature and on the main clinical practice guidelines. The SIP protocol, a bundle of evidence-based recommendations, it is is easy to use, inexpensive, and cost-effective. If routinely used and carefully inplemented, it greatly reduces complications such as failure of venipuncture, accidental arterial puncture, damage of median nerve, infection and catheter related venous thrombosis.

  17. Improving Sleep for Hospitalized Antepartum Patients: A Non-Randomized Controlled Pilot Study.

    PubMed

    Lee, Kathryn A; Gay, Caryl L

    2017-12-15

    To evaluate feasibility and efficacy of a hospital-based protocol for improving sleep in high- risk antepartum patients. Sleep measures were compared during 1 week of hospitalization before and after implementing a Sleep Improvement Protocol for Antepartum Patients (SIP-AP). A non-randomized convenience sample of usual care controls was compared to a subsequent intervention sample after the protocol was implemented. Women were eligible if they spoke English, were medically stable, pregnant for at least 20 weeks, and hospitalized at least 24 hours; 25 pregnant women had sufficient data for analyses (11 controls, 14 intervention). Sleep was assessed in 3 ways: the Pittsburgh Sleep Quality Index was completed after obtaining consent to estimate sleep quality prior to hospital admission; sleep diary completed each hospital day; and General Sleep Disturbance Scale completed at 7 days or prior to hospital discharge. Symptoms that could affect sleep were assessed with the Memorial Symptom Assessment Scale. Both groups recorded similar sleep duration (7 hours) but the intervention group had fewer symptoms and significantly ( P = .015) lower sleep disturbance scores (53.1 ± 14.5) than controls (71.9 ± 18.8). Participant feedback about the intervention was positive, although adherence to components of the intervention protocol was variable. This pilot study provides evidence of the feasibility and preliminary efficacy of the SIP-AP intervention for reducing symptoms and improving sleep of antepartum patients during hospitalization. Further detailed evaluation of specific components of this protocol is warranted, and other types of hospitalized patients may benefit from unit-based modifications to this SIP-AP protocol. © 2017 American Academy of Sleep Medicine

  18. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  19. OPeNDAP Server4: Buidling a High-Performance Server for the DAP by Leveraging Existing Software

    NASA Astrophysics Data System (ADS)

    Potter, N.; West, P.; Gallagher, J.; Garcia, J.; Fox, P.

    2006-12-01

    OPeNDAP has been working in conjunction with NCAR/ESSL/HAO to develop a modular, high performance data server that will be the successor to the current OPeNDAP data server. The new server, called Server4, is really two servers: A 'Back-End' data server which reads information from various types of data sources and packages the results in DAP objects; and A 'Front-End' which receives client DAP request and then decides how use features of the Back-End data server to build the correct responses. This architecture can be configured in several interesting ways: The Front- and Back-End components can be run on either the same or different machines, depending on security and performance needs, new Front-End software can be written to support other network data access protocols and local applications can interact directly with the Back-End data server. This new server's Back-End component will use the server infrastructure developed by HAO for use with the Earth System Grid II project. Extensions needed to use it as part of the new OPeNDAP server were minimal. The HAO server was modified so that it loads 'data handlers' at run-time. Each data handler module only needs to satisfy a simple interface which both enabled the existing data handlers written for the old OPeNDAP server to be directly used and also simplifies writing new handlers from scratch. The Back-End server leverages high- performance features developed for the ESG II project, so applications that can interact with it directly can read large volumes of data efficiently. The Front-End module of Server4 uses the Java Servlet system in place of the Common Gateway Interface (CGI) used in the past. New front-end modules can be written to support different network data access protocols, so that same server will ultimately be able to support more than the DAP/2.0 protocol. As an example, we will discuss a SOAP interface that's currently in development. In addition to support for DAP/2.0 and prototypical support for a SOAP interface, the new server includes support for the THREDDS cataloging protocol. THREDDS is tightly integrated into the Front-End of Server4. The Server4 Front-End can make full use of the advanced THREDDS features such as attribute specification and inheritance, custom catalogs which segue into automatically generated catalogs as well as providing a default behavior which requires almost no catalog configuration.

  20. Protein-based stable isotope probing.

    PubMed

    Jehmlich, Nico; Schmidt, Frank; Taubert, Martin; Seifert, Jana; Bastida, Felipe; von Bergen, Martin; Richnow, Hans-Hermann; Vogt, Carsten

    2010-12-01

    We describe a stable isotope probing (SIP) technique that was developed to link microbe-specific metabolic function to phylogenetic information. Carbon ((13)C)- or nitrogen ((15)N)-labeled substrates (typically with >98% heavy label) were used in cultivation experiments and the heavy isotope incorporation into proteins (protein-SIP) on growth was determined. The amount of incorporation provides a measure for assimilation of a substrate, and the sequence information from peptide analysis obtained by mass spectrometry delivers phylogenetic information about the microorganisms responsible for the metabolism of the particular substrate. In this article, we provide guidelines for incubating microbial cultures with labeled substrates and a protocol for protein-SIP. The protocol guides readers through the proteomics pipeline, including protein extraction, gel-free and gel-based protein separation, the subsequent mass spectrometric analysis of peptides and the calculation of the incorporation of stable isotopes into peptides. Extraction of proteins and the mass fingerprint measurements of unlabeled and labeled fractions can be performed in 2-3 d.

  1. Solitary intracranial plasmacytoma located in the spheno-clival region mimicking chordoma: a case report.

    PubMed

    Liu, Z Y; Qi, X Q; Wu, X J; Luo, C; Lu, Y C

    2010-01-01

    Solitary intracranial plasmacytoma (SIP) is very rare. This case report presents serial findings of SIP located in the spheno-clival region in a 54-year old female who presented with an inferior hemianopia in the right eye and an enlarged physiological blind spot in both eyes. Based on the initial diagnosis of a spheno-clival region chordoma, the tumour was partially resected by the nasal-sphenoidal sinus approach. Subsequently, the correct diagnosis of SIP was made based on the pathology and immunohistochemical staining of the tumour. The patient was treated using a whole skull-base radiation therapy protocol with 45 Gy and she was in good physical condition during the subsequent 22 months. The findings of a series of similar case reports documenting SIP in 20 cases published from 1976 to 2008 are also reviewed. Based on these case reports, the key features of SIP, including their clinical manifestations, clinical imaging characteristics, treatment and prognosis, are described.

  2. Extending Tactical Fleet Communications Through VoIP

    DTIC Science & Technology

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  3. DelPhi web server v2: incorporating atomic-style geometrical figures into the computational protocol.

    PubMed

    Smith, Nicholas; Witham, Shawn; Sarkar, Subhra; Zhang, Jie; Li, Lin; Li, Chuan; Alexov, Emil

    2012-06-15

    A new edition of the DelPhi web server, DelPhi web server v2, is released to include atomic presentation of geometrical figures. These geometrical objects can be used to model nano-size objects together with real biological macromolecules. The position and size of the object can be manipulated by the user in real time until desired results are achieved. The server fixes structural defects, adds hydrogen atoms and calculates electrostatic energies and the corresponding electrostatic potential and ionic distributions. The web server follows a client-server architecture built on PHP and HTML and utilizes DelPhi software. The computation is carried out on supercomputer cluster and results are given back to the user via http protocol, including the ability to visualize the structure and corresponding electrostatic potential via Jmol implementation. The DelPhi web server is available from http://compbio.clemson.edu/delphi_webserver.

  4. Proactive Byzantine Quorum Systems

    NASA Astrophysics Data System (ADS)

    Alchieri, Eduardo A. P.; Bessani, Alysson Neves; Pereira, Fernando Carlos; da Silva Fraga, Joni

    Byzantine Quorum Systems is a replication technique used to ensure availability and consistency of replicates data even in presence of arbitrary faults. This paper presents a Byzantine Quorum Systems protocol that provides atomic semantics despite the existence of Byzantine clients and servers. Moreover, this protocol is integrated with a protocol for proactive recovery of servers. In that way, the system tolerates any number of failures during its lifetime, since no more than f out of n servers fail during a small interval of time between recoveries. All solutions proposed in this paper can be used on asynchronous systems, which requires no time assumptions. The proposed quorum system read and write protocols have been implemented and their efficiency is demonstrated through some experiments carried out in the Emulab platform.

  5. Highly accurate prediction of protein self-interactions by incorporating the average block and PSSM information into the general PseAAC.

    PubMed

    Zhai, Jing-Xuan; Cao, Tian-Jie; An, Ji-Yong; Bian, Yong-Tao

    2017-11-07

    It is a challenging task for fundamental research whether proteins can interact with their partners. Protein self-interaction (SIP) is a special case of PPIs, which plays a key role in the regulation of cellular functions. Due to the limitations of experimental self-interaction identification, it is very important to develop an effective biological tool for predicting SIPs based on protein sequences. In the study, we developed a novel computational method called RVM-AB that combines the Relevance Vector Machine (RVM) model and Average Blocks (AB) for detecting SIPs from protein sequences. Firstly, Average Blocks (AB) feature extraction method is employed to represent protein sequences on a Position Specific Scoring Matrix (PSSM). Secondly, Principal Component Analysis (PCA) method is used to reduce the dimension of AB vector for reducing the influence of noise. Then, by employing the Relevance Vector Machine (RVM) algorithm, the performance of RVM-AB is assessed and compared with the state-of-the-art support vector machine (SVM) classifier and other exiting methods on yeast and human datasets respectively. Using the fivefold test experiment, RVM-AB model achieved very high accuracies of 93.01% and 97.72% on yeast and human datasets respectively, which are significantly better than the method based on SVM classifier and other previous methods. The experimental results proved that the RVM-AB prediction model is efficient and robust. It can be an automatic decision support tool for detecting SIPs. For facilitating extensive studies for future proteomics research, the RVMAB server is freely available for academic use at http://219.219.62.123:8888/SIP_AB. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Wide Area Information Servers: An Executive Information System for Unstructured Files.

    ERIC Educational Resources Information Center

    Kahle, Brewster; And Others

    1992-01-01

    Describes the Wide Area Information Servers (WAIS) system, an integrated information retrieval system for corporate end users. Discussion covers general characteristics of the system, search techniques, protocol development, user interfaces, servers, selective dissemination of information, nontextual data, access to other servers, and description…

  7. High-sensitivity stable-isotope probing by a quantitative terminal restriction fragment length polymorphism protocol.

    PubMed

    Andeer, Peter; Strand, Stuart E; Stahl, David A

    2012-01-01

    Stable-isotope probing (SIP) has proved a valuable cultivation-independent tool for linking specific microbial populations to selected functions in various natural and engineered systems. However, application of SIP to microbial populations with relatively minor buoyant density increases, such as populations that utilize compounds as a nitrogen source, results in reduced resolution of labeled populations. We therefore developed a tandem quantitative PCR (qPCR)-TRFLP (terminal restriction fragment length polymorphism) protocol that improves resolution of detection by quantifying specific taxonomic groups in gradient fractions. This method combines well-controlled amplification with TRFLP analysis to quantify relative taxon abundance in amplicon pools of FAM-labeled PCR products, using the intercalating dye EvaGreen to monitor amplification. Method accuracy was evaluated using mixtures of cloned 16S rRNA genes, DNA extracted from low- and high-G+C bacterial isolates (Escherichia coli, Rhodococcus, Variovorax, and Microbacterium), and DNA from soil microcosms amended with known amounts of genomic DNA from bacterial isolates. Improved resolution of minor shifts in buoyant density relative to TRFLP analysis alone was confirmed using well-controlled SIP analyses.

  8. Comparing architectural solutions of IPT application SDKs utilizing H.323 and SIP

    NASA Astrophysics Data System (ADS)

    Keskinarkaus, Anja; Korhonen, Jani; Ohtonen, Timo; Kilpelanaho, Vesa; Koskinen, Esa; Sauvola, Jaakko J.

    2001-07-01

    This paper presents two approaches to efficient service development for Internet Telephony. In first approach we consider services ranging from core call signaling features and media control as stated in ITU-T's H.323 to end user services that supports user interaction. The second approach supports IETF's SIP protocol. We compare these from differing architectural perspectives, economy of network and terminal development, and propose efficient architecture models for both protocols. In their design, the main criteria were component independence, lightweight operation and portability in heterogeneous end-to-end environments. In proposed architecture, the vertical division of call signaling and streaming media control logic allows for using the components either individually or combined, depending on the level of functionality required by an application.

  9. Leo Satellite Communication through a LEO Constellation using TCP/IP Over ATM

    NASA Technical Reports Server (NTRS)

    Foore, Lawrence R.; Konangi, Vijay K.; Wallett, Thomas M.

    1999-01-01

    The simulated performance characteristics for communication between a terrestrial client and a Low Earth Orbit (LEO) satellite server are presented. The client and server nodes consist of a Transmission Control Protocol /Internet Protocol (TCP/IP) over ATM configuration. The ATM cells from the client or the server are transmitted to a gateway, packaged with some header information and transferred to a commercial LEO satellite constellation. These cells are then routed through the constellation to a gateway on the globe that allows the client/server communication to take place. Unspecified Bit Rate (UBR) is specified as the quality of service (QoS). Various data rates are considered.

  10. Optimizing the NASA Technical Report Server

    NASA Technical Reports Server (NTRS)

    Nelson, Michael L.; Maa, Ming-Hokng

    1996-01-01

    The NASA Technical Report Server (NTRS), a World Wide Web report distribution NASA technical publications service, is modified for performance enhancement, greater protocol support, and human interface optimization. Results include: Parallel database queries, significantly decreasing user access times by an average factor of 2.3; access from clients behind firewalls and/ or proxies which truncate excessively long Uniform Resource Locators (URLs); access to non-Wide Area Information Server (WAIS) databases and compatibility with the 239-50.3 protocol; and a streamlined user interface.

  11. Data exchange technology based on handshake protocol for industrial automation system

    NASA Astrophysics Data System (ADS)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  12. The Sickness Impact Profile as a measure of the health status of noncognitively impaired nursing home residents.

    PubMed

    Rothman, M L; Hedrick, S; Inui, T

    1989-03-01

    The Sickness Impact Profile (SIP) is a multidimensional, behaviorally based measure of the health status that has been successfully used in a wide range of applications. The characteristics of this measure have not been assessed with nursing home residents. The purpose of this study was to assess the feasibility, reliability (internal consistency), validity, and comprehensiveness of the SIP as a measure of the health status of a selected group of nursing home residents. One hundred sixty-eight veterans residing in community and VA nursing homes responded to a questionnaire consisting of the SIP, Index of Activities of Daily Living, Barthel Index, Life Satisfaction Index Z, and the Philadelphia Geriatric Center Morale Scale. In general, the respondents correctly interpreted instructions; reliability and validity were supported; and the SIP was found to provide a comprehensive assessment of physical function. Adding a measure of psychologic well-being to a study protocol involving this population may, however, provide additional useful information regarding this construct.

  13. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    PubMed

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  14. Network Analysis with SiLK

    DTIC Science & Technology

    2015-01-06

    Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol

  15. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  16. Providing Internet Access to High-Resolution Mars Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMars server is a computer program that provides Internet access to high-resolution Mars images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of Mars. The OnMars server is an implementation of the Open Geospatial Consortium (OGC) Web Map Service (WMS) server. Unlike other Mars Internet map servers that provide Martian data using an Earth coordinate system, the OnMars WMS server supports encoding of data in Mars-specific coordinate systems. The OnMars server offers access to most of the available high-resolution Martian image and elevation data, including an 8-meter-per-pixel uncontrolled mosaic of most of the Mars Global Surveyor (MGS) Mars Observer Camera Narrow Angle (MOCNA) image collection, which is not available elsewhere. This server can generate image and map files in the tagged image file format (TIFF), Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. The OnMars server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  17. The pepATTRACT web server for blind, large-scale peptide-protein docking.

    PubMed

    de Vries, Sjoerd J; Rey, Julien; Schindler, Christina E M; Zacharias, Martin; Tuffery, Pierre

    2017-07-03

    Peptide-protein interactions are ubiquitous in the cell and form an important part of the interactome. Computational docking methods can complement experimental characterization of these complexes, but current protocols are not applicable on the proteome scale. pepATTRACT is a novel docking protocol that is fully blind, i.e. it does not require any information about the binding site. In various stages of its development, pepATTRACT has participated in CAPRI, making successful predictions for five out of seven protein-peptide targets. Its performance is similar or better than state-of-the-art local docking protocols that do require binding site information. Here we present a novel web server that carries out the rigid-body stage of pepATTRACT. On the peptiDB benchmark, the web server generates a correct model in the top 50 in 34% of the cases. Compared to the full pepATTRACT protocol, this leads to some loss of performance, but the computation time is reduced from ∼18 h to ∼10 min. Combined with the fact that it is fully blind, this makes the web server well-suited for large-scale in silico protein-peptide docking experiments. The rigid-body pepATTRACT server is freely available at http://bioserv.rpbs.univ-paris-diderot.fr/services/pepATTRACT. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. A single sip of a strong alcoholic beverage causes exposure to carcinogenic concentrations of acetaldehyde in the oral cavity.

    PubMed

    Linderborg, Klas; Salaspuro, Mikko; Väkeväinen, Satu

    2011-09-01

    The aim of this study was to explore oral exposure to carcinogenic (group 1) acetaldehyde after single sips of strong alcoholic beverages containing no or high concentrations of acetaldehyde. Eight volunteers tasted 5 ml of ethanol diluted to 40 vol.% with no acetaldehyde and 40 vol.% calvados containing 2400 μM acetaldehyde. Salivary acetaldehyde and ethanol concentrations were measured by gas chromatography. The protocol was repeated after ingestion of ethanol (0.5 g/kg body weight). Salivary acetaldehyde concentration was significantly higher after sipping calvados than after sipping ethanol at 30s both with (215 vs. 128 μmol/l, p<0.05) and without (258 vs. 89 μmol/l, p<0.05) alcohol ingestion. From 2 min onwards there were no significant differences in the decreasing salivary acetaldehyde concentration, which remained above the level of carcinogenicity still at 10 min. The systemic alcohol distribution from blood to saliva had no additional effect on salivary acetaldehyde after sipping of the alcoholic beverages. Carcinogenic concentrations of acetaldehyde are produced from ethanol in the oral cavity instantly after a small sip of strong alcoholic beverage, and the exposure continues for at least 10 min. Acetaldehyde present in the beverage has a short-term effect on total acetaldehyde exposure. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Annotation and visualization of endogenous retroviral sequences using the Distributed Annotation System (DAS) and eBioX

    PubMed Central

    Martínez Barrio, Álvaro; Lagercrantz, Erik; Sperber, Göran O; Blomberg, Jonas; Bongcam-Rudloff, Erik

    2009-01-01

    Background The Distributed Annotation System (DAS) is a widely used network protocol for sharing biological information. The distributed aspects of the protocol enable the use of various reference and annotation servers for connecting biological sequence data to pertinent annotations in order to depict an integrated view of the data for the final user. Results An annotation server has been devised to provide information about the endogenous retroviruses detected and annotated by a specialized in silico tool called RetroTector. We describe the procedure to implement the DAS 1.5 protocol commands necessary for constructing the DAS annotation server. We use our server to exemplify those steps. Data distribution is kept separated from visualization which is carried out by eBioX, an easy to use open source program incorporating multiple bioinformatics utilities. Some well characterized endogenous retroviruses are shown in two different DAS clients. A rapid analysis of areas free from retroviral insertions could be facilitated by our annotations. Conclusion The DAS protocol has shown to be advantageous in the distribution of endogenous retrovirus data. The distributed nature of the protocol is also found to aid in combining annotation and visualization along a genome in order to enhance the understanding of ERV contribution to its evolution. Reference and annotation servers are conjointly used by eBioX to provide visualization of ERV annotations as well as other data sources. Our DAS data source can be found in the central public DAS service repository, , or at . PMID:19534743

  20. Interfaces for Distributed Systems of Information Servers.

    ERIC Educational Resources Information Center

    Kahle, Brewster; And Others

    1992-01-01

    Describes two systems--Wide Area Information Servers (WAIS) and Rosebud--that provide protocol-based mechanisms for accessing remote full-text information servers. Design constraints, human interface design, and implementation are examined for five interfaces to these systems developed to run on the Macintosh or Unix terminals. Sample screen…

  1. Secure Skyline Queries on Cloud Platform.

    PubMed

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  2. Privacy-Preserving Classifier Learning

    NASA Astrophysics Data System (ADS)

    Brickell, Justin; Shmatikov, Vitaly

    We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database held by a remote server without learning any additional information about the records held in the database. The server does not learn anything about the constructed classifier, not even the user’s choice of feature and class attributes.

  3. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    ERIC Educational Resources Information Center

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  4. Template-free modeling by LEE and LEER in CASP11.

    PubMed

    Joung, InSuk; Lee, Sun Young; Cheng, Qianyi; Kim, Jong Yun; Joo, Keehyoung; Lee, Sung Jong; Lee, Jooyoung

    2016-09-01

    For the template-free modeling of human targets of CASP11, we utilized two of our modeling protocols, LEE and LEER. The LEE protocol took CASP11-released server models as the input and used some of them as templates for 3D (three-dimensional) modeling. The template selection procedure was based on the clustering of the server models aided by a community detection method of a server-model network. Restraining energy terms generated from the selected templates together with physical and statistical energy terms were used to build 3D models. Side-chains of the 3D models were rebuilt using target-specific consensus side-chain library along with the SCWRL4 rotamer library, which completed the LEE protocol. The first success factor of the LEE protocol was due to efficient server model screening. The average backbone accuracy of selected server models was similar to that of top 30% server models. The second factor was that a proper energy function along with our optimization method guided us, so that we successfully generated better quality models than the input template models. In 10 out of 24 cases, better backbone structures than the best of input template structures were generated. LEE models were further refined by performing restrained molecular dynamics simulations to generate LEER models. CASP11 results indicate that LEE models were better than the average template models in terms of both backbone structures and side-chain orientations. LEER models were of improved physical realism and stereo-chemistry compared to LEE models, and they were comparable to LEE models in the backbone accuracy. Proteins 2016; 84(Suppl 1):118-130. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  5. DelPhiPKa web server: predicting pKa of proteins, RNAs and DNAs.

    PubMed

    Wang, Lin; Zhang, Min; Alexov, Emil

    2016-02-15

    A new pKa prediction web server is released, which implements DelPhi Gaussian dielectric function to calculate electrostatic potentials generated by charges of biomolecules. Topology parameters are extended to include atomic information of nucleotides of RNA and DNA, which extends the capability of pKa calculations beyond proteins. The web server allows the end-user to protonate the biomolecule at particular pH based on calculated pKa values and provides the downloadable file in PQR format. Several tests are performed to benchmark the accuracy and speed of the protocol. The web server follows a client-server architecture built on PHP and HTML and utilizes DelPhiPKa program. The computation is performed on the Palmetto supercomputer cluster and results/download links are given back to the end-user via http protocol. The web server takes advantage of MPI parallel implementation in DelPhiPKa and can run a single job on up to 24 CPUs. The DelPhiPKa web server is available at http://compbio.clemson.edu/pka_webserver. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  6. Time Synchronization Prototype, Server Upgrade Procedure Support and Remote Software Development

    NASA Technical Reports Server (NTRS)

    Sanders, Shania R.

    2014-01-01

    Networks are roadways of communication that connect devices. Like all roadways, there are rules and regulations that govern whatever (information in this case) travels along them. One type of rule that is commonly used is called a protocol. More specifically, a protocol is a standard that specifies how data should be transmitted over a network. The project outlined in this document seeks to implement one protocol in particular, Precision Time Protocol, within the Kennedy Ground Control Subsystem network at Kennedy Space Center. This document also summarizes work completed for server upgrades, remote software developer training and how all three assignments demonstrated the importance of accountability and security.

  7. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  8. GUI implementation of image encryption and decryption using Open CV-Python script on secured TFTP protocol

    NASA Astrophysics Data System (ADS)

    Reddy, K. Rasool; Rao, Ch. Madhava

    2018-04-01

    Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.

  9. Device-independent quantum private query

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita; Paul, Goutam; Roy, Sarbani

    2017-04-01

    In quantum private query (QPQ), a client obtains values corresponding to his or her query only, and nothing else from the server, and the server does not get any information about the queries. V. Giovannetti et al. [Phys. Rev. Lett. 100, 230502 (2008)], 10.1103/PhysRevLett.100.230502 gave the first QPQ protocol and since then quite a few variants and extensions have been proposed. However, none of the existing protocols are device independent; i.e., all of them assume implicitly that the entangled states supplied to the client and the server are of a certain form. In this work, we exploit the idea of a local CHSH game and connect it with the scheme of Y. G. Yang et al. [Quantum Info. Process. 13, 805 (2014)], 10.1007/s11128-013-0692-8 to present the concept of a device-independent QPQ protocol.

  10. An End-to-End Description of the Data Flow of AMSR-E and GLAS Data Products: Product Generation Through Product Delivery to Users

    NASA Astrophysics Data System (ADS)

    Lutz, B. J.; Marquis, M.

    2001-12-01

    The Aqua and ICESat missions are components of the Earth Observing System (EOS). The Advanced Microwave Scanning Radiometer (AMSR-E) instrument will fly on the Aqua satellite planned for launch in Spring 2002. AMSR-E is a passive microwave instrument, modified from the AMSR instrument, which will be deployed on the Japanese Advanced Earth Observing Satellite-II (ADEOS-II). AMSR-E will observe the atmosphere, land, oceans, and cryosphere, yielding measurements of precipitation, cloud water, water vapor, surface wetness, sea surface temperatures, oceanic wind speed, sea ice concentrations, snow depth, and snow water content. The Geoscience Laser Altimeter System (GLAS) instrument will fly aboard the ICESat satellite scheduled for launch in Summer 2002. This instrument will measure ice-sheet topography and temporal changes in topography; cloud heights, planetary boundary heights and aerosol vertical structure; and land and water topography. The GLAS and AMSR-E teams have both chosen to utilize Science Investigator-led Processing Systems (SIPS) to process their respective EOS data products. The SIPS facilities are funded by the Earth Science Data and Information System (ESDIS) Project at NASA's Goddard Space Flight Center and operated under the direction of a science team leader. The SIPS capitalize upon the scientific expertise of the science teams and the distributed processing capabilities of their institutions. The SIPS are charged with routine production of their respective EOS data products for archival at a Distributed Active Archive Center (DAAC). The National Snow and Ice Data Center (NSIDC) DAAC in Boulder, Colorado will archive all AMSR-E and GLAS data products. The NSIDC DAAC will distribute these data products to users throughout the world. The SIPS processing flows of both teams are rather complex. The AMSR-E SIPS is composed of three separate processing facilities (Japan, California, and Alabama). The ICESat SIPS is composed of one main processing center (Maryland) and an important secondary data set processing center (Texas) that generates required auxiliary data products. The EOSDIS Core System (ECS) has developed extensive protocols and procedures to ensure timeliness and completeness of delivery of the data from the SIPS to the DAACs. The NSIDC DAAC, in addition to being the repository of AMSR-E and GLAS data products, provides enhanced services, documentation and guides for these data. NSIDC is a liaison between the science teams and the user community. This poster will display flow diagrams showing: a) the AMSR-E and the ICESat SIPS, and the process of how their Level 1, 2, and 3 data products are generated; b) the staging and delivery of these sets of data to the NSIDC DAAC for archival, and the ECS protocols required to ensure delivery; and c) the services and "value-added" products that the NSIDC DAAC provides to the user community in support of the Aqua (AMSR-E) and ICESat missions.

  11. Secure Skyline Queries on Cloud Platform

    PubMed Central

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-01-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710

  12. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

  13. Defense in Depth Added to Malicious Activities Simulation Tools (MAST)

    DTIC Science & Technology

    2015-09-01

    cipher suites. The TLS Handshake is a combination of three components: handshake, change cipher spec, and alert. 41 (1) The Handshake ( Hello ) The...TLS Handshake, specifically the “ Hello ” portion, is designed to negotiate session parameters (cipher suite). The client informs the server of the...protocols and standards that it supports and then the server selects the highest common protocols and standards. Specifically, the Client Hello message

  14. Performance of the High Sensitivity Open Source Multi-GNSS Assisted GNSS Reference Server.

    NASA Astrophysics Data System (ADS)

    Sarwar, Ali; Rizos, Chris; Glennon, Eamonn

    2015-06-01

    The Open Source GNSS Reference Server (OSGRS) exploits the GNSS Reference Interface Protocol (GRIP) to provide assistance data to GPS receivers. Assistance can be in terms of signal acquisition and in the processing of the measurement data. The data transfer protocol is based on Extensible Mark-up Language (XML) schema. The first version of the OSGRS required a direct hardware connection to a GPS device to acquire the data necessary to generate the appropriate assistance. Scenarios of interest for the OSGRS users are weak signal strength indoors, obstructed outdoors or heavy multipath environments. This paper describes an improved version of OSGRS that provides alternative assistance support from a number of Global Navigation Satellite Systems (GNSS). The underlying protocol to transfer GNSS assistance data from global casters is the Networked Transport of RTCM (Radio Technical Commission for Maritime Services) over Internet Protocol (NTRIP), and/or the RINEX (Receiver Independent Exchange) format. This expands the assistance and support model of the OSGRS to globally available GNSS data servers connected via internet casters. A variety of formats and versions of RINEX and RTCM streams become available, which strengthens the assistance provisioning capability of the OSGRS platform. The prime motivation for this work was to enhance the system architecture of the OSGRS to take advantage of globally available GNSS data sources. Open source software architectures and assistance models provide acquisition and data processing assistance for GNSS receivers operating in weak signal environments. This paper describes test scenarios to benchmark the OSGRSv2 performance against other Assisted-GNSS solutions. Benchmarking devices include the SPOT satellite messenger, MS-Based & MS-Assisted GNSS, HSGNSS (SiRFstar-III) and Wireless Sensor Networks Assisted-GNSS. Benchmarked parameters include the number of tracked satellites, the Time to Fix First (TTFF), navigation availability and accuracy. Three different configurations of Multi-GNSS assistance servers were used, namely Cloud-Client-Server, the Demilitarized Zone (DMZ) Client-Server and PC-Client-Server; with respect to the connectivity location of client and server. The impact on the performance based on server and/or client initiation, hardware capability, network latency, processing delay and computation times with their storage, scalability, processing and load sharing capabilities, were analysed. The performance of the OSGRS is compared against commercial GNSS, Assisted-GNSS and WSN-enabled GNSS devices. The OSGRS system demonstrated lower TTFF and higher availability.

  15. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    PubMed Central

    Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  16. Two-cloud-servers-assisted secure outsourcing multiparty computation.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  17. The Common Gateway Interface (CGI) for Enhancing Access to Database Servers via the World Wide Web (WWW).

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Explains the Common Gateway Interface (CGI) protocol as a set of rules for passing information from a Web server to an external program such as a database search engine. Topics include advantages over traditional client/server solutions, limitations, sample library applications, and sources of information from the Internet. (LRW)

  18. Reference-frame-independent quantum-key-distribution server with a telecom tether for an on-chip client.

    PubMed

    Zhang, P; Aungskunsiri, K; Martín-López, E; Wabnig, J; Lobino, M; Nock, R W; Munns, J; Bonneau, D; Jiang, P; Li, H W; Laing, A; Rarity, J G; Niskanen, A O; Thompson, M G; O'Brien, J L

    2014-04-04

    We demonstrate a client-server quantum key distribution (QKD) scheme. Large resources such as laser and detectors are situated at the server side, which is accessible via telecom fiber to a client requiring only an on-chip polarization rotator, which may be integrated into a handheld device. The detrimental effects of unstable fiber birefringence are overcome by employing the reference-frame-independent QKD protocol for polarization qubits in polarization maintaining fiber, where standard QKD protocols fail, as we show for comparison. This opens the way for quantum enhanced secure communications between companies and members of the general public equipped with handheld mobile devices, via telecom-fiber tethering.

  19. Triple-server blind quantum computation using entanglement swapping

    NASA Astrophysics Data System (ADS)

    Li, Qin; Chan, Wai Hong; Wu, Chunhui; Wen, Zhonghua

    2014-04-01

    Blind quantum computation allows a client who does not have enough quantum resources or technologies to achieve quantum computation on a remote quantum server such that the client's input, output, and algorithm remain unknown to the server. Up to now, single- and double-server blind quantum computation have been considered. In this work, we propose a triple-server blind computation protocol where the client can delegate quantum computation to three quantum servers by the use of entanglement swapping. Furthermore, the three quantum servers can communicate with each other and the client is almost classical since one does not require any quantum computational power, quantum memory, and the ability to prepare any quantum states and only needs to be capable of getting access to quantum channels.

  20. Implementing TCP/IP and a socket interface as a server in a message-passing operating system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hipp, E.; Wiltzius, D.

    1990-03-01

    The UNICOS 4.3BSD network code and socket transport interface are the basis of an explicit network server for NLTSS, a message passing operating system on the Cray YMP. A BSD socket user library provides access to the network server using an RPC mechanism. The advantages of this server methodology are its modularity and extensibility to migrate to future protocol suites (e.g. OSI) and transport interfaces. In addition, the network server is implemented in an explicit multi-tasking environment to take advantage of the Cray YMP multi-processor platform. 19 refs., 5 figs.

  1. Single-server blind quantum computation with quantum circuit model

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaoqian; Weng, Jian; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing; Song, Tingting

    2018-06-01

    Blind quantum computation (BQC) enables the client, who has few quantum technologies, to delegate her quantum computation to a server, who has strong quantum computabilities and learns nothing about the client's quantum inputs, outputs and algorithms. In this article, we propose a single-server BQC protocol with quantum circuit model by replacing any quantum gate with the combination of rotation operators. The trap quantum circuits are introduced, together with the combination of rotation operators, such that the server is unknown about quantum algorithms. The client only needs to perform operations X and Z, while the server honestly performs rotation operators.

  2. The Chronic Illness Problem Inventory as a measure of dysfunction in chronic pain patients.

    PubMed

    Romano, J M; Turner, J A; Jensen, M P

    1992-04-01

    Assessment of physical and psychosocial dysfunction is recognized as essential in chronic pain patient evaluation. One instrument, the Sickness Impact Profile (SIP), has demonstrated good reliability and validity as a measure of dysfunction among chronic pain patients. An alternate measure, the Chronic Illness Problem Inventory (CIPI), is shorter and more easily scored than the SIP, but as yet has not been applied widely to chronic pain problems. In the present study, 95 chronic low back pain patients completed the SIP, the CIPI, activity diaries, the McGill Pain Questionnaire (MPQ), and the Center for Epidemiologic Studies-Depression scale (CES-D), before participating in a chronic pain treatment study. Overt pain behaviors were also coded from videotapes of a standardized assessment protocol. Seventy-five subjects completed the measures post-treatment. The results indicate that although the SIP and the CIPI are significantly correlated and appear to be measuring similar constructs, there is also substantial unshared variance between them, suggesting that they may tap somewhat different aspects of dysfunction in chronic pain. The CIPI shows promise as a useful alternative measure of dysfunction in chronic low back pain patients, but requires further validation for this purpose.

  3. Software Modules for the Proximity-1 Space Link Interleaved Time Synchronization (PITS) Protocol

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Veregge, John R.; Gao, Jay L.; Clare, Loren P.; Mills, David

    2012-01-01

    The Proximity-1 Space Link Interleaved Time Synchronization (PITS) protocol provides time distribution and synchronization services for space systems. A software prototype implementation of the PITS algorithm has been developed that also provides the test harness to evaluate the key functionalities of PITS with simulated data source and sink. PITS integrates time synchronization functionality into the link layer of the CCSDS Proximity-1 Space Link Protocol. The software prototype implements the network packet format, data structures, and transmit- and receive-timestamp function for a time server and a client. The software also simulates the transmit and receive-time stamp exchanges via UDP (User Datagram Protocol) socket between a time server and a time client, and produces relative time offsets and delay estimates.

  4. Lyceum: A Multi-Protocol Digital Library Gateway

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.; Esler, Sandra L.

    1997-01-01

    Lyceum is a prototype scalable query gateway that provides a logically central interface to multi-protocol and physically distributed, digital libraries of scientific and technical information. Lyceum processes queries to multiple syntactically distinct search engines used by various distributed information servers from a single logically central interface without modification of the remote search engines. A working prototype (http://www.larc.nasa.gov/lyceum/) demonstrates the capabilities, potentials, and advantages of this type of meta-search engine by providing access to over 50 servers covering over 20 disciplines.

  5. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services

    PubMed Central

    Gessler, Damian DG; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-01-01

    Background SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. Results There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at , developer tools at , and a portal to third-party ontologies at (a "swap meet"). Conclusion SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs. PMID:19775460

  6. Glossary of Internet Terms.

    ERIC Educational Resources Information Center

    Microcomputers for Information Management, 1995

    1995-01-01

    Provides definitions for 71 terms related to the Internet, including Archie, bulletin board system, cyberspace, e-mail (electronic mail), file transfer protocol, gopher, hypertext, integrated services digital network, local area network, listserv, modem, packet switching, server, telnet, UNIX, WAIS (wide area information servers), and World Wide…

  7. System level traffic shaping in disk servers with heterogeneous protocols

    NASA Astrophysics Data System (ADS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-06-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  8. Recent improvements in the NASA technical report server

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.

    1995-01-01

    The NASA Technical Report Server (NTRS), a World Wide Web (WWW) report distribution service, has been modified to allow parallel database queries, significantly decreasing user access time by an average factor of 2.3, access from clients behind firewalls and/or proxies which truncate excessively long Uniform Resource Locators (URL's), access to non-Wide Area Information Server (WAIS) databases, and compatibility with the Z39-50.3 protocol.

  9. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.

    PubMed

    Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-09-23

    SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs.

  10. The NIST Internet time service

    NASA Astrophysics Data System (ADS)

    Levine, Judah

    1994-05-01

    We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.

  11. The NIST Internet time service

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1994-01-01

    We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.

  12. Effects of dopamine agents on a schedule-induced polydipsia procedure in the spontaneously hypertensive rat and in Wistar control rats.

    PubMed

    Íbias, Javier; Miguéns, Miguel; Pellón, Ricardo

    2016-09-01

    The spontaneously hypertensive rat (SHR) has been proposed as an animal model for attention deficit hyperactivity disorder (ADHD), and typically develops excessive patterns of response under most behavioural protocols. Schedule-induced polydipsia (SIP) is the excessive water consumption that occurs as a schedule effect when food is intermittently delivered and animals are partially food- but not water-deprived. SIP has been used as a model of excessive behaviour, and considerable evidence has involved the dopaminergic system in its development and maintenance. The aim of this study was to evaluate the effects of the most common psychostimulants used in ADHD treatment on SIP, comparing their effects in SHRs with rats from control populations. SHR, Wistar Kyoto (WKY) and Wistar rats were submitted to a multiple fixed time (FT) food schedule with two components: 30 s and 90 s. The acute effects of different dopaminergic compounds were evaluated after 40 sessions of SIP acquisition. All animals showed higher adjunctive drinking under FT 30 s than FT 90 s, and SHRs displayed higher asymptotic SIP levels in FT 90 s compared to WKY and Wistar rats. SHRs were less sensitive to dopaminergic agents than control rats in terms of affecting rates of adjunctive drinking. These differences point to an altered dopaminergic system in the SHR and provide new insights into the neurobiological basis of ADHD pharmacological treatments. © The Author(s) 2016.

  13. Classifier fusion for VoIP attacks classification

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  14. Schedule-induced polydipsia: a rat model of obsessive-compulsive disorder.

    PubMed

    Platt, Brian; Beyer, Chad E; Schechter, Lee E; Rosenzweig-Lipson, Sharon

    2008-04-01

    Obsessive-compulsive disorder (OCD) is difficult to model in animals due to the involvement of both mental (obsessions) and physical (compulsions) symptoms. Due to limitations of using animals to evaluate obsessions, OCD models are limited to evaluation of the compulsive and repetitive behaviors of animals. Of these, models of adjunctive behaviors offer the most value in regard to predicting efficacy of anti-OCD drugs in the clinic. Adjunctive behaviors are those that are maintained indirectly by the variables that control another behavior, rather than directly by their own typical controlling variables. Schedule-induced polydipsia (SIP) is an adjunctive model in which rats exhibit exaggerated drinking behavior (polydipsia) when presented with food pellets under a fixed-time schedule. The polydipsic response is an excessive manifestation of a normal behavior (drinking), providing face validity to the model. Furthermore, clinically effective drugs for the treatment of OCD decrease SIP. This protocol describes a rat SIP model of OCD and provides preclinical data for drugs that decrease polydipsia and are clinically effective in the treatment of OCD.

  15. RaptorX server: a resource for template-based protein structure modeling.

    PubMed

    Källberg, Morten; Margaryan, Gohar; Wang, Sheng; Ma, Jianzhu; Xu, Jinbo

    2014-01-01

    Assigning functional properties to a newly discovered protein is a key challenge in modern biology. To this end, computational modeling of the three-dimensional atomic arrangement of the amino acid chain is often crucial in determining the role of the protein in biological processes. We present a community-wide web-based protocol, RaptorX server ( http://raptorx.uchicago.edu ), for automated protein secondary structure prediction, template-based tertiary structure modeling, and probabilistic alignment sampling.Given a target sequence, RaptorX server is able to detect even remotely related template sequences by means of a novel nonlinear context-specific alignment potential and probabilistic consistency algorithm. Using the protocol presented here it is thus possible to obtain high-quality structural models for many target protein sequences when only distantly related protein domains have experimentally solved structures. At present, RaptorX server can perform secondary and tertiary structure prediction of a 200 amino acid target sequence in approximately 30 min.

  16. Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Mantri, Atul; Demarie, Tommaso F.; Menicucci, Nicolas C.; Fitzsimons, Joseph F.

    2017-07-01

    Blind quantum computation protocols allow a user to delegate a computation to a remote quantum computer in such a way that the privacy of their computation is preserved, even from the device implementing the computation. To date, such protocols are only known for settings involving at least two quantum devices: either a user with some quantum capabilities and a remote quantum server or two or more entangled but noncommunicating servers. In this work, we take the first step towards the construction of a blind quantum computing protocol with a completely classical client and single quantum server. Specifically, we show how a classical client can exploit the ambiguity in the flow of information in measurement-based quantum computing to construct a protocol for hiding critical aspects of a computation delegated to a remote quantum computer. This ambiguity arises due to the fact that, for a fixed graph, there exist multiple choices of the input and output vertex sets that result in deterministic measurement patterns consistent with the same fixed total ordering of vertices. This allows a classical user, computing only measurement angles, to drive a measurement-based computation performed on a remote device while hiding critical aspects of the computation.

  17. Ventilatory muscle endurance training in quadriplegia: effects on breathing pattern.

    PubMed

    Loveridge, B; Badour, M; Dubo, H

    1989-10-01

    We examined the effects of ventilatory muscle endurance training on resting breathing pattern in 12 C6-C7 traumatic quadriplegics at least 1 year post-injury. All subjects had complete motor loss below the lesion level. Subjects were randomly assigned to a training (N = 6), or a control group (N = 6). Baseline tests included measurement of resting ventilation and breathing pattern using mercury in rubber strain gauges for 20 minutes in a seated position; maximum inspiratory mouth pressure (MIP) at FRC, and sustainable inspiratory mouth pressure for 10 minutes (SIP); lung volumes, and arterial blood gases (ABG's). The training protocol consisted of breathing through an inspiratory resistor equivalent to 85% SIP for 15 minutes twice daily, 5 days a week for 8 weeks. Both trainers and controls attended the lab every 2 weeks for reassessment of MIP and SIP and the inspiratory resistance was increased in the training group as SIP increased. At the end of 8 weeks, baseline tests were repeated. All subjects had normal ABG's. There was a significant increase in mean MIP and SIP in both the control group (30% +/- 19% and 31% +/- 18% respectively), and in the training group (42% +/- 24% and 78% +/- 49% respectively). Although the absolute values for both MIP and SIP were greater in the training group than in the control group, the differences were not significant. The alterations in resting breathing pattern were also the same in both groups. Mean frequency decreased significantly in the control group (20.2/minute to 16.9/minute) and, while insignificant, the change in frequency in the training group was the same, 19.4/minute to 16.4/minute. Mean tidal volume (Vt) increased 18.2% of baseline Vt in the control group and 17.0% baseline in the trainers, resulting in no change in minute ventilation. As MIP and SIP increased similarly in both groups, the data from the control and trainers was pooled and timing changes re-evaluated pre- and post-study. A significant decrease in mean Ti/Ttot was observed, while no change in Vt/Ti was found. We concluded that the testing procedure itself provided the stimulus resulting in a significant increase in MIP and SIP. The addition of training did not increase MIP and SIP further. The increased MIP and SIP resulted in a slower and deeper breathing pattern and a significantly shorter Ti/Ttot in both trainers and control subjects.

  18. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  19. Project Integration Architecture: Implementation of the CORBA-Served Application Infrastructure

    NASA Technical Reports Server (NTRS)

    Jones, William Henry

    2005-01-01

    The Project Integration Architecture (PIA) has been demonstrated in a single-machine C++ implementation prototype. The architecture is in the process of being migrated to a Common Object Request Broker Architecture (CORBA) implementation. The migration of the Foundation Layer interfaces is fundamentally complete. The implementation of the Application Layer infrastructure for that migration is reported. The Application Layer provides for distributed user identification and authentication, per-user/per-instance access controls, server administration, the formation of mutually-trusting application servers, a server locality protocol, and an ability to search for interface implementations through such trusted server networks.

  20. Network time synchronization servers at the US Naval Observatory

    NASA Technical Reports Server (NTRS)

    Schmidt, Richard E.

    1995-01-01

    Responding to an increased demand for reliable, accurate time on the Internet and Milnet, the U.S. Naval Observatory Time Service has established the network time servers, tick.usno.navy.mil and tock.usno.navy.mil. The system clocks of these HP9000/747i industrial work stations are synchronized to within a few tens of microseconds of USNO Master Clock 2 using VMEbus IRIG-B interfaces. Redundant time code is available from a VMEbus GPS receiver. UTC(USNO) is provided over the network via a number of protocols, including the Network Time Protocol (NTP) (DARPA Network Working Group Report RFC-1305), the Daytime Protocol (RFC-867), and the Time protocol (RFC-868). Access to USNO network time services is presently open and unrestricted. An overview of USNO time services and results of LAN and WAN time synchronization tests will be presented.

  1. KoBaMIN: a knowledge-based minimization web server for protein structure refinement.

    PubMed

    Rodrigues, João P G L M; Levitt, Michael; Chopra, Gaurav

    2012-07-01

    The KoBaMIN web server provides an online interface to a simple, consistent and computationally efficient protein structure refinement protocol based on minimization of a knowledge-based potential of mean force. The server can be used to refine either a single protein structure or an ensemble of proteins starting from their unrefined coordinates in PDB format. The refinement method is particularly fast and accurate due to the underlying knowledge-based potential derived from structures deposited in the PDB; as such, the energy function implicitly includes the effects of solvent and the crystal environment. Our server allows for an optional but recommended step that optimizes stereochemistry using the MESHI software. The KoBaMIN server also allows comparison of the refined structures with a provided reference structure to assess the changes brought about by the refinement protocol. The performance of KoBaMIN has been benchmarked widely on a large set of decoys, all models generated at the seventh worldwide experiments on critical assessment of techniques for protein structure prediction (CASP7) and it was also shown to produce top-ranking predictions in the refinement category at both CASP8 and CASP9, yielding consistently good results across a broad range of model quality values. The web server is fully functional and freely available at http://csb.stanford.edu/kobamin.

  2. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  3. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  4. A simplified ingestion procedure for esophageal capsule endoscopy: initial evaluation in healthy volunteers.

    PubMed

    Gralnek, I M; Rabinovitz, R; Afik, D; Eliakim, R

    2006-09-01

    Initial studies on esophageal capsule endoscopy (PillCam ESO) reported excellent sensitivity and specificity, but these were followed by mixed results in several subsequent studies, probably due to deviations from the recommended ingestion protocol and the inconvenience of capsule ingestion in the supine position. The aim of this study was therefore to test a simplified ingestion procedure (SIP) for PillCam ESO. Using a cross-over study design, the SIP was prospectively compared with the original ingestion procedure for PillCam ESO in 24 healthy volunteers (15 men, nine women; mean age 44, range 27 - 70) and evaluated for: bubbles/saliva interference at the Z-line, Z-line circumferential visualization (quadrants), and convenience and ease of the ingestion procedure. All Rapid 4 videos were reviewed in a randomized manner and read by an experienced PillCam ESO reader blinded to the ingestion procedure used. It was found that the SIP significantly improved visualization in comparison with the original ingestion procedure, with less interference due to bubbles/saliva observed at the gastroesophageal junction ( P = 0.002) and improved visualization of the Z-line ( P = 0.025). Although the esophageal transit time was significantly faster with the SIP (3 : 45 min vs. 0 : 38 min; P = 0.0001), there were no differences in the number of Z-line frames/images captured. This new, simplified ingestion procedure for PillCam ESO provides significantly improved visualization of the Z-line in healthy volunteers. The overall test characteristics of PillCam ESO using SIP should be tested in patients with esophageal disease.

  5. A FPGA embedded web server for remote monitoring and control of smart sensors networks.

    PubMed

    Magdaleno, Eduardo; Rodríguez, Manuel; Pérez, Fernando; Hernández, David; García, Enrique

    2013-12-27

    This article describes the implementation of a web server using an embedded Altera NIOS II IP core, a general purpose and configurable RISC processor which is embedded in a Cyclone FPGA. The processor uses the μCLinux operating system to support a Boa web server of dynamic pages using Common Gateway Interface (CGI). The FPGA is configured to act like the master node of a network, and also to control and monitor a network of smart sensors or instruments. In order to develop a totally functional system, the FPGA also includes an implementation of the time-triggered protocol (TTP/A). Thus, the implemented master node has two interfaces, the webserver that acts as an Internet interface and the other to control the network. This protocol is widely used to connecting smart sensors and actuators and microsystems in embedded real-time systems in different application domains, e.g., industrial, automotive, domotic, etc., although this protocol can be easily replaced by any other because of the inherent characteristics of the FPGA-based technology.

  6. A FPGA Embedded Web Server for Remote Monitoring and Control of Smart Sensors Networks

    PubMed Central

    Magdaleno, Eduardo; Rodríguez, Manuel; Pérez, Fernando; Hernández, David; García, Enrique

    2014-01-01

    This article describes the implementation of a web server using an embedded Altera NIOS II IP core, a general purpose and configurable RISC processor which is embedded in a Cyclone FPGA. The processor uses the μCLinux operating system to support a Boa web server of dynamic pages using Common Gateway Interface (CGI). The FPGA is configured to act like the master node of a network, and also to control and monitor a network of smart sensors or instruments. In order to develop a totally functional system, the FPGA also includes an implementation of the time-triggered protocol (TTP/A). Thus, the implemented master node has two interfaces, the webserver that acts as an Internet interface and the other to control the network. This protocol is widely used to connecting smart sensors and actuators and microsystems in embedded real-time systems in different application domains, e.g., industrial, automotive, domotic, etc., although this protocol can be easily replaced by any other because of the inherent characteristics of the FPGA-based technology. PMID:24379047

  7. Secure entanglement distillation for double-server blind quantum computation.

    PubMed

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-07-12

    Blind quantum computation is a new secure quantum computing protocol where a client, who does not have enough quantum technologies at her disposal, can delegate her quantum computation to a server, who has a fully fledged quantum computer, in such a way that the server cannot learn anything about the client's input, output, and program. If the client interacts with only a single server, the client has to have some minimum quantum power, such as the ability of emitting randomly rotated single-qubit states or the ability of measuring states. If the client interacts with two servers who share Bell pairs but cannot communicate with each other, the client can be completely classical. For such a double-server scheme, two servers have to share clean Bell pairs, and therefore the entanglement distillation is necessary in a realistic noisy environment. In this Letter, we show that it is possible to perform entanglement distillation in the double-server scheme without degrading the security of blind quantum computing.

  8. On-demand rendering of an oblique slice through 3D volumetric data using JPEG2000 client-server framework

    NASA Astrophysics Data System (ADS)

    Joshi, Rajan L.

    2006-03-01

    In medical imaging, the popularity of image capture modalities such as multislice CT and MRI is resulting in an exponential increase in the amount of volumetric data that needs to be archived and transmitted. At the same time, the increased data is taxing the interpretation capabilities of radiologists. One of the workflow strategies recommended for radiologists to overcome the data overload is the use of volumetric navigation. This allows the radiologist to seek a series of oblique slices through the data. However, it might be inconvenient for a radiologist to wait until all the slices are transferred from the PACS server to a client, such as a diagnostic workstation. To overcome this problem, we propose a client-server architecture based on JPEG2000 and JPEG2000 Interactive Protocol (JPIP) for rendering oblique slices through 3D volumetric data stored remotely at a server. The client uses the JPIP protocol for obtaining JPEG2000 compressed data from the server on an as needed basis. In JPEG2000, the image pixels are wavelet-transformed and the wavelet coefficients are grouped into precincts. Based on the positioning of the oblique slice, compressed data from only certain precincts is needed to render the slice. The client communicates this information to the server so that the server can transmit only relevant compressed data. We also discuss the use of caching on the client side for further reduction in bandwidth requirements. Finally, we present simulation results to quantify the bandwidth savings for rendering a series of oblique slices.

  9. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  10. PREFMD: a web server for protein structure refinement via molecular dynamics simulations.

    PubMed

    Heo, Lim; Feig, Michael

    2018-03-15

    Refinement of protein structure models is a long-standing problem in structural bioinformatics. Molecular dynamics-based methods have emerged as an avenue to achieve consistent refinement. The PREFMD web server implements an optimized protocol based on the method successfully tested in CASP11. Validation with recent CASP refinement targets shows consistent and more significant improvement in global structure accuracy over other state-of-the-art servers. PREFMD is freely available as a web server at http://feiglab.org/prefmd. Scripts for running PREFMD as a stand-alone package are available at https://github.com/feiglab/prefmd.git. feig@msu.edu. Supplementary data are available at Bioinformatics online.

  11. Stable isotope probing to study functional components of complex microbial ecosystems.

    PubMed

    Mazard, Sophie; Schäfer, Hendrik

    2014-01-01

    This protocol presents a method of dissecting the DNA or RNA of key organisms involved in a specific biochemical process within a complex ecosystem. Stable isotope probing (SIP) allows the labelling and separation of nucleic acids from community members that are involved in important biochemical transformations, yet are often not the most numerically abundant members of a community. This pure culture-independent technique circumvents limitations of traditional microbial isolation techniques or data mining from large-scale whole-community metagenomic studies to tease out the identities and genomic repertoires of microorganisms participating in biological nutrient cycles. SIP experiments can be applied to virtually any ecosystem and biochemical pathway under investigation provided a suitable stable isotope substrate is available. This versatile methodology allows a wide range of analyses to be performed, from fatty-acid analyses, community structure and ecology studies, and targeted metagenomics involving nucleic acid sequencing. SIP experiments provide an effective alternative to large-scale whole-community metagenomic studies by specifically targeting the organisms or biochemical transformations of interest, thereby reducing the sequencing effort and time-consuming bioinformatics analyses of large datasets.

  12. Password-only authenticated three-party key exchange with provable security in the standard model.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  13. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  14. Autoconfiguration and Service Discovery

    NASA Astrophysics Data System (ADS)

    Manner, Jukka

    To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.

  15. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.

  16. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  17. How Public Is the Web?: Robots, Access, and Scholarly Communication.

    ERIC Educational Resources Information Center

    Snyder, Herbert; Rosenbaum, Howard

    1998-01-01

    Examines the use of Robot Exclusion Protocol (REP) to restrict the access of search engine robots to 10 major United States university Web sites. An analysis of Web site searching and interviews with Web server administrators shows that the decision to use this procedure is largely technical and is typically made by the Web server administrator.…

  18. Experimental Blind Quantum Computing for a Classical Client.

    PubMed

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-04

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  19. Experimental Blind Quantum Computing for a Classical Client

    NASA Astrophysics Data System (ADS)

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-01

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  20. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    NASA Astrophysics Data System (ADS)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  1. An Interface Transformation Strategy for AF-IPPS

    DTIC Science & Technology

    2012-12-01

    Representational State Transfer (REST) and Java Enterprise Edition ( Java EE) to implement a reusable “translation service.” For SOAP and REST protocols, XML and...of best-of-breed open source software. The product baseline is summarized in the following table: Product Function Description Java Language...Compiler & Runtime JBoss Application Server Applications, Messaging, Translation Java EE Application Server Ruby on Rails Applications Ruby Web

  2. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  3. A radiology department intranet: development and applications.

    PubMed

    Willing, S J; Berland, L L

    1999-01-01

    An intranet is a "private Internet" that uses the protocols of the World Wide Web to share information resources within a company or with the company's business partners and clients. The hardware requirements for an intranet begin with a dedicated Web server permanently connected to the departmental network. The heart of a Web server is the hypertext transfer protocol (HTTP) service, which receives a page request from a client's browser and transmits the page back to the client. Although knowledge of hypertext markup language (HTML) is not essential for authoring a Web page, a working familiarity with HTML is useful, as is knowledge of programming and database management. Security can be ensured by using scripts to write information in hidden fields or by means of "cookies." Interfacing databases and database management systems with the Web server and conforming the user interface to HTML syntax can be achieved by means of the common gateway interface (CGI), Active Server Pages (ASP), or other methods. An intranet in a radiology department could include the following types of content: on-call schedules, work schedules and a calendar, a personnel directory, resident resources, memorandums and discussion groups, software for a radiology information system, and databases.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, Weikuan; Vetter, Jeffrey S

    Parallel NFS (pNFS) is touted as an emergent standard protocol for parallel I/O access in various storage environments. Several pNFS prototypes have been implemented for initial validation and protocol examination. Previous efforts have focused on realizing the pNFS protocol to expose the best bandwidth potential from underlying file and storage systems. In this presentation, we provide an initial characterization of two pNFS prototype implementations, lpNFS (a Lustre-based parallel NFS implementation) and spNFS (another reference implementation from Network Appliance, Inc.). We show that both lpNFS and spNFS can faithfully achieve the primary goal of pNFS, i.e., aggregating I/O bandwidth from manymore » storage servers. However, they both face the challenge of scalable metadata management. Particularly, the throughput of sp-NFS metadata operations degrades significanlty with an increasing number of data servers. Even for the better-performing lpNFS, we discuss its architecture and propose a direct I/O request flow protocol to improve its performance.« less

  5. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    PubMed Central

    Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229

  6. A comparison between the minimal model and the glucose clamp in the assessment of insulin sensitivity across the spectrum of glucose tolerance. Insulin Resistance Atherosclerosis Study.

    PubMed

    Saad, M F; Anderson, R L; Laws, A; Watanabe, R M; Kades, W W; Chen, Y D; Sands, R E; Pei, D; Savage, P J; Bergman, R N

    1994-09-01

    An insulin-modified frequently sampled intravenous glucose tolerance test (FSIGTT) with minimal model analysis was compared with the glucose clamp in 11 subjects with normal glucose tolerance (NGT), 20 with impaired glucose tolerance (IGT), and 24 with non-insulin-dependent diabetes mellitus (NIDDM). The insulin sensitivity index (SI) was calculated from FSIGTT using 22- and 12-sample protocols (SI(22) and SI(12), respectively). Insulin sensitivity from the clamp was expressed as SI(clamp) and SIP(clamp). Minimal model parameters were similar when calculated with SI(22) and SI(12). SI could not be distinguished from 0 in approximately 50% of diabetic patients with either protocol. SI(22) correlated significantly with SI(clamp) in the whole group (r = 0.62), and in the NGT (r = 0.53), IGT (r = 0.48), and NIDDM (r = 0.41) groups (P < 0.05 for each). SI(12) correlated significantly with SI(clamp) in the whole group (r = 0.55, P < 0.001) and in the NGT (r = 0.53, P = 0.046) and IGT (r = 0.58, P = 0.008) but not NIDDM (r = 0.30, P = 0.085) groups. When SI(22), SI(clamp), and SIP(clamp) were expressed in the same units, SI(22) was 66 +/- 5% (mean +/- SE) and 50 +/- 8% lower than SI(clamp) and SIP(clamp), respectively. Thus, minimal model analysis of the insulin-modified FSIGTT provides estimates of insulin sensitivity that correlate significantly with those from the glucose clamp. The correlation was weaker, however, in NIDDM. The insulin-modified FSIGTT can be used as a simple test for assessment of insulin sensitivity in population studies involving nondiabetic subjects. Additional studies are needed before using this test routinely in patients with NIDDM.

  7. An Educators' Guide to Information Access across the Internet.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1994-01-01

    A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…

  8. Improvements to Autoplot's HAPI Support

    NASA Astrophysics Data System (ADS)

    Faden, J.; Vandegriff, J. D.; Weigel, R. S.

    2017-12-01

    Autoplot handles data from a variety of data servers. These servers communicate data in different forms, each somewhat different in capabilities and each needing new software to interface. The Heliophysics Application Programmer's Interface (HAPI) attempts to ease this by providing a standard target for clients and servers to meet. Autoplot fully supports reading data from HAPI servers, and support continues to improve as the HAPI server spec matures. This collaboration has already produced robust clients and documentation which would be expensive for groups creating their own protocol. For example, client-side data caching is introduced where Autoplot maintains a cache of data for performance and off-line use. This is a feature we considered for previous data systems, but we could never afford the time to study and implement this carefully. Also, Autoplot itself can be used as a server, making the data it can read and the results of its processing available to other data systems. Autoplot use with other data transmission systems is reviewed as well, outlining features of each system.

  9. CDC WONDER: a cooperative processing architecture for public health.

    PubMed Central

    Friede, A; Rosen, D H; Reid, J A

    1994-01-01

    CDC WONDER is an information management architecture designed for public health. It provides access to information and communications without the user's needing to know the location of data or communication pathways and mechanisms. CDC WONDER users have access to extractions from some 40 databases; electronic mail (e-mail); and surveillance data processing. System components include the Remote Client, the Communications Server, the Queue Managers, and Data Servers and Process Servers. The Remote Client software resides in the user's machine; other components are at the Centers for Disease Control and Prevention (CDC). The Remote Client, the Communications Server, and the Applications Server provide access to the information and functions in the Data Servers and Process Servers. The system architecture is based on cooperative processing, and components are coupled via pure message passing, using several protocols. This architecture allows flexibility in the choice of hardware and software. One system limitation is that final results from some subsystems are obtained slowly. Although designed for public health, CDC WONDER could be useful for other disciplines that need flexible, integrated information exchange. PMID:7719813

  10. Privacy-preserving clinical decision support system using Gaussian kernel-based classification.

    PubMed

    Rahulamathavan, Yogachandran; Veluru, Suresh; Phan, Raphael C-W; Chambers, Jonathon A; Rajarajan, Muttukrishnan

    2014-01-01

    A clinical decision support system forms a critical capability to link health observations with health knowledge to influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited to provide efficient and accurate clinical decision support in healthcare. In this scenario, clinicians can use the health knowledge located in remote servers via the Internet to diagnose their patients. However, the fact that these servers are third party and therefore potentially not fully trusted raises possible privacy concerns. In this paper, we propose a novel privacy-preserving protocol for a clinical decision support system where the patients' data always remain in an encrypted form during the diagnosis process. Hence, the server involved in the diagnosis process is not able to learn any extra knowledge about the patient's data and results. Our experimental results on popular medical datasets from UCI-database demonstrate that the accuracy of the proposed protocol is up to 97.21% and the privacy of patient data is not compromised.

  11. The HMMER Web Server for Protein Sequence Similarity Search.

    PubMed

    Prakash, Ananth; Jeffryes, Matt; Bateman, Alex; Finn, Robert D

    2017-12-08

    Protein sequence similarity search is one of the most commonly used bioinformatics methods for identifying evolutionarily related proteins. In general, sequences that are evolutionarily related share some degree of similarity, and sequence-search algorithms use this principle to identify homologs. The requirement for a fast and sensitive sequence search method led to the development of the HMMER software, which in the latest version (v3.1) uses a combination of sophisticated acceleration heuristics and mathematical and computational optimizations to enable the use of profile hidden Markov models (HMMs) for sequence analysis. The HMMER Web server provides a common platform by linking the HMMER algorithms to databases, thereby enabling the search for homologs, as well as providing sequence and functional annotation by linking external databases. This unit describes three basic protocols and two alternate protocols that explain how to use the HMMER Web server using various input formats and user defined parameters. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  12. Filmless PACS in a multiple facility environment

    NASA Astrophysics Data System (ADS)

    Wilson, Dennis L.; Glicksman, Robert A.; Prior, Fred W.; Siu, Kai-Yeung; Goldburgh, Mitchell M.

    1996-05-01

    A Picture Archiving and Communication System centered on a shared image file server can support a filmless hospital. Systems based on this architecture have proven themselves in over four years of clinical operation. Changes in healthcare delivery are causing radiology groups to support multiple facilities for remote clinic support and consolidation of services. There will be a corresponding need for communicating over a standardized wide area network (WAN). Interactive workflow, a natural extension to the single facility case, requires a means to work effectively and seamlessly across moderate to low speed communication networks. Several schemes for supporting a consortium of medical treatment facilities over a WAN are explored. Both centralized and distributed database approaches are evaluated against several WAN scenarios. Likewise, several architectures for distributing image file servers or buffers over a WAN are explored, along with the caching and distribution strategies that support them. An open system implementation is critical to the success of a wide area system. The role of the Digital Imaging and Communications in Medicine (DICOM) standard in supporting multi- facility and multi-vendor open systems is also addressed. An open system can be achieved by using a DICOM server to provide a view of the system-wide distributed database. The DICOM server interface to a local version of the global database lets a local workstation treat the multiple, distributed data servers as though they were one local server for purposes of examination queries. The query will recover information about the examination that will permit retrieval over the network from the server on which the examination resides. For efficiency reasons, the ability to build cross-facility radiologist worklists and clinician-oriented patient folders is essential. The technologies of the World-Wide-Web can be used to generate worklists and patient folders across facilities. A reliable broadcast protocol may be a convenient way to notify many different users and many image servers about new activities in the network of image servers. In addition to ensuring reliability of message delivery and global serialization of each broadcast message in the network, the broadcast protocol should not introduce significant communication overhead.

  13. A Server-Based Mobile Coaching System

    PubMed Central

    Baca, Arnold; Kornfeind, Philipp; Preuschl, Emanuel; Bichler, Sebastian; Tampier, Martin; Novatchkov, Hristo

    2010-01-01

    A prototype system for monitoring, transmitting and processing performance data in sports for the purpose of providing feedback has been developed. During training, athletes are equipped with a mobile device and wireless sensors using the ANT protocol in order to acquire biomechanical, physiological and other sports specific parameters. The measured data is buffered locally and forwarded via the Internet to a server. The server provides experts (coaches, biomechanists, sports medicine specialists etc.) with remote data access, analysis and (partly automated) feedback routines. In this way, experts are able to analyze the athlete’s performance and return individual feedback messages from remote locations. PMID:22163490

  14. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  15. WMS Server 2.0

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian; Wood, James F.

    2012-01-01

    This software is a simple, yet flexible server of raster map products, compliant with the Open Geospatial Consortium (OGC) Web Map Service (WMS) 1.1.1 protocol. The server is a full implementation of the OGC WMS 1.1.1 as a fastCGI client and using Geospatial Data Abstraction Library (GDAL) for data access. The server can operate in a proxy mode, where all or part of the WMS requests are done on a back server. The server has explicit support for a colocated tiled WMS, including rapid response of black (no-data) requests. It generates JPEG and PNG images, including 16-bit PNG. The GDAL back-end support allows great flexibility on the data access. The server is a port to a Linux/GDAL platform from the original IRIX/IL platform. It is simpler to configure and use, and depending on the storage format used, it has better performance than other available implementations. The WMS server 2.0 is a high-performance WMS implementation due to the fastCGI architecture. The use of GDAL data back end allows for great flexibility. The configuration is relatively simple, based on a single XML file. It provides scaling and cropping, as well as blending of multiple layers based on layer transparency.

  16. Serverification of Molecular Modeling Applications: The Rosetta Online Server That Includes Everyone (ROSIE)

    PubMed Central

    Conchúir, Shane Ó.; Der, Bryan S.; Drew, Kevin; Kuroda, Daisuke; Xu, Jianqing; Weitzner, Brian D.; Renfrew, P. Douglas; Sripakdeevong, Parin; Borgo, Benjamin; Havranek, James J.; Kuhlman, Brian; Kortemme, Tanja; Bonneau, Richard; Gray, Jeffrey J.; Das, Rhiju

    2013-01-01

    The Rosetta molecular modeling software package provides experimentally tested and rapidly evolving tools for the 3D structure prediction and high-resolution design of proteins, nucleic acids, and a growing number of non-natural polymers. Despite its free availability to academic users and improving documentation, use of Rosetta has largely remained confined to developers and their immediate collaborators due to the code’s difficulty of use, the requirement for large computational resources, and the unavailability of servers for most of the Rosetta applications. Here, we present a unified web framework for Rosetta applications called ROSIE (Rosetta Online Server that Includes Everyone). ROSIE provides (a) a common user interface for Rosetta protocols, (b) a stable application programming interface for developers to add additional protocols, (c) a flexible back-end to allow leveraging of computer cluster resources shared by RosettaCommons member institutions, and (d) centralized administration by the RosettaCommons to ensure continuous maintenance. This paper describes the ROSIE server infrastructure, a step-by-step ‘serverification’ protocol for use by Rosetta developers, and the deployment of the first nine ROSIE applications by six separate developer teams: Docking, RNA de novo, ERRASER, Antibody, Sequence Tolerance, Supercharge, Beta peptide design, NCBB design, and VIP redesign. As illustrated by the number and diversity of these applications, ROSIE offers a general and speedy paradigm for serverification of Rosetta applications that incurs negligible cost to developers and lowers barriers to Rosetta use for the broader biological community. ROSIE is available at http://rosie.rosettacommons.org. PMID:23717507

  17. Template based protein structure modeling by global optimization in CASP11.

    PubMed

    Joo, Keehyoung; Joung, InSuk; Lee, Sun Young; Kim, Jong Yun; Cheng, Qianyi; Manavalan, Balachandran; Joung, Jong Young; Heo, Seungryong; Lee, Juyong; Nam, Mikyung; Lee, In-Ho; Lee, Sung Jong; Lee, Jooyoung

    2016-09-01

    For the template-based modeling (TBM) of CASP11 targets, we have developed three new protein modeling protocols (nns for server prediction and LEE and LEER for human prediction) by improving upon our previous CASP protocols (CASP7 through CASP10). We applied the powerful global optimization method of conformational space annealing to three stages of optimization, including multiple sequence-structure alignment, three-dimensional (3D) chain building, and side-chain remodeling. For more successful fold recognition, a new alignment method called CRFalign was developed. It can incorporate sensitive positional and environmental dependence in alignment scores as well as strong nonlinear correlations among various features. Modifications and adjustments were made to the form of the energy function and weight parameters pertaining to the chain building procedure. For the side-chain remodeling step, residue-type dependence was introduced to the cutoff value that determines the entry of a rotamer to the side-chain modeling library. The improved performance of the nns server method is attributed to successful fold recognition achieved by combining several methods including CRFalign and to the current modeling formulation that can incorporate native-like structural aspects present in multiple templates. The LEE protocol is identical to the nns one except that CASP11-released server models are used as templates. The success of LEE in utilizing CASP11 server models indicates that proper template screening and template clustering assisted by appropriate cluster ranking promises a new direction to enhance protein 3D modeling. Proteins 2016; 84(Suppl 1):221-232. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  18. Using RSAT to scan genome sequences for transcription factor binding sites and cis-regulatory modules.

    PubMed

    Turatsinze, Jean-Valery; Thomas-Chollier, Morgane; Defrance, Matthieu; van Helden, Jacques

    2008-01-01

    This protocol shows how to detect putative cis-regulatory elements and regions enriched in such elements with the regulatory sequence analysis tools (RSAT) web server (http://rsat.ulb.ac.be/rsat/). The approach applies to known transcription factors, whose binding specificity is represented by position-specific scoring matrices, using the program matrix-scan. The detection of individual binding sites is known to return many false predictions. However, results can be strongly improved by estimating P value, and by searching for combinations of sites (homotypic and heterotypic models). We illustrate the detection of sites and enriched regions with a study case, the upstream sequence of the Drosophila melanogaster gene even-skipped. This protocol is also tested on random control sequences to evaluate the reliability of the predictions. Each task requires a few minutes of computation time on the server. The complete protocol can be executed in about one hour.

  19. Impact of chronic cough on quality of life.

    PubMed

    French, C L; Irwin, R S; Curley, F J; Krikorian, C J

    Cough is the most common complaint for which adult patients seek medical care in the United States; however, the reason(s) for this is unknown. To determine whether chronic cough was associated with adverse psychosocial or physical effects on the quality of life and whether the elimination of chronic cough with specific therapy improved these adverse effects. The study design was a prospective before-and-after intervention trial with patients serving as their own controls. Study subjects were a convenience sample of 39 consecutive and unselected adult patients referred for evaluation and management of a chronic, persistently troublesome cough. Baseline data were available for 39 patients and follow-up for 28 patients (22 women and 6 men). At baseline, demographic, Adverse Cough Outcome Survey (ACOS), and Sickness Impact Profile (SIP) data were collected and patients were managed according to a validated, systematic protocol. Following specific therapy for cough, ACOS and SIP instruments were readministered. The ages, sex, duration, and spectra and frequencies of the causes of cough were similar to multiple other studies. At baseline, patients reported a mean +/- SD of 8.6 +/- 4.8 types of adverse occurrences related to cough. There were significant correlations between multiple ACOS items and total, physical, and psychosocial SIP scores. Psychosocial score correlated with total number of symptoms (P<.02). After cough disappeared with treatment, ACOS complaints decreased to a mean +/- SD of 1.9 +/- 3.2 (P<.0001) as did total (mean +/- SD, 4.8 +/- 4.5 to 1.8 +/- 2.2) (P= .004), psychosocial (mean +/- SD, 4.2 +/- 6.8 to 0.8 +/- 2.3) (P = .004), and physical (mean +/- SD, 2.2 +/- 2.9 to 0.9 +/- 1.8) (P = .05) SIP scores. Multiple linear regression analysis showed that 54% of variability of the psychosocial SIP score was explained by 4 ACOS items while none of the physical score was explained. Chronic cough was associated with deterioration in patients' quality of life. The health-related dysfunction was most likely psychosocial. The ACOS and SIP appear to be valid tools in assessing the impact of chronic cough.

  20. Nonbibliographic Applications of Z39.50.

    ERIC Educational Resources Information Center

    Kunze, John A.

    1992-01-01

    Describes the use of the Z39.50 information retrieval protocol as the basis for Infocal, a read-only, client/server-based campus information system. Technical considerations in adapting the protocol to nonbibliographic data, including semantic modules, dynamic attribute sets, and dynamic record syntax, are described in detail. (Contains 11…

  1. Migrating an Online Service to WAP - A Case Study.

    ERIC Educational Resources Information Center

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  2. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  3. Web tools for large-scale 3D biological images and atlases

    PubMed Central

    2012-01-01

    Background Large-scale volumetric biomedical image data of three or more dimensions are a significant challenge for distributed browsing and visualisation. Many images now exceed 10GB which for most users is too large to handle in terms of computer RAM and network bandwidth. This is aggravated when users need to access tens or hundreds of such images from an archive. Here we solve the problem for 2D section views through archive data delivering compressed tiled images enabling users to browse through very-large volume data in the context of a standard web-browser. The system provides an interactive visualisation for grey-level and colour 3D images including multiple image layers and spatial-data overlay. Results The standard Internet Imaging Protocol (IIP) has been extended to enable arbitrary 2D sectioning of 3D data as well a multi-layered images and indexed overlays. The extended protocol is termed IIP3D and we have implemented a matching server to deliver the protocol and a series of Ajax/Javascript client codes that will run in an Internet browser. We have tested the server software on a low-cost linux-based server for image volumes up to 135GB and 64 simultaneous users. The section views are delivered with response times independent of scale and orientation. The exemplar client provided multi-layer image views with user-controlled colour-filtering and overlays. Conclusions Interactive browsing of arbitrary sections through large biomedical-image volumes is made possible by use of an extended internet protocol and efficient server-based image tiling. The tools open the possibility of enabling fast access to large image archives without the requirement of whole image download and client computers with very large memory configurations. The system was demonstrated using a range of medical and biomedical image data extending up to 135GB for a single image volume. PMID:22676296

  4. Unconditionally verifiable blind quantum computation

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph F.; Kashefi, Elham

    2017-07-01

    Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.

  5. The relationship between disease and function and perceived health in very frail elders.

    PubMed

    Mulrow, C D; Gerety, M B; Cornell, J E; Lawrence, V A; Kanten, D N

    1994-04-01

    To study associations between disease and observed function and self-perceived health in very frail elders. Cross-sectional survey of nine nursing homes in San Antonio, TX. 194 elderly long-stay nursing home residents dependent in at least two ADLs and without severe cognitive impairment. Burden of disease (BOD) was chart abstracted using a standardized protocol that assessed types and severities of 59 categorizations of chronic and acute medical conditions. Observed function and self-perceived health status were assessed independently by the Katz Activities of Daily Living scale (ADL) and the Sickness Impact Profile (SIP), respectively. Summary BOD scores had a low, but statistically significant, univariate correlation with ADL scores (r = 0.21, P = 0.003) and no significant correlation with SIP scores (R = -0.008). Multiple linear regression analyses, including the 24 most frequent disease categories, showed that disease explained significant amounts of ADL (r2 = 0.25, P = 0.001) and borderline significant amounts of SIP (r2 = 0.16, P = 0.11). Models including both disease and sociodemographic, cognitive, and affective variables showed disease added significant incremental explantation beyond the other factors to ADL (incremental r2 = 0.14, P = 0.04), but not to SIP (incremental r2 = 0.08, P > 0.10). Disease, observed function, and self-perceived health status are separate, but interrelated entities, with disease having a stronger relationship to observed function than self-perceived health. Comprehensive assessment of frail elders may need to include all three areas, and studies that focus on one area should take into account the other two as potential important covariates.

  6. Detection of autotrophic verrucomicrobial methanotrophs in a geothermal environment using stable isotope probing.

    PubMed

    Sharp, Christine E; Stott, Matthew B; Dunfield, Peter F

    2012-01-01

    Genomic analysis of the methanotrophic verrucomicrobium "Methylacidiphilum infernorum" strain V4 has shown that most pathways conferring its methanotrophic lifestyle are similar to those found in proteobacterial methanotrophs. However, due to the large sequence divergence of its methane monooxygenase-encoding genes (pmo), "universal" pmoA polymerase chain reaction (PCR) primers do not target these bacteria. Unlike proteobacterial methanotrophs, "Methylacidiphilum" fixes carbon autotrophically, and uses methane only for energy generation. As a result, techniques used to detect methanotrophs in the environment such as (13)CH(4)-stable isotope probing (SIP) and pmoA-targeted PCR do not detect verrucomicrobial methanotrophs, and they may have been overlooked in previous environmental studies. We developed a modified SIP technique to identify active methanotrophic Verrucomicrobia in the environment by labeling with (13)CO(2) and (13)CH(4), individually and in combination. Testing the protocol in "M. infernorum" strain V4 resulted in assimilation of (13)CO(2) but not (13)CH(4), verifying its autotrophic lifestyle. To specifically detect methanotrophs (as opposed to other autotrophs) via (13)CO(2)-SIP, a quantitative PCR (qPCR) assay specific for verrucomicrobial-pmoA genes was developed and used in combination with SIP. Incubation of an acidic, high-temperature geothermal soil with (13)CH(4) + (12)CO(2) caused little shift in the density distribution of verrucomicrobial-pmoA genes relative to controls. However, labeling with (13)CO(2) in combination with (12)CH(4) or (13)CH(4) induced a strong shift in the distribution of verrucomicrobial-pmoA genes towards the heavy DNA fractions. The modified SIP technique demonstrated that the primary methanotrophs active in the soil were autotrophs and belonged to the Verrucomicrobia. This is the first demonstration of autotrophic, non-proteobacterial methanotrophy in situ, and provides a tool to detect verrucomicrobial methanotrophs in other ecosystems.

  7. Validation of a multidimensional evaluation scale for use in elderly cancer patients.

    PubMed

    Monfardini, S; Ferrucci, L; Fratino, L; del Lungo, I; Serraino, D; Zagonel, V

    1996-01-15

    Although aging is one of the most important risk factors for cancer, elderly patients tend to be excluded from cancer clinical trials, only on the basis of chronologic age. Performance Status (PS) has been used widely to select adult patients for entry into clinical trials, but it does not include a comprehensive evaluation of various age-related factors in the elderly. This study was designed to assess the reliability and validity of a multidimensional geriatric assessment protocol for elderly patients with cancer. Thirty consecutive elderly patients (> or = 65 years), diagnosed with hematologic neoplasia or solid tumors and undergoing chemotherapy or radiotherapy, were given a specifically structured multidimensional questionnaire (MACE) three times during one week by two different physicians. MACE was intended to collect information on demographics, socioeconomic status, cognitive status, depression, physical performance, disability, and tumor characteristics. In parallel with MACE, information was collected by means of the Sickness Impact Profile (SIP). Both for inter-rater and test-retest reliability, the values of the intraclass correlation coefficient (ICC) were generally higher than 0.7. Disability, cognitive status, depressive symptoms, and the number of days spent in bed sick in the last two weeks were markedly correlated with the global, physical, and social SIP score. Disability alone explained 70% of the variance in the SIP global score, 83% of the variance in the SIP physical score, and 45% of the variance in the SIP psychosocial score. MACE proved to be applicable in a reasonable amount of time (around 30 minutes) for a medical oncology ward. These data indicate that this structured evaluation of functional status is feasible and reliable. MACE is therefore proposed as a clinical research tool to avoid arbitrary decisions on patient selection for enrollment in clinical trials, to favor uniform monitoring of treatment, and to allow a better comparison of results.

  8. Detection of autotrophic verrucomicrobial methanotrophs in a geothermal environment using stable isotope probing

    PubMed Central

    Sharp, Christine E.; Stott, Matthew B.; Dunfield, Peter F.

    2012-01-01

    Genomic analysis of the methanotrophic verrucomicrobium “Methylacidiphilum infernorum” strain V4 has shown that most pathways conferring its methanotrophic lifestyle are similar to those found in proteobacterial methanotrophs. However, due to the large sequence divergence of its methane monooxygenase-encoding genes (pmo), “universal” pmoA polymerase chain reaction (PCR) primers do not target these bacteria. Unlike proteobacterial methanotrophs, “Methylacidiphilum” fixes carbon autotrophically, and uses methane only for energy generation. As a result, techniques used to detect methanotrophs in the environment such as 13CH4-stable isotope probing (SIP) and pmoA-targeted PCR do not detect verrucomicrobial methanotrophs, and they may have been overlooked in previous environmental studies. We developed a modified SIP technique to identify active methanotrophic Verrucomicrobia in the environment by labeling with 13CO2 and 13CH4, individually and in combination. Testing the protocol in “M. infernorum” strain V4 resulted in assimilation of 13CO2 but not 13CH4, verifying its autotrophic lifestyle. To specifically detect methanotrophs (as opposed to other autotrophs) via 13CO2-SIP, a quantitative PCR (qPCR) assay specific for verrucomicrobial-pmoA genes was developed and used in combination with SIP. Incubation of an acidic, high-temperature geothermal soil with 13CH4 + 12CO2 caused little shift in the density distribution of verrucomicrobial-pmoA genes relative to controls. However, labeling with 13CO2 in combination with 12CH4 or 13CH4 induced a strong shift in the distribution of verrucomicrobial-pmoA genes towards the heavy DNA fractions. The modified SIP technique demonstrated that the primary methanotrophs active in the soil were autotrophs and belonged to the Verrucomicrobia. This is the first demonstration of autotrophic, non-proteobacterial methanotrophy in situ, and provides a tool to detect verrucomicrobial methanotrophs in other ecosystems. PMID:22912630

  9. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  10. On the Nets. Comparing Web Browsers: Mosaic, Cello, Netscape, WinWeb and InternetWorks Life.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1995-01-01

    World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)

  11. X-Windows Information Sharing Protocol Widget Class

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Information Sharing Protocol (ISP) Widget Class ("Class") is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing ISP graphical-user-interface (GUI) computer programs. ISP programming tasks require many method calls to identify, query, and interpret the connections and messages exchanged between a client and an ISP server. Most X-Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Information Sharing Protocol (ISP) Widget Class encapsulates the client side of the ISP programming libraries within the framework of an X-Windows widget. Using the widget framework, X-Windows GUI programs can interact with ISP services in an abstract way and in the same manner as that of other graphical widgets, making it easier to write ISP GUI client programs. Wrapping ISP client services inside a widget framework enables a programmer to treat an ISP server interface as though it were a GUI. Moreover, an alternate subclass could implement another communication protocol in the same sort of widget.

  12. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  13. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  14. Privacy-preserving public auditing for data integrity in cloud

    NASA Astrophysics Data System (ADS)

    Shaik Saleem, M.; Murali, M.

    2018-04-01

    Cloud computing which has collected extent concentration from communities of research and with industry research development, a large pool of computing resources using virtualized sharing method like storage, processing power, applications and services. The users of cloud are vend with on demand resources as they want in the cloud computing. Outsourced file of the cloud user can easily tampered as it is stored at the third party service providers databases, so there is no integrity of cloud users data as it has no control on their data, therefore providing security assurance to the users data has become one of the primary concern for the cloud service providers. Cloud servers are not responsible for any data loss as it doesn’t provide the security assurance to the cloud user data. Remote data integrity checking (RDIC) licenses an information to data storage server, to determine that it is really storing an owners data truthfully. RDIC is composed of security model and ID-based RDIC where it is responsible for the security of every server and make sure the data privacy of cloud user against the third party verifier. Generally, by running a two-party Remote data integrity checking (RDIC) protocol the clients would themselves be able to check the information trustworthiness of their cloud. Within the two party scenario the verifying result is given either from the information holder or the cloud server may be considered as one-sided. Public verifiability feature of RDIC gives the privilege to all its users to verify whether the original data is modified or not. To ensure the transparency of the publicly verifiable RDIC protocols, Let’s figure out there exists a TPA who is having knowledge and efficiency to verify the work to provide the condition clearly by publicly verifiable RDIC protocols.

  15. 21 CFR 1311.02 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... server or hard drive. Certificate Policy means a named set of rules that sets forth the applicability of..., prescribe specific performance requirements, practices, formats, communications protocols, etc., for...

  16. Standard Port-Visit Cost Forecasting Model for U.S. Navy Husbanding Contracts

    DTIC Science & Technology

    2009-12-01

    Protocol (HTTP) server.35 2. MySQL . An open-source database.36 3. PHP . A common scripting language used for Web development.37 E. IMPLEMENTATION OF...Inc. (2009). MySQL Community Server (Version 5.1) [Software]. Available from http://dev.mysql.com/downloads/ 37 The PHP Group (2009). PHP (Version...Logistics Services MySQL My Structured Query Language NAVSUP Navy Supply Systems Command NC Non-Contract Items NPS Naval Postgraduate

  17. Consumption with Large Sip Sizes Increases Food Intake and Leads to Underestimation of the Amount Consumed

    PubMed Central

    Bolhuis, Dieuwerke P.; Lakemond, Catriona M. M.; de Wijk, Rene A.; Luning, Pieternel A.; de Graaf, Cees

    2013-01-01

    Background A number of studies have shown that bite and sip sizes influence the amount of food intake. Consuming with small sips instead of large sips means relatively more sips for the same amount of food to be consumed; people may believe that intake is higher which leads to faster satiation. This effect may be disturbed when people are distracted. Objective The objective of the study is to assess the effects of sip size in a focused state and a distracted state on ad libitum intake and on the estimated amount consumed. Design In this 3×2 cross-over design, 53 healthy subjects consumed ad libitum soup with small sips (5 g, 60 g/min), large sips (15 g, 60 g/min), and free sips (where sip size was determined by subjects themselves), in both a distracted and focused state. Sips were administered via a pump. There were no visual cues toward consumption. Subjects then estimated how much they had consumed by filling soup in soup bowls. Results Intake in the small-sip condition was ∼30% lower than in both the large-sip and free-sip conditions (P<0.001). In addition, subjects underestimated how much they had consumed in the large-sip and free-sip conditions (P<0.03). Distraction led to a general increase in food intake (P = 0.003), independent of sip size. Distraction did not influence sip size or estimations. Conclusions Consumption with large sips led to higher food intake, as expected. Large sips, that were either fixed or chosen by subjects themselves led to underestimations of the amount consumed. This may be a risk factor for over-consumption. Reducing sip or bite sizes may successfully lower food intake, even in a distracted state. PMID:23372657

  18. Migration of legacy mumps applications to relational database servers.

    PubMed

    O'Kane, K C

    2001-07-01

    An extended implementation of the Mumps language is described that facilitates vendor neutral migration of legacy Mumps applications to SQL-based relational database servers. Implemented as a compiler, this system translates Mumps programs to operating system independent, standard C code for subsequent compilation to fully stand-alone, binary executables. Added built-in functions and support modules extend the native hierarchical Mumps database with access to industry standard, networked, relational database management servers (RDBMS) thus freeing Mumps applications from dependence upon vendor specific, proprietary, unstandardized database models. Unlike Mumps systems that have added captive, proprietary RDMBS access, the programs generated by this development environment can be used with any RDBMS system that supports common network access protocols. Additional features include a built-in web server interface and the ability to interoperate directly with programs and functions written in other languages.

  19. A group communication approach for mobile computing mobile channel: An ISIS tool for mobile services

    NASA Astrophysics Data System (ADS)

    Cho, Kenjiro; Birman, Kenneth P.

    1994-05-01

    This paper examines group communication as an infrastructure to support mobility of users, and presents a simple scheme to support user mobility by means of switching a control point between replicated servers. We describe the design and implementation of a set of tools, called Mobile Channel, for use with the ISIS system. Mobile Channel is based on a combination of the two replication schemes: the primary-backup approach and the state machine approach. Mobile Channel implements a reliable one-to-many FIFO channel, in which a mobile client sees a single reliable server; servers, acting as a state machine, see multicast messages from clients. Migrations of mobile clients are handled as an intentional primary switch, and hand-offs or server failures are completely masked to mobile clients. To achieve high performance, servers are replicated at a sliding-window level. Our scheme provides a simple abstraction of migration, eliminates complicated hand-off protocols, provides fault-tolerance and is implemented within the existing group communication mechanism.

  20. Design and evaluation of web-based image transmission and display with different protocols

    NASA Astrophysics Data System (ADS)

    Tan, Bin; Chen, Kuangyi; Zheng, Xichuan; Zhang, Jianguo

    2011-03-01

    There are many Web-based image accessing technologies used in medical imaging area, such as component-based (ActiveX Control) thick client Web display, Zerofootprint thin client Web viewer (or called server side processing Web viewer), Flash Rich Internet Application(RIA) ,or HTML5 based Web display. Different Web display methods have different peformance in different network environment. In this presenation, we give an evaluation on two developed Web based image display systems. The first one is used for thin client Web display. It works between a PACS Web server with WADO interface and thin client. The PACS Web server provides JPEG format images to HTML pages. The second one is for thick client Web display. It works between a PACS Web server with WADO interface and thick client running in browsers containing ActiveX control, Flash RIA program or HTML5 scripts. The PACS Web server provides native DICOM format images or JPIP stream for theses clients.

  1. An NTP Stratum-One Server Farm Fed By IEEE-1588

    DTIC Science & Technology

    2010-01-01

    Serial Time Code Formats,” U.S. Army White Sands Missile Range, N.M. [11] J. Eidson , 2005, “IEEE-1588 Standard for a Precision Clock Synchronization ... synchronized to its Master Clocks via IRIG-B time code on a low- frequency RF distribution system. The availability of Precise Time Protocol (PTP, IEEE...forwarding back to the requestor. The farm NTP servers are synchronized to the USNO Master Clocks using IRIG-B time code. The current standard NTP

  2. TCP/IP Interface for the Satellite Orbit Analysis Program (SOAP)

    NASA Technical Reports Server (NTRS)

    Carnright, Robert; Stodden, David; Coggi, John

    2009-01-01

    The Transmission Control Protocol/ Internet protocol (TCP/IP) interface for the Satellite Orbit Analysis Program (SOAP) provides the means for the software to establish real-time interfaces with other software. Such interfaces can operate between two programs, either on the same computer or on different computers joined by a network. The SOAP TCP/IP module employs a client/server interface where SOAP is the server and other applications can be clients. Real-time interfaces between software offer a number of advantages over embedding all of the common functionality within a single program. One advantage is that they allow each program to divide the computation labor between processors or computers running the separate applications. Secondly, each program can be allowed to provide its own expertise domain with other programs able to use this expertise.

  3. 3Drefine: an interactive web server for efficient protein structure refinement

    PubMed Central

    Bhattacharya, Debswapna; Nowotny, Jackson; Cao, Renzhi; Cheng, Jianlin

    2016-01-01

    3Drefine is an interactive web server for consistent and computationally efficient protein structure refinement with the capability to perform web-based statistical and visual analysis. The 3Drefine refinement protocol utilizes iterative optimization of hydrogen bonding network combined with atomic-level energy minimization on the optimized model using a composite physics and knowledge-based force fields for efficient protein structure refinement. The method has been extensively evaluated on blind CASP experiments as well as on large-scale and diverse benchmark datasets and exhibits consistent improvement over the initial structure in both global and local structural quality measures. The 3Drefine web server allows for convenient protein structure refinement through a text or file input submission, email notification, provided example submission and is freely available without any registration requirement. The server also provides comprehensive analysis of submissions through various energy and statistical feedback and interactive visualization of multiple refined models through the JSmol applet that is equipped with numerous protein model analysis tools. The web server has been extensively tested and used by many users. As a result, the 3Drefine web server conveniently provides a useful tool easily accessible to the community. The 3Drefine web server has been made publicly available at the URL: http://sysbio.rnet.missouri.edu/3Drefine/. PMID:27131371

  4. Method for a dummy CD mirror server based on NAS

    NASA Astrophysics Data System (ADS)

    Tang, Muna; Pei, Jing

    2002-09-01

    With the development of computer network, information sharing is becoming the necessity in human life. The rapid development of CD-ROM and CD-ROM driver techniques makes it possible to issue large database online. After comparing many designs of dummy CD mirror database, which are the embodiment of a main product in CD-ROM database now and in near future, we proposed and realized a new PC based scheme. Our system has the following merits, such as, supporting all kinds of CD format; supporting many network protocol; the independence of mirror network server and the main server; low price, super large capacity, without the need of any special hardware. Preliminarily experiments have verified the validity of the proposed scheme. Encouraged by the promising application future, we are now preparing to put it into market. This paper discusses the design and implement of the CD-ROM server detailedly.

  5. Installation of the National Transport Code Collaboration Data Server at the ITPA International Multi-tokamak Confinement Profile Database

    NASA Astrophysics Data System (ADS)

    Roach, Colin; Carlsson, Johan; Cary, John R.; Alexander, David A.

    2002-11-01

    The National Transport Code Collaboration (NTCC) has developed an array of software, including a data client/server. The data server, which is written in C++, serves local data (in the ITER Profile Database format) as well as remote data (by accessing one or several MDS+ servers). The client, a web-invocable Java applet, provides a uniform, intuitive, user-friendly, graphical interface to the data server. The uniformity of the interface relieves the user from the trouble of mastering the differences between different data formats and lets him/her focus on the essentials: plotting and viewing the data. The user runs the client by visiting a web page using any Java capable Web browser. The client is automatically downloaded and run by the browser. A reference to the data server is then retrieved via the standard Web protocol (HTTP). The communication between the client and the server is then handled by the mature, industry-standard CORBA middleware. CORBA has bindings for all common languages and many high-quality implementations are available (both Open Source and commercial). The NTCC data server has been installed at the ITPA International Multi-tokamak Confinement Profile Database, which is hosted by the UKAEA at Culham Science Centre. The installation of the data server is protected by an Internet firewall. To make it accessible to clients outside the firewall some modifications of the server were required. The working version of the ITPA confinement profile database is not open to the public. Authentification of legitimate users is done utilizing built-in Java security features to demand a password to download the client. We present an overview of the NTCC data client/server and some details of how the CORBA firewall-traversal issues were resolved and how the user authentification is implemented.

  6. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    NASA Astrophysics Data System (ADS)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google Earth layers using KML; generation of maps via WMS or ArcIMS protocols; and data manipulation with Unix utilities.

  7. 106-17 Telemetry Management Resources Chapter 25

    DTIC Science & Technology

    2017-07-01

    aspects of the TmNS system . There are two primary protocols for accessing the management resources: Simple Network Management Protocol (SNMP) and... management resources as well as a basic HTTP clients and servers for a more RESTful approach to system management . Both tools are available from the...Telemetry Standards, RCC Standard 106-17 Chapter 25, July 2017 i CHAPTER 25 Management Resources Acronyms

  8. Building a Multi-Discipline Digital Library Through Extending the Dienst Protocol

    NASA Technical Reports Server (NTRS)

    Nelson, Michael L.; Maly, Kurt; Shen, Stewart N. T.

    1997-01-01

    The purpose of this project is to establish multi-discipline capability for a unified, canonical digital library service for scientific and technical information (STI). This is accomplished by extending the Dienst Protocol to be aware of subject classification of a servers holdings. We propose a hierarchical, general, and extendible subject classification that can encapsulate existing classification systems.

  9. Blind quantum computing with weak coherent pulses.

    PubMed

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-18

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.

  10. Blind Quantum Computing with Weak Coherent Pulses

    NASA Astrophysics Data System (ADS)

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-01

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.

  11. Experiences with DCE: the pro7 communication server based on OSF-DCE functionality.

    PubMed

    Schulte, M; Lordieck, W

    1997-01-01

    The pro7-communication server is a new approach to manage communication between different applications on different hardware platforms in a hospital environment. The most important features are the use of OSF/DCE for realising remote procedure calls between different platforms, the use of an SQL-92 compatible relational database and the design of a new software development tool (called protocol definition language compiler) for describing the interface of a new application, which is to integrate in a hospital environment.

  12. Government Information Locator Service (GILS). Draft report to the Information Infrastructure Task Force

    NASA Technical Reports Server (NTRS)

    1994-01-01

    This is a draft report on the Government Information Locator Service (GILS) to the National Information Infrastructure (NII) task force. GILS is designed to take advantage of internetworking technology known as client-server architecture which allows information to be distributed among multiple independent information servers. Two appendices are provided -- (1) A glossary of related terminology and (2) extracts from a draft GILS profile for the use of the American National Standard Information Retrieval Application Service Definition and Protocol Specification for Library Applications.

  13. Data Access Tools And Services At The Goddard Distributed Active Archive Center (GDAAC)

    NASA Technical Reports Server (NTRS)

    Pham, Long; Eng, Eunice; Sweatman, Paul

    2003-01-01

    As one of the largest providers of Earth Science data from the Earth Observing System, GDAAC provides the latest data from the Moderate Resolution Imaging Spectroradiometer (MODIS), Atmospheric Infrared Sounder (AIRS), Solar Radiation and Climate Experiment (SORCE) data products via GDAAC's data pool (50TB of disk cache). In order to make this huge volume of data more accessible to the public and science communities, the GDAAC offers multiple data access tools and services: Open Source Project for Network Data Access Protocol (OPeNDAP), Grid Analysis and Display System (GrADS/DODS) (GDS), Live Access Server (LAS), OpenGlS Web Map Server (WMS) and Near Archive Data Mining (NADM). The objective is to assist users in retrieving electronically a smaller, usable portion of data for further analysis. The OPeNDAP server, formerly known as the Distributed Oceanographic Data System (DODS), allows the user to retrieve data without worrying about the data format. OPeNDAP is capable of server-side subsetting of HDF, HDF-EOS, netCDF, JGOFS, ASCII, DSP, FITS and binary data formats. The GrADS/DODS server is capable of serving the same data formats as OPeNDAP. GDS has an additional feature of server-side analysis. Users can analyze the data on the server there by decreasing the computational load on their client's system. The LAS is a flexible server that allows user to graphically visualize data on the fly, to request different file formats and to compare variables from distributed locations. Users of LAS have options to use other available graphics viewers such as IDL, Matlab or GrADS. WMS is based on the OPeNDAP for serving geospatial information. WMS supports OpenGlS protocol to provide data in GIs-friendly formats for analysis and visualization. NADM is another access to the GDAAC's data pool. NADM gives users the capability to use a browser to upload their C, FORTRAN or IDL algorithms, test the algorithms, and mine data in the data pool. With NADM, the GDAAC provides an environment physically close to the data source. NADM will benefit users with mining or offer data reduction algorithms by reducing large volumes of data before transmission over the network to the user.

  14. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  15. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less

  16. A Fast lattice-based polynomial digital signature system for m-commerce

    NASA Astrophysics Data System (ADS)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  17. Construction of a multimedia application on public network

    NASA Astrophysics Data System (ADS)

    Liu, Jang; Wang, Chwan-Huei; Tseng, Ming-Yu; Hsiao, Sun-Lang; Luo, Wen-Hen; Tseng, Yung-Mean; Hung, Feng-Yue

    1994-04-01

    This paper describes our perception of current developments in networking, telecommunication and technology of multimedia. As such, we have taken a constructive view. From this standpoint, we devised a client server architecture that veils servers from their customers. It adheres to our conviction that network and location independence for serve access is a future trend. We have constructed an on-line KARAOKE on an existing CVS (Chinese Videotex System) to test the workability of this architecture and it works well. We are working on a prototype multimedia service network which is a miniature client server structure of our proposal. A specially designed protocol is described. Through this protocol, an one-to-many connection can be set up and to provide for multimedia applications, new connections can be established within a basic connection. So continuous media may have their own connections without being interrupted by other media, at least from the view of an application. We have advanced a constructive view which is not a framework itself. But it is tantamount to a framework, in building systems as assembly of methods, technics, designs, and ideas. This is what a framework does with more flexibility and availability.

  18. Earth Observing System Data Gateway

    NASA Technical Reports Server (NTRS)

    Pfister, Robin; McMahon, Joe; Amrhein, James; Sefert, Ed; Marsans, Lorena; Solomon, Mark; Nestler, Mark

    2006-01-01

    The Earth Observing System Data Gateway (EDG) software provides a "one-stop-shopping" standard interface for exploring and ordering Earth-science data stored at geographically distributed sites. EDG enables a user to do the following: 1) Search for data according to high-level criteria (e.g., geographic location, time, or satellite that acquired the data); 2) Browse the results of a search, viewing thumbnail sketches of data that satisfy the user s criteria; and 3) Order selected data for delivery to a specified address on a chosen medium (e.g., compact disk or magnetic tape). EDG consists of (1) a component that implements a high-level client/server protocol, and (2) a collection of C-language libraries that implement the passing of protocol messages between an EDG client and one or more EDG servers. EDG servers are located at sites usually called "Distributed Active Archive Centers" (DAACs). Each DAAC may allow access to many individual data items, called "granules" (e.g., single Landsat images). Related granules are grouped into collections called "data sets." EDG enables a user to send a search query to multiple DAACs simultaneously, inspect the resulting information, select browseable granules, and then order selected data from the different sites in a seamless fashion.

  19. IPTV multicast with peer-assisted lossy error control

    NASA Astrophysics Data System (ADS)

    Li, Zhi; Zhu, Xiaoqing; Begen, Ali C.; Girod, Bernd

    2010-07-01

    Emerging IPTV technology uses source-specific IP multicast to deliver television programs to end-users. To provide reliable IPTV services over the error-prone DSL access networks, a combination of multicast forward error correction (FEC) and unicast retransmissions is employed to mitigate the impulse noises in DSL links. In existing systems, the retransmission function is provided by the Retransmission Servers sitting at the edge of the core network. In this work, we propose an alternative distributed solution where the burden of packet loss repair is partially shifted to the peer IP set-top boxes. Through Peer-Assisted Repair (PAR) protocol, we demonstrate how the packet repairs can be delivered in a timely, reliable and decentralized manner using the combination of server-peer coordination and redundancy of repairs. We also show that this distributed protocol can be seamlessly integrated with an application-layer source-aware error protection mechanism called forward and retransmitted Systematic Lossy Error Protection (SLEP/SLEPr). Simulations show that this joint PARSLEP/ SLEPr framework not only effectively mitigates the bottleneck experienced by the Retransmission Servers, thus greatly enhancing the scalability of the system, but also efficiently improves the resistance to the impulse noise.

  20. Analysis of Active Methylotrophic Communities: When DNA-SIP Meets High-Throughput Technologies.

    PubMed

    Taubert, Martin; Grob, Carolina; Howat, Alexandra M; Burns, Oliver J; Chen, Yin; Neufeld, Josh D; Murrell, J Colin

    2016-01-01

    Methylotrophs are microorganisms ubiquitous in the environment that can metabolize one-carbon (C1) compounds as carbon and/or energy sources. The activity of these prokaryotes impacts biogeochemical cycles within their respective habitats and can determine whether these habitats act as sources or sinks of C1 compounds. Due to the high importance of C1 compounds, not only in biogeochemical cycles, but also for climatic processes, it is vital to understand the contributions of these microorganisms to carbon cycling in different environments. One of the most challenging questions when investigating methylotrophs, but also in environmental microbiology in general, is which species contribute to the environmental processes of interest, or "who does what, where and when?" Metabolic labeling with C1 compounds substituted with (13)C, a technique called stable isotope probing, is a key method to trace carbon fluxes within methylotrophic communities. The incorporation of (13)C into the biomass of active methylotrophs leads to an increase in the molecular mass of their biomolecules. For DNA-based stable isotope probing (DNA-SIP), labeled and unlabeled DNA is separated by isopycnic ultracentrifugation. The ability to specifically analyze DNA of active methylotrophs from a complex background community by high-throughput sequencing techniques, i.e. targeted metagenomics, is the hallmark strength of DNA-SIP for elucidating ecosystem functioning, and a protocol is detailed in this chapter.

  1. Validating metal binding sites in macromolecule structures using the CheckMyMetal web server

    PubMed Central

    Zheng, Heping; Chordia, Mahendra D.; Cooper, David R.; Chruszcz, Maksymilian; Müller, Peter; Sheldrick, George M.

    2015-01-01

    Metals play vital roles in both the mechanism and architecture of biological macromolecules. Yet structures of metal-containing macromolecules where metals are misidentified and/or suboptimally modeled are abundant in the Protein Data Bank (PDB). This shows the need for a diagnostic tool to identify and correct such modeling problems with metal binding environments. The "CheckMyMetal" (CMM) web server (http://csgid.org/csgid/metal_sites/) is a sophisticated, user-friendly web-based method to evaluate metal binding sites in macromolecular structures in respect to 7350 metal binding sites observed in a benchmark dataset of 2304 high resolution crystal structures. The protocol outlines how the CMM server can be used to detect geometric and other irregularities in the structures of metal binding sites and alert researchers to potential errors in metal assignment. The protocol also gives practical guidelines for correcting problematic sites by modifying the metal binding environment and/or redefining metal identity in the PDB file. Several examples where this has led to meaningful results are described in the anticipated results section. CMM was designed for a broad audience—biomedical researchers studying metal-containing proteins and nucleic acids—but is equally well suited for structural biologists to validate new structures during modeling or refinement. The CMM server takes the coordinates of a metal-containing macromolecule structure in the PDB format as input and responds within a few seconds for a typical protein structure modeled with a few hundred amino acids. PMID:24356774

  2. Psychometric evaluation of the Social Interaction Phobia Scale.

    PubMed

    Reilly, Alison R; Carleton, R Nicholas; Weeks, Justin W

    2012-01-01

    The present study evaluated the psychometric properties of a novel measure of social anxiety symptoms, the Social Interaction Phobia Scale (SIPS), as a stand-alone item set, using an undergraduate sample (N=512). The 14-item SIPS has three subscales assessing Social Interaction Anxiety, Fear of Overt Evaluation, and Fear of Attracting Attention. Confirmatory factor analyses replicated the three-factor structure for the SIPS originally reported by Carleton et al. All SIPS scores demonstrated good internal consistency. The convergent validity of the SIPS was supported by strong and positive correlations between all SIPS scores and measures of social anxiety and fear of evaluation; the finding that the relationships between all SIPS scores and a social anxiety measure were stronger than relationships between all SIPS scores and measures of other constructs supported the discriminant validity of the SIPS. Results suggest that the SIPS possesses excellent psychometric properties.

  3. Advances in recurrence and malignant transformation of sinonasal inverted papillomas

    PubMed Central

    Sun, Qingjia; An, Lifeng; Zheng, Jun; Zhu, Dongdong

    2017-01-01

    Sinonasal inverted papilloma (SIP) is a benign tumor of the nasal cavity and sinus. SIP is characterized by aggressive malignant transformation and a high rate of recurrence. Inadequate removal of the tumor during surgery is one of the most significant contributors to SIP recurrence. A growing body of evidence suggests that molecular alteration in SIP, including human papilloma virus infections, single nucleotide polymorphisms of key genes, deregulation of signaling pathways and immunological changes, may lead to SIP occurrence and malignant transformation. However, the extent to which these molecular mechanisms contribute to SIP pathology and transformation remains unclear due to limited research. Further studies are warranted to elucidate the primary dependent factors that contribute to SIP etiology. The present article reviewed risk factors of progression and recurrence of SIP, including outdoor and industrial occupational exposure, smoking, septal deviation, SIP location, recurrent cases, stage of SIP-associated squamous cell carcinoma and choice of surgical method. PMID:28599459

  4. Transitioning the Tactical Marine Corps to IPv6

    DTIC Science & Technology

    2011-09-01

    SUT System Under Test SYSCOM Systems Command (synonymous with MCSC) TCP Transmission Control Protocol TDS Tactical Data Systems TDN...capability to provide services to the Marine Corps Tactical Data Systems ( TDS ) and other DDS-M systems. The 2 DDS-M can function as the file server...Intelligence ( ATI ) program provides comprehensive application protocols and attacks, as well as feature updates and responsive service and support with

  5. AMMOS2: a web server for protein-ligand-water complexes refinement via molecular mechanics.

    PubMed

    Labbé, Céline M; Pencheva, Tania; Jereva, Dessislava; Desvillechabrol, Dimitri; Becot, Jérôme; Villoutreix, Bruno O; Pajeva, Ilza; Miteva, Maria A

    2017-07-03

    AMMOS2 is an interactive web server for efficient computational refinement of protein-small organic molecule complexes. The AMMOS2 protocol employs atomic-level energy minimization of a large number of experimental or modeled protein-ligand complexes. The web server is based on the previously developed standalone software AMMOS (Automatic Molecular Mechanics Optimization for in silico Screening). AMMOS utilizes the physics-based force field AMMP sp4 and performs optimization of protein-ligand interactions at five levels of flexibility of the protein receptor. The new version 2 of AMMOS implemented in the AMMOS2 web server allows the users to include explicit water molecules and individual metal ions in the protein-ligand complexes during minimization. The web server provides comprehensive analysis of computed energies and interactive visualization of refined protein-ligand complexes. The ligands are ranked by the minimized binding energies allowing the users to perform additional analysis for drug discovery or chemical biology projects. The web server has been extensively tested on 21 diverse protein-ligand complexes. AMMOS2 minimization shows consistent improvement over the initial complex structures in terms of minimized protein-ligand binding energies and water positions optimization. The AMMOS2 web server is freely available without any registration requirement at the URL: http://drugmod.rpbs.univ-paris-diderot.fr/ammosHome.php. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  6. 3Drefine: an interactive web server for efficient protein structure refinement.

    PubMed

    Bhattacharya, Debswapna; Nowotny, Jackson; Cao, Renzhi; Cheng, Jianlin

    2016-07-08

    3Drefine is an interactive web server for consistent and computationally efficient protein structure refinement with the capability to perform web-based statistical and visual analysis. The 3Drefine refinement protocol utilizes iterative optimization of hydrogen bonding network combined with atomic-level energy minimization on the optimized model using a composite physics and knowledge-based force fields for efficient protein structure refinement. The method has been extensively evaluated on blind CASP experiments as well as on large-scale and diverse benchmark datasets and exhibits consistent improvement over the initial structure in both global and local structural quality measures. The 3Drefine web server allows for convenient protein structure refinement through a text or file input submission, email notification, provided example submission and is freely available without any registration requirement. The server also provides comprehensive analysis of submissions through various energy and statistical feedback and interactive visualization of multiple refined models through the JSmol applet that is equipped with numerous protein model analysis tools. The web server has been extensively tested and used by many users. As a result, the 3Drefine web server conveniently provides a useful tool easily accessible to the community. The 3Drefine web server has been made publicly available at the URL: http://sysbio.rnet.missouri.edu/3Drefine/. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  7. AMMOS2: a web server for protein–ligand–water complexes refinement via molecular mechanics

    PubMed Central

    Labbé, Céline M.; Pencheva, Tania; Jereva, Dessislava; Desvillechabrol, Dimitri; Becot, Jérôme; Villoutreix, Bruno O.; Pajeva, Ilza

    2017-01-01

    Abstract AMMOS2 is an interactive web server for efficient computational refinement of protein–small organic molecule complexes. The AMMOS2 protocol employs atomic-level energy minimization of a large number of experimental or modeled protein–ligand complexes. The web server is based on the previously developed standalone software AMMOS (Automatic Molecular Mechanics Optimization for in silico Screening). AMMOS utilizes the physics-based force field AMMP sp4 and performs optimization of protein–ligand interactions at five levels of flexibility of the protein receptor. The new version 2 of AMMOS implemented in the AMMOS2 web server allows the users to include explicit water molecules and individual metal ions in the protein–ligand complexes during minimization. The web server provides comprehensive analysis of computed energies and interactive visualization of refined protein–ligand complexes. The ligands are ranked by the minimized binding energies allowing the users to perform additional analysis for drug discovery or chemical biology projects. The web server has been extensively tested on 21 diverse protein–ligand complexes. AMMOS2 minimization shows consistent improvement over the initial complex structures in terms of minimized protein–ligand binding energies and water positions optimization. The AMMOS2 web server is freely available without any registration requirement at the URL: http://drugmod.rpbs.univ-paris-diderot.fr/ammosHome.php. PMID:28486703

  8. Requirements for a network storage service

    NASA Technical Reports Server (NTRS)

    Kelly, Suzanne M.; Haynes, Rena A.

    1991-01-01

    Sandia National Laboratories provides a high performance classified computer network as a core capability in support of its mission of nuclear weapons design and engineering, physical sciences research, and energy research and development. The network, locally known as the Internal Secure Network (ISN), comprises multiple distributed local area networks (LAN's) residing in New Mexico and California. The TCP/IP protocol suite is used for inter-node communications. Scientific workstations and mid-range computers, running UNIX-based operating systems, compose most LAN's. One LAN, operated by the Sandia Corporate Computing Computing Directorate, is a general purpose resource providing a supercomputer and a file server to the entire ISN. The current file server on the supercomputer LAN is an implementation of the Common File Server (CFS). Subsequent to the design of the ISN, Sandia reviewed its mass storage requirements and chose to enter into a competitive procurement to replace the existing file server with one more adaptable to a UNIX/TCP/IP environment. The requirements study for the network was the starting point for the requirements study for the new file server. The file server is called the Network Storage Service (NSS) and its requirements are described. An application or functional description of the NSS is given. The final section adds performance, capacity, and access constraints to the requirements.

  9. Advancing the Power and Utility of Server-Side Aggregation

    NASA Technical Reports Server (NTRS)

    Fulker, Dave; Gallagher, James

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters.Topics 2 through 7 will be relevant to data consumers, data providers andnotably, due to the open-source nature of all OPeNDAP softwareto developers wishing to extend Hyrax, to build compatible clients and servers, andor to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  10. Prevalence and Correlates of Sipping Alcohol in a Prospective Middle School Sample

    PubMed Central

    Jackson, Kristina M.; Colby, Suzanne M.; Barnett, Nancy P.; Abar, Caitlin C.

    2015-01-01

    Research documents an association between early use of alcohol and adverse outcomes. Most studies on drinking initiation exclude sipping or confound sips with consumption of a full drink. Yet, even a few sips of alcohol can constitute a meaningful experience for naïve drinkers. Prior research with this project indicated that sipping prior to middle school predicted subsequent adverse outcomes (at high-school entry), even controlling for child externalizing and sensation seeking and parent alcohol use. The present study extends our prior work by examining the correlates of early sipping and sipping onset. The sample was comprised of 1,023 6th, 7th, and 8th graders (52% female; 24% non-White, 12% Hispanic). Participants completed web-based surveys on five occasions over the course of two years. The prevalence of sipping at Wave 1 was 37%, with 29% of never-sippers initiating sipping within two years. Sipping was associated with stronger alcohol-related cognitions and low school engagement as well as contextual influences in the peer, sibling, and parent domains. Sipping onset among never-sippers was prospectively predicted by sensation seeking and problem behavior as well as parental and sibling influences. Importantly, mere availability of alcohol was a strong correlate both concurrently and prospectively. Further analyses demonstrated that youth who sipped alcohol with parental permission had a lower profile of risk and healthier relationships with parents as compared to youth who reported unsanctioned sipping. Findings point to the importance of considering fine-grained early drinking behavior and call for further attention to sipping in research on initiation of alcohol use. PMID:25938631

  11. Security Analysis of Session Initiation Protocol

    DTIC Science & Technology

    2010-06-01

    traffic as Bob@biloxi.com), a VPN was established with OpenVPN 2.1_rc19 between all relevant entities. Configuration files used by the clients and...static key is created by running the command ’ openvpn --genkey --secret static.key.’ By 22 rerouting all SIP traffic through VPNs as needed, a network... OpenVPN , and VM 2’s routing table is modified so that all IP packets except those addressed to VM 1’s publicly facing IP are routed through the OpenVPN

  12. The 10 Hottest Technologies in Telecom.

    ERIC Educational Resources Information Center

    Flanagan, Patrick

    1997-01-01

    Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…

  13. Quantum computing on encrypted data

    NASA Astrophysics Data System (ADS)

    Fisher, K. A. G.; Broadbent, A.; Shalm, L. K.; Yan, Z.; Lavoie, J.; Prevedel, R.; Jennewein, T.; Resch, K. J.

    2014-01-01

    The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.

  14. GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application

    NASA Technical Reports Server (NTRS)

    McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.

    2010-01-01

    The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.

  15. Quantum computing on encrypted data.

    PubMed

    Fisher, K A G; Broadbent, A; Shalm, L K; Yan, Z; Lavoie, J; Prevedel, R; Jennewein, T; Resch, K J

    2014-01-01

    The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.

  16. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    NASA Astrophysics Data System (ADS)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  17. CABS-flex: server for fast simulation of protein structure fluctuations

    PubMed Central

    Jamroz, Michal; Kolinski, Andrzej; Kmiecik, Sebastian

    2013-01-01

    The CABS-flex server (http://biocomp.chem.uw.edu.pl/CABSflex) implements CABS-model–based protocol for the fast simulations of near-native dynamics of globular proteins. In this application, the CABS model was shown to be a computationally efficient alternative to all-atom molecular dynamics—a classical simulation approach. The simulation method has been validated on a large set of molecular dynamics simulation data. Using a single input (user-provided file in PDB format), the CABS-flex server outputs an ensemble of protein models (in all-atom PDB format) reflecting the flexibility of the input structure, together with the accompanying analysis (residue mean-square-fluctuation profile and others). The ensemble of predicted models can be used in structure-based studies of protein functions and interactions. PMID:23658222

  18. CABS-flex: Server for fast simulation of protein structure fluctuations.

    PubMed

    Jamroz, Michal; Kolinski, Andrzej; Kmiecik, Sebastian

    2013-07-01

    The CABS-flex server (http://biocomp.chem.uw.edu.pl/CABSflex) implements CABS-model-based protocol for the fast simulations of near-native dynamics of globular proteins. In this application, the CABS model was shown to be a computationally efficient alternative to all-atom molecular dynamics--a classical simulation approach. The simulation method has been validated on a large set of molecular dynamics simulation data. Using a single input (user-provided file in PDB format), the CABS-flex server outputs an ensemble of protein models (in all-atom PDB format) reflecting the flexibility of the input structure, together with the accompanying analysis (residue mean-square-fluctuation profile and others). The ensemble of predicted models can be used in structure-based studies of protein functions and interactions.

  19. A spatial information crawler for OpenGIS WFS

    NASA Astrophysics Data System (ADS)

    Jiang, Jun; Yang, Chong-jun; Ren, Ying-chao

    2008-10-01

    The growth of the internet makes it non-trivial to search for the accuracy information efficiently. Topical crawler, which is aiming at a certain area, attracts more and more intention now because it can help people to find out what they need. Furthermore, with the OpenGIS WFS (Web Feature Service) Specification developed by OGC (Open GIS Consortium), much more geospatial data providers adopt this protocol to publish their data on the internet. In this case, a crawler which is aiming at the WFS servers can help people to find the geospatial data from WFS servers. In this paper, we propose a prototype system of a WFS crawler based on the OpenGIS WFS Specification. The crawler architecture, working principles, and detailed function of each component are introduced. This crawler is capable of discovering WFS servers dynamically, saving and updating the service contents of the servers. The data collect by the crawler can be supported to a geospatial data search engine as its data source.

  20. The ClusPro web server for protein-protein docking

    PubMed Central

    Kozakov, Dima; Hall, David R.; Xia, Bing; Porter, Kathryn A.; Padhorny, Dzmitry; Yueh, Christine; Beglov, Dmitri; Vajda, Sandor

    2017-01-01

    The ClusPro server (https://cluspro.org) is a widely used tool for protein-protein docking. The server provides a simple home page for basic use, requiring only two files in Protein Data Bank format. However, ClusPro also offers a number of advanced options to modify the search that include the removal of unstructured protein regions, applying attraction or repulsion, accounting for pairwise distance restraints, constructing homo-multimers, considering small angle X-ray scattering (SAXS) data, and finding heparin binding sites. Six different energy functions can be used depending on the type of proteins. Docking with each energy parameter set results in ten models defined by centers of highly populated clusters of low energy docked structures. This protocol describes the use of the various options, the construction of auxiliary restraints files, the selection of the energy parameters, and the analysis of the results. Although the server is heavily used, runs are generally completed in < 4 hours. PMID:28079879

  1. Network information security in a phase III Integrated Academic Information Management System (IAIMS).

    PubMed

    Shea, S; Sengupta, S; Crosswell, A; Clayton, P D

    1992-01-01

    The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.

  2. Near-optimality of special periodic protocols for fluid models of single server switched networks with switchover times

    NASA Astrophysics Data System (ADS)

    Matveev, A. S.; Ishchenko, R.

    2017-11-01

    We consider a generic deterministic time-invariant fluid model of a single server switched network, which consists of finitely many infinite size buffers (queues) and receives constant rate inflows of jobs from the outside. Any flow undergoes a multi-phase service, entering a specific buffer after every phase, and ultimately leaves the network; the route of the flow over the buffers is pre-specified, and flows may merge inside the network. They share a common source of service, which can serve at most one buffer at a time and has to switch among buffers from time to time; any switch consumes a nonzero switchover period. With respect to the long-run maximal scaled wip (work in progress) performance metric, near-optimality of periodic scheduling and service protocols is established: the deepest optimum (that is over all feasible processes in the network, irrespective of the initial state) is furnished by such a protocol up to as small error as desired. Moreover, this can be achieved with a special periodic protocol introduced in the paper. It is also shown that the exhaustive policy is optimal for any buffer whose service at the maximal rate does not cause growth of the scaled wip.

  3. Friendship quality and social information processing in clinically anxious children.

    PubMed

    Baker, J R; Hudson, J L

    2014-02-01

    The association between perceived friendship quality (FQ) and social information processing (SIP) was examined in three groups of children and their close friends aged 7-12 years: 16 anxiety disordered children with social phobia (SP); 12 anxiety disordered children without SP (No-SP); and 32 nonclinical children. Positive and negative FQ positively associated with target children's positive and negative responding on a vignette measure of SIP. SP children reported lower positive SIP than No-SP but not nonclinical children; and this was the only group difference in SIP. Target children and their friends were similar in negative but not positive SIP. Following discussion about the vignette with a close friend, all target children increased in positive SIP; negative SIP did not change. Lower FQ and a more socially anxious friend predicted higher negative target child SIP postdiscussion. Close friendships play an important role in the SIP of both clinical and nonclinical children.

  4. Network Upgrade for the SLC: Control System Modifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Mackenzie, R.; Sass, R.

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  5. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  6. Silica-Induced Protein (Sip) in Thermophilic Bacterium Thermus thermophilus Responds to Low Iron Availability

    PubMed Central

    Fujino, Yasuhiro; Nagayoshi, Yuko; Iwase, Makoto; Yokoyama, Takushi; Ohshima, Toshihisa

    2016-01-01

    ABSTRACT Thermus thermophilus HB8 expresses silica-induced protein (Sip) when cultured in medium containing supersaturated silicic acids. Using genomic information, Sip was identified as a Fe3+-binding ABC transporter. Detection of a 1-kb hybridized band in Northern analysis revealed that sip transcription is monocistronic and that sip has its own terminator and promoter. The sequence of the sip promoter showed homology with that of the σA-dependent promoter, which is known as a housekeeping promoter in HB8. Considering that sip is transcribed when supersaturated silicic acids are added, the existence of a repressor is presumed. DNA microarray analysis suggested that supersaturated silicic acids and iron deficiency affect Thermus cells similarly, and enhanced sip transcription was detected under both conditions. This suggested that sip transcription was initiated by iron deficiency and that the ferric uptake regulator (Fur) controlled the transcription. Three Fur gene homologues (TTHA0255, TTHA0344, and TTHA1292) have been annotated in the HB8 genome, and electrophoretic mobility shift assays revealed that the TTHA0344 product interacts with the sip promoter region. In medium containing supersaturated silicic acids, free Fe3+ levels were decreased due to Fe3+ immobilization on colloidal silica. This suggests that, because Fe3+ ions are captured by colloidal silica in geothermal water, Thermus cells are continuously exposed to the risk of iron deficiency. Considering that Sip is involved in iron acquisition, Sip production may be a strategy to survive under conditions of low iron availability in geothermal water. IMPORTANCE The thermophilic bacterium Thermus thermophilus HB8 produces silica-induced protein (Sip) in the presence of supersaturated silicic acids. Sip has homology with iron-binding ABC transporter; however, the mechanism by which Sip expression is induced by silicic acids remains unexplained. We demonstrate that Sip captures iron and its transcription is regulated by the repressor ferric uptake regulator (Fur). This implies that Sip is expressed with iron deficiency. In addition, it is suggested that negatively charged colloidal silica in supersaturated solution absorbs Fe3+ ions and decreases iron availability. Considering that geothermal water contains ample silicic acids, it is suggested that thermophilic bacteria are always facing iron starvation. Sip production may be a strategy for surviving under conditions of low iron availability in geothermal water. PMID:26994077

  7. 75 FR 55978 - Approval and Promulgation of Air Quality Implementation Plans; Texas; Revisions to the New Source...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-15

    ... Implementation Plan (SIP); Prevention of Significant Deterioration (PSD) AGENCY: Environmental Protection Agency... Texas PSD State Implementation Plan (SIP). EPA is approving a SIP revision submitted February 1, 2006... Texas PSD SIP; it merely approves reorganization and renumbering of the Texas PSD SIP rules. Further...

  8. 46 CFR 8.570 - Interim approval of prototype SIP company or vessel plans.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Interim approval of prototype SIP company or vessel... of prototype SIP company or vessel plans. (a) A company operating under an approved prototype SIP... continue operating under the plans while revisions are developed to bring the prototype SIP company or...

  9. The Spectral Image Processing System (SIPS): Software for integrated analysis of AVIRIS data

    NASA Technical Reports Server (NTRS)

    Kruse, F. A.; Lefkoff, A. B.; Boardman, J. W.; Heidebrecht, K. B.; Shapiro, A. T.; Barloon, P. J.; Goetz, A. F. H.

    1992-01-01

    The Spectral Image Processing System (SIPS) is a software package developed by the Center for the Study of Earth from Space (CSES) at the University of Colorado, Boulder, in response to a perceived need to provide integrated tools for analysis of imaging spectrometer data both spectrally and spatially. SIPS was specifically designed to deal with data from the Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) and the High Resolution Imaging Spectrometer (HIRIS), but was tested with other datasets including the Geophysical and Environmental Research Imaging Spectrometer (GERIS), GEOSCAN images, and Landsat TM. SIPS was developed using the 'Interactive Data Language' (IDL). It takes advantage of high speed disk access and fast processors running under the UNIX operating system to provide rapid analysis of entire imaging spectrometer datasets. SIPS allows analysis of single or multiple imaging spectrometer data segments at full spatial and spectral resolution. It also allows visualization and interactive analysis of image cubes derived from quantitative analysis procedures such as absorption band characterization and spectral unmixing. SIPS consists of three modules: SIPS Utilities, SIPS_View, and SIPS Analysis. SIPS version 1.1 is described below.

  10. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  11. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  12. CABS-dock web server for the flexible docking of peptides to proteins without prior knowledge of the binding site

    PubMed Central

    Kurcinski, Mateusz; Jamroz, Michal; Blaszczyk, Maciej; Kolinski, Andrzej; Kmiecik, Sebastian

    2015-01-01

    Protein–peptide interactions play a key role in cell functions. Their structural characterization, though challenging, is important for the discovery of new drugs. The CABS-dock web server provides an interface for modeling protein–peptide interactions using a highly efficient protocol for the flexible docking of peptides to proteins. While other docking algorithms require pre-defined localization of the binding site, CABS-dock does not require such knowledge. Given a protein receptor structure and a peptide sequence (and starting from random conformations and positions of the peptide), CABS-dock performs simulation search for the binding site allowing for full flexibility of the peptide and small fluctuations of the receptor backbone. This protocol was extensively tested over the largest dataset of non-redundant protein–peptide interactions available to date (including bound and unbound docking cases). For over 80% of bound and unbound dataset cases, we obtained models with high or medium accuracy (sufficient for practical applications). Additionally, as optional features, CABS-dock can exclude user-selected binding modes from docking search or to increase the level of flexibility for chosen receptor fragments. CABS-dock is freely available as a web server at http://biocomp.chem.uw.edu.pl/CABSdock. PMID:25943545

  13. 77 FR 62200 - Approval and Promulgation of Implementation Plans; New Mexico; Revisions to the New Source Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-12

    ... Plan (SIP); Prevention of Significant Deterioration (PSD) and Nonattainment New Source Review (NNSR... approve revisions to the New Mexico SIP to update the New Mexico NNSR and PSD SIP permitting programs.... New Mexico submitted the PSD and NNSR SIP permitting revisions in two SIP submittals on June 11, 2009...

  14. 40 CFR 52.1638 - Bernalillo County particulate matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) New Mexico § 52.1638 Bernalillo County particulate matter (PM10) Group II SIP commitments. (a) On December 7, 1988, the Governor of New Mexico submitted a revision to the State Implementation Plan (SIP... SIPs. The City of Albuquerque and Bernalillo County Air Quality Control Board adopted this SIP revision...

  15. 40 CFR 52.1638 - Bernalillo County particulate matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) New Mexico § 52.1638 Bernalillo County particulate matter (PM10) Group II SIP commitments. (a) On December 7, 1988, the Governor of New Mexico submitted a revision to the State Implementation Plan (SIP... SIPs. The City of Albuquerque and Bernalillo County Air Quality Control Board adopted this SIP revision...

  16. 75 FR 28626 - Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): SIP 10...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): SIP 10-029, Pilot Study--Cancer Survivorship Care Planning & SIP 10-030, Evaluating Special Events as a Recruitment Strategy for Cancer Screening, Initial Review In accordance...

  17. EPA Approved Regulations in the Texas SIP

    EPA Pesticide Factsheets

    changed name to EPA Approved Regulations in the Texas SIP, Add links to:Texas Read Me; Texas SIP History;Current/Previous SIP-Approved Regulations; Delete regulations--now in /node/191099, removed tables

  18. Enhanced sensitivity of DNA- and rRNA-based stable isotope probing by fractionation and quantitative analysis of isopycnic centrifugation gradients.

    PubMed

    Lueders, Tillmann; Manefield, Mike; Friedrich, Michael W

    2004-01-01

    Stable isotope probing (SIP) of nucleic acids allows the detection and identification of active members of natural microbial populations that are involved in the assimilation of an isotopically labelled compound into nucleic acids. SIP is based on the separation of isotopically labelled DNA or rRNA by isopycnic density gradient centrifugation. We have developed a highly sensitive protocol for the detection of 'light' and 'heavy' nucleic acids in fractions of centrifugation gradients. It involves the fluorometric quantification of total DNA or rRNA, and the quantification of either 16S rRNA genes or 16S rRNA in gradient fractions by real-time PCR with domain-specific primers. Using this approach, we found that fully 13C-labelled DNA or rRNA of Methylobacterium extorquens was quantitatively resolved from unlabelled DNA or rRNA of Methanosarcina barkeri by cesium chloride or cesium trifluoroacetate density gradient centrifugation respectively. However, a constant low background of unspecific nucleic acids was detected in all DNA or rRNA gradient fractions, which is important for the interpretation of environmental SIP results. Consequently, quantitative analysis of gradient fractions provides a higher precision and finer resolution for retrieval of isotopically enriched nucleic acids than possible using ethidium bromide or gradient fractionation combined with fingerprinting analyses. This is a prerequisite for the fine-scale tracing of microbial populations metabolizing 13C-labelled compounds in natural ecosystems.

  19. Clone of EPA Approved Regulations in the Texas SIP

    EPA Pesticide Factsheets

    changed name to EPA Approved Regulations in the Texas SIP, Add links to:Texas Read Me; Texas SIP History;Current/Previous SIP-Approved Regulations; Delete regulations--now in /node/191099, removed tables

  20. 2018 NDIA 33rd Annual National Test and Evaluation Conference

    DTIC Science & Technology

    2018-05-17

    Breach IOC Delayed RDT&E Overrun MS B IOC First Flight CDR Wind Tunnel Campaign Flight Test Campaign $ Peak Burn Rate Occurs Around FF Wind Tunnel...Connectivity Team – Tier 2 network support, network characterization and analysis, walk-the- wire trouble resolution, assistance with new site Connection...File Transfer Protocol (SFTP) Server. The Test and Training Enabling Architecture (TENA) is used for over the wire simulation protocol via the DISGW

  1. GUMP: Adapting Client/Server Messaging Protocols into Peer-to-Peer Serverless Environments

    DTIC Science & Technology

    2010-06-11

    and other related metadata, such as message re- ceiver ID (for supporting multiple connections) and so forth. The Proxy consumes the message and uses...the underlying discovery subsystem and multicast to process the message and translate the request into behaviour suitable for the un- derlying...communication i.e. a chat. Jingle (XEP-0166) [26] is a related specification that de- fines an extension to the XMPP protocol for initiating and

  2. Domain Name Server Security (DNSSEC) Protocol Deployment

    DTIC Science & Technology

    2014-10-01

    all the time. For mobile devices, end-system validation is much more difficult due to the state of their networks, many of which do not allow...way to distribute keying information than the current public-key infrastructure (PKI) allows. In addition, it will take work to convince CDNs and...Control Protocol (TCP) or even DNS over Secure Sockets Layer (SSL). One of the important outcomes of our work is the realization that that a " mobile

  3. Remote object authentication: confidence model, cryptosystem and protocol

    NASA Astrophysics Data System (ADS)

    Lancrenon, Jean; Gillard, Roland; Fournel, Thierry

    2009-04-01

    This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.

  4. Hydrocortisone administration for the treatment of refractory hypotension in critically ill newborns.

    PubMed

    Baker, C F W; Barks, J D E; Engmann, C; Vazquez, D M; Neal, C R; Schumacher, R E; Bhatt-Mehta, V

    2008-06-01

    The purpose of this observation was to evaluate the safety and efficacy of hydrocortisone (HC) for the treatment of refractory hypotension in term and preterm infants. A secondary purpose was to determine the utility of serum cortisol concentrations in predicting the response to treatment. This is a retrospective observational study of 117 infants treated with a standardized HC protocol for refractory hypotension. Refractory hypotension was defined as a mean arterial pressure (MAP) less than the gestational age (GA) despite a total inotrope dose of 20 microg per kg per min. Baseline serum cortisol concentrations were determined prior to treatment with stress dose HC. Treatment with HC increased the MAP at 2, 6, 12 and 24 h after initiation, decreased the total inotrope dose at 6, 12 and 24 h, and was associated with resolution of oliguria. There was no correlation between the pretreatment baseline cortisol concentration and GA, birth weight or the response to treatment. The incidence of grades III to IV intraventricular hemorrhage, periventricular leukomalacia, bacterial or fungal sepsis and spontaneous intestinal perforation (SIP) after HC treatment was similar to institutional historic controls prior to institution of this standardized HC protocol. HC treatment was associated with a rapid resolution of cardiovascular compromise. The incidence of significant side effects was similar to that in previously published reports, including a comparable incidence of SIP. On the basis of our results, measuring baseline serum cortisol concentration to guide the management of refractory hypotension is unwarranted.

  5. 78 FR 4339 - Approval and Promulgation of Implementation Plans; New Mexico; Revisions to the New Source Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... Plan (SIP); Prevention of Significant Deterioration (PSD) and Nonattainment New Source Review (NNSR... revisions to the New Mexico SIP to update the New Mexico NNSR and PSD SIP permitting programs consistent... submitted the PSD and NNSR SIP permitting revisions in two SIP submittals on June 11, 2009 and May 23, 2011...

  6. Mixed methods evaluation of a randomized control pilot trial targeting sugar-sweetened beverage behaviors.

    PubMed

    Zoellner, Jamie; Cook, Emily; Chen, Yvonnes; You, Wen; Davy, Brenda; Estabrooks, Paul

    2013-02-01

    This Excessive sugar-sweetened beverage (SSB) consumption and low health literacy skills have emerged as two public health concerns in the United States (US); however, there is limited research on how to effectively address these issues among adults. As guided by health literacy concepts and the Theory of Planned Behavior (TPB), this randomized controlled pilot trial applied the RE-AIM framework and a mixed methods approach to examine a sugar-sweetened beverage (SSB) intervention (SipSmartER), as compared to a matched-contact control intervention targeting physical activity (MoveMore). Both 5-week interventions included two interactive group sessions and three support telephone calls. Executing a patient-centered developmental process, the primary aim of this paper was to evaluate patient feedback on intervention content and structure. The secondary aim was to understand the potential reach (i.e., proportion enrolled, representativeness) and effectiveness (i.e. health behaviors, theorized mediating variables, quality of life) of SipSmartER. Twenty-five participants were randomized to SipSmartER (n=14) or MoveMore (n=11). Participants' intervention feedback was positive, ranging from 4.2-5.0 on a 5-point scale. Qualitative assessments reavealed several opportunties to improve clarity of learning materials, enhance instructions and communication, and refine research protocols. Although SSB consumption decreased more among the SipSmartER participants (-256.9 ± 622.6 kcals), there were no significant group differences when compared to control participants (-199.7 ± 404.6 kcals). Across both groups, there were significant improvements for SSB attitudes, SSB behavioral intentions, and two media literacy constructs. The value of using a patient-centered approach in the developmental phases of this intervention was apparent, and pilot findings suggest decreased SSB may be achieved through targeted health literacy and TPB strategies. Future efforts are needed to examine the potential public health impact of a large-scale trial to address health literacy and reduce SSB.

  7. Stress-induced premature senescence (SIPS)--influence of SIPS on radiotherapy.

    PubMed

    Suzuki, Masatoshi; Boothman, David A

    2008-03-01

    Replicative senescence is a fundamental feature in normal human diploid cells and results from dysfunctional telomeres at the Hayflick cell division limit. Ionizing radiation (IR) prematurely induces the same phenotypes as replicative senescence prior to the Hayflick limit. This process is known as stress-induced premature senescence (SIPS). Since the cell cycle is irreversibly arrested in SIPS-induced cells, even if they are stimulated by various growth factors, it is thought that SIPS is a form of cell death, irreversibly eliminating replicating cells. IR-induced-focus formation of DNA repair proteins, a marker of DNA damage, is detected in SIPS as well as replicative senescent cells. Furthermore, both processes persistently induce cell cycle checkpoint mechanisms, indicating DNA damage created by ionizing radiation induces SIPS in normal cells, possibly by the same mechanisms as those occurring in replicative senescence. Interestingly, IR induces SIPS not only in normal cells, but also in tumor cells. Due to the expression of telomerase in tumor cells, telomere-dependent replicative senescence does not occur. However, SIPS is induced under certain conditions after IR exposure. Thus, cell death triggered by IR can be attributed to apoptosis or SIPS in tumor cells. However, metabolic function remains intact in SIPS-induced cancer cells, and recent studies show that senescence eliminate cells undergoing SIPS secrete various kinds of factors outside the cell, changing the microenvironment. Evidence using co-culture systems containing normal senescent stromal cells and epithelial tumor cells show that factors secreted from senescent stroma cells promote the growth of tumor epithelial cells both in vitro and in vivo. Thus, regulation of factors secreted from SIPS-induced stromal cells, as well as tumor cells, may affect radiotherapy.

  8. HASP server: a database and structural visualization platform for comparative models of influenza A hemagglutinin proteins.

    PubMed

    Ambroggio, Xavier I; Dommer, Jennifer; Gopalan, Vivek; Dunham, Eleca J; Taubenberger, Jeffery K; Hurt, Darrell E

    2013-06-18

    Influenza A viruses possess RNA genomes that mutate frequently in response to immune pressures. The mutations in the hemagglutinin genes are particularly significant, as the hemagglutinin proteins mediate attachment and fusion to host cells, thereby influencing viral pathogenicity and species specificity. Large-scale influenza A genome sequencing efforts have been ongoing to understand past epidemics and pandemics and anticipate future outbreaks. Sequencing efforts thus far have generated nearly 9,000 distinct hemagglutinin amino acid sequences. Comparative models for all publicly available influenza A hemagglutinin protein sequences (8,769 to date) were generated using the Rosetta modeling suite. The C-alpha root mean square deviations between a randomly chosen test set of models and their crystallographic templates were less than 2 Å, suggesting that the modeling protocols yielded high-quality results. The models were compiled into an online resource, the Hemagglutinin Structure Prediction (HASP) server. The HASP server was designed as a scientific tool for researchers to visualize hemagglutinin protein sequences of interest in a three-dimensional context. With a built-in molecular viewer, hemagglutinin models can be compared side-by-side and navigated by a corresponding sequence alignment. The models and alignments can be downloaded for offline use and further analysis. The modeling protocols used in the HASP server scale well for large amounts of sequences and will keep pace with expanded sequencing efforts. The conservative approach to modeling and the intuitive search and visualization interfaces allow researchers to quickly analyze hemagglutinin sequences of interest in the context of the most highly related experimental structures, and allow them to directly compare hemagglutinin sequences to each other simultaneously in their two- and three-dimensional contexts. The models and methodology have shown utility in current research efforts and the ongoing aim of the HASP server is to continue to accelerate influenza A research and have a positive impact on global public health.

  9. QuakeSim Project Networking

    NASA Astrophysics Data System (ADS)

    Kong, D.; Donnellan, A.; Pierce, M. E.

    2012-12-01

    QuakeSim is an online computational framework focused on using remotely sensed geodetic imaging data to model and understand earthquakes. With the rise in online social networking over the last decade, many tools and concepts have been developed that are useful to research groups. In particular, QuakeSim is interested in the ability for researchers to post, share, and annotate files generated by modeling tools in order to facilitate collaboration. To accomplish this, features were added to the preexisting QuakeSim site that include single sign-on, automated saving of output from modeling tools, and a personal user space to manage sharing permissions on these saved files. These features implement OpenID and Lightweight Data Access Protocol (LDAP) technologies to manage files across several different servers, including a web server running Drupal and other servers hosting the computational tools themselves.

  10. Social information processing in children: specific relations to anxiety, depression, and affect.

    PubMed

    Luebbe, Aaron M; Bell, Debora J; Allwood, Maureen A; Swenson, Lance P; Early, Martha C

    2010-01-01

    Two studies examined shared and unique relations of social information processing (SIP) to youth's anxious and depressive symptoms. Whether SIP added unique variance over and above trait affect in predicting internalizing symptoms was also examined. In Study 1, 215 youth (ages 8-13) completed symptom measures of anxiety and depression and a vignette-based interview measure of SIP. Anxiety and depression were each related to a more negative information-processing style. Only depression was uniquely related to a less positive information processing style. In Study 2, 127 youth (ages 10-13) completed measures of anxiety, depression, SIP, and trait affect. SIP's relations to internalizing symptoms were replicated. Over and above negative affect, negative SIP predicted both anxiety and depression. Low positive SIP added variance over and above positive affect in predicting only depression. Finally, SIP functioning partially mediated the relations of affect to internalizing symptoms.

  11. Network and User-Perceived Performance of Web Page Retrievals

    NASA Technical Reports Server (NTRS)

    Kruse, Hans; Allman, Mark; Mallasch, Paul

    1998-01-01

    The development of the HTTP protocol has been driven by the need to improve the network performance of the protocol by allowing the efficient retrieval of multiple parts of a web page without the need for multiple simultaneous TCP connections between a client and a server. We suggest that the retrieval of multiple page elements sequentially over a single TCP connection may result in a degradation of the perceived performance experienced by the user. We attempt to quantify this perceived degradation through the use of a model which combines a web retrieval simulation and an analytical model of TCP operation. Starting with the current HTTP/l.1 specification, we first suggest a client@side heuristic to improve the perceived transfer performance. We show that the perceived speed of the page retrieval can be increased without sacrificing data transfer efficiency. We then propose a new client/server extension to the HTTP/l.1 protocol to allow for the interleaving of page element retrievals. We finally address the issue of the display of advertisements on web pages, and in particular suggest a number of mechanisms which can make efficient use of IP multicast to send advertisements to a number of clients within the same network.

  12. UPM: unified policy-based network management

    NASA Astrophysics Data System (ADS)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  13. 75 FR 32190 - Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): SIP 10...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ... Approaches To Preventing Teen Pregnancy Among Underserved Populations and SIP 10-035, Impact of High School... received in response to ``SIP 10-033, Innovative Approaches to Preventing Teen Pregnancy among Underserved...

  14. CacyBP/SIP as a regulator of transcriptional responses in brain cells

    PubMed Central

    Kilanczyk, Ewa; Filipek, Anna; Hetman, Michal

    2014-01-01

    Summary The Calcyclin-Binding Protein/Siah-1-Interacting Protein (CacyBP/SIP) is highly expressed in the brain and was shown to regulate the β-catenin-driven transcription in thymocytes. Therefore, it was investigated whether in brain cells CacyBP/SIP might play a role as a transcriptional regulator. In BDNF- or forskolin-stimulated rat primary cortical neurons, overexpression of CacyBP/SIP enhanced transcriptional activity of the cAMP-response element (CRE). In addition, overexpressed CacyBP/SIP enhanced BDNF-mediated activation of the Nuclear Factor of Activated T-cells (NFAT) but not the Serum Response Element (SRE). These stimulatory effects required an intact C-terminal domain of CacyBP/SIP. Moreover, in C6 rat glioma cells, the overexpressed CacyBP/SIP enhanced activation of CRE- or NFAT- following forskolin- or serum stimulation, respectively. Conversely, knockdown of endogenous CacyBP/SIP reduced activation of CRE- and NFAT but not SRE. Taken together, these results indicate that CacyBP/SIP is a novel regulator of CRE- and NFAT-driven transcription. PMID:25163685

  15. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    PubMed

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  16. Extending OPeNDAP's Data-Access Protocol to Include Enhanced Pre-Retrieval Operations

    NASA Astrophysics Data System (ADS)

    Fulker, D. W.

    2013-12-01

    We describe plans to extend OPeNDAP's Web-services protocol as a Building Block for NSF's EarthCube initiative. Though some data-access services have offered forms of subset-selection for decades, other pre-retrieval operations have been unavailable, in part because their benefits (over equivalent post-retrieval actions) are only now becoming fully evident. This is due in part to rapid growth in the volumes of data that are pertinent to the geosciences, exacerbated by limitations such as Internet speeds and latencies as well as pressures toward data usage on ever-smaller devices. In this context, as recipients of a "Building Blocks" award from the most recent round of EarthCube funding, we are launching the specification and prototype implementation of a new Open Data Services Invocation Protocol (ODSIP), by which clients may invoke a newly rich set of data-acquisition services, ranging from statistical summarization and criteria-driven subsetting to re-gridding/resampling. ODSIP will be an extension to DAP4, the latest version of OPeNDAP's widely used data access protocol, which underpins a number of open-source, multilingual, client-server systems (offering data access as a Web service), including THREDDS, PyDAP, GrADS, ERDAP and FERRET, as well as OPeNDAP's own Hyrax servers. We are motivated by the idea that key parts of EarthCube can be built effectively around clients and servers that employ a common and conceptually rich protocol for data acquisition. This concept extends 'data provision' to include pre-retrieval operations that, even when invoked by remote clients, exhibit efficiencies of data-proximate computation. Our aim for ODSIP is to embed a largely domain-neutral algebra of server functions that, despite being deliberately compact, can fulfill a broad range of user needs for pre-retrieval operations. To that end, our approach builds upon languages and tools that have proven effective in multi-domain contexts, and we will employ a user-centered design process built around three science scenarios: 1) accelerated visualization/analysis of model outputs on non-rectangular meshes (over coastal North Carolina); 2) dynamic downscaling of climate predictions for regional utility (over Hawaii); and 3) feature-oriented retrievals of satellite imagery (focusing on satellite-derived sea-surface-temperature fronts). These scenarios will test important aspects of the server-function algebra: * The Hawaii climate study requires coping with issues of scale on rectangular grids, placing strong emphasis on statistical functions. * The east-coast storm-surge study requires irregular grids, thus exploring mathematical challenges that have been addressed in many domains via the GridFields library, which we will employ. We think important classes of geoscience problems in multiple domains--where dealing with discontinuities, for example--are essentially intractable without polygonal meshes. * The sea-surface fronts study integrates vector-style features with array-style coverages, thus touching on the kinds of mathematics that arise when mixing Eulerian and Lagrangian frameworks. Our presentation will sketch the context for ODSIP, our process for a user-centered design, and our hopes for how ODSIP, as an emerging cyberinfrastructure concept for the Geosciences, may serve as a fundamental building block for EarthCube.

  17. Impact of 50% Synthesized Iso-Paraffins (SIP) on F-76 Fuel Coalescence

    DTIC Science & Technology

    2013-12-16

    petroleum JP-5 and Synthesized Iso-Paraffins (SIP). SIP fuels are made from direct fermentation of sugar into olefinic hydrocarbons. The olefinic...manufactured scaled down filter/coalescer and separator to simulate the performance of a full-scale filter separator system. This test is designed to predict...5 and Synthesized Iso-Paraffins (SIP). SIP fuels are made from direct fermentation of sugar into olefinic hydrocarbons. The olefinic hydrocarbons

  18. SIPSim: A Modeling Toolkit to Predict Accuracy and Aid Design of DNA-SIP Experiments.

    PubMed

    Youngblut, Nicholas D; Barnett, Samuel E; Buckley, Daniel H

    2018-01-01

    DNA Stable isotope probing (DNA-SIP) is a powerful method that links identity to function within microbial communities. The combination of DNA-SIP with multiplexed high throughput DNA sequencing enables simultaneous mapping of in situ assimilation dynamics for thousands of microbial taxonomic units. Hence, high throughput sequencing enabled SIP has enormous potential to reveal patterns of carbon and nitrogen exchange within microbial food webs. There are several different methods for analyzing DNA-SIP data and despite the power of SIP experiments, it remains difficult to comprehensively evaluate method accuracy across a wide range of experimental parameters. We have developed a toolset (SIPSim) that simulates DNA-SIP data, and we use this toolset to systematically evaluate different methods for analyzing DNA-SIP data. Specifically, we employ SIPSim to evaluate the effects that key experimental parameters (e.g., level of isotopic enrichment, number of labeled taxa, relative abundance of labeled taxa, community richness, community evenness, and beta-diversity) have on the specificity, sensitivity, and balanced accuracy (defined as the product of specificity and sensitivity) of DNA-SIP analyses. Furthermore, SIPSim can predict analytical accuracy and power as a function of experimental design and community characteristics, and thus should be of great use in the design and interpretation of DNA-SIP experiments.

  19. SIPSim: A Modeling Toolkit to Predict Accuracy and Aid Design of DNA-SIP Experiments

    PubMed Central

    Youngblut, Nicholas D.; Barnett, Samuel E.; Buckley, Daniel H.

    2018-01-01

    DNA Stable isotope probing (DNA-SIP) is a powerful method that links identity to function within microbial communities. The combination of DNA-SIP with multiplexed high throughput DNA sequencing enables simultaneous mapping of in situ assimilation dynamics for thousands of microbial taxonomic units. Hence, high throughput sequencing enabled SIP has enormous potential to reveal patterns of carbon and nitrogen exchange within microbial food webs. There are several different methods for analyzing DNA-SIP data and despite the power of SIP experiments, it remains difficult to comprehensively evaluate method accuracy across a wide range of experimental parameters. We have developed a toolset (SIPSim) that simulates DNA-SIP data, and we use this toolset to systematically evaluate different methods for analyzing DNA-SIP data. Specifically, we employ SIPSim to evaluate the effects that key experimental parameters (e.g., level of isotopic enrichment, number of labeled taxa, relative abundance of labeled taxa, community richness, community evenness, and beta-diversity) have on the specificity, sensitivity, and balanced accuracy (defined as the product of specificity and sensitivity) of DNA-SIP analyses. Furthermore, SIPSim can predict analytical accuracy and power as a function of experimental design and community characteristics, and thus should be of great use in the design and interpretation of DNA-SIP experiments. PMID:29643843

  20. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  1. Quality of life and response of negative symptoms in schizophrenia to haloperidol and the atypical antipsychotic remoxipride. The Canadian Remoxipride Group.

    PubMed

    Awad, A G; Lapierre, Y D; Angus, C; Rylander, A

    1997-07-01

    In a large, multicenter, double-blind study of the effect of haloperidol and the atypical antipsychotic remoxipride on improvement of negative symptoms in schizophrenia, quality of life was also assessed using a modified version of the Sickness Impact Profile (SIP). Compared with previous studies, this study had a longer duration (28 weeks), and the dose of the comparator, haloperidol, was much lower. At the end of the study, compared with the baseline, both treatment groups reported comparable improvement in negative symptoms as defined by the protocol (at least 20% improvement). Similarly, both groups showed comparable changes on global and multidimensional self-assessments of quality of life. All the subfactors of the modified version of the SIP were similar in both groups, except for the subfactor that relates to alertness behavior, which possibly reflects remoxipride's lack of any sedating properties compared with haloperidol. This study presents an approach for inclusion of quality of life as an outcome measure in the design of clinical trials of new antipsychotic medications.

  2. CacyBP/SIP nuclear translocation induced by gastrin promotes gastric cancer cell proliferation

    PubMed Central

    Zhai, Hui-Hong; Meng, Juan; Wang, Jing-Bo; Liu, Zhen-Xiong; Li, Yuan-Fei; Feng, Shan-Shan

    2014-01-01

    AIM: To investigate the role of nuclear translocation of calcyclin binding protein, also called Siah-1 interacting protein (CacyBP/SIP), in gastric carcinogenesis. METHODS: The expression of CacyBP/SIP protein in gastric cancer cell lines was detected by Western blot. Immunofluorescence experiments were performed on gastric cancer cell lines that had been either unstimulated or stimulated with gastrin. To confirm the immunofluorescence findings, the relative abundance of CacyBP/SIP in nuclear and cytoplasmic compartments was assessed by Western blot. The effect of nuclear translocation of CacyBP/SIP on cell proliferation was examined using MTT assay. The colony formation assay was used to measure clonogenic cell survival. The effect of CacyBP/SIP nuclear translocation on cell cycle progression was investigated. Two CacyBP/SIP-specific siRNA vectors were designed and constructed to inhibit CacyBP/SIP expression in order to reduce the nuclear translocation of CacyBP/SIP, and the expression of CacyBP/SIP in stably transfected cells was determined by Western blot. The effect of inhibiting CacyBP/SIP nuclear translocation on cell proliferation was then assessed. RESULTS: CacyBP/SIP protein was present in most of gastric cancer cell lines. In unstimulated cells, CacyBP/SIP was distributed throughout the cytoplasm; while in stimulated cells, CacyBP/SIP was found mainly in the perinuclear region. CacyBP/SIP nuclear translocation generated a growth-stimulatory effect on cells. The number of colonies in the CacyBP/SIP nuclear translocation group was significantly higher than that in the control group. The percentage of stimulated cells in G1 phase was significantly lower than that of control cells (69.70% ± 0.46% and 65.80% ± 0.60%, control cells and gastrin-treated SGC7901 cells, P = 0.008; 72.99% ± 0.46% and 69.36% ± 0.51%, control cells and gastrin-treated MKN45 cells, P = 0.022). CacyBP/SIPsi1 effectively down-regulated the expression of CacyBP/SIP, and cells stably transfected by CacyBP/SIPsi1 were then chosen for further cellular assays. In CacyBP/SIPsi1 stably transfected cells, CacyBP/SIP was shown to be distributed throughout the cytoplasm, irregardless of whether they were stimulated or not. After CacyBP/SIP nuclear translocation was reduced, there had no major effect on cell proliferation, as shown by MTT assay. There had no enhanced anchorage-dependent growth upon stimulation, as indicated by colony formation in flat plates. No changes appeared in the percentage of cells in G0-G1 phase in either cell line (71.09% ± 0.16% and 70.86% ± 0.25%, control cells and gastrin-treated SGC7901-CacyBP/SIPsi1 cells, P = 0.101; 74.17% ± 1.04% and 73.07% ± 1.00%, control cells and gastrin-treated MKN45-CacyBP/SIPsi1 cells, P = 0.225). CONCLUSION: CacyBP/SIP nuclear translocation promotes the proliferation and cell cycle progression of gastric cancer cells. PMID:25110433

  3. CacyBP/SIP nuclear translocation induced by gastrin promotes gastric cancer cell proliferation.

    PubMed

    Zhai, Hui-Hong; Meng, Juan; Wang, Jing-Bo; Liu, Zhen-Xiong; Li, Yuan-Fei; Feng, Shan-Shan

    2014-08-07

    To investigate the role of nuclear translocation of calcyclin binding protein, also called Siah-1 interacting protein (CacyBP/SIP), in gastric carcinogenesis. The expression of CacyBP/SIP protein in gastric cancer cell lines was detected by Western blot. Immunofluorescence experiments were performed on gastric cancer cell lines that had been either unstimulated or stimulated with gastrin. To confirm the immunofluorescence findings, the relative abundance of CacyBP/SIP in nuclear and cytoplasmic compartments was assessed by Western blot. The effect of nuclear translocation of CacyBP/SIP on cell proliferation was examined using MTT assay. The colony formation assay was used to measure clonogenic cell survival. The effect of CacyBP/SIP nuclear translocation on cell cycle progression was investigated. Two CacyBP/SIP-specific siRNA vectors were designed and constructed to inhibit CacyBP/SIP expression in order to reduce the nuclear translocation of CacyBP/SIP, and the expression of CacyBP/SIP in stably transfected cells was determined by Western blot. The effect of inhibiting CacyBP/SIP nuclear translocation on cell proliferation was then assessed. CacyBP/SIP protein was present in most of gastric cancer cell lines. In unstimulated cells, CacyBP/SIP was distributed throughout the cytoplasm; while in stimulated cells, CacyBP/SIP was found mainly in the perinuclear region. CacyBP/SIP nuclear translocation generated a growth-stimulatory effect on cells. The number of colonies in the CacyBP/SIP nuclear translocation group was significantly higher than that in the control group. The percentage of stimulated cells in G1 phase was significantly lower than that of control cells (69.70% ± 0.46% and 65.80% ± 0.60%, control cells and gastrin-treated SGC7901 cells, P = 0.008; 72.99% ± 0.46% and 69.36% ± 0.51%, control cells and gastrin-treated MKN45 cells, P = 0.022). CacyBP/SIPsi1 effectively down-regulated the expression of CacyBP/SIP, and cells stably transfected by CacyBP/SIPsi1 were then chosen for further cellular assays. In CacyBP/SIPsi1 stably transfected cells, CacyBP/SIP was shown to be distributed throughout the cytoplasm, irregardless of whether they were stimulated or not. After CacyBP/SIP nuclear translocation was reduced, there had no major effect on cell proliferation, as shown by MTT assay. There had no enhanced anchorage-dependent growth upon stimulation, as indicated by colony formation in flat plates. No changes appeared in the percentage of cells in G0-G1 phase in either cell line (71.09% ± 0.16% and 70.86% ± 0.25%, control cells and gastrin-treated SGC7901-CacyBP/SIPsi1 cells, P = 0.101; 74.17% ± 1.04% and 73.07% ± 1.00%, control cells and gastrin-treated MKN45-CacyBP/SIPsi1 cells, P = 0.225). CacyBP/SIP nuclear translocation promotes the proliferation and cell cycle progression of gastric cancer cells.

  4. Loss of Sip1 leads to migration defects and retention of ectodermal markers during lens development.

    PubMed

    Manthey, Abby L; Lachke, Salil A; FitzGerald, Paul G; Mason, Robert W; Scheiblin, David A; McDonald, John H; Duncan, Melinda K

    2014-02-01

    SIP1 encodes a DNA-binding transcription factor that regulates multiple developmental processes, as highlighted by the pleiotropic defects observed in Mowat-Wilson syndrome, which results from mutations in this gene. Further, in adults, dysregulated SIP1 expression has been implicated in both cancer and fibrotic diseases, where it functionally links TGFβ signaling to the loss of epithelial cell characteristics and gene expression. In the ocular lens, an epithelial tissue important for vision, Sip1 is co-expressed with epithelial markers, such as E-cadherin, and is required for the complete separation of the lens vesicle from the head ectoderm during early ocular morphogenesis. However, the function of Sip1 after early lens morphogenesis is still unknown. Here, we conditionally deleted Sip1 from the developing mouse lens shortly after lens vesicle closure, leading to defects in coordinated fiber cell tip migration, defective suture formation, and cataract. Interestingly, RNA-Sequencing analysis on Sip1 knockout lenses identified 190 differentially expressed genes, all of which are distinct from previously described Sip1 target genes. Furthermore, 34% of the genes with increased expression in the Sip1 knockout lenses are normally downregulated as the lens transitions from the lens vesicle to early lens, while 49% of the genes with decreased expression in the Sip1 knockout lenses are normally upregulated during early lens development. Overall, these data imply that Sip1 plays a major role in reprogramming the lens vesicle away from a surface ectoderm cell fate towards that necessary for the development of a transparent lens and demonstrate that Sip1 regulates distinctly different sets of genes in different cellular contexts. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  5. Loss of Sip1 leads to migration defects and retention of ectodermal markers during lens development

    PubMed Central

    Manthey, Abby L.; Lachke, Salil A.; FitzGerald, Paul G.; Mason, Robert W.; Scheiblin, David A.; McDonald, John H.; Duncan, Melinda K.

    2014-01-01

    SIP1 encodes a DNA-binding transcription factor that regulates multiple developmental processes, as highlighted by the pleiotropic defects observed in Mowat-Wilson Syndrome, which results from mutations in this gene. Further, in adults, dysregulated SIP1 expression has been implicated in both cancer and fibrotic diseases, where it functionally links TGFβ signaling to the loss of epithelial cell characteristics and gene expression. In the ocular lens, an epithelial tissue important for vision, Sip1 is co-expressed with epithelial markers, such as E-cadherin, and is required for the complete separation of the lens vesicle from the head ectoderm during early ocular morphogenesis. However, the function of Sip1 after early lens morphogenesis is still unknown. Here, we conditionally deleted Sip1 from the developing mouse lens shortly after lens vesicle closure, leading to defects in coordinated fiber cell tip migration, defective suture formation, and cataract. Interestingly, RNA-Sequencing analysis on Sip1 knockout lenses identified 190 differentially expressed genes, all of which are distinct from previously described Sip1 target genes. Furthermore, 34% of the genes with increased expression in the Sip1 knockout lenses are normally downregulated as the lens transitions from the lens vesicle to early lens, while 49% of the genes with decreased expression in the Sip1 knockout lenses are normally upregulated during early lens development. Overall, these data imply that Sip1 plays a major role in reprogramming the lens vesicle away from a surface ectoderm cell fate towards that necessary for the development of a transparent lens and demonstrate that Sip1 regulates distinctly different sets of genes in different cellular contexts. PMID:24161570

  6. The effect of S100A6 on nuclear translocation of CacyBP/SIP in colon cancer cells

    PubMed Central

    Yang, Bo; Li, Qianqian; Liu, Aiqin; Zhao, Yingying; Qiu, Changqing; Ge, Jun

    2018-01-01

    Background Calcyclin Binding Protein/(Siah-1 interacting protein) (CacyBP/SIP) acts as an oncogene in colorectal cancer. The nuclear accumulation of CacyBP/SIP has been linked to the proliferation of cancer cells. It has been reported that intracellular Ca2+ induces the nuclear translocation of CacyBP/SIP. However, the molecular mechanism of CacyBP/SIP nuclear translocation has yet to be elucidated. The purpose of this study was to test whether the Ca2+-dependent binding partner S100 protein is involved in CacyBP/SIP nuclear translocation in colon cancer SW480 cells. Methods The subcellular localization of endogenous CacyBP/SIP was observed following the stimulation of ionomycin or BAPTA/AM by immunofluorescence staining in SW480 cells. S100A6 small interfering RNAs (siRNA) were transfected into SW480 cells. Immunoprecipitation assays detected whether S100 protein is relevant to the nuclear translocation of CacyBP/SIP in response to changes in [Ca2+]i. Results We observed that endogenous CacyBP/SIP is translocated from the cytosol to the nucleus following the elevation of [Ca2+]i by ionomycin in SW480 cells. Co-immunoprecipitation experiments showed that the interaction between S100A6 and CacyBP/SIP was increased simultaneously with elevated Ca2+. Knockdown of S100A6 abolished the Ca2+ effect on the subcellular translocation of CacyBP/SIP. Conclusion Thus, we demonstrated that S100A6 is required for the Ca2+-dependent nuclear translocation of CacyBP/SIP in colon cancer SW480 cells. PMID:29534068

  7. Synergistic regulation of the acute phase protein SIP24/24p3 by glucocorticoid and pro-inflammatory cytokines.

    PubMed

    Liu, Quan-Sheng; Nilsen-Hamilton, Marit; Xiong, Si-Dong

    2003-10-25

    SIP24/24p3 is a secreted murine acute phase protein which has been speculated to play an anti-inflammatory role in vivo. Recently SIP24/24p3 has been found to be able to specifically induce apoptosis in leukocytes. By using (35)S metabolic labeling method, we studied the regulation of SIP24/24p3 by glucocorticoid and pro-inflammatory cytokines IL-6 and TNF-alpha in cultured Balb/c 3T3 and BNL cells. The following results were observed: (1) dexamethasone induced the expression of SIP24/24p3 in both Balb/c 3T3 and BNL cells, the induction was more significant in BNL cells; (2) dexamethasone and IL-6 synergistically induced the expression of SIP24/24p3 in both Balb/c 3T3 and BNL cells; (3) in Balb/c 3T3 cells dexamethasone and TNF-alpha acted synergistically to induce the expression of SIP24/24p3, whereas in BNL cells dexamethasone and TNF-alpha induced the expression of SIP24/24p3 in an additive manner; (4) dexamethasone and IL-6/TNF-alpha acted synergistically in Balb/c 3T3 cells and additively in BNL cells to induce the expression of SIP24/24p3. The inducibility of SIP24/24p3 by multiple factors will help to explain its highly specific expression in vivo. The difference in the expression patterns of SIP24/24p3 in different cell types is also suggestive to its expression and regulation in hepatic and extrahepatic tissues. Finally, the fact that SIP24/24p3 protein can be induced by both pro-inflammatory as well as anti-inflammatory factors is indicative of the important role of SIP24/24p3 in the entire acute phase response process.

  8. CacyBP/SIP nuclear translocation regulates p27Kip1 stability in gastric cancer cells

    PubMed Central

    Niu, Ying-Lin; Li, Ya-Jun; Wang, Jing-Bo; Lu, Yuan-Yuan; Liu, Zhen-Xiong; Feng, Shan-Shan; Hu, Jian-Guo; Zhai, Hui-Hong

    2016-01-01

    AIM: To investigate the mechanism of calcyclin binding protein/Siah-1 interacting protein (CacyBP/SIP) nuclear translocation in promoting the proliferation of gastric cancer (GC) cells. METHODS: The effect of CacyBP/SIP nuclear translocation on cell cycle was investigated by cell cycle analysis. Western blot analysis was used to assess the change in expression of cell cycle regulatory proteins and proteasome-mediated degradation of p27Kip1. Co-immunoprecipitation (co-IP) analysis was performed to examine the binding of CacyBP/SIP with Skp1. A CacyBP/SIP truncation mutant which lacked the Skp1 binding site was constructed and fused to a fluorescent protein. Subsequently, the effect on Skp1 binding with the fusion protein was examined by co-IP, while localization of fluorescent fusion protein observed by confocal laser microscopy, and change in p27Kip1 protein expression assessed by Western blot analysis. RESULTS: CacyBP/SIP nuclear translocation induced by gastrin promoted progression of GC cells from G1 phase. However, while CacyBP/SIP nuclear translocation was inhibited using siRNA to suppress CacyBP/SIP expression, cell cycle was clearly inhibited. CacyBP/SIP nuclear translocation significantly decreased the level of cell cycle inhibitor p27Kip1, increased Cyclin E protein expression whereas the levels of Skp1, Skp2, and CDK2 were not affected. Upon inhibition of CacyBP/SIP nuclear translocation, there were no changes in protein levels of p27Kip1 and Cyclin E, while p27Kip1 decrease could be prevented by the proteasome inhibitor MG132. Moreover, CacyBP/SIP was found to bind to Skp1 by immunoprecipitation, an event that was abolished by mutant CacyBP/SIP, which also failed to stimulate p27Kip1 degradation, even though the mutant could still translocate into the nucleus. CONCLUSION: CacyBP/SIP nuclear translocation contributes to the proliferation of GC cells, and CacyBP/SIP exerts this effect, at least in part, by stimulating ubiquitin-mediated degradation of p27Kip1. PMID:27099442

  9. Serving Satellite Remote Sensing Data to User Community through the OGC Interoperability Protocols

    NASA Astrophysics Data System (ADS)

    di, L.; Yang, W.; Bai, Y.

    2005-12-01

    Remote sensing is one of the major methods for collecting geospatial data. Hugh amount of remote sensing data has been collected by space agencies and private companies around the world. For example, NASA's Earth Observing System (EOS) is generating more than 3 Tb of remote sensing data per day. The data collected by EOS are processed, distributed, archived, and managed by the EOS Data and Information System (EOSDIS). Currently, EOSDIS is managing several petabytes of data. All of those data are not only valuable for global change research, but also useful for local and regional application and decision makings. How to make the data easily accessible to and usable by the user community is one of key issues for realizing the full potential of these valuable datasets. In the past several years, the Open Geospatial Consortium (OGC) has developed several interoperability protocols aiming at making geospatial data easily accessible to and usable by the user community through Internet. The protocols particularly relevant to the discovery, access, and integration of multi-source satellite remote sensing data are the Catalog Service for Web (CS/W) and Web Coverage Services (WCS) Specifications. The OGC CS/W specifies the interfaces, HTTP protocol bindings, and a framework for defining application profiles required to publish and access digital catalogues of metadata for geographic data, services, and related resource information. The OGC WCS specification defines the interfaces between web-based clients and servers for accessing on-line multi-dimensional, multi-temporal geospatial coverage in an interoperable way. Based on definitions by OGC and ISO 19123, coverage data include all remote sensing images as well as gridded model outputs. The Laboratory for Advanced Information Technology and Standards (LAITS), George Mason University, has been working on developing and implementing OGC specifications for better serving NASA Earth science data to the user community for many years. We have developed the NWGISS software package that implements multiple OGC specifications, including OGC WMS, WCS, CS/W, and WFS. As a part of NASA REASON GeoBrain project, the NWGISS WCS and CS/W servers have been extended to provide operational access to NASA EOS data at data pools through OGC protocols and to make both services chainable in the web-service chaining. The extensions in the WCS server include the implementation of WCS 1.0.0 and WCS 1.0.2, and the development of WSDL description of the WCS services. In order to find the on-line EOS data resources, the CS/W server is extended at the backend to search metadata in NASA ECHO. This presentation reports those extensions and discuss lessons-learned on the implementation. It also discusses the advantage, disadvantages, and future improvement of OGC specifications, particularly the WCS.

  10. Application of Aquaculture Monitoring System Based on CC2530

    NASA Astrophysics Data System (ADS)

    Chen, H. L.; Liu, X. Q.

    In order to improve the intelligent level of aquaculture technology, this paper puts forward a remote wireless monitoring system based on ZigBee technology, GPRS technology and Android mobile phone platform. The system is composed of wireless sensor network (WSN), GPRS module, PC server, and Android client. The WSN was set up by CC2530 chips based on ZigBee protocol, to realize the collection of water quality parameters such as the water level, temperature, PH and dissolved oxygen. The GPRS module realizes remote communication between WSN and PC server. Android client communicates with server to monitor the level of water quality. The PID (proportion, integration, differentiation) control is adopted in the control part, the control commands from the android mobile phone is sent to the server, the server again send it to the lower machine to control the water level regulating valve and increasing oxygen pump. After practical testing to the system in Liyang, Jiangsu province, China, temperature measurement accuracy reaches 0.5°C, PH measurement accuracy reaches 0.3, water level control precision can be controlled within ± 3cm, dissolved oxygen control precision can be controlled within ±0.3 mg/L, all the indexes can meet the requirements, this system is very suitable for aquaculture.

  11. Share Data with OPeNDAP Hyrax: New Features and Improvements

    NASA Technical Reports Server (NTRS)

    Gallagher, James

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in 1. server installation, 2. server configuration, 3. Hyrax aggregation capabilities, 4. support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS), 5. support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  12. HPEPDOCK: a web server for blind peptide-protein docking based on a hierarchical algorithm.

    PubMed

    Zhou, Pei; Jin, Bowen; Li, Hao; Huang, Sheng-You

    2018-05-09

    Protein-peptide interactions are crucial in many cellular functions. Therefore, determining the structure of protein-peptide complexes is important for understanding the molecular mechanism of related biological processes and developing peptide drugs. HPEPDOCK is a novel web server for blind protein-peptide docking through a hierarchical algorithm. Instead of running lengthy simulations to refine peptide conformations, HPEPDOCK considers the peptide flexibility through an ensemble of peptide conformations generated by our MODPEP program. For blind global peptide docking, HPEPDOCK obtained a success rate of 33.3% in binding mode prediction on a benchmark of 57 unbound cases when the top 10 models were considered, compared to 21.1% for pepATTRACT server. HPEPDOCK also performed well in docking against homology models and obtained a success rate of 29.8% within top 10 predictions. For local peptide docking, HPEPDOCK achieved a high success rate of 72.6% on a benchmark of 62 unbound cases within top 10 predictions, compared to 45.2% for HADDOCK peptide protocol. Our HPEPDOCK server is computationally efficient and consumed an average of 29.8 mins for a global peptide docking job and 14.2 mins for a local peptide docking job. The HPEPDOCK web server is available at http://huanglab.phys.hust.edu.cn/hpepdock/.

  13. Help Is on the WAIS.

    ERIC Educational Resources Information Center

    Lukanuski, Mary

    1992-01-01

    Describes the development of the WAIS (Wide Area Information Servers) protocol, a system that allows users access to personal, corporate, and commercial electronic information from one interface. The availability of WAIS on the Internet and the reactions of users are addressed. Several problems are considered, including funding, hardware…

  14. Plug into a Network.

    ERIC Educational Resources Information Center

    Vander Linden, Doug; Clark, Larry

    1994-01-01

    Stand-alone, single-user software programs for classroom use can be prohibitively expensive, compared to information-sharing network systems. Based on a Kansas district's experience, this article explains three types of networks (device-sharing, operating-system-based, and client-server-based) and discusses network protocols, software choices,…

  15. Research on realization scheme of interactive voice response (IVR) system

    NASA Astrophysics Data System (ADS)

    Jin, Xin; Zhu, Guangxi

    2003-12-01

    In this paper, a novel interactive voice response (IVR) system is proposed, which is apparently different from the traditional. Using software operation and network control, the IVR system is presented which only depends on software in the server in which the system lies and the hardware in network terminals on user side, such as gateway (GW), personal gateway (PG), PC and so on. The system transmits the audio using real time protocol (RTP) protocol via internet to the network terminals and controls flow using finite state machine (FSM) stimulated by H.245 massages sent from user side and the system control factors. Being compared with other existing schemes, this IVR system results in several advantages, such as greatly saving the system cost, fully utilizing the existing network resources and enhancing the flexibility. The system is capable to be put in any service server anywhere in the Internet and even fits for the wireless applications based on packet switched communication. The IVR system has been put into reality and passed the system test.

  16. MyDas, an Extensible Java DAS Server

    PubMed Central

    Jimenez, Rafael C.; Quinn, Antony F.; Jenkinson, Andrew M.; Mulder, Nicola; Martin, Maria; Hunter, Sarah; Hermjakob, Henning

    2012-01-01

    A large number of diverse, complex, and distributed data resources are currently available in the Bioinformatics domain. The pace of discovery and the diversity of information means that centralised reference databases like UniProt and Ensembl cannot integrate all potentially relevant information sources. From a user perspective however, centralised access to all relevant information concerning a specific query is essential. The Distributed Annotation System (DAS) defines a communication protocol to exchange annotations on genomic and protein sequences; this standardisation enables clients to retrieve data from a myriad of sources, thus offering centralised access to end-users. We introduce MyDas, a web server that facilitates the publishing of biological annotations according to the DAS specification. It deals with the common functionality requirements of making data available, while also providing an extension mechanism in order to implement the specifics of data store interaction. MyDas allows the user to define where the required information is located along with its structure, and is then responsible for the communication protocol details. PMID:23028496

  17. Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux

    NASA Astrophysics Data System (ADS)

    Peng, Daogang; Zhang, Hao; Weng, Jiannian; Li, Hui; Xia, Fei

    Industrial Ethernet is a new technology for industrial network communications developed in recent years. In the field of industrial automation in China, EPA is the first standard accepted and published by ISO, and has been included in the fourth edition IEC61158 Fieldbus of NO.14 type. According to EPA standard, Field devices such as industrial field controller, actuator and other instruments are all able to realize communication based on the Ethernet standard. The Atmel AT91RM9200 embedded development board and open source embedded Linux are used to develop an information inquiry service system of EPA protocol based on embedded ARM Linux in this paper. The system is capable of designing an EPA Server program for EPA data acquisition procedures, the EPA information inquiry service is available for programs in local or remote host through Socket interface. The EPA client can access data and information of other EPA equipments on the EPA network when it establishes connection with the monitoring port of the server.

  18. MyDas, an extensible Java DAS server.

    PubMed

    Salazar, Gustavo A; García, Leyla J; Jones, Philip; Jimenez, Rafael C; Quinn, Antony F; Jenkinson, Andrew M; Mulder, Nicola; Martin, Maria; Hunter, Sarah; Hermjakob, Henning

    2012-01-01

    A large number of diverse, complex, and distributed data resources are currently available in the Bioinformatics domain. The pace of discovery and the diversity of information means that centralised reference databases like UniProt and Ensembl cannot integrate all potentially relevant information sources. From a user perspective however, centralised access to all relevant information concerning a specific query is essential. The Distributed Annotation System (DAS) defines a communication protocol to exchange annotations on genomic and protein sequences; this standardisation enables clients to retrieve data from a myriad of sources, thus offering centralised access to end-users.We introduce MyDas, a web server that facilitates the publishing of biological annotations according to the DAS specification. It deals with the common functionality requirements of making data available, while also providing an extension mechanism in order to implement the specifics of data store interaction. MyDas allows the user to define where the required information is located along with its structure, and is then responsible for the communication protocol details.

  19. Implementation of the Algorithm for Congestion control in the Dynamic Circuit Network (DCN)

    NASA Astrophysics Data System (ADS)

    Nalamwar, H. S.; Ivanov, M. A.; Buddhawar, G. U.

    2017-01-01

    Transport Control Protocol (TCP) incast congestion happens when a number of senders work in parallel with the same server where the high bandwidth and low latency network problem occurs. For many data center network applications such as a search engine, heavy traffic is present on such a server. Incast congestion degrades the entire performance as packets are lost at a server side due to buffer overflow, and as a result, the response time becomes longer. In this work, we focus on TCP throughput, round-trip time (RTT), receive window and retransmission. Our method is based on the proactive adjust of the TCP receive window before the packet loss occurs. We aim to avoid the wastage of the bandwidth by adjusting its size as per the number of packets. To avoid the packet loss, the ICTCP algorithm has been implemented in the data center network (ToR).

  20. HDF-EOS Web Server

    NASA Technical Reports Server (NTRS)

    Ullman, Richard; Bane, Bob; Yang, Jingli

    2008-01-01

    A shell script has been written as a means of automatically making HDF-EOS-formatted data sets available via the World Wide Web. ("HDF-EOS" and variants thereof are defined in the first of the two immediately preceding articles.) The shell script chains together some software tools developed by the Data Usability Group at Goddard Space Flight Center to perform the following actions: Extract metadata in Object Definition Language (ODL) from an HDF-EOS file, Convert the metadata from ODL to Extensible Markup Language (XML), Reformat the XML metadata into human-readable Hypertext Markup Language (HTML), Publish the HTML metadata and the original HDF-EOS file to a Web server and an Open-source Project for a Network Data Access Protocol (OPeN-DAP) server computer, and Reformat the XML metadata and submit the resulting file to the EOS Clearinghouse, which is a Web-based metadata clearinghouse that facilitates searching for, and exchange of, Earth-Science data.

  1. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  2. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  3. CoAP-Based Mobility Management for the Internet of Things

    PubMed Central

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-01-01

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214

  4. Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction

    NASA Astrophysics Data System (ADS)

    Aarts, Fides; Jonsson, Bengt; Uijen, Johan

    In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.

  5. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  6. BitTorious volunteer: server-side extensions for centrally-managed volunteer storage in BitTorrent swarms.

    PubMed

    Lee, Preston V; Dinu, Valentin

    2015-11-04

    Our publication of the BitTorious portal [1] demonstrated the ability to create a privatized distributed data warehouse of sufficient magnitude for real-world bioinformatics studies using minimal changes to the standard BitTorrent tracker protocol. In this second phase, we release a new server-side specification to accept anonymous philantropic storage donations by the general public, wherein a small portion of each user's local disk may be used for archival of scientific data. We have implementated the server-side announcement and control portions of this BitTorrent extension into v3.0.0 of the BitTorious portal, upon which compatible clients may be built. Automated test cases for the BitTorious Volunteer extensions have been added to the portal's v3.0.0 release, supporting validation of the "peer affinity" concept and announcement protocol introduced by this specification. Additionally, a separate reference implementation of affinity calculation has been provided in C++ for informaticians wishing to integrate into libtorrent-based projects. The BitTorrent "affinity" extensions as provided in the BitTorious portal reference implementation allow data publishers to crowdsource the extreme storage prerequisites for research in "big data" fields. With sufficient awareness and adoption of BitTorious Volunteer-based clients by the general public, the BitTorious portal may be able to provide peta-scale storage resources to the scientific community at relatively insignificant financial cost.

  7. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  8. Network oriented radiological and medical archive

    NASA Astrophysics Data System (ADS)

    Ferraris, M.; Frixione, P.; Squarcia, S.

    2001-10-01

    In this paper the basic ideas of NORMA (Network Oriented Radiological and Medical Archive) are discussed. NORMA is an original project built by a team of physicists in collaboration with radiologists in order to select the best Treatment Planning in radiotherapy. It allows physicians and health physicists, working in different places, to discuss on interesting clinical cases visualizing the same diagnostic images, at the same time, and highlighting zones of interest (tumors and organs at risk). NORMA has a client/server architecture in order to be platform independent. Applying World Wide Web technologies, it can be easily used by people with no specific computer knowledge providing a verbose help to guide the user through the right steps of execution. The client side is an applet while the server side is a Java application. In order to optimize execution the project also includes a proprietary protocol, lying over TCP/IP suite, that organizes data exchanges and control messages. Diagnostic images are retrieved from a relational database or from a standard DICOM (Digital Images and COmmunications in Medicine) PACS through the DICOM-WWW gateway allowing connection of the usual Web browsers, used by the NORMA system, to DICOM applications via the HTTP protocol. Browser requests are sent to the gateway from the Web server through CGI (Common Gateway Interface). DICOM software translates the requests in DICOM messages and organizes the communication with the remote DICOM Application.

  9. CABS-dock web server for the flexible docking of peptides to proteins without prior knowledge of the binding site.

    PubMed

    Kurcinski, Mateusz; Jamroz, Michal; Blaszczyk, Maciej; Kolinski, Andrzej; Kmiecik, Sebastian

    2015-07-01

    Protein-peptide interactions play a key role in cell functions. Their structural characterization, though challenging, is important for the discovery of new drugs. The CABS-dock web server provides an interface for modeling protein-peptide interactions using a highly efficient protocol for the flexible docking of peptides to proteins. While other docking algorithms require pre-defined localization of the binding site, CABS-dock does not require such knowledge. Given a protein receptor structure and a peptide sequence (and starting from random conformations and positions of the peptide), CABS-dock performs simulation search for the binding site allowing for full flexibility of the peptide and small fluctuations of the receptor backbone. This protocol was extensively tested over the largest dataset of non-redundant protein-peptide interactions available to date (including bound and unbound docking cases). For over 80% of bound and unbound dataset cases, we obtained models with high or medium accuracy (sufficient for practical applications). Additionally, as optional features, CABS-dock can exclude user-selected binding modes from docking search or to increase the level of flexibility for chosen receptor fragments. CABS-dock is freely available as a web server at http://biocomp.chem.uw.edu.pl/CABSdock. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  10. Evolution of the Data Access Protocol in Response to Community Needs

    NASA Astrophysics Data System (ADS)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that server functions can be used to perform operations on large volumes of data and return results that are far smaller than would be required to achieve the same outcomes via client-side processing. We are using information from these efforts to inform the design of server functions in DAP4. Each of the three areas of DAP4 advancement is being guided by input from a number of community members, including an OPULS Advisory Committee.

  11. Experience in Construction and Operation of the Distributed Information Systems on the Basis of the Z39.50 Protocol

    NASA Astrophysics Data System (ADS)

    Zhizhimov, Oleg; Mazov, Nikolay; Skibin, Sergey

    Questions concerned with construction and operation of the distributed information systems on the basis of ANSI/NISO Z39.50 Information Retrieval Protocol are discussed in the paper. The paper is based on authors' practice in developing ZooPARK server. Architecture of distributed information systems, questions of reliability of such systems, minimization of search time and administration are examined. Problems with developing of distributed information systems are also described.

  12. Research on Optical Transmitter and Receiver Module Used for High-Speed Interconnection between CPU and Memory

    NASA Astrophysics Data System (ADS)

    He, Huimin; Liu, Fengman; Li, Baoxia; Xue, Haiyun; Wang, Haidong; Qiu, Delong; Zhou, Yunyan; Cao, Liqiang

    2016-11-01

    With the development of the multicore processor, the bandwidth and capacity of the memory, rather than the memory area, are the key factors in server performance. At present, however, the new architectures, such as fully buffered DIMM (FBDIMM), hybrid memory cube (HMC), and high bandwidth memory (HBM), cannot be commercially applied in the server. Therefore, a new architecture for the server is proposed. CPU and memory are separated onto different boards, and optical interconnection is used for the communication between them. Each optical module corresponds to each dual inline memory module (DIMM) with 64 channels. Compared to the previous technology, not only can the architecture realize high-capacity and wide-bandwidth memory, it also can reduce power consumption and cost, and be compatible with the existing dynamic random access memory (DRAM). In this article, the proposed module with system-in-package (SiP) integration is demonstrated. In the optical module, the silicon photonic chip is included, which is a promising technology to be applied in the next-generation data exchanging centers. And due to the bandwidth-distance performance of the optical interconnection, SerDes chips are introduced to convert the 64-bit data at 800 Mbps from/to 4-channel data at 12.8 Gbps after/before they are transmitted though optical fiber. All the devices are packaged on cheap organic substrates. To ensure the performance of the whole system, several optimization efforts have been performed on the two modules. High-speed interconnection traces have been designed and simulated with electromagnetic simulation software. Steady-state thermal characteristics of the transceiver module have been evaluated by ANSYS APLD based on finite-element methodology (FEM). Heat sinks are placed at the hotspot area to ensure the reliability of all working chips. Finally, this transceiver system based on silicon photonics is measured, and the eye diagrams of data and clock signals are verified.

  13. 76 FR 28437 - Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): Initial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... Preventive Services for Older Adults SIP11-045, and Measuring Impact of Multi-Component Interventions to Prevent Older Adult Falls and Assessing Sustainability and Scalability, SIP 11-046, Panel D,'' initial... SIP11-045, and Measuring Impact of Multi- Component Interventions to Prevent Older Adult Falls and...

  14. 40 CFR 52.1384 - Emission control regulations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... construction permit to override a requirement that has been approved as part of the SIP, are disapproved. We cannot approve these provisions into the SIP, as it would allow the State to change a SIP requirement through the issuance of a permit. Pursuant to section 110 of the Act, to change a requirement of the SIP...

  15. The Social Interaction Phobia Scale: Continued support for the psychometric validity of the SIPS using clinical and non-clinical samples.

    PubMed

    Menatti, Alison R; Weeks, Justin W; Carleton, R Nicholas; Morrison, Amanda S; Heimberg, Richard G; Hope, Debra A; Blanco, Carlos; Schneier, Franklin R; Liebowitz, Michael R

    2015-05-01

    The present study sought to extend findings supporting the psychometric validity of a promising measure of social anxiety (SA) symptoms, the Social Interaction Phobia Scale (SIPS; Carleton et al., 2009). Analyses were conducted using three samples: social anxiety disorder (SAD) patients, generalized anxiety disorder (GAD) patients, and healthy controls. SIPS scores of SAD patients demonstrated internal consistency and construct validity, and the previously demonstrated three-factor structure of the SIPS was replicated. Further, the SIPS total score uniquely predicted SA symptoms, and SIPS scores were significantly higher for SAD patients than GAD patients or controls. Two cut-off scores that discriminated SAD patients from GAD patients and from healthy controls were identified. The current study is the first to replicate the SIPS three-factor model in a large, treatment-seeking sample of SAD patients and establish a cut-off score discriminating SAD from GAD patients. Findings support the SIPS as a valid, SAD-specific assessment instrument. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Protection against Foot-and-Mouth Disease Virus in Guinea Pigs via Oral Administration of Recombinant Lactobacillus plantarum Expressing VP1

    PubMed Central

    Wang, Miao; Pan, Li; Zhou, Peng; Lv, Jianliang; Zhang, Zhongwang; Wang, Yonglu; Zhang, Yongguang

    2015-01-01

    Mucosal vaccination is an effective strategy for generating antigen-specific immune responses against mucosal infections of foot-and-mouth disease virus (FMDV). In this study, Lactobacillus plantarum strains NC8 and WCFS1 were used as oral delivery vehicles containing a pSIP411-VP1 recombinant plasmid to initiate mucosal and systemic immune responses in guinea pigs. Guinea pigs were orally vaccinated (three doses) with NC8-pSIP411, NC8-pSIP411-VP1, WCFS1-pSIP411, WCFS1-pSIP411-VP1 or milk. Animals immunized with NC8-pSIP411-VP1 and WCFS1-pSIP411-VP1 developed high levels of antigen-specific serum IgG, IgA, IgM, mucosal secretory IgA (sIgA) and neutralizing antibodies, and revealed stronger cell-mediated immune responses and enhanced protection against FMDV challenge compared with control groups. The recombinant pSIP411-VP1 effectively improved immunoprotection against FMDV in guinea pigs. PMID:26629822

  17. A recombinant truncated surface immunogenic protein (tSip) plus adjuvant FIA confers active protection against Group B streptococcus infection in tilapia.

    PubMed

    He, Yang; Wang, Kai-Yu; Xiao, Dan; Chen, De-Fang; Huang, Lingyuan; Liu, Tianqiang; Wang, Jun; Geng, Yi; Wang, Er-Long; Yang, Qian

    2014-12-05

    Tilapia is an important agricultural fish that has been plagued by Group B streptococcus (GBS) infections in recent years, some of them severe. It is well-known that surface immunogenicity protein (Sip) is an effective vaccine against GBS. Since Sip was not expressed in either E. coli BL21 or E. coli Rosetta, we removed the N-terminal signal peptide and LysM of the virus to produce purified truncated Sip (tSip(1)), which multiplied easily in an E. coli host. The antibody's ability to recognize and combine with GBS was determined by Western-blot and specific staining in vitro. The relative percentage of survival (RPS), antibody titers, bacterial recovery, and pathologic morphology were monitored in vivo to evaluate the immune effects. Freund's incomplete adjuvant (FIA) plus tSip and aluminum hydroxide gel (AH) plus tSip were also evaluated. It revealed that tSip mixed with FIA was an effective vaccine against GBS in tilapia, while AH is toxic to tilapia. Copyright © 2014. Published by Elsevier Ltd.

  18. 78 FR 21281 - Approval and Promulgation of Implementation Plans; State of Missouri; Infrastructure SIP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ...EPA is proposing action on four Missouri State Implementation Plan (SIP) submissions. First, EPA is proposing to approve portions of two SIP submissions from the State of Missouri addressing the applicable requirements of Clean Air Act (CAA) for the 1997 and 2006 National Ambient Air Quality Standards (NAAQS) for fine particulate matter (PM2.5). The CAA requires that each state adopt and submit a SIP to support implementation, maintenance, and enforcement of each new or revised NAAQS promulgated by EPA. These SIPs are commonly referred to as ``infrastructure'' SIPs. The infrastructure requirements are designed to ensure that the structural components of each state's air quality management program are adequate to meet the state's responsibilities under the CAA. EPA is also proposing to approve two additional SIP submissions from Missouri, one addressing the Prevention of Significant Deterioration (PSD) program in Missouri, and another addressing the requirements applicable to any board or body which approves permits or enforcement orders of the CAA, both of which support requirements associated with infrastructure SIPs.

  19. Client/Server data serving for high performance computing

    NASA Technical Reports Server (NTRS)

    Wood, Chris

    1994-01-01

    This paper will attempt to examine the industry requirements for shared network data storage and sustained high speed (10's to 100's to thousands of megabytes per second) network data serving via the NFS and FTP protocol suite. It will discuss the current structural and architectural impediments to achieving these sorts of data rates cost effectively today on many general purpose servers and will describe and architecture and resulting product family that addresses these problems. The sustained performance levels that were achieved in the lab will be shown as well as a discussion of early customer experiences utilizing both the HIPPI-IP and ATM OC3-IP network interfaces.

  20. Design and Development of a Network-Based Electronic Library.

    ERIC Educational Resources Information Center

    Larson, Ray R.

    1994-01-01

    Describes collaboration between the University of California at Berkeley and four other universities to develop interoperable servers containing each participant's Computer Science Technical Reports and to make them available over the Internet using standard protocols. The proposed library architecture, approaches to indexing and retrieval, and…

  1. CacyBP/SIP promotes the proliferation of colon cancer cells

    PubMed Central

    Chen, Xiong; Wang, Jun; Lu, Yuanyuan; Zhang, Faming; Liu, Zhengxiong; Lei, Ting; Fan, Daiming

    2017-01-01

    CacyBP/SIP is a component of the ubiquitin pathway and is overexpressed in several transformed tumor tissues, including colon cancer, which is one of the most common cancers worldwide. It is unknown whether CacyBP/SIP promotes the proliferation of colon cancer cells. This study examined the expression level, subcellular localization, and binding activity of CacyBP/SIP in human colon cancer cells in the presence and absence of the hormone gastrin. We found that CacyBP/SIP was expressed in a high percentage of colon cancer cells, but not in normal colonic surface epithelium. CacyBP/SIP promoted the cell proliferation of colon cancer cells under both basal and gastrin stimulated conditions as shown by knockdown studies. Gastrin stimulation triggered the translocation of CacyBP/SIP to the nucleus, and enhanced interaction between CacyBP/SIP and SKP1, a key component of ubiquitination pathway which further mediated the proteasome-dependent degradation of p27kip1 protein. The gastrin induced reduction in p27kip1 was prevented when cells were treated with the proteasome inhibitor MG132. These results suggest that CacyBP/SIP may be promoting growth of colon cancer cells by enhancing ubiquitin-mediated degradation of p27kip1. PMID:28196083

  2. Calcyclin Binding Protein/Siah-1 Interacting Protein Is a Hsp90 Binding Chaperone

    PubMed Central

    Góral, Agnieszka; Bieganowski, Paweł; Prus, Wiktor; Krzemień-Ojak, Łucja; Kądziołka, Beata; Fabczak, Hanna; Filipek, Anna

    2016-01-01

    The Hsp90 chaperone activity is tightly regulated by interaction with many co-chaperones. Since CacyBP/SIP shares some sequence homology with a known Hsp90 co-chaperone, Sgt1, in this work we performed a set of experiments in order to verify whether CacyBP/SIP can interact with Hsp90. By applying the immunoprecipitation assay we have found that CacyBP/SIP binds to Hsp90 and that the middle (M) domain of Hsp90 is responsible for this binding. Furthermore, the proximity ligation assay (PLA) performed on HEp-2 cells has shown that the CacyBP/SIP-Hsp90 complexes are mainly localized in the cytoplasm of these cells. Using purified proteins and applying an ELISA we have shown that Hsp90 interacts directly with CacyBP/SIP and that the latter protein does not compete with Sgt1 for the binding to Hsp90. Moreover, inhibitors of Hsp90 do not perturb CacyBP/SIP-Hsp90 binding. Luciferase renaturation assay and citrate synthase aggregation assay with the use of recombinant proteins have revealed that CacyBP/SIP exhibits chaperone properties. Also, CacyBP/SIP-3xFLAG expression in HEp-2 cells results in the appearance of more basic Hsp90 forms in 2D electrophoresis, which may indicate that CacyBP/SIP dephosphorylates Hsp90. Altogether, the obtained results suggest that CacyBP/SIP is involved in regulation of the Hsp90 chaperone machinery. PMID:27249023

  3. Applications of schedule-induced polydipsia in rodents for the study of an excessive ethanol intake phenotype

    PubMed Central

    Ford, Matthew M.

    2014-01-01

    Schedule-induced polydipsia (SIP) is generated by subjecting a highly motivated animal to a sub-optimal rate of food reinforcement while also providing access to a fluid. SIP is one of several adjunctive (or displacement) behaviors that are expressed in an exaggerated form that is deemed ‘excessive’. This feature makes SIP an attractive model for studying an excessive ethanol drinking phenotype in rodents. Multiple experimental variables are crucial for the full manifestation of adjunctive drinking, including the degree of food deprivation, the inter-pellet interval selected, and the size of the food reward offered. Although these variables were extensively studied and optimized for water polydipsia in rats, a similarly customized approach to ethanol SIP and application of the procedure in mice have largely been curtailed in favor of the default variable values historically used for water SIP in rats. Further, ethanol SIP also requires careful consideration of variables such as taste and ethanol concentration. Investigation of the stress axis and neurochemical systems such as dopamine and serotonin in mediating adjunctive drinking stemmed from two leading hypotheses regarding the underlying mechanisms of SIP generation: 1) SIP as a coping strategy to mitigate stress associated with the aversive environmental condition, and 2) SIP as a displacement of reward in a highly motivated animal. Ethanol SIP is a powerful model of excessive intake because it can generate an ethanol-dependent state and sustain frequent and intoxicating levels of blood ethanol with voluntary oral consumption. The required food deprivation and the loss of the excessive drinking phenotype following removal of the generator schedule are the two main limitations of the model. Future utility of ethanol SIP will be enhanced by more fully dissecting the underlying hormonal and neurochemical mechanisms and optimizing experimental variables for ethanol SIP on a per species and strain basis. PMID:24680665

  4. Applications of schedule-induced polydipsia in rodents for the study of an excessive ethanol intake phenotype.

    PubMed

    Ford, Matthew M

    2014-05-01

    Schedule-induced polydipsia (SIP) is generated by subjecting a highly motivated animal to a sub-optimal rate of food reinforcement while also providing access to a fluid. SIP is one of several adjunctive (or displacement) behaviors that are expressed in an exaggerated form that is deemed 'excessive.' This feature makes SIP an attractive model for studying an excessive ethanol drinking phenotype in rodents. Multiple experimental variables are crucial for the full manifestation of adjunctive drinking, including the degree of food deprivation, the inter-pellet interval selected, and the size of the food reward offered. Although these variables were extensively studied and optimized for water polydipsia in rats, a similarly customized approach to ethanol SIP and application of the procedure in mice have largely been curtailed in favor of the default variable values historically used for water SIP in rats. Further, ethanol SIP also requires careful consideration of variables such as taste and ethanol concentration. Investigation of the stress axis and neurochemical systems such as dopamine and serotonin in mediating adjunctive drinking stemmed from two leading hypotheses regarding the underlying mechanisms of SIP generation: 1) SIP as a coping strategy to mitigate stress associated with the aversive environmental condition, and 2) SIP as a displacement of reward in a highly motivated animal. Ethanol SIP is a powerful model of excessive intake because it can generate an ethanol-dependent state and sustain frequent and intoxicating levels of blood ethanol with voluntary oral consumption. The required food deprivation and the loss of the excessive drinking phenotype following removal of the generator schedule are the two main limitations of the model. Future utility of ethanol SIP will be enhanced by more fully dissecting the underlying hormonal and neurochemical mechanisms and optimizing experimental variables for ethanol SIP on a per species and strain basis. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. (124)I-L19-SIP for immuno-PET imaging of tumour vasculature and guidance of (131)I-L19-SIP radioimmunotherapy.

    PubMed

    Tijink, Bernard M; Perk, Lars R; Budde, Marianne; Stigter-van Walsum, Marijke; Visser, Gerard W M; Kloet, Reina W; Dinkelborg, Ludger M; Leemans, C René; Neri, Dario; van Dongen, Guus A M S

    2009-08-01

    The human monoclonal antibody (MAb) fragment L19-SIP is directed against extra domain B (ED-B) of fibronectin, a marker of tumour angiogenesis. A clinical radioimmunotherapy (RIT) trial with (131)I-L19-SIP was recently started. In the present study, after GMP production of (124)I and efficient production of (124)I-L19-SIP, we aimed to demonstrate the suitability of (124)I-L19-SIP immuno-PET for imaging of angiogenesis at early-stage tumour development and as a scouting procedure prior to clinical (131)I-L19-SIP RIT. (124)I was produced in a GMP compliant way via (124)Te(p,n)(124)I reaction and using a TERIMO module for radioiodine separation. L19-SIP was radioiodinated by using a modified version of the IODO-GEN method. The biodistribution of coinjected (124)I- and (131)I-L19-SIP was compared in FaDu xenograft-bearing nude mice, while (124)I PET images were obtained from mice with tumours of <50 to approximately 700 mm(3). (124)I was produced highly pure with an average yield of 15.4 +/- 0.5 MBq/microAh, while separation yield was approximately 90% efficient with <0.5% loss of TeO(2). Overall labelling efficiency, radiochemical purity and immunoreactive fraction were for (124)I-L19-SIP: approximately 80 , 99.9 and >90%, respectively. Tumour uptake was 7.3 +/- 2.1, 10.8 +/- 1.5, 7.8 +/- 1.4, 5.3 +/- 0.6 and 3.1 +/- 0.4%ID/g at 3, 6, 24, 48 and 72 h p.i., resulting in increased tumour to blood ratios ranging from 6.0 at 24 h to 45.9 at 72 h p.i.. Fully concordant labelling and biodistribution results were obtained with (124)I- and (131)I-L19-SIP. Immuno-PET with (124)I-L19-SIP using a high-resolution research tomograph PET scanner revealed clear delineation of the tumours as small as 50 mm(3) and no adverse uptake in other organs. (124)I-MAb conjugates for clinical immuno-PET can be efficiently produced. Immuno-PET with (124)I-L19-SIP appeared qualified for sensitive imaging of tumour neovasculature and for predicting (131)I-L19-SIP biodistribution.

  6. Verification for measurement-only blind quantum computing

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki

    2014-06-01

    Blind quantum computing is a new secure quantum computing protocol where a client who does not have any sophisticated quantum technology can delegate her quantum computing to a server without leaking any privacy. It is known that a client who has only a measurement device can perform blind quantum computing [T. Morimae and K. Fujii, Phys. Rev. A 87, 050301(R) (2013), 10.1103/PhysRevA.87.050301]. It has been an open problem whether the protocol can enjoy the verification, i.e., the ability of the client to check the correctness of the computing. In this paper, we propose a protocol of verification for the measurement-only blind quantum computing.

  7. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  8. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  9. 76 FR 51925 - Approval and Promulgation of Air Quality Implementation Plans; Maryland; Adhesives and Sealants Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... http://www.regulations.gov Web site is an ``anonymous access'' system, which means EPA will not know..., the Maryland Department of the Environment (MDE) submitted revisions to its SIP (Maryland SIP 08-02....11.35). On May 28, 2009, MDE submitted another revision to its SIP (Maryland SIP 09-01) amending...

  10. The Phyre2 web portal for protein modelling, prediction and analysis

    PubMed Central

    Kelley, Lawrence A; Mezulis, Stefans; Yates, Christopher M; Wass, Mark N; Sternberg, Michael JE

    2017-01-01

    Summary Phyre2 is a suite of tools available on the web to predict and analyse protein structure, function and mutations. The focus of Phyre2 is to provide biologists with a simple and intuitive interface to state-of-the-art protein bioinformatics tools. Phyre2 replaces Phyre, the original version of the server for which we previously published a protocol. In this updated protocol, we describe Phyre2, which uses advanced remote homology detection methods to build 3D models, predict ligand binding sites, and analyse the effect of amino-acid variants (e.g. nsSNPs) for a user’s protein sequence. Users are guided through results by a simple interface at a level of detail determined by them. This protocol will guide a user from submitting a protein sequence to interpreting the secondary and tertiary structure of their models, their domain composition and model quality. A range of additional available tools is described to find a protein structure in a genome, to submit large number of sequences at once and to automatically run weekly searches for proteins difficult to model. The server is available at http://www.sbg.bio.ic.ac.uk/phyre2. A typical structure prediction will be returned between 30mins and 2 hours after submission. PMID:25950237

  11. Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade

    NASA Astrophysics Data System (ADS)

    Graça, S.; Santos, J.; Manso, M. E.

    2004-10-01

    The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.

  12. Z39.50 and the Scholar's Workstation Concept.

    ERIC Educational Resources Information Center

    Phillips, Gary Lee

    1992-01-01

    Examines the potential application of the American National Standards Institute (ANSI)/National Information Standards Organization (NISO) Z39.50 library networking protocol as a client/server environment for a scholar's workstation. Computer networking models are described, and linking the workstation to an online public access catalog (OPAC) is…

  13. A service protocol for post-processing of medical images on the mobile device

    NASA Astrophysics Data System (ADS)

    He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian

    2014-03-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.

  14. Creep Behavior of Structural Insulated Panels (SIPS): Results from a Pilot Study

    Treesearch

    Dwight McDonald; Marshall Begel; C. Adam Senalik; Robert Ross; Thomas D. Skaggs; Borjen Yeh; Thomas Williamson

    2014-01-01

    Structural insulated panels (SIPs) have been recognized as construction materials in the International Residential Code (IRC) since 2009. Although most SIPs are used in wall applications, they can also be used as roof or floor panels that are subjected to long-term transverse loading, for which SIP creep performance may be critical in design. However, limited...

  15. Lateral load performance of SIP walls with full bearing

    Treesearch

    Boren Yeh; Tom Skaggs; Xiping Wang; Tom Williamson

    2018-01-01

    The purpose of this study was to develop test data needed to characterize lateral load performance of structural insulated panel (SIP) walls with full bearing (restrained). The research program involved structural testing of 29 full-size SIP walls (8 ft tall by 8 ft long) of various configurations that bracket a range of SIP wall configurations commonly used in the...

  16. A statistical study on seismo-ionospheric precursors in the total electron content of global ionosphere map associated with M×6.0 earthquakes in the West Pacific region during 1998-2012

    NASA Astrophysics Data System (ADS)

    Liu, Jann-Yenq; Chen, Koichi; Tsai, Ho-Fang; Hattori, Katsumi; Le, Huijun

    2013-04-01

    This paper reports statistical results of seismo-ionospheric precursors (SIPs) of the total electron content (TEC) in the global ionosphere map (GIM) over the epicenter of earthquakes with magnitude 6 and greater in China, Japan, and Taiwan during 1998-2012. To detect SIP, a quartile-based (i.e. median-based) process is performed. The earthquakes are sub-divided into various regions to have a better understanding on SIP characteristics, as well as examined with and without being led by magnetic storms to confirm the SIP existence. Results show that the SIPs mainly are the TEC significant increase in Japan, and decrease in Taiwan and China, respectively, which suggests the latitudinal effect playing an important role. Meanwhile, for a practical application of monitoring SIPs, the GIM TEC at a fixed point is tested. Results show that multi monitoring points and/or a spatial observation are required to enhance the SIP detection.

  17. A novel Smart Routing Protocol for remote health monitoring in Medical Wireless Networks.

    PubMed

    Sundararajan, T V P; Sumithra, M G; Maheswar, R

    2014-01-01

    In a Medical Wireless Network (MWN), sensors constantly monitor patient's physiological condition and movement. Inter-MWN communications are set up between the Patient Server and one or more Centralized Coordinators. However, MWNs require protocols with little energy consumption and the self-organizing attribute perceived in ad-hoc networks. The proposed Smart Routing Protocol (SRP) selects only the nodes with a higher residual energy and lower traffic density for routing. This approach enhances cooperation among the nodes of a Mobile Ad Hoc Network. Consequently, SRP produces better results than the existing protocols, namely Conditional Min-Max Battery Cost Routing, Min-Max Battery Cost Routing and AdHoc On-demand Distance Vector in terms of network parameters. The performance of the erstwhile schemes for routing protocols is evaluated using the network simulator Qualnet v 4.5.

  18. A methodology of SiP testing based on boundary scan

    NASA Astrophysics Data System (ADS)

    Qin, He; Quan, Haiyang; Han, Yifei; Zhu, Tianrui; Zheng, Tuo

    2017-10-01

    System in Package (SiP) play an important role in portable, aerospace and military electronic with the microminiaturization, light weight, high density, and high reliability. At present, SiP system test has encountered the problem on system complexity and malfunction location with the system scale exponentially increase. For SiP system, this paper proposed a testing methodology and testing process based on the boundary scan technology. Combining the character of SiP system and referencing the boundary scan theory of PCB circuit and embedded core test, the specific testing methodology and process has been proposed. The hardware requirement of the under test SiP system has been provided, and the hardware platform of the testing has been constructed. The testing methodology has the character of high test efficiency and accurate malfunction location.

  19. Requirements for a network storage service

    NASA Technical Reports Server (NTRS)

    Kelly, Suzanne M.; Haynes, Rena A.

    1992-01-01

    Sandia National Laboratories provides a high performance classified computer network as a core capability in support of its mission of nuclear weapons design and engineering, physical sciences research, and energy research and development. The network, locally known as the Internal Secure Network (ISN), was designed in 1989 and comprises multiple distributed local area networks (LAN's) residing in Albuquerque, New Mexico and Livermore, California. The TCP/IP protocol suite is used for inner-node communications. Scientific workstations and mid-range computers, running UNIX-based operating systems, compose most LAN's. One LAN, operated by the Sandia Corporate Computing Directorate, is a general purpose resource providing a supercomputer and a file server to the entire ISN. The current file server on the supercomputer LAN is an implementation of the Common File System (CFS) developed by Los Alamos National Laboratory. Subsequent to the design of the ISN, Sandia reviewed its mass storage requirements and chose to enter into a competitive procurement to replace the existing file server with one more adaptable to a UNIX/TCP/IP environment. The requirements study for the network was the starting point for the requirements study for the new file server. The file server is called the Network Storage Services (NSS) and is requirements are described in this paper. The next section gives an application or functional description of the NSS. The final section adds performance, capacity, and access constraints to the requirements.

  20. Intro and Recent Advances: Remote Data Access via OPeNDAP Web Services

    NASA Technical Reports Server (NTRS)

    Fulker, David

    2016-01-01

    During the upcoming Summer 2016 meeting of the ESIP Federation (July 19-22), OpenDAP will hold a Developers and Users Workshop. While a broad set of topics will be covered, a key focus is capitalizing on recent EOSDIS-sponsored advances in Hyrax, OPeNDAPs own software for server-side realization of the DAP2 and DAP4 protocols. These Hyrax advances are as important to data users as to data providers, and the workshop will include hands-on experiences of value to both. Specifically, a balanced set of presentations and hands-on tutorials will address advances in1.server installation,2.server configuration,3.Hyrax aggregation capabilities,4.support for data-access from clients that are HTTP-based, JSON-based or OGC-compliant (especially WCS and WMS),5.support for DAP4,6.use and extension of server-side computational capabilities, and7.several performance-affecting matters. Topics 2 through 7 will be relevant to data consumers, data providers and notably, due to the open-source nature of all OPeNDAP software to developers wishing to extend Hyrax, to build compatible clients and servers, and/or to employ Hyrax as middleware that enables interoperability across a variety of end-user and source-data contexts. A session for contributed talks will elaborate the topics listed above and embrace additional ones.

  1. Volume serving and media management in a networked, distributed client/server environment

    NASA Technical Reports Server (NTRS)

    Herring, Ralph H.; Tefend, Linda L.

    1993-01-01

    The E-Systems Modular Automated Storage System (EMASS) is a family of hierarchical mass storage systems providing complete storage/'file space' management. The EMASS volume server provides the flexibility to work with different clients (file servers), different platforms, and different archives with a 'mix and match' capability. The EMASS design considers all file management programs as clients of the volume server system. System storage capacities are tailored to customer needs ranging from small data centers to large central libraries serving multiple users simultaneously. All EMASS hardware is commercial off the shelf (COTS), selected to provide the performance and reliability needed in current and future mass storage solutions. All interfaces use standard commercial protocols and networks suitable to service multiple hosts. EMASS is designed to efficiently store and retrieve in excess of 10,000 terabytes of data. Current clients include CRAY's YMP Model E based Data Migration Facility (DMF), IBM's RS/6000 based Unitree, and CONVEX based EMASS File Server software. The VolSer software provides the capability to accept client or graphical user interface (GUI) commands from the operator's console and translate them to the commands needed to control any configured archive. The VolSer system offers advanced features to enhance media handling and particularly media mounting such as: automated media migration, preferred media placement, drive load leveling, registered MediaClass groupings, and drive pooling.

  2. An implementation of wireless medical image transmission system on mobile devices.

    PubMed

    Lee, SangBock; Lee, Taesoo; Jin, Gyehwan; Hong, Juhyun

    2008-12-01

    The advanced technology of computing system was followed by the rapid improvement of medical instrumentation and patient record management system. The typical examples are hospital information system (HIS) and picture archiving and communication system (PACS), which computerized the management procedure of medical records and images in hospital. Because these systems were built and used in hospitals, doctors out of hospital have problems to access them immediately on emergent cases. To solve these problems, this paper addressed the realization of system that could transmit the images acquired by medical imaging systems in hospital to the remote doctors' handheld PDA's using CDMA cellular phone network. The system consists of server and PDA. The server was developed to manage the accounts of doctors and patients and allocate the patient images to each doctor. The PDA was developed to display patient images through remote server connection. To authenticate the personal user, remote data access (RDA) method was used in PDA accessing the server database and file transfer protocol (FTP) was used to download patient images from the remove server. In laboratory experiments, it was calculated to take ninety seconds to transmit thirty images with 832 x 488 resolution and 24 bit depth and 0.37 Mb size. This result showed that the developed system has no problems for remote doctors to receive and review the patient images immediately on emergent cases.

  3. HDOCK: a web server for protein–protein and protein–DNA/RNA docking based on a hybrid strategy

    PubMed Central

    Yan, Yumeng; Zhang, Di; Zhou, Pei; Li, Botong

    2017-01-01

    Abstract Protein–protein and protein–DNA/RNA interactions play a fundamental role in a variety of biological processes. Determining the complex structures of these interactions is valuable, in which molecular docking has played an important role. To automatically make use of the binding information from the PDB in docking, here we have presented HDOCK, a novel web server of our hybrid docking algorithm of template-based modeling and free docking, in which cases with misleading templates can be rescued by the free docking protocol. The server supports protein–protein and protein–DNA/RNA docking and accepts both sequence and structure inputs for proteins. The docking process is fast and consumes about 10–20 min for a docking run. Tested on the cases with weakly homologous complexes of <30% sequence identity from five docking benchmarks, the HDOCK pipeline tied with template-based modeling on the protein–protein and protein–DNA benchmarks and performed better than template-based modeling on the three protein–RNA benchmarks when the top 10 predictions were considered. The performance of HDOCK became better when more predictions were considered. Combining the results of HDOCK and template-based modeling by ranking first of the template-based model further improved the predictive power of the server. The HDOCK web server is available at http://hdock.phys.hust.edu.cn/. PMID:28521030

  4. OceanNOMADS: A New Distribution Node for Operational Ocean Model Output

    NASA Astrophysics Data System (ADS)

    Cross, S.; Vance, T.; Breckenridge, T.

    2009-12-01

    The NOAA National Operational Model Archive and Distribution System (NOMADS) is a distributed, web-services based project providing real-time and retrospective access to climate and weather model data and related datasets. OceanNOMADS is a new NOMADS node dedicated to ocean model and related data, with an initial focus on operational ocean models from NOAA and the U.S. Navy. The node offers data access through a Thematic Real-time Environmental Distributed Data Services (THREDDS) server via the commonly used OPeNDAP protocol. The primary server is operated by the National Coastal Data Development Center and hosted by the Northern Gulf Institute at Stennis Space Center, MS. In cooperation with the National Marine Fisheries Service and Mississippi State University (MSU), a duplicate server is being installed at MSU with a 1-gigabit connection to the National Lambda Rail. This setup will allow us to begin to quantify the benefit of high-speed data connections to scientists needing remote access to these large datasets. Work is also underway on the next generation of services from OceanNOMADS, including user-requested server-side data reformatting, regridding, and aggregation, as well as tools for model-data comparison.

  5. Quality of service policy control in virtual private networks

    NASA Astrophysics Data System (ADS)

    Yu, Yiqing; Wang, Hongbin; Zhou, Zhi; Zhou, Dongru

    2004-04-01

    This paper studies the QoS of VPN in an environment where the public network prices connection-oriented services based on source, destination and grade of service, and advertises these prices to its VPN customers (users). As different QoS technologies can produce different QoS, there are according different traffic classification rules and priority rules. The internet service provider (ISP) may need to build complex mechanisms separately for each node. In order to reduce the burden of network configuration, we need to design policy control technologies. We considers mainly directory server, policy server, policy manager and policy enforcers. Policy decision point (PDP) decide its control according to policy rules. In network, policy enforce point (PEP) decide its network controlled unit. For InterServ and DiffServ, we will adopt different policy control methods as following: (1) In InterServ, traffic uses resource reservation protocol (RSVP) to guarantee the network resource. (2) In DiffServ, policy server controls the DiffServ code points and per hop behavior (PHB), its PDP distributes information to each network node. Policy server will function as following: information searching; decision mechanism; decision delivering; auto-configuration. In order to prove the effectiveness of QoS policy control, we make the corrective simulation.

  6. Louisiana SIP: LAC 33:III Ch. 14 Subchap A, 1401 to 1415--Determining Conformity of General Federal Actions to State or Federal Implementation Plans; SIP effective 1996-11-12 (LAc67) and 1998-05-08 (LAc75)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch. 14 Subchap A, 1401 to 1415--Determining Conformity of General Federal Actions to State or Federal Implementation Plans; SIP effective 1996-11-12 (LAc67) and 1998-05-08 (LAc75)

  7. 40 CFR 57.205 - Submission of supplementary information upon relaxation of an SO2 SIP emission limitation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... upon relaxation of an SO2 SIP emission limitation. 57.205 Section 57.205 Protection of Environment... Application and the NSO Process § 57.205 Submission of supplementary information upon relaxation of an SO2 SIP emission limitation. (a) In the event an SO2 SIP limit is relaxed subsequent to EPA approval or issuance of...

  8. Louisiana SIP: LAC 33:III Ch 21 Subchap J, 2147--Limiting Volatile Organic Compound (VOC) Emissions from Reactor Processes and Distillation Operations in Synthetic Organic Chemical manufacturing Industry (SOCMI); SIP effective 1998-02-02 (LAc74) to more..

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch 21 Subchap J, 2147--Limiting Volatile Organic Compound (VOC) Emissions from Reactor Processes and Distillation Operations in Synthetic Organic Chemical manufacturing Industry (SOCMI); SIP effective 1998-02-02 (LAc74) more...

  9. Louisiana SIP: LAC 33:III Ch 2147. Limiting Volatile Organic Compound (VOC) Emissions from Reactor Processes and Distillation Operations in Synthetic Organic Chemical manufacturing Industry (SOCMI); SIP effective 2011-08-04 (LAd34) to 2017-09-27

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch 2147. Limiting Volatile Organic Compound (VOC) Emissions from Reactor Processes and Distillation Operations in Synthetic Organic Chemical manufacturing Industry (SOCMI); SIP effective 2011-08-04 (LAd34) to 2017-09-27

  10. Should we care about diurnal temperatures when calculating the precipitation isotope thermometer?

    NASA Astrophysics Data System (ADS)

    Vachon, R.; Kloeckner, D.

    2008-12-01

    Long records of the concentrations of stable isotopes of precipitation (SIPs) have long been used as proxies for regional and global climates for periods when meteorological measurements were not made. SIPs' longstanding correlation to local surface temperatures (in many locations) and molecular thermal dynamics have lead to many interpretations of variability in SIPs to be changes in local temperatures. In order to create accurate temperature-SIP transfer functions one needs to link modern SIP concentrations to temperatures of when precipitation happened. A well-sited example of complexities in the temperature-SIP relationships - For simplicity one may assume that annual precipitation occurred at the same time of year throughout a long SIP archive, however, it is possible that the timing of precipitation actually shifted from summer to winter months. If the temperature difference between the seasons is large the SIP archive could be wrongly interpreted as a several degree cooling in average annual temperatures. Temperature changes similar in magnitude to seasonal fluctuations are also observed throughout a given day. What would happen if precipitation shifted from mid-afternoon to nighttime events? This line of thinking implies that diurnal effects plausibly should be considered when calculating SIP-transfer functions. This is particularly convincing when precipitation for a region is powered by middle of the day (summer) heat causing convective precipitation or evening cooling increasing relative humidities near the land's surface. This study examines both theoretical and observed (5 locations within North America) surface temperatures at the time of precipitation throughout a day and estimates diurnal effects on SIP-transfer functions. Ultimately, one must ask, how high does condensation form, and what are daily temperature patterns at those heights?

  11. NMR Model of PrgI-SipD Interaction and its Implications in the Needle-Tip Assembly of the Salmonella Type III Secretion System

    PubMed Central

    Rathinavelan, Thenmalarchelvi; Lara-Tejero, Maria; Lefebre, Matthew; Chatterjee, Srirupa; McShan, Andrew C.; Guo, Da-Chuan; Tang, Chun; Galan, Jorge E.; De Guzman, Roberto N.

    2014-01-01

    Salmonella and other pathogenic bacteria use the type III secretion system (T3SS) to inject virulence proteins into human cells to initiate infections. The structural component of the T3SS contains a needle and a needle tip. The needle is assembled from PrgI needle protomers and the needle tip is capped with several copies of the SipD tip protein. How a tip protein docks on the needle is unclear. A crystal structure of a PrgI-SipD fusion protein docked on the PrgI needle results in steric clash of SipD at the needle tip when modeled on the recent atomic structure of the needle. Thus, there is currently no good model of how SipD is docked on the PrgI needle tip. Previously, we showed by NMR paramagnetic relaxation enhancement (PRE) methods that a specific region in the SipD coiled-coil is the binding site for PrgI. Others have hypothesized that a domain of the tip protein – the N-terminal α-helical hairpin, has to swing away during the assembly of the needle apparatus. Here, we show by PRE methods that a truncated form of SipD lacking the α-helical hairpin domain binds more tightly to PrgI. Further, PRE-based structure calculations revealed multiple PrgI binding sites on the SipD coiled-coil. Our PRE results together with the recent NMR-derived atomic structure of the Salmonella needle suggest a possible model of how SipD might dock at the PrgI needle tip. SipD and PrgI are conserved in other bacterial T3SSs, thus our results have wider implication in understanding other needle-tip complexes. PMID:24951833

  12. Dimerization and phosphatase activity of calcyclin-binding protein/Siah-1 interacting protein: the influence of oxidative stress

    PubMed Central

    Topolska-Woś, Agnieszka M.; Shell, Steven M.; Kilańczyk, Ewa; Szczepanowski, Roman H.; Chazin, Walter J.; Filipek, Anna

    2015-01-01

    CacyBP/SIP [calcyclin-binding protein/Siah-1 [seven in absentia homolog 1 (Siah E3 ubiquitin protein ligase 1)] interacting protein] is a multifunctional protein whose activity includes acting as an ERK1/2 phosphatase. We analyzed dimerization of mouse CacyBP/SIP in vitro and in mouse neuroblastoma cell line (NB2a) cells, as well as the structure of a full-length protein. Moreover, we searched for the CacyBP/SIP domain important for dimerization and dephosphorylation of ERK2, and we analyzed the role of dimerization in ERK1/2 signaling in NB2a cells. Cell-based assays showed that CacyBP/SIP forms a homodimer in NB2a cell lysate, and biophysical methods demonstrated that CacyBP/SIP forms a stable dimer in vitro. Data obtained using small-angle X-ray scattering supported a model in which CacyBP/SIP occupies an anti-parallel orientation mediated by the N-terminal dimerization domain. Site-directed mutagenesis established that the N-terminal domain is indispensable for full phosphatase activity of CacyBP/SIP. We also demonstrated that the oligomerization state of CacyBP/SIP as well as the level of post-translational modifications and subcellular distribution of CacyBP/SIP change after activation of the ERK1/2 pathway in NB2a cells due to oxidative stress. Together, our results suggest that dimerization is important for controlling phosphatase activity of CacyBP/SIP and for regulating the ERK1/2 signaling pathway.—Topolska-Woś, A. M., Shell, S. M., Kilańczyk, E., Szczepanowski, R. H., Chazin, W. J., Filipek, A. Dimerization and phosphatase activity of calcyclin-binding protein/Siah-1 interacting protein: the influence of oxidative stress. PMID:25609429

  13. Reliability and Validity of the Alcohol Short Index of Problems and a Newly Constructed Drug Short Index of Problems*

    PubMed Central

    Alterman, Arthur I.; Cacciola, John S.; Ivey, Megan A.; Lynch, Kevin G.

    2009-01-01

    Objective: This study evaluated the psychometric properties of the 15-item alcohol Short Index of Problems (SIP) instrument and those of a newly constructed 15-item drug Short Index of Problems (SIP-D) instrument in 277 newly entered substance-abuse patients. Method: The SIP is derived from the longer, 50-item Drinker Inventory of Consequences (DrInC), which was designed to assess adverse consequences of alcohol use. The SIP-D was constructed by substituting the term “drug use” for the term “drinking” in each SIP item. A 3-month recall interval was employed. Results: Factor analyses of each of the instruments revealed similar solutions, with only one main factor accounting for the majority of variance. Nonparametric item response theory methods produced the same finding. Internal consistency reliability estimates for the SIP and SIP-D total scores were .98 and .97, respectively. Concurrent validity was demonstrated by examining the correlations of the total scores for each of the instruments with the recent summary indexes of the newly revised Addiction Severity Index (ASI-Version 6): alcohol, drug, medical, economic, legal, family/social, and psychiatric problems. Conclusions: This study is the first to confirm the psychometric validity of the SIP when used as an independent instrument unembedded within the DrInC. The study also supports the use of the SIP-D as a brief measure of adverse consequences of drug use. The findings strongly support the unidimensional structure of both measures. PMID:19261243

  14. Reliability and validity of the alcohol short index of problems and a newly constructed drug short index of problems.

    PubMed

    Alterman, Arthur I; Cacciola, John S; Ivey, Megan A; Habing, Brian; Lynch, Kevin G

    2009-03-01

    This study evaluated the psychometric properties of the 15-item alcohol Short Index of Problems (SIP) instrument and those of a newly constructed 15-item drug Short Index of Problems (SIP-D) instrument in 277 newly entered substance-abuse patients. The SIP is derived from the longer, 50-item Drinker Inventory of Consequences (DrInC), which was designed to assess adverse consequences of alcohol use. The SIP-D was constructed by substituting the term "drug use" for the term "drinking" in each SIP item. A 3-month recall interval was employed. Factor analyses of each of the instruments revealed similar solutions, with only one main factor accounting for the majority of variance. Nonparametric item response theory methods produced the same finding. Internal consistency reliability estimates for the SIP and SIP-D total scores were .98 and .97, respectively. Concurrent validity was demonstrated by examining the correlations of the total scores for each of the instruments with the recent summary indexes of the newly revised Addiction Severity Index (ASI-Version 6): alcohol, drug, medical, economic, legal, family/social, and psychiatric problems. This study is the first to confirm the psychometric validity of the SIP when used as an independent instrument unembedded within the DrInC. The study also supports the use of the SIP-D as a brief measure of adverse consequences of drug use. The findings strongly support the unidimensional structure of both measures.

  15. The small serine-threonine protein SIP2 interacts with STE12 and is involved in ascospore germination in Sordaria macrospora.

    PubMed

    Elleuche, Skander; Bernhards, Yasmine; Schäfers, Christian; Varghese, Jans Manjali; Nolting, Nicole; Pöggeler, Stefanie

    2010-12-01

    In fungi, the homoeodomain protein STE12 controls diverse developmental processes, and derives its regulatory specificity from different protein interactions. We recently showed that in the homothallic ascomycete Sordaria macrospora, STE12 is essential for ascospore development, and is able to interact with the alpha-domain mating-type protein SMTA-1 and the MADS box protein MCM1. To further evaluate the functional roles of STE12, we used the yeast two-hybrid approach to identify new STE12-interacting partners. Using STE12 as bait, a small, serine-threonine-rich protein (designated STE12-interacting protein 2, SIP2) was identified. SIP2 is conserved among members of the fungal class Sordariomycetes. In vivo localization studies revealed that SIP2 was targeted to the nucleus and cytoplasm. The STE12/SIP2 interaction was further confirmed in vivo by bimolecular fluorescence complementation. Nuclear localization of SIP2 was apparently mediated by STE12. Unlike deletion of ste12, deletion of sip2 in S. macrospora led to only a slight decrease in ascospore germination, and no other obvious morphological phenotype. In comparison to the Δste12 single knockout strain, ascospore germination was significantly increased in a Δsip2/ste12 double knockout strain. Our data provide evidence for a regulatory role of the novel fungal protein SIP2 in ascospore germination. Copyright © 2010 Elsevier GmbH. All rights reserved.

  16. Interactive MPEG-4 low-bit-rate speech/audio transmission over the Internet

    NASA Astrophysics Data System (ADS)

    Liu, Fang; Kim, JongWon; Kuo, C.-C. Jay

    1999-11-01

    The recently developed MPEG-4 technology enables the coding and transmission of natural and synthetic audio-visual data in the form of objects. In an effort to extend the object-based functionality of MPEG-4 to real-time Internet applications, architectural prototypes of multiplex layer and transport layer tailored for transmission of MPEG-4 data over IP are under debate among Internet Engineering Task Force (IETF), and MPEG-4 systems Ad Hoc group. In this paper, we present an architecture for interactive MPEG-4 speech/audio transmission system over the Internet. It utilities a framework of Real Time Streaming Protocol (RTSP) over Real-time Transport Protocol (RTP) to provide controlled, on-demand delivery of real time speech/audio data. Based on a client-server model, a couple of low bit-rate bit streams (real-time speech/audio, pre- encoded speech/audio) are multiplexed and transmitted via a single RTP channel to the receiver. The MPEG-4 Scene Description (SD) and Object Descriptor (OD) bit streams are securely sent through the RTSP control channel. Upon receiving, an initial MPEG-4 audio- visual scene is constructed after de-multiplexing, decoding of bit streams, and scene composition. A receiver is allowed to manipulate the initial audio-visual scene presentation locally, or interactively arrange scene changes by sending requests to the server. A server may also choose to update the client with new streams and list of contents for user selection.

  17. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  18. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  19. "WWW.MDTF.ORG": a World Wide Web forum for developing open-architecture, freely distributed, digital teaching file software by participant consensus.

    PubMed

    Katzman, G L; Morris, D; Lauman, J; Cochella, C; Goede, P; Harnsberger, H R

    2001-06-01

    To foster a community supported evaluation processes for open-source digital teaching file (DTF) development and maintenance. The mechanisms used to support this process will include standard web browsers, web servers, forum software, and custom additions to the forum software to potentially enable a mediated voting protocol. The web server will also serve as a focal point for beta and release software distribution, which is the desired end-goal of this process. We foresee that www.mdtf.org will provide for widespread distribution of open source DTF software that will include function and interface design decisions from community participation on the website forums.

  20. Louisiana SIP: LAC 33:III Ch. 7 Section 701. Purpose and Information Regarding Standards for PM10, SO2, CO, Atmospheric Oxidants, NOx and Pb; SIP effective 1989-05-08 (LAc49) to 2011-08-03 (LAd34 - Revised)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch. 7 Section 701. Purpose and Information Regarding Standards for PM10, SO2, CO, Atmospheric Oxidants, NOx and Pb; SIP effective 1989-05-08 (LAc49) to 2011-08-03 (LAd34 - Revised)

  1. 40 CFR 51.125 - Emissions reporting requirements for SIP revisions relating to budgets for SO2 and NOX emissions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SIP revisions relating to budgets for SO2 and NOX emissions. 51.125 Section 51.125 Protection of... SIP revisions relating to budgets for SO2 and NOX emissions. (a) For its transport SIP revision under § 51.123 and/or 51.124, each State must submit to EPA SO2 and/or NOX emissions data as described in...

  2. Louisiana SIP: LAC 33:III Ch 2132. Stage II Vapor Recovery Systems for Control of Vehicle Refuelling Emissions at Gasoline Dispensing Facilities; SIP effective 2011-08-04 (LAd34) and 2016-02-29 (LAd47) to 2017-09-27

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch 2132. Stage II Vapor Recovery Systems for Control of Vehicle Refuelling Emissions at Gasoline Dispensing Facilities; SIP effective 2011-08-04 (LAd34) and 2016-02-29 (LAd47) to 2017-09-27

  3. Controlled mutual quantum entity authentication with an untrusted third party

    NASA Astrophysics Data System (ADS)

    Kang, Min-Sung; Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Han, Sang-Wook; Moon, Sung

    2018-07-01

    We propose a quantum control entity mutual authentication protocol that can be executed in environments involving an untrusted third party. In general, the third party, referred to as Charlie, can be an entity such as a telephone company, server, financial company, or login webpage for a portal service. Most communication protocols controlled by third parties are vulnerable to internal attacks. In this study, we present two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.

  4. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  5. Finite-data-size study on practical universal blind quantum computation

    NASA Astrophysics Data System (ADS)

    Zhao, Qiang; Li, Qiong

    2018-07-01

    The universal blind quantum computation with weak coherent pulses protocol is a practical scheme to allow a client to delegate a computation to a remote server while the computation hidden. However, in the practical protocol, a finite data size will influence the preparation efficiency in the remote blind qubit state preparation (RBSP). In this paper, a modified RBSP protocol with two decoy states is studied in the finite data size. The issue of its statistical fluctuations is analyzed thoroughly. The theoretical analysis and simulation results show that two-decoy-state case with statistical fluctuation is closer to the asymptotic case than the one-decoy-state case with statistical fluctuation. Particularly, the two-decoy-state protocol can achieve a longer communication distance than the one-decoy-state case in this statistical fluctuation situation.

  6. Role of the pituitary-adrenal hormones in the acquisition of schedule-induced polydipsia.

    PubMed

    Levine, R; Levine, S

    1989-06-01

    Adrenalectomized female rats failed to develop schedule-induced polydipsia (SIP). Dexamethasone (DEX) injections failed to reinstate SIP in adrenalectomized rats. They did not prevent intact rats from acquiring SIP but interfered with subsequent expression of this behavior. In contrast, corticosterone, the rats' normally occurring glucocorticoid, fully restored the acquisition and subsequent expression of SIP in adrenalectomized rats. This strongly suggests that corticosterone plays an essential role in the normal acquisition and development of this behavior. Data are interpreted in the context of current information concerning adrenal hormone receptors. It is hypothesized SIP acquisition is at least partly regulated by the Type I (mineralocorticoid) receptor.

  7. Streamlining the SIP Process

    EPA Pesticide Factsheets

    EPA collaborated with the The National Association of Clean Air Agencies (NACAA/ECOs) SIP Reform Work Group to minimize federal and state burden in developing SIPs, but ensure the plans effectiveness in complying with the Clean Air Act.

  8. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  9. PERP, a host tetraspanning membrane protein, is required for S almonella‐induced inflammation

    PubMed Central

    Hallstrom, Kelly N.; Srikanth, C. V.; Agbor, Terence A.; Dumont, Christopher M.; Peters, Kristen N.; Paraoan, Luminita; Casanova, James E.; Boll, Erik J.

    2015-01-01

    Summary S almonella enterica  Typhimurium induces intestinal inflammation through the activity of type III secreted effector (T3SE) proteins. Our prior results indicate that the secretion of the T3SE SipA and the ability of SipA to induce epithelial cell responses that lead to induction of polymorphonuclear transepithelial migration are not coupled to its direct delivery into epithelial cells from S almonella. We therefore tested the hypothesis that SipA interacts with a membrane protein located at the apical surface of intestinal epithelial cells. Employing a split ubiquitin yeast‐two‐hybrid screen, we identified the tetraspanning membrane protein, p53 effector related to PMP‐22 (PERP), as a SipA binding partner. SipA and PERP appear to have intersecting activities as we found PERP to be involved in proinflammatory pathways shown to be regulated by SipA. In sum, our studies reveal a critical role for PERP in the pathogenesis of S. Typhimurium, and for the first time demonstrate that SipA, a T3SE protein, can engage a host protein at the epithelial surface. PMID:25486861

  10. 76 FR 48002 - Approval and Promulgation of Air Quality Implementation Plans; State of California; Interstate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-08

    ...EPA is finalizing a limited approval and limited disapproval of a state implementation plan (SIP) revision submitted by the State of California on November 17, 2007, to address the ``transport SIP'' provisions of Clean Air Act (CAA) section 110(a)(2)(D)(i) for the 1997 8-hour ozone National Ambient Air Quality Standards (NAAQS or standards) and the 1997 fine particulate matter (PM2.5) NAAQS. Section 110(a)(2)(D)(i) of the CAA requires that each SIP contain, among other things, adequate measures prohibiting emissions of air pollutants in amounts which will interfere with any other State's measures required under title I, part C of the CAA to prevent significant deterioration of air quality. EPA is approving California's SIP revision with respect to those Districts that implement SIP- approved permit programs meeting the approval criteria and simultaneously disapproving California's SIP revision with respect to those Districts that do not implement SIP-approved permit programs meeting the approval criteria, as discussed in our May 31, 2011 proposed rule (76 FR 31263).

  11. The development of a purification procedure for saxitoxin-induced protein.

    PubMed

    Smith, D S; Kitts, D D; Fenske, B; Owen, T G; Shyng, S

    1995-02-01

    A simple economical procedure for purifying saxitoxin-induced protein (SIP) from crude extracts of the small shore crab, Hemigrapsus oregenesis, was developed. (NH4)2SO4 precipitation, chymotrypsin digestion, heat treatment, gel filtration and ion-exchange-chromatography procedures were evaluated in purifying SIP. An enzyme immunoassay was used to determine the SIP yield and relative purity at each step of three procedures, thus permitting an assessment of the conditions required for maximum recovery. Response surface analysis was used in an attempt to determine the optimum temperature and exposure time for the heat treatment. A 20 min incubation at 65 degrees C was confirmed by electrophoretic analysis to be the best combination of time and temperature for achieving both an acceptable yield and purity of SIP. SIP in desalted concentrate was shown to be resistant to chymotrypsin proteolysis; however, this enzyme had deleterious effects on SIP purification at later stages of the procedure. The omission of the chymotrypsin digestion, and the inclusion of gel-filtration chromatography in the final clean-up step, resulted in the purification of SIP comparable with that achieved with affinity chromatography.

  12. Chapter 20: Data Center IT Efficiency Measures Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Huang, Robert; Masanet, Eric

    This chapter focuses on IT measures in the data center and examines the techniques and analysis methods used to verify savings that result from improving the efficiency of two specific pieces of IT equipment: servers and data storage.

  13. Malware Mimics for Network Security Assessment

    DTIC Science & Technology

    2011-03-01

    Master’s Thesis 4 . TITLE AND SUBTITLE Malware Mimics for Network Security Assessment 6. AUTHOR(S) Taff, William R and Salevski, Paul M. 5...Communication Protocol .......................41 viii 4 . Graphical User Interface for MM-Server .......43 C. BUILDING THE TEST PLATFORM...Extension ...............71 2. More Advanced Modules ........................72 3. Increase Scale of Test Bed ...................73 4 . Security

  14. One Server Fits All

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    The benefits of deploying a communications system that runs over the Internet Protocol are well documented. Sending voice over the Internet, a process commonly known as VoIP, has been shown to save money on long distance calls, make voice mail more accessible, and enable users to answer their phones from anywhere. The technology also makes adding…

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perry, Marcia

    The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who is online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination.more » Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and that this user is authorized to ain access to the IRCD.« less

  16. DICOM-compliant PACS with CD-based image archival

    NASA Astrophysics Data System (ADS)

    Cox, Robert D.; Henri, Christopher J.; Rubin, Richard K.; Bret, Patrice M.

    1998-07-01

    This paper describes the design and implementation of a low- cost PACS conforming to the DICOM 3.0 standard. The goal was to provide an efficient image archival and management solution on a heterogeneous hospital network as a basis for filmless radiology. The system follows a distributed, client/server model and was implemented at a fraction of the cost of a commercial PACS. It provides reliable archiving on recordable CD and allows access to digital images throughout the hospital and on the Internet. Dedicated servers have been designed for short-term storage, CD-based archival, data retrieval and remote data access or teleradiology. The short-term storage devices provide DICOM storage and query/retrieve services to scanners and workstations and approximately twelve weeks of 'on-line' image data. The CD-based archival and data retrieval processes are fully automated with the exception of CD loading and unloading. The system employs lossless compression on both short- and long-term storage devices. All servers communicate via the DICOM protocol in conjunction with both local and 'master' SQL-patient databases. Records are transferred from the local to the master database independently, ensuring that storage devices will still function if the master database server cannot be reached. The system features rules-based work-flow management and WWW servers to provide multi-platform remote data access. The WWW server system is distributed on the storage, retrieval and teleradiology servers allowing viewing of locally stored image data directly in a WWW browser without the need for data transfer to a central WWW server. An independent system monitors disk usage, processes, network and CPU load on each server and reports errors to the image management team via email. The PACS was implemented using a combination of off-the-shelf hardware, freely available software and applications developed in-house. The system has enabled filmless operation in CT, MR and ultrasound within the radiology department and throughout the hospital. The use of WWW technology has enabled the development of an intuitive we- based teleradiology and image management solution that provides complete access to image data.

  17. Design and implementation of a cloud based lithography illumination pupil processing application

    NASA Astrophysics Data System (ADS)

    Zhang, Youbao; Ma, Xinghua; Zhu, Jing; Zhang, Fang; Huang, Huijie

    2017-02-01

    Pupil parameters are important parameters to evaluate the quality of lithography illumination system. In this paper, a cloud based full-featured pupil processing application is implemented. A web browser is used for the UI (User Interface), the websocket protocol and JSON format are used for the communication between the client and the server, and the computing part is implemented in the server side, where the application integrated a variety of high quality professional libraries, such as image processing libraries libvips and ImageMagic, automatic reporting system latex, etc., to support the program. The cloud based framework takes advantage of server's superior computing power and rich software collections, and the program could run anywhere there is a modern browser due to its web UI design. Compared to the traditional way of software operation model: purchased, licensed, shipped, downloaded, installed, maintained, and upgraded, the new cloud based approach, which is no installation, easy to use and maintenance, opens up a new way. Cloud based application probably is the future of the software development.

  18. Application of wireless networks-peer-to-peer information sharing

    NASA Astrophysics Data System (ADS)

    ellappan, Vijayan; chaki, suchismita; kumar, avn

    2017-11-01

    Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.

  19. Site-specific chemical modification of antibody fragments using traceless cleavable linkers.

    PubMed

    Bernardes, Gonçalo J L; Steiner, Martina; Hartmann, Isabelle; Neri, Dario; Casi, Giulio

    2013-11-01

    Antibody-drug conjugates (ADCs) are promising agents for the selective delivery of cytotoxic drugs to specific cells (for example, tumors). In this protocol, we describe two strategies for the precise modification at engineered C- or N-terminal cysteines of antibodies in IgG, diabody and small immunoprotein (SIP) formats that yield homogenous ADCs. In this protocol, cemadotin derivatives are used as model drugs, as these agents have a potent cytotoxic activity and are easy to synthesize. However, other drugs with similar functional groups could be considered. In the first approach, a cemadotin derivative containing a sulfhydryl group results in a mixed disulfide linkage. In the second approach, a cemadotin derivative containing an aldehyde group is joined via a thiazolidine linkage. The procedures outlined are robust, enabling the preparation of ADCs with a defined number of drugs per antibody in a time frame between 7 and 24 h.

  20. Interactive real-time media streaming with reliable communication

    NASA Astrophysics Data System (ADS)

    Pan, Xunyu; Free, Kevin M.

    2014-02-01

    Streaming media is a recent technique for delivering multimedia information from a source provider to an end- user over the Internet. The major advantage of this technique is that the media player can start playing a multimedia file even before the entire file is transmitted. Most streaming media applications are currently implemented based on the client-server architecture, where a server system hosts the media file and a client system connects to this server system to download the file. Although the client-server architecture is successful in many situations, it may not be ideal to rely on such a system to provide the streaming service as users may be required to register an account using personal information in order to use the service. This is troublesome if a user wishes to watch a movie simultaneously while interacting with a friend in another part of the world over the Internet. In this paper, we describe a new real-time media streaming application implemented on a peer-to-peer (P2P) architecture in order to overcome these challenges within a mobile environment. When using the peer-to-peer architecture, streaming media is shared directly between end-users, called peers, with minimal or no reliance on a dedicated server. Based on the proposed software pɛvμa (pronounced [revma]), named for the Greek word meaning stream, we can host a media file on any computer and directly stream it to a connected partner. To accomplish this, pɛvμa utilizes the Microsoft .NET Framework and Windows Presentation Framework, which are widely available on various types of windows-compatible personal computers and mobile devices. With specially designed multi-threaded algorithms, the application can stream HD video at speeds upwards of 20 Mbps using the User Datagram Protocol (UDP). Streaming and playback are handled using synchronized threads that communicate with one another once a connection is established. Alteration of playback, such as pausing playback or tracking to a different spot in the media file, will be reflected in all media streams. These techniques are designed to allow users at different locations to simultaneously view a full length HD video and interactively control the media streaming session. To create a sustainable media stream with high quality, our system supports UDP packet loss recovery at high transmission speed using custom File- Buffers. Traditional real-time streaming protocols such as Real-time Transport Protocol/RTP Control Protocol (RTP/RTCP) provide no such error recovery mechanism. Finally, the system also features an Instant Messenger that allows users to perform social interactions with one another while they enjoy a media file. The ultimate goal of the application is to offer users a hassle free way to watch a media file over long distances without having to upload any personal information into a third party database. Moreover, the users can communicate with each other and stream media directly from one mobile device to another while maintaining an independence from traditional sign up required by most streaming services.

  1. Guidance on Streamlining the SIP Process

    EPA Pesticide Factsheets

    EPA collaborated with the The National Association of Clean Air Agencies (NACAA/ECOs) SIP Reform Work Group to minimize federal and state burden in developing SIPs, but ensure the plans effectiveness in complying with the Clean Air Act.

  2. 40 CFR 52.146 - Particulate matter (PM-10) Group II SIP commitments.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... submitted a revision to the State Implementation Plan (SIP) for Casa Grande, Show Low, Safford, Flagstaff... Implementation Plan (SIP) requirements for Casa Grande, Show Low, Safford, Flagstaff and Joseph City as provided...

  3. Infrastructure SIP Requirements and Guidance

    EPA Pesticide Factsheets

    The Clean Air Act requires states to submit SIPs that implement, maintain, and enforce a new or revised national ambient air quality standard (NAAQS) within 3 years of EPA issuing the standard. The Infrastructure SIP is required for all states.

  4. Thermal Control of the Scientific Instrument Package in the Large Space Telescope

    NASA Technical Reports Server (NTRS)

    Hawks, K. H.

    1972-01-01

    The general thermal control system philosophy was to utilize passive control where feasible and to utilize active methods only where required for more accurate thermal control of the SIP components with narrow temperature tolerances. A thermal model of the SIP and a concept for cooling the SIP cameras are presented. The model and cooling concept have established a rationale for determining a Phase A baseline for SIP thermal control.

  5. Computer program for nonlinear static stress analysis of shuttle thermal protection system: User's manual

    NASA Technical Reports Server (NTRS)

    Giles, G. L.; Wallas, M.

    1981-01-01

    User documentation is presented for a computer program which considers the nonlinear properties of the strain isolator pad (SIP) in the static stress analysis of the shuttle thermal protection system. This program is generalized to handle an arbitrary SIP footprint including cutouts for instrumentation and filler bar. Multiple SIP surfaces are defined to model tiles in unique locations such as leading edges, intersections, and penetrations. The nonlinearity of the SIP is characterized by experimental stress displacement data for both normal and shear behavior. Stresses in the SIP are calculated using a Newton iteration procedure to determine the six rigid body displacements of the tile which develop reaction forces in the SIP to equilibrate the externally applied loads. This user documentation gives an overview of the analysis capabilities, a detailed description of required input data and an example to illustrate use of the program.

  6. 77 FR 27162 - Notice of Data Availability Supporting Approval and Promulgation of Air Quality Implementation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-09

    ...EPA proposed on April 25, 2012 (77 FR 24794) to take action on a revision to the state implementation plan (SIP) addressing regional haze submitted by the State of New York. In that proposal, EPA proposed to address through a Federal Implementation Plan (FIP) certain requirements not addressed in New York's regional haze SIP submission or, alternatively, to approve a substantively identical SIP revision by New York, should the State timely submit such a revision. In two letters dated April 16, 2012, New York submitted additional materials relevant to our proposed action on its regional haze SIP submission, including proposed SIP revisions addressing the requirements for best available retrofit technology controls (BART) for a number of sources. EPA is providing notice of availability of these materials. The comment period on EPA's proposed action on the New York regional haze SIP closes on June 18, 2010.

  7. Transient improvement after brief antiepileptic drug withdrawal in the epilepsy monitoring unit--possible relationship to AED tolerance.

    PubMed

    Azar, Nabil J; Lagrange, Andre H; Wang, Lily; Song, Yanna; Abou-Khalil, Bassel W

    2010-05-01

    A drug holiday seems to produce seizure interval prolongation (SIP) after reinstitution of antiepileptic drugs (AEDs). This effect was demonstrated mainly with carbamazepine. We evaluated SIP with newer AEDs and tested the relationship of SIP to history of AED tolerance. We prospectively studied patients with refractory epilepsy admitted to the Vanderbilt epilepsy monitoring unit (EMU) over a period of 12 months. We included only patients on levetiracetam, lamotrigine, or oxcarbazepine who had their AEDs withdrawn on admission and reinstituted without change upon discharge. We defined SIP as the interval from EMU discharge to first seizure minus the interval between the last two seizures before EMU admission. A total of 43 patients completed the study; 15 were on monotherapy. SIP was greater than zero in this patient group (p < 0.0001), with a mean prolongation of 19.4 +/- 28.0 days. The average SIP was higher (p = 0.01) in patients on monotherapy (29.7 +/- 23.8 days) than patients on polytherapy (13.9 +/- 29.0 days). SIP tended to be greater in patients with a prior history of AED tolerance (25.7 +/- 36.8 days) compared to patient with no prior history of AED tolerance (14.0 +/- 16.3 days). SIP does occur after brief AED withdrawal. This effect is greater in patients on monotherapy and tends to be larger in patients with a history of AED tolerance. The SIP effect may be related to the phenomenon of tolerance, clinically seen as resistance to AED therapeutic effect.

  8. Do we act upon what we see? Direct effects of alcohol cues in movies on young adults' alcohol drinking.

    PubMed

    Koordeman, Renske; Kuntsche, Emmanuel; Anschutz, Doeschka J; van Baaren, Rick B; Engels, Rutger C M E

    2011-01-01

    Ample survey research has shown that alcohol portrayals in movies affect the development of alcohol consumption in youth. Hence, there is preliminary evidence that alcohol portrayals in movies also directly influence viewers' drinking of alcohol while watching movies. One process that might account for these direct effects is imitation. The present study therefore examined whether young people imitate actors sipping alcohol on screen. We observed sipping behaviours of 79 young adults (ages 18-25) watching a 60-min movie clip, 'What Happens in Vegas', in a semi-naturalistic home setting. Each of the 79 participants was exposed to 25 alcohol cues. Two-level logistic regression analyses were used to analyse whether participants in general imitated actors' sipping during this clip. In addition, we applied proportional hazard models in a survival analysis framework (Cox regression) to test whether there was a difference in imitation of the cues between male and female participants, and to test whether the timing of the actors' sipping throughout the movie played a role. The findings showed that participants were more likely to sip in accordance with the actors' sipping than without such a cue. Further, we found that men were more likely to imitate actors' sipping than females and that participants tended to respond to actors' sipping at the beginning of the movie rather than at the end. Exposure to actors sipping alcohol in a movie seems to have an immediate impact on the drinking behaviour of viewers, via the mechanism of imitation.

  9. 76 FR 28437 - Disease, Disability, and Injury Prevention and Control Special Interest Project (SIP): Initial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... announced below concerns ``Validation of Self-Reported Sleep Surveillance Measures, SIP11-047, Panel E..., discussion, and evaluation of ``Validation of Self-Reported Sleep Surveillance Measures, SIP11-047, Panel E...

  10. Enhanced service zone architecture for multiservices over IP

    NASA Astrophysics Data System (ADS)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  11. Louisiana SIP: LAC 33:III Ch 23 Subchap B, §2303--Aluminum Plants, §2303 Standards for Horizontal Stud Soderberg Primary Aluminum Plants and Prebake Primary Aluminum Plants; SIP effective 1989-05-08 (LAc49) to 2011-08-03 (LAad34 - Revised)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch 23 Subchap B, §2303--Aluminum Plants, §2303 Standards for Horizontal Stud Soderberg Primary Aluminum Plants and Prebake Primary Aluminum Plants; SIP effective 1989-05-08 (LAc49) to 2011-08-03 (LAad34 - Revised)

  12. SipA Activation of Caspase-3 Is a Decisive Mediator of Host Cell Survival at Early Stages of Salmonella enterica Serovar Typhimurium Infection

    PubMed Central

    McIntosh, Anne; Meikle, Lynsey M.; Ormsby, Michael J.; McCormick, Beth A.; Christie, John M.; Brewer, James M.; Roberts, Mark

    2017-01-01

    ABSTRACT Salmonella invasion protein A (SipA) is a dual-function effector protein that plays roles in both actin polymerization and caspase-3 activation in intestinal epithelial cells. To date its function in other cell types has remained largely unknown despite its expression in multiple cell types and its extracellular secretion during infection. Here we show that in macrophages SipA induces increased caspase-3 activation early in infection. This activation required a threshold level of SipA linked to multiplicity of infection and may be a limiting factor controlling bacterial numbers in infected macrophages. In polymorphonuclear leukocytes, SipA or other Salmonella pathogenicity island 1 effectors had no effect on induction of caspase-3 activation either alone or in the presence of whole bacteria. Tagging of SipA with the small fluorescent phiLOV tag, which can pass through the type three secretion system, allowed visualization and quantification of caspase-3 activation by SipA-phiLOV in macrophages. Additionally, SipA-phiLOV activation of caspase-3 could be tracked in the intestine through multiphoton laser scanning microscopy in an ex vivo intestinal model. This allowed visualization of areas where the intestinal epithelium had been compromised and demonstrated the potential use of this fluorescent tag for in vivo tracking of individual effectors. PMID:28630067

  13. OPeNDAP servers like Hyrax and TDS can easily support common single-sign-on authentication protocols using the Apache httpd and related software; adding support for these protocols to clients can be more challenging

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Potter, N.; Evans, B. J. K.

    2016-12-01

    OPeNDAP, in conjunction with the Australian National University, documented the installation process needed to add authentication to OPeNDAP-enabled data servers (Hyrax, TDS, etc.) and examined 13 OPeNDAP clients to determine how best to add authentication using LDAP, Shibboleth and OAuth2 (we used NASA's URS). We settled on a server configuration (architecture) that uses the Apache web server and a collection of open-source modules to perform the authentication and authorization actions. This is not the only way to accomplish those goals, but using Apache represents a good balance between functionality, leveraging existing work that has been well vetted and includes support for a wide variety of web services, include those that depend on a servlet engine such as tomcat (which both Hyrax and TDS do). Or work shows how LDAP, OAuth2 and Shibboleth can all be accommodated using this readily available software stack. Also important is that the Apache software is very widely used and is fairly robust - extremely important for security software components. In order to make use of a server requiring authentication, clients must support the authentication process. Because HTTP has included authentication for well over a decade, and because HTTP/HTTPS can be used by simply linking programs with a library, both the LDAP and OAuth2/URS authentication schemes have almost universal support within the OPeNDAP client base. The clients, i.e. the HTTP client libraries they employ, understand how to submit the credentials to the correct server when confronted by an HTTP/S Unauthorized (401) response. Interestingly OAuth2 can achieve it's SSO objectives while relying entirely on normative HTTP transport. All 13 of the clients examined worked.The situation with Shibboleth is different. While Shibboleth does use HTTP, it also requires the client to either scrape a web page or support the SAML2.0 ECP profile, which, for programmatic clients, means using SOAP messages. Since working with SOAP is outside the scope of HTTP, support for Shibboleth must be added explicitly into the client software. Some of the potential burden of enabling OPeNDAP clients to work with Shibboleth may be mitigated by getting both NetCDF-C and NetCDF-Java libraries to use the Shibboleth ECP profile. If done, this would get 9 of the 13 clients we examined working.

  14. Evaluating the effectiveness of the Safety Investment Program (SIP) policies for Oregon.

    DOT National Transportation Integrated Search

    2009-10-01

    The Safety Investment Program (SIP) was originally called the Statewide Transportation Improvement Program - : Safety Investment Program (STIP-SIP). The concept of the program was first discussed in October 1997 and the : program was adopted by the O...

  15. Infrastructure State Implementation Plan (SIP) Requirements and Guidance

    EPA Pesticide Factsheets

    The Clean Air Act requires states to submit SIPs that implement, maintain, and enforce a new or revised national ambient air quality standard (NAAQS) within 3 years of EPA issuing the standard. The Infrastructure SIP is required for all states.

  16. mREST Interface Specification

    NASA Technical Reports Server (NTRS)

    McCartney, Patrick; MacLean, John

    2012-01-01

    mREST is an implementation of the REST architecture specific to the management and sharing of data in a system of logical elements. The purpose of this document is to clearly define the mREST interface protocol. The interface protocol covers all of the interaction between mREST clients and mREST servers. System-level requirements are not specifically addressed. In an mREST system, there are typically some backend interfaces between a Logical System Element (LSE) and the associated hardware/software system. For example, a network camera LSE would have a backend interface to the camera itself. These interfaces are specific to each type of LSE and are not covered in this document. There are also frontend interfaces that may exist in certain mREST manager applications. For example, an electronic procedure execution application may have a specialized interface for configuring the procedures. This interface would be application specific and outside of this document scope. mREST is intended to be a generic protocol which can be used in a wide variety of applications. A few scenarios are discussed to provide additional clarity but, in general, application-specific implementations of mREST are not specifically addressed. In short, this document is intended to provide all of the information necessary for an application developer to create mREST interface agents. This includes both mREST clients (mREST manager applications) and mREST servers (logical system elements, or LSEs).

  17. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  18. Spectral Induced Polarization approaches to characterize reactive transport parameters and processes

    NASA Astrophysics Data System (ADS)

    Schmutz, M.; Franceschi, M.; Revil, A.; Peruzzo, L.; Maury, T.; Vaudelet, P.; Ghorbani, A.; Hubbard, S. S.

    2017-12-01

    For almost a decade, geophysical methods have explored the potential for characterization of reactive transport parameters and processes relevant to hydrogeology, contaminant remediation, and oil and gas applications. Spectral Induced Polarization (SIP) methods show particular promise in this endeavour, given the sensitivity of the SIP signature to geological material electrical double layer properties and the critical role of the electrical double layer on reactive transport processes, such as adsorption. In this presentation, we discuss results from several recent studies that have been performed to quantify the value of SIP parameters for characterizing reactive transport parameters. The advances have been realized through performing experimental studies and interpreting their responses using theoretical and numerical approaches. We describe a series of controlled experimental studies that have been performed to quantify the SIP responses to variations in grain size and specific surface area, pore fluid geochemistry, and other factors. We also model chemical reactions at the interface fluid/matrix linked to part of our experimental data set. For some examples, both geochemical modelling and measurements are integrated into a SIP physico-chemical based model. Our studies indicate both the potential of and the opportunity for using SIP to estimate reactive transport parameters. In case of well sorted granulometry of the samples, we find that the grain size characterization (as well as the permeabililty for some specific examples) value can be estimated using SIP. We show that SIP is sensitive to physico-chemical conditions at the fluid/mineral interface, including the different pore fluid dissolved ions (Na+, Cu2+, Zn2+, Pb2+) due to their different adsorption behavior. We also showed the relevance of our approach to characterize the fluid/matrix interaction for various organic contents (wetting and non-wetting oils). We also discuss early efforts to jointly interpret SIP and other information for improved estimation, approaches to use SIP information to constrain mechanistic flow and transport models, and the potential to apply some of the approaches to field scale applications.

  19. S100A6 Protein Negatively Regulates CacyBP/SIP-Mediated Inhibition of Gastric Cancer Cell Proliferation and Tumorigenesis

    PubMed Central

    Zhang, Kun; Liang, Jie; Chuai, Yucai; Li, Yuan; Wang, Xiaoming

    2012-01-01

    Calcyclin-binding protein (CacyBP/SIP), identified on the basis of its ability to interact with S100 proteins in a calcium-dependent manner, was previously found to inhibit the proliferation and tumorigenesis of gastric cancer cells in our laboratory. Importantly, the effects of S100 proteins on the biological behavior of CacyBP/SIP in gastric cancer remain unclear. Herein, we report the construction of eukaryotic expression vectors for wild-type CacyBP/SIP and a truncated mutant lacking the S100 protein binding domain (CacyBP/SIPΔS100). The expressions of the wild-type and truncated recombinant proteins were demonstrated by transfection of MKN45 gastric cancer cells. Co-immunoprecipitation assays demonstrated interaction between S100A6 and wild-type CacyBP/SIP in MKN45 cells. Removal of the S100 protein binding domain dramatically reduced the affinity of CacyBP/SIP for S100 proteins as indicated by reduced co-immunoprecipitation of S100A6 by CacyBP/SIPΔS100. The MTT assay, FACS assay, clonogenic assay and tumor xenograft experiment were performed to assess the effect of CacyBP/SIP on cell growth and tumorigenesis in vitro and in vivo. Overexpression of CacyBP/SIP inhibited the proliferation and tumorigenesis of MKN45 gastric cancer cells; the proliferation and tumorigenesis rates were even further reduced by the expression of CacyBP/SIPΔS100. We also showed that S100 proteins negatively regulate CacyBP/SIP-mediated inhibition of gastric cancer cell proliferation, through an effect on β-catenin protein expression and transcriptional activation of Tcf/LEF. Although the underlying mechanism of action requires further investigation, this study provides new insight into the interaction between S100 proteins and CacyBP/SIP, which might enrich our knowledge of S100 proteins and be helpful for our understanding of the development of gastric cancer. PMID:22295074

  20. Social Information Processing and Cluster B Personality Pathology among Clinic-Referred Adolescents.

    PubMed

    Hessels, Christel; van Aken, Marcel A G; Orobio de Castro, Bram; Laceulle, Odilia M; van Voorst, Guus

    2016-01-01

    This study investigated relations between personality pathology and mentalizing capacities reflected in social information processing (SIP) of adolescents. 96 adolescent outpatients completed a structured interview regarding SIP. Their clinicians completed a checklist based on DSM-IV, assessing severity of personality pathology. Significant relations were found between the severity of personality pathology and SIP: the more severe the personality pathology, the higher the intensity of reported emotions, the more likely adolescents were to choose inadequate coping strategies and aggressive reactions in social situations, and the more positively they evaluated aggressive reactions. Severity of traits of antisocial (ASPD) and borderline personality disorder (BPD) had unique associations with distinctive SIP variables: ASPD being more related to inadequate coping strategies, less reflection on other's motives and aggressive responses, and BPD being more related to avoidant or prosocial responses and in particular to memories of frustrating events. This study provides evidence for difficulties in SIP among adolescents with more severe personality pathology, suggesting that the steps in the SIP model can be used to operationalize mentalizing problems. The results seem to paint a picture of ASPD and BPD having a shared background, but their own specific problems concerning SIP. © 2016 S. Karger AG, Basel.

  1. Broadband network on-line data acquisition system with web based interface for control and basic analysis

    NASA Astrophysics Data System (ADS)

    Polkowski, Marcin; Grad, Marek

    2016-04-01

    Passive seismic experiment "13BB Star" is operated since mid 2013 in northern Poland and consists of 13 broadband seismic stations. One of the elements of this experiment is dedicated on-line data acquisition system comprised of both client (station) side and server side modules with web based interface that allows monitoring of network status and provides tools for preliminary data analysis. Station side is controlled by ARM Linux board that is programmed to maintain 3G/EDGE internet connection, receive data from digitizer, send data do central server among with additional auxiliary parameters like temperatures, voltages and electric current measurements. Station side is controlled by set of easy to install PHP scripts. Data is transmitted securely over SSH protocol to central server. Central server is a dedicated Linux based machine. Its duty is receiving and processing all data from all stations including auxiliary parameters. Server side software is written in PHP and Python. Additionally, it allows remote station configuration and provides web based interface for user friendly interaction. All collected data can be displayed for each day and station. It also allows manual creation of event oriented plots with different filtering abilities and provides numerous status and statistic information. Our solution is very flexible and easy to modify. In this presentation we would like to share our solution and experience. National Science Centre Poland provided financial support for this work via NCN grant DEC-2011/02/A/ST10/00284.

  2. BioBarcode: a general DNA barcoding database and server platform for Asian biodiversity resources.

    PubMed

    Lim, Jeongheui; Kim, Sang-Yoon; Kim, Sungmin; Eo, Hae-Seok; Kim, Chang-Bae; Paek, Woon Kee; Kim, Won; Bhak, Jong

    2009-12-03

    DNA barcoding provides a rapid, accurate, and standardized method for species-level identification using short DNA sequences. Such a standardized identification method is useful for mapping all the species on Earth, particularly when DNA sequencing technology is cheaply available. There are many nations in Asia with many biodiversity resources that need to be mapped and registered in databases. We have built a general DNA barcode data processing system, BioBarcode, with open source software - which is a general purpose database and server. It uses mySQL RDBMS 5.0, BLAST2, and Apache httpd server. An exemplary database of BioBarcode has around 11,300 specimen entries (including GenBank data) and registers the biological species to map their genetic relationships. The BioBarcode database contains a chromatogram viewer which improves the performance in DNA sequence analyses. Asia has a very high degree of biodiversity and the BioBarcode database server system aims to provide an efficient bioinformatics protocol that can be freely used by Asian researchers and research organizations interested in DNA barcoding. The BioBarcode promotes the rapid acquisition of biological species DNA sequence data that meet global standards by providing specialized services, and provides useful tools that will make barcoding cheaper and faster in the biodiversity community such as standardization, depository, management, and analysis of DNA barcode data. The system can be downloaded upon request, and an exemplary server has been constructed with which to build an Asian biodiversity system http://www.asianbarcode.org.

  3. HDOCK: a web server for protein-protein and protein-DNA/RNA docking based on a hybrid strategy.

    PubMed

    Yan, Yumeng; Zhang, Di; Zhou, Pei; Li, Botong; Huang, Sheng-You

    2017-07-03

    Protein-protein and protein-DNA/RNA interactions play a fundamental role in a variety of biological processes. Determining the complex structures of these interactions is valuable, in which molecular docking has played an important role. To automatically make use of the binding information from the PDB in docking, here we have presented HDOCK, a novel web server of our hybrid docking algorithm of template-based modeling and free docking, in which cases with misleading templates can be rescued by the free docking protocol. The server supports protein-protein and protein-DNA/RNA docking and accepts both sequence and structure inputs for proteins. The docking process is fast and consumes about 10-20 min for a docking run. Tested on the cases with weakly homologous complexes of <30% sequence identity from five docking benchmarks, the HDOCK pipeline tied with template-based modeling on the protein-protein and protein-DNA benchmarks and performed better than template-based modeling on the three protein-RNA benchmarks when the top 10 predictions were considered. The performance of HDOCK became better when more predictions were considered. Combining the results of HDOCK and template-based modeling by ranking first of the template-based model further improved the predictive power of the server. The HDOCK web server is available at http://hdock.phys.hust.edu.cn/. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  4. Louisiana SIP: LAC 33:III Ch. 5 Section 509. Prevention of Significant Deterioration; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) and 1991-07-01 (LAc57) and 1996-12-16 (LAc69) to 2011-08-17 (LAd36 - Revised)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch. 5 Section 509. Prevention of Significant Deterioration; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) and 1991-07-01 (LAc57) and 1996-12-16 (LAc69) to 2011-08-17 (LAd36 - Revised)

  5. Louisiana SIP: LAC 33:III Ch 61 Subchap A, §6121 to § 6131--Method 43 - Capture Efficiency Test Procedures; SIP effective 1994-06-06 (LAc60) to to 2011-08-03 (LAd34 - Moved to Chap 21 Subchap N §§ 2155-2160 and revised)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch 61 Subchap A, §6121 to § 6131--Method 43 - Capture Efficiency Test Procedures; SIP effective 1994-06-06 (LAc60) to to 2011-08-03 (LAd34 - Moved to Chap 21 Subchap N §§ 2155-2160 and revised)

  6. Louisiana SIP: LAC 33:III Ch. 7 - Table 2 - Ambient Air--Methods of Contaminant Measurements; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) to 2011-08-03 (LAd34 - Moved to Section 711 and revised [adds PM-2.5])

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch. 7 - Table 2 - Ambient Air--Methods of Contaminant Measurements; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) to 2011-08-03 (LAd34 - Moved to Section 711 and revised [adds PM-2.5])

  7. Louisiana SIP: LAC 33:III Ch. 7 Section 709. Measurement of Concentrations PM10, SO2, Carbon Monoxide, Atmospheric Oxidants, Nitrogen Oxides, and Lead; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) to 2011-08-03 (LAd34 - Revised)

    EPA Pesticide Factsheets

    Louisiana SIP: LAC 33:III Ch. 7 Section 709. Measurement of Concentrations PM10, SO2, Carbon Monoxide, Atmospheric Oxidants, Nitrogen Oxides, and Lead; SIP effective 1989-05-08 (LAc49) and 1989-08-14 (LAc50) to 2011-08-03 (LAd34 - Revised)

  8. 76 FR 31263 - Approval and Promulgation of Implementation Plans; State of California; Interstate Transport of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ...EPA is proposing a limited approval and limited disapproval of a State Implementation Plan (``SIP'') revision submitted by the State of California on November 17, 2007, for the purpose of addressing the ``transport SIP'' provisions of Clean Air Act (``CAA'') section 110(a)(2)(D)(i) for the 1997 8-hour ozone National Ambient Air Quality Standards (NAAQS or standards) and the 1997 fine particulate matter (``PM2.5'') NAAQS. Section 110(a)(2)(D)(i) of the CAA requires that each SIP contain adequate provisions to prohibit emissions that adversely affect air quality in other States through interstate transport. EPA is proposing a limited approval and limited disapproval of California's SIP revision for the 1997 8-hour ozone and 1997 PM2.5 NAAQS with respect to the requirement in CAA section 110(a)(2)(D)(i)(II) that each SIP contain adequate measures prohibiting emissions of air pollutants in amounts which will interfere with other States' measures required under title I, part C of the CAA to prevent significant deterioration of air quality. Specifically, EPA is proposing to approve California's SIP revision with respect to those Districts in California that implement SIP-approved permit programs meeting the approval criteria under CAA section 110(a)(2)(D)(i), as discussed in this proposal. EPA is simultaneously proposing to disapprove California's SIP revision with respect to those Districts in California that do not implement SIP-approved permit programs meeting these approval criteria. For any District for which we finalize a disapproval, EPA intends to simultaneously promulgate a limited Federal Implementation Plan (``FIP''), as discussed in this proposal, unless the relevant area is already subject to a FIP.

  9. The Short Inventory of Problems – Revised (SIP-R): Psychometric properties within a large, diverse sample of substance use disorder treatment seekers

    PubMed Central

    Kiluk, Brian D.; Dreifuss, Jessica A.; Weiss, Roger D.; Morgenstern, Jon; Carroll, Kathleen M.

    2012-01-01

    Assessment of the adverse consequences of substance use serves an important function in both clinical and research settings, yet there is no universally agreed upon measure of consequences relevant to multiple types of substance use disorders. One of the most commonly used measures, the Short Inventory of Problems (SIP), has been adapted and evaluated in several specific populations, but evidence of its reliability and validity across broader samples of persons with substance use disorders is needed. This study evaluated the psychometric properties of a revised version of the SIP (SIP-R) in a large combined sample of alcohol and drug use disorder treatment-seekers, with participants pooled from two national, multisite randomized clinical trials. A total of 886 participants across 10 outpatient treatment facilities completed a common assessment battery that included the SIP-R, Addiction Severity Index (ASI), University of Rhode Island Change Assessment (URICA), HIV Risk Behavior Scale (HRBS), and a substance use calendar. Results supported the SIP-R’s internal reliability (α=.95). Confirmatory factor analysis demonstrated that the hypothesized 5-factor model with one higher-order factor produced the best fit. Convergent validity was evident through the SIP-R’s correlation with several composite scores from the ASI and the URICA, and analyses supported its conceptual distinction from quantity indices of drug/alcohol use. The SIP-R also demonstrated an ability to predict treatment retention, with higher scores associated with poorer retention. These results provide support for the SIP-R’s psychometric properties as a measure of consequences across a broad sample of treatment-seeking drug and alcohol users. PMID:22642856

  10. Symmetrically private information retrieval based on blind quantum computing

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling

    2015-05-01

    Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.

  11. The potential role of CacyBP/SIP in tumorigenesis.

    PubMed

    Ning, Xiaoxuan; Chen, Yang; Wang, Xiaosu; Li, Qiaoneng; Sun, Shiren

    2016-08-01

    Calcyclin-binding protein/Siah-1-interacting protein (CacyBP/SIP) was initially described as a binding partner of S100A6 in the Ehrlich ascites tumor cells and later as a Siah-1-interacting protein. This 30 kDa protein includes three domains and is involved in cell proliferation, differentiation, cytoskeletal rearrangement, and transcriptional regulation via binding to various proteins. Studies have also shown that the CacyBP/SIP is a critical protein in tumorigenesis. But, its promotion or suppression of cancer progression may depend on the cell type. In this review, the biological characteristics and target proteins of CacyBP/SIP have been described. Moreover, the exact role of CacyBP/SIP in various cancers is discussed.

  12. DServO: A Peer-to-Peer-based Approach to Biomedical Ontology Repositories.

    PubMed

    Mambone, Zakaria; Savadogo, Mahamadi; Some, Borlli Michel Jonas; Diallo, Gayo

    2015-01-01

    We present in this poster an extension of the ServO ontology server system, which adopts a decentralized Peer-To-Peer approach for managing multiple heterogeneous knowledge organization systems. It relies on the use of the JXTA protocol coupled with information retrieval techniques to provide a decentralized infrastructure for managing multiples instances of Ontology Repositories.

  13. 46 CFR 8.540 - Enrollment in SIP.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTION ALTERNATIVES Streamlined Inspection Program § 8.540 Enrollment in SIP. Upon successful completion of the training and evaluation phase, the Coast Guard SIP Advisor will recommend to the OCMI that the company or...

  14. Seismo-Ionospheric Precursor in the GIM TEC of the 24 August 2014 M6 Napa Earthquake

    NASA Astrophysics Data System (ADS)

    Wu, T. Y.; Liu, T. J. Y.; Liu, J. Y.

    2015-12-01

    This study examines seismo-ionospheric precursors (SIPs) in the global ionosphere map (GIM) of the total electron content (TEC) associated with the 24 August 2014 M6 South Napa earthquake and statistical evidence of SIPs of the GPS TEC in western USA during 2000-2014. The temporal SIP in the GIM TEC around the epicenter significantly decreasing (negative anomaly) on 22 August. To discriminate the global effect, such as solar flares, magnetic storms, etc., and the local effect, such as earthquakes, 5183 lattices on the GIM are employed to conduct a global search of the SIP distribution. Anomalies of both GIM TEC and associated gradients specifically and continuously appearing over the epicenter suggest that the SIP relate to the 2014 South Napa earthquake. A simulation is further carried out to produce the SIP in GIM TEC before the earthquake. Results indicate that the eastward electric field generated over the epicenter area during the earthquake preparation period to be essential.

  15. Heterologous Protein Secretion in Lactobacilli with Modified pSIP Vectors

    PubMed Central

    Karlskås, Ingrid Lea; Maudal, Kristina; Axelsson, Lars; Rud, Ida; Eijsink, Vincent G. H.; Mathiesen, Geir

    2014-01-01

    We describe new variants of the modular pSIP-vectors for inducible gene expression and protein secretion in lactobacilli. The basic functionality of the pSIP system was tested in Lactobacillus strains representing 14 species using pSIP411, which harbors the broad-host-range Lactococcus lactis SH71rep replicon and a β-glucuronidase encoding reporter gene. In 10 species, the inducible gene expression system was functional. Based on these results, three pSIP vectors with different signal peptides were modified by replacing their narrow-host-range L. plantarum 256rep replicon with SH71rep and transformed into strains of five different species of Lactobacillus. All recombinant strains secreted the target protein NucA, albeit with varying production levels and secretion efficiencies. The Lp_3050 derived signal peptide generally resulted in the highest levels of secreted NucA. These modified pSIP vectors are useful tools for engineering a wide variety of Lactobacillus species. PMID:24614815

  16. A mobile information management system used in textile enterprises

    NASA Astrophysics Data System (ADS)

    Huang, C.-R.; Yu, W.-D.

    2008-02-01

    The mobile information management system (MIMS) for textile enterprises is based on Microsoft Visual Studios. NET2003 Server, Microsoft SQL Server 2000, C++ language and wireless application protocol (WAP) and wireless markup language (WML) technology. The portable MIMS is composed of three-layer structures, i.e. showing layer; operating layer; and data visiting layer corresponding to the port-link module; processing module; and database module. By using the MIMS, not only the information exchanges become more convenient and easier, but also the compatible between the giant information capacity and a micro-cell phone and functional expansion nature in operating and designing can be realized by means of build-in units. The development of MIMS is suitable for the utilization in textile enterprises.

  17. Molecular Analysis of Phr Peptide Processing in Bacillus subtilis†

    PubMed Central

    Stephenson, Sophie; Mueller, Christian; Jiang, Min; Perego, Marta

    2003-01-01

    In Bacillus subtilis, an export-import pathway regulates production of the Phr pentapeptide inhibitors of Rap proteins. Processing of the Phr precursor proteins into the active pentapeptide form is a key event in the initiation of sporulation and competence development. The PhrA (ARNQT) and PhrE (SRNVT) peptides inhibit the RapA and RapE phosphatases, respectively, whose activity is directed toward the Spo0F∼P intermediate response regulator of the sporulation phosphorelay. The PhrC (ERGMT) peptide inhibits the RapC protein acting on the ComA response regulator for competence with regard to DNA transformation. The structural organization of PhrA, PhrE, and PhrC suggested a role for type I signal peptidases in the processing of the Phr preinhibitor, encoded by the phr genes, into the proinhibitor form. The proinhibitor was then postulated to be cleaved to the active pentapeptide inhibitor by an additional enzyme. In this report, we provide evidence that Phr preinhibitor proteins are subject to only one processing event at the peptide bond on the amino-terminal end of the pentapeptide. This processing event is most likely independent of type I signal peptidase activity. In vivo and in vitro analyses indicate that none of the five signal peptidases of B. subtilis (SipS, SipT, SipU, SipV, and SipW) are indispensable for Phr processing. However, we show that SipV and SipT have a previously undescribed role in sporulation, competence, and cell growth. PMID:12897006

  18. Molecular analysis of Phr peptide processing in Bacillus subtilis.

    PubMed

    Stephenson, Sophie; Mueller, Christian; Jiang, Min; Perego, Marta

    2003-08-01

    In Bacillus subtilis, an export-import pathway regulates production of the Phr pentapeptide inhibitors of Rap proteins. Processing of the Phr precursor proteins into the active pentapeptide form is a key event in the initiation of sporulation and competence development. The PhrA (ARNQT) and PhrE (SRNVT) peptides inhibit the RapA and RapE phosphatases, respectively, whose activity is directed toward the Spo0F approximately P intermediate response regulator of the sporulation phosphorelay. The PhrC (ERGMT) peptide inhibits the RapC protein acting on the ComA response regulator for competence with regard to DNA transformation. The structural organization of PhrA, PhrE, and PhrC suggested a role for type I signal peptidases in the processing of the Phr preinhibitor, encoded by the phr genes, into the proinhibitor form. The proinhibitor was then postulated to be cleaved to the active pentapeptide inhibitor by an additional enzyme. In this report, we provide evidence that Phr preinhibitor proteins are subject to only one processing event at the peptide bond on the amino-terminal end of the pentapeptide. This processing event is most likely independent of type I signal peptidase activity. In vivo and in vitro analyses indicate that none of the five signal peptidases of B. subtilis (SipS, SipT, SipU, SipV, and SipW) are indispensable for Phr processing. However, we show that SipV and SipT have a previously undescribed role in sporulation, competence, and cell growth.

  19. Kids SIP smartER: A Feasibility Study to Reduce Sugar-Sweetened Beverage Consumption Among Middle School Youth in Central Appalachia.

    PubMed

    Lane, Hannah; Porter, Kathleen J; Hecht, Erin; Harris, Priscilla; Kraak, Vivica; Zoellner, Jamie

    2017-01-01

    To test the feasibility of Kids SIP smartER, a school-based intervention to reduce consumption of sugar-sweetened beverages (SSBs). Matched-contact randomized crossover study with mixed-methods analysis. One middle school in rural, Appalachian Virginia. Seventy-four sixth and seventh graders (5 classrooms) received Kids SIP smartER in random order over 2 intervention periods. Feasibility outcomes were assessed among 2 teachers. Kids SIP smartER consisted of 6 lessons grounded in the Theory of Planned Behavior, media literacy, and public health literacy and aimed to improve individual SSB behaviors and understanding of media literacy and prevalent regional disparities. The matched-contact intervention promoted physical activity. Beverage Intake Questionnaire-15 (SSB consumption), validated theory questionnaires, feasibility questionnaires (student and teacher), student focus groups, teacher interviews, and process data (eg, attendance). Repeated measures analysis of variances across 3 time points, descriptive statistics, and deductive analysis of qualitative data. During the first intervention period, students receiving Kids SIP smartER (n = 43) significantly reduced SSBs by 11 ounces/day ( P = .01) and improved media ( P < .001) and public health literacy ( P < .01) understanding; however, only media literacy showed between-group differences ( P < .01). Students and teachers found Kids SIP smartER acceptable, in-demand, practical, and implementable within existing resources. Kids SIP smartER is feasible in an underresourced, rural school setting. Results will inform further development and large-scale testing of Kids SIP smartER to reduce SSBs among rural adolescents.

  20. Multiple-sip temporal dominance of sensations associated with acceptance test: a study on special beers.

    PubMed

    Corrêa Simioni, Síntia Carla; Ribeiro, Michele Nayara; de Souza, Vanessa Rios; Nunes, Cleiton Antônio; Pinheiro, Ana Carla Marques

    2018-03-01

    In this study, we proposed the use of a multiple-sip temporal dominance of sensations (TDS) test alongside with an acceptance test over repeated consumption for the analysis of special beers, with the aim of contributing to a deeper understanding of consumer behavior regarding temporal descriptions and sensory acceptance. Consumers of special beers sequentially evaluated six sips of a particular type of beer by TDS analysis and an acceptance test was performed for each sip. Four different kinds of specialty beers were evaluated [Bohemian Pilsner (BP), Witbier (WB), Belgian Strong Ale Dubbel (BD), and Russian Imperial Stout (RS)]. In general, the descriptive profile of beers varied temporally, i.e., there was an increased dominance of bitterness and a decreased dominance of fruity, floral, toffee, and coffee attributes. Concurrently, a reduction in sensory acceptance with an increased number of sips, especially the last sip, was observed in two kinds of beers that possessed a strong flavor, BD and RS. BP and WB presented smooth attributes and low notable characteristics, which could have contributed to the maintenance of the acceptance grades as the number of sips increased. The combination of TDS and acceptance over repeated sips can be useful for obtaining detailed descriptions of products that are closer to real time consumption by consumers, and thus aids in ensuring good product performance once released. The information obtained can also help product development scientists to fine-tune product formulations and ensure acceptability.

  1. Simple Peer-to-Peer SIP Privacy

    NASA Astrophysics Data System (ADS)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  2. Filtering SPAM in P2PSIP Communities with Web of Trust

    NASA Astrophysics Data System (ADS)

    Heikkilä, Juho; Gurtov, Andrei

    Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.

  3. System-in Package of Integrated Humidity Sensor Using CMOS-MEMS Technology.

    PubMed

    Lee, Sung Pil

    2015-10-01

    Temperature/humidity microchips with micropump were fabricated using a CMOS-MEMS process and combined with ZigBee modules to implement a sensor system in package (SIP) for a ubiquitous sensor network (USN) and/or a wireless communication system. The current of a diode temperature sensor to temperature and a normalized current of FET humidity sensor to relative humidity showed linear characteristics, respectively, and the use of the micropump has enabled a faster response. A wireless reception module using the same protocol as that in transmission systems processed the received data within 10 m and showed temperature and humidity values in the display.

  4. 40 CFR 52.2522 - Approval status.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Federal regulatory SIP requirements for PSD applicable as of the August 31, 2011 SIP revision submission..., October 1, 2009, October 26, 2011, and February 17, 2012 which address the PSD-related requirements set... February 17, 2012 submitted to meet the PSD-related infrastructure SIP obligations set forth at CAA...

  5. Comment on id-based remote data integrity checking with data privacy preserving

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Meng, Hongxin

    2017-09-01

    Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.

  6. Operational Interoperable Web Coverage Service for Earth Observing Satellite Data: Issues and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Yang, W.; Min, M.; Bai, Y.; Lynnes, C.; Holloway, D.; Enloe, Y.; di, L.

    2008-12-01

    In the past few years, there have been growing interests, among major earth observing satellite (EOS) data providers, in serving data through the interoperable Web Coverage Service (WCS) interface protocol, developed by the Open Geospatial Consortium (OGC). The interface protocol defined in WCS specifications allows client software to make customized requests of multi-dimensional EOS data, including spatial and temporal subsetting, resampling and interpolation, and coordinate reference system (CRS) transformation. A WCS server describes an offered coverage, i.e., a data product, through a response to a client's DescribeCoverage request. The description includes the offered coverage's spatial/temporal extents and resolutions, supported CRSs, supported interpolation methods, and supported encoding formats. Based on such information, a client can request the entire or a subset of coverage in any spatial/temporal resolutions and in any one of the supported CRSs, formats, and interpolation methods. When implementing a WCS server, a data provider has different approaches to present its data holdings to clients. One of the most straightforward, and commonly used, approaches is to offer individual physical data files as separate coverages. Such implementation, however, will result in too many offered coverages for large data holdings and it also cannot fully present the relationship among different, but spatially and/or temporally associated, data files. It is desirable to disconnect offered coverages from physical data files so that the former is more coherent, especially in spatial and temporal domains. Therefore, some servers offer one single coverage for a set of spatially coregistered time series data files such as a daily global precipitation coverage linked to many global single- day precipitation files; others offer one single coverage for multiple temporally coregistered files together forming a large spatial extent. In either case, a server needs to assemble an output coverage real-time by combining potentially large number of physical files, which can be operationally difficult. The task becomes more challenging if an offered coverage involves spatially and temporally un-registered physical files. In this presentation, we will discuss issues and lessons learned in providing NASA's AIRS Level 2 atmospheric products, which are in satellite swath CRS and in 6-minute segment granule files, as virtual global coverages. We"ll discuss the WCS server's on- the-fly georectification, mosaicking, quality screening, performance, and scalability.

  7. New Developments in Developmental Research on Social Information Processing and Antisocial Behavior

    ERIC Educational Resources Information Center

    Fontaine, Reid Griffith

    2010-01-01

    The Special Section on developmental research on social information processing (SIP) and antisocial behavior is here introduced. Following a brief history of SIP theory, comments on several themes--measurement and assessment, attributional and interpretational style, response evaluation and decision, and the relation between emotion and SIP--that…

  8. 76 FR 28437 - Disease, Disability, and Injury Prevention and Control Special Interest Project (SIP): Initial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Disease, Disability, and Injury Prevention and Control Special Interest Project (SIP): Initial Review The meeting... Disease or Treated by Assisted Reproductive Technology, SIP11-048, Panel F,'' initial review In accordance...

  9. 75 FR 30410 - Disease, Disability, and Injury Prevention and Control Special Interest Project (SIP): Provider...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-01

    ..., Disability, and Injury Prevention and Control Special Interest Project (SIP): Provider and Public Health... and Public Health Input for Vaccine Policy Decisions, SIP 10-036.'' Contact Person for More Information: Michelle Mathieson, Public Health Analyst, National Center for Chronic Disease and Health...

  10. 77 FR 11744 - Approval and Promulgation of Implementation Plans; Tennessee: Prevention of Significant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... New Source Review (NSR) Prevention of Significant Deterioration (PSD) program. Specifically, the SIP... modification projects become subject to Tennessee's PSD permitting requirements for GHG emissions. This rule... thresholds in the Tennessee SIP for GHG PSD requirements. EPA is approving Tennessee's January 11, 2012, SIP...

  11. School Inclusion Programmes (SIPS)

    ERIC Educational Resources Information Center

    Drossinou-Korea, Maria; Matousi, Dimitra; Panopoulos, Nikolaos; Paraskevopoulou, Aikaterini

    2016-01-01

    The purpose of this work was to understand the school inclusion programmes (SIPs) for students with special educational needs (SEN). The methodology was conducted in the field of special education (SE) and focuses on three case studies of students who was supported by SIPs. The Targeted, Individual, Structured, Inclusion Programme for students…

  12. A Feasibility Study on the Geophysical Response to Nanoparticles in the Subsurface

    EPA Science Inventory

    The research presented herein aims to determine if a spectral induced polarization (SIP) response exists due to nanoparticles in a saturated sand matrix. If a SIP response is realized in such an experimental setting, then it is feasible that SIP may be capable of delineating nano...

  13. 40 CFR 52.1638 - Bernalillo County particulate matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) for Bernalillo County that contained commitments, from the Director of the Albuquerque Environmental... SIPs. The City of Albuquerque and Bernalillo County Air Quality Control Board adopted this SIP revision on November 9, 1988. (b) The Albuquerque Environmental Health Department has committed to comply with...

  14. 40 CFR 52.1638 - Bernalillo County particulate matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) for Bernalillo County that contained commitments, from the Director of the Albuquerque Environmental... SIPs. The City of Albuquerque and Bernalillo County Air Quality Control Board adopted this SIP revision on November 9, 1988. (b) The Albuquerque Environmental Health Department has committed to comply with...

  15. 40 CFR 52.1638 - Bernalillo County particulate matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) for Bernalillo County that contained commitments, from the Director of the Albuquerque Environmental... SIPs. The City of Albuquerque and Bernalillo County Air Quality Control Board adopted this SIP revision on November 9, 1988. (b) The Albuquerque Environmental Health Department has committed to comply with...

  16. 77 FR 36964 - Approval and Promulgation of Implementation Plans; Texas; Revisions to the New Source Review (NSR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...EPA is proposing to approve revisions to the SIP for the State of Texas that relate to antibacksliding of Major NSR SIP Requirements for the one-hour ozone NAAQS; Major NNSR SIP requirements for the 1997 eight-hour ozone NAAQS; Major NSR Reform Program with Plantwide Applicability Limit (PAL) provisions; and non-PAL aspects of the Major NSR SIP requirements. EPA proposes to find that these changes to the Texas SIP comply with the Federal Clean Air Act (the Act or CAA) and EPA regulations and are consistent with EPA policies. Texas submitted revisions to these programs on June 10, 2005, and February 1, 2006. EPA disapproved these SIP revisions on September 15, 2010 (75 FR 56424). In response to the 2010 disapproval, Texas submitted revisions to these programs in two separate SIP submittals on March 11, 2011. These SIP submittals include resubmittal of the rules that were previously submitted June 10, 2005, and February 1, 2006, and subsequently disapproved by EPA on September 15, 2010. On February 22, 2012, Texas proposed further revisions to the NSR Reform Program to further clarify and ensure compliance with Federal requirements relating to NSR Reform. On May 3, 2012, Texas provided a letter to EPA which requested that EPA parallel process the revisions proposed February 22, 2012, and included a demonstration showing how its submitted rules are at least as stringent as the Federal NSR Reform Program. Texas has requested that EPA parallel process the revisions proposed February 22, 2012, and consider the May 3, 2012, letter in the review of the March 11, 2011, SIP submittals. Today, EPA is proposing to find that the March 11, 2011, SIP submittals; the February 22, 2012, proposed revisions; and the May 3, 2012, letter, address each of the grounds for EPA's September 15, 2010, disapproval and other issues related to the Texas NSR Reform revisions as identified later. Accordingly, EPA proposes to approve these two March 11, 2011, revisions; the February 22, 2012, proposed revisions for which Texas has requested parallel processing; and the May 3, 2012, letter as part of the Texas NSR SIP. EPA is proposing this action under section 110 and parts C and D of the Act.

  17. A second gene for type I signal peptidase in Bradyrhizobium japonicum, sipF, is located near genes involved in RNA processing and cell division.

    PubMed

    Bairl, A; Müller, P

    1998-11-01

    The TnphoA-induced Bradyrhizobium japonicum mutant 184 shows slow growth and aberrant colonization of soybean nodules. Using a DNA fragment adjacent to the transposon insertion site as a probe, a 3.4-kb BglII fragment of B. japonicum 110spc4 DNA was identified and cloned. Sequence analysis indicated that two truncated ORFs and three complete ORFs were encoded on this fragment. A database search revealed homologies to several other prokaryotic proteins: PdxJ (an enzyme involved in vitamin B6 biosynthesis), AcpS (acyl carrier protein synthase), Lep or Sip (prokaryotic type I signal peptidase), RNase III (an endoribonuclease which processes double-stranded rRNA precursors and mRNA) and Era (a GTP-binding protein required for cell division). The mutation in strain 184 was found to lie within the signal peptidase gene, which was designated sipF. Therefore, sipF is located in a region that encodes gene products involved in posttranscriptional and posttranslational processing processes. By complementation of the lep(ts) E. coli mutant strain IT41 it was demonstrated that sipF indeed encodes a functional signal peptidase, and genetic complementation of B. japonicum mutant 184 by a 2.8-kb SalI fragment indicated that sipF is expressed from a promoter located directly upstream of sipF. Using a non-polar kanamycin resistance cassette, a specific sipF mutant was constructed which exhibited defects in symbiosis similar to those of the original mutant 184.

  18. Bridged HPSi and Linear HSiP as Probes of the SiP Radical in Astrophysical/Interstellar Media

    NASA Astrophysics Data System (ADS)

    Fortenberry, Ryan C.; Francisco, Joseph S.

    2017-07-01

    The SiP radical has a \\tilde{X}{}2{{\\Pi }} ground state and a low-lying A{}2{{{Σ }}}+ state with a transition wavelength of greater than 20 μm. However, this transition has a near-zero oscillator strength making it all but unobservable. Addition of a hydrogen atom to the system creates the strangely bent HPSi molecule and also the linear HSiP isomer, lying 0.50 eV above the bent. The electron-deficient P-Si π cloud in \\tilde{X}{}2{{\\Pi }} SiP is stabilized by the addition of the hydrogen atom, making this isomer the preferred form of HPSi. The HSiP linear isomer can be formed from A{}2{{{Σ }}}+ SiP. As a result, the [HPSi]/[HSiP] ratio could serve as tracer of the otherwise unobservable but low-lying A{}2{{{Σ }}}+≤ftarrow \\tilde{X}{}2{{\\Pi }} electronic transition of SiP. The high-level quantum chemical computations employed here imply that the rotational lines of HPSi and HSiP will overlap extensively, but the vibrational frequencies, especially the hydride stretch, are significantly separated. The hydride stretches are in the 5 μm range, making them excellent candidates for mid-IR observations with the Stratsopheric Observatory for Infrared Astronomy or with the James Webb Space Telescope. Furthermore, the rotational constants and vibrational frequencies of \\tilde{X}{}2{{\\Pi }} SiP, A{}2{{{Σ }}}+ SiP, and \\tilde{X}{}1{{{Σ }}}+ SiP- are also provided in addition to the relative energies of all five species.

  19. Safety and immunogenicity of an oral DNA vaccine encoding Sip of Streptococcus agalactiae from Nile tilapia Oreochromis niloticus delivered by live attenuated Salmonella typhimurium.

    PubMed

    Huang, L Y; Wang, K Y; Xiao, D; Chen, D F; Geng, Y; Wang, J; He, Y; Wang, E L; Huang, J L; Xiao, G Y

    2014-05-01

    Attenuated Salmonella typhimurium SL7207 was used as a carrier for a reconstructed DNA vaccine against Streptococcus agalactiae. A 1.02 kb DNA fragment, encoding for a portion of the surface immunogenic protein (Sip) of S. agalactiae was inserted into pVAX1. The recombinant plasmid pVAX1-sip was transfected in EPC cells to detect the transient expression by an indirect immunofluorescence assay, together with Western blot analysis. The pVAX1-sip was transformed by electroporation into SL7207. The stability of pVAX1-sip into Salmonella was over 90% after 50 generations with antibiotic selection in vitro while remained stable over 80% during 35 generations under antibiotic-free conditions. The LD50 of SL/pVAX1-sip was 1.7 × 10(11) CFU/fish by intragastric administration which indicated a quite low virulence. Tilapias were inoculated orally at 10(8) CFU/fish, the recombinant bacteria were found present in intestinal tract, spleens and livers and eventually eliminated from the tissues 4 weeks after immunization. Fish immunized at 10(7), 10(8) and 10(9) CFU/fish with different immunization times caused various levels of serum antibody and an effective protection against lethal challenge with the wild-type strain S. agalactiae. Integration studies showed that the pVAX1-sip did not integrate with tilapia chromosomes. The DNA vaccine SL/pVAX1-sip was proved to be safe and effective in protecting tilapias against S. agalactiae infection. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Complex conductivity of organic-rich shales

    NASA Astrophysics Data System (ADS)

    Woodruff, W. F.; Revil, A.; Torres-Verdin, C.

    2013-12-01

    We can accurately determine the intrinsic anisotropy and material properties in the laboratory, providing empirical evidence of transverse isotropy and the polarization of the organic and metallic fractions in saturated and unsaturated shales. We develop two distinct approaches to obtain the complex conductivity tensor from spectral induced polarization (SIP) measurements. Experimental results indicate clear anisotropy, and characterize the effects of thermal maturation, TOC, and pyrite, aiding in the calibration and interpretation of geophysical data. SIP is a non-intrusive measurement, sensitive to the surface conductance of mineral grains, frequency-dependent polarization of the electrical double layer, and bulk conductivity of the pore water. The in-phase and quadrature components depend upon parameters of principal importance in unconventional shale formation evaluation (e.g., the distribution of pore throat sizes, formation factor, permeability, salinity and cation exchange capacity (CEC), fluid saturation and wettability). In addition to the contribution of the electrical double layer of non-conducting minerals to surface conductivity, we have observed a clear relaxation associated with kerogen pyrolysis, pyrite distribution, and evidence that the CEC of the kerogen fraction may also contribute, depending on thermal maturation history. We utilize a recent model for anisotropic complex conductivity, and rigorous experimental protocols to quantify the role of kerogen and pyrolysis on surface and quadrature conductivity in mudrocks. The complex conductivity tensor σ* describes the directional dependence of electrical conduction in a porous medium, and accounts for both conduction and polarization. The complex-valued tensor components are given as σ*ij , where σ'ij represents in-phase and σ"ij denotes quadrature conductivities. The directional dependence of the complex conductivity tensor is relegated to the textural properties of the material. The components of the formation factor and connectivity (tortuosity) tensors Fij and Tij (affecting the bulk and surface conductivity, respectively) are correlated as Fij=TijΦ. Both conductivity and connectivity tensors share the same eigenvectors; the anisotropy ratio is equivalent in TI media. At high pore water salinity, surface and quadrature conductivity share the same bulk tortuosity; when surface conductivity dominates (low salinity), conductivity is controlled by the surface conductance, and the tortuosity of electrical current along mineral surfaces usually higher than that of the pore water. We developed two distinct SIP measurement protocols to obtain the tensor: (1) azimuthal sampling and inversion of phasor potentials through the full-field solution of the Laplace equation; (2) direct measurement of complex conductivity eigenvalues by polarized, single-component stimulus current. Experiments also include unsaturated and saturated measurements with three brines of known salinity and pH, at log-distributed frequencies ranging 1 mHz to 45 kHz. Both azimuthal spectra and eigenvalue spectra validate the theoretical model and illustrate the effectiveness of the protocols themselves. We obtain the textural tensors and invert key parameters including Archie exponents and CEC, and characterize the relaxation phenomena associated with kerogen content and maturity for multiphase fluid systems.

  1. 40 CFR 52.331 - Committal SIP for the Colorado Group II PM10 areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PM10 areas. 52.331 Section 52.331 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.331 Committal SIP for the Colorado Group II PM10 areas. On April 14, 1989, the Governor submitted a Committal SIP...

  2. 40 CFR 52.331 - Committal SIP for the Colorado Group II PM10 areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PM10 areas. 52.331 Section 52.331 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.331 Committal SIP for the Colorado Group II PM10 areas. On April 14, 1989, the Governor submitted a Committal SIP...

  3. 40 CFR 52.331 - Committal SIP for the Colorado Group II PM10 areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PM10 areas. 52.331 Section 52.331 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.331 Committal SIP for the Colorado Group II PM10 areas. On April 14, 1989, the Governor submitted a Committal SIP...

  4. 40 CFR 52.331 - Committal SIP for the Colorado Group II PM10 areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PM10 areas. 52.331 Section 52.331 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.331 Committal SIP for the Colorado Group II PM10 areas. On April 14, 1989, the Governor submitted a Committal SIP...

  5. 40 CFR 52.331 - Committal SIP for the Colorado Group II PM10 areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PM10 areas. 52.331 Section 52.331 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.331 Committal SIP for the Colorado Group II PM10 areas. On April 14, 1989, the Governor submitted a Committal SIP...

  6. 76 FR 27649 - Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): Initial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... Disadvantaged Communities, SIP11-041, Feasibility Study to Link Data from the National Breast and Cervical..., Management Analysis and Services Office, CDC, pursuant to Public Law 92-463. Matters To Be Discussed: The... Promote Colorectal Cancer Screening in Disadvantaged Communities, SIP11-041, Feasibility Study to Link...

  7. 78 FR 4804 - Revision to the Washington State Implementation Plan; Tacoma-Pierce County Nonattainment Area

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... Plan (SIP) revision submitted by the Washington Department of Ecology (Ecology) dated November 28, 2012... Air Quality Standard (NAAQS). Second, EPA is proposing to approve updated rules submitted by Ecology... emissions. II. Summary of SIP Revision Ecology's November 28, 2012 SIP revision contains two elements for...

  8. Social Information Processing as a Mediator between Cognitive Schemas and Aggressive Behavior in Adolescents

    ERIC Educational Resources Information Center

    Calvete, Esther; Orue, Izaskun

    2012-01-01

    This longitudinal investigation assessed whether cognitive schemas of justification of violence, mistrust, and narcissism predicted social information processing (SIP), and SIP in turn predicted aggressive behavior in adolescents. A total of 650 adolescents completed measures of cognitive schemas at Time 1, SIP in ambiguous social scenarios at…

  9. 77 FR 24843 - Approval and Promulgation of Air Quality Implementation Plans; Virginia; Removal of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-26

    ... requirements for large stationary internal combustion engines under the NO X SIP Call. Transco Station 175 has...), large stationary internal combustion engines, and large cement kilns. The NO X SIP Call was challenged... internal combustion engines and large cement kilns. EPA approved Virginia's Phase I NO X SIP Call...

  10. 77 FR 60053 - Approval and Promulgation of Air Quality Implementation Plans; Delaware; Requirements for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Deterioration and Nonattainment New Source Review; Fine Particulate Matter (PM2.5) AGENCY: Environmental... preconstruction permitting requirements for fine particulate matter (PM 2.5 ) into the Delaware SIP. In addition... fine particulate matter (PM 2.5 ) into the Delaware SIP. In addition, EPA proposed approval of SIP...

  11. 40 CFR 52.2306 - Particulate Matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Particulate Matter (PM10) Group II SIP commitments. 52.2306 Section 52.2306 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate Matter (PM10) Group II SIP commitments. On July 18, 1988, the Governor of Texas submitted a...

  12. 40 CFR 52.2306 - Particulate Matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 4 2011-07-01 2011-07-01 false Particulate Matter (PM10) Group II SIP commitments. 52.2306 Section 52.2306 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate Matter (PM10) Group II SIP commitments. On July 18, 1988, the Governor of Texas submitted a...

  13. 40 CFR 52.1637 - Particulate Matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Particulate Matter (PM10) Group II SIP commitments. 52.1637 Section 52.1637 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate Matter (PM10) Group II SIP commitments. (a) On August 19, 1988, the Governor of New Mexico...

  14. 40 CFR 52.1637 - Particulate Matter (PM10) Group II SIP commitments.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 4 2011-07-01 2011-07-01 false Particulate Matter (PM10) Group II SIP commitments. 52.1637 Section 52.1637 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate Matter (PM10) Group II SIP commitments. (a) On August 19, 1988, the Governor of New Mexico...

  15. 40 CFR 52.634 - Particulate matter (PM-10) Group III SIP.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Hawaii § 52.634 Particulate matter (PM-10) Group III SIP. (a) On September 14, 1988, the Governor of Hawaii submitted a revision to the... necessary to satisfy the requirements of the PM-10 Group III SIP. (b) The Hawaii Department of Health has...

  16. 77 FR 45949 - Approval and Promulgation of Air Quality Implementation Plans; Maryland; Preconstruction...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... (SIP) submitted by the Maryland Department of the Environment (MDE). These revisions pertain to... are listed in the www.regulations.gov Web site. Although listed in the electronic docket, some... submitted by MDE, as described below. II. Summary of SIP Revision A. SIP Revision 07-13 On October 24, 2007...

  17. 76 FR 69895 - Approval and Promulgation of Implementation Plans; California; 2008 San Joaquin Valley PM2.5

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-09

    ... Control District and the California Air Resources Board. Finally, it is disapproving the SIP's contingency... that SIP revision on July 29, 2011. EPA also proposed to disapprove the contingency measures provisions... also today disapproving the SIP's contingency measure provisions because they do not provide sufficient...

  18. 78 FR 77628 - Approval and Promulgation of Air Quality Implementation Plans; New Hampshire; Manchester and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... Hampshire Department of Environmental Services (NH DES) submitted a SIP revision to EPA that contained... 8-hour CO standard. On August 1, 2012, the NH DES submitted a limited maintenance plan SIP revision... DES's SIP revision uses EPA's limited maintenance plan approach, as detailed in the EPA guidance...

  19. Correlation of ultrasound imaging of oral swallow with ventilatory alterations in cerebral palsied and normal children: preliminary observations.

    PubMed

    Kenny, D J; Casas, M J; McPherson, K A

    1989-01-01

    Preliminary results of an investigation that synchronizes the videotaped output of ultrasound camera and the analog data from physiological measurements of swallowing and ventilation in normal and cerebral palsied (CP) children are presented. Four cerebral palsied children and three control children undertook a single sip-swallow of 5 ml of liquid and a solid mastication-swallow sequence on three occasions according to a defined protocol. The CP children exhibited much more variability and less control of the liquid bolus than did the controls. The ultrasound image clearly demonstrates the lack of control of the posterior of the tongue in many CP children. Some parts of the sequence of oral swallow and the time to achieve maximum anterior displacement of the hyoid bone appear to be slowed. The sequential events of swallowing show less variability as the sip-swallow proceeds from the oral voluntary to pharyngeal and lower involuntary phases. This study also identified a short-latency apnea that appears to accompany a saliva (protective) swallow and a long-latency apnea that accompanies semi-solid or liquid bolus (alimentary) swallows. Further investigations of normal and CP children utilizing a combined diagnostic imaging-physiological measurement approach will follow this initial study.

  20. Forefoot deformity, pain, and mobility in rheumatoid and nonarthritic subjects.

    PubMed

    O'Connell, P G; Lohmann Siegel, K; Kepple, T M; Stanhope, S J; Gerber, L H

    1998-09-01

    To evaluate how painful metatarsal arthritis affects foot and ankle mechanics and mobility. We studied 16 symptomatic forefeet in 10 patients with rheumatoid arthritis (RA) and compared them with 14 asymptomatic forefeet in 7 nonarthritic subjects. RA limbs with significant disease at other locations were excluded. We measured pain and deformity of the foot using a visual analog scale and a modified articular index. A video based 3 dimensional gait analysis system and force platform were used to collect data on subjects walking barefoot at a self-selected pace according to an established protocol. Mobility level was quantified using the Sickness Impact Profile (SIP) ambulation subscale. We observed considerable pain and deformity of the forefeet of RA subjects. During gait, motion and force measures revealed that RA subjects significantly (p < 0.005) delayed and reduced forefoot loading, which minimized use of the foot as a rigid level for push off. As a result, stride lengths were shorter and gait was slower compared to nonarthritic subjects. SIP scores revealed that these changes in gait resulted in moderate disability in RA subjects (p=0.05). Impairments of the forefoot due to RA include pain and deformity, which produce characteristic stance phase abnormalities in foot function, a slow walking speed, and moderate disability.

  1. HotJava: Sun's Animated Interactive World Wide Web Browser for the Internet.

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Examines HotJava and Java, World Wide Web technology for use on the Internet. HotJava, an interactive, animated Web browser, based on the object-oriented Java programming language, is different from HTML-based browsers such as Netscape. Its client/server design does not understand Internet protocols but can dynamically find what it needs to know.…

  2. Automatic Response to Intrusion

    DTIC Science & Technology

    2002-10-01

    Computing Corporation Sidewinder Firewall [18] SRI EMERALD Basic Security Module (BSM) and EMERALD File Transfer Protocol (FTP) Monitors...the same event TCP Wrappers [24] Internet Security Systems RealSecure [31] SRI EMERALD IDIP monitor NAI Labs Generic Software Wrappers Prototype...included EMERALD , NetRadar, NAI Labs UNIX wrappers, ARGuE, MPOG, NetRadar, CyberCop Server, Gauntlet, RealSecure, and the Cyber Command System

  3. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  4. A data grid for imaging-based clinical trials

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Chao, Sander S.; Lee, Jasper; Liu, Brent; Documet, Jorge; Huang, H. K.

    2007-03-01

    Clinical trials play a crucial role in testing new drugs or devices in modern medicine. Medical imaging has also become an important tool in clinical trials because images provide a unique and fast diagnosis with visual observation and quantitative assessment. A typical imaging-based clinical trial consists of: 1) A well-defined rigorous clinical trial protocol, 2) a radiology core that has a quality control mechanism, a biostatistics component, and a server for storing and distributing data and analysis results; and 3) many field sites that generate and send image studies to the radiology core. As the number of clinical trials increases, it becomes a challenge for a radiology core servicing multiple trials to have a server robust enough to administrate and quickly distribute information to participating radiologists/clinicians worldwide. The Data Grid can satisfy the aforementioned requirements of imaging based clinical trials. In this paper, we present a Data Grid architecture for imaging-based clinical trials. A Data Grid prototype has been implemented in the Image Processing and Informatics (IPI) Laboratory at the University of Southern California to test and evaluate performance in storing trial images and analysis results for a clinical trial. The implementation methodology and evaluation protocol of the Data Grid are presented.

  5. Universal Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph; Kashefi, Elham

    2012-02-01

    Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's inputs, outputs and computation remain private. Recently we proposed a universal unconditionally secure BQC scheme, based on the conceptual framework of the measurement-based quantum computing model, where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. Here we present a refinement of the scheme which vastly expands the class of quantum circuits which can be directly implemented as a blind computation, by introducing a new class of resource states which we term dotted-complete graph states and expanding the set of single qubit states the client is required to prepare. These two modifications significantly simplify the overall protocol and remove the previously present restriction that only nearest-neighbor circuits could be implemented as blind computations directly. As an added benefit, the refined protocol admits a substantially more intuitive and simplified verification mechanism, allowing the correctness of a blind computation to be verified with arbitrarily small probability of error.

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  7. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  8. Secure Nearest Neighbor Query on Crowd-Sensing Data

    PubMed Central

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-01-01

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes. PMID:27669253

  9. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  10. Secure Nearest Neighbor Query on Crowd-Sensing Data.

    PubMed

    Cheng, Ke; Wang, Liangmin; Zhong, Hong

    2016-09-22

    Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU) situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes.

  11. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  12. The impact of mild induced hypothermia on the rate of transfusion and the mortality in severely injured patients: a retrospective multi-centre study.

    PubMed

    Jensen, Kai Oliver; Held, Leonhard; Kraus, Andrea; Hildebrand, Frank; Mommsen, Philipp; Mica, Ladislav; Wanner, Guido A; Steiger, Peter; Moos, Rudolf M; Simmen, Hans-Peter; Sprengel, Kai

    2016-10-06

    Although under discussion, induced hypothermia (IH) is an established therapy for patients with cardiac arrest or traumatic brain injuries. The influences on coagulopathy and bleeding tendency in severely injured patients (SIP) with concomitant traumatic brain injury are most widely unclear. Therefore, the aim of this study was to quantify the effect of mild IH in SIP with concomitant severe traumatic brain injuries on transfusion rate and mortality. In this retrospective multi-centre study, SIP from three European level-1 trauma centres with an ISS ≥16 between 2009 and 2011 were included. At hospital A, patients qualified for IH with age ≤70 years and a severe head injury with an abbreviated injury scale (AIS Head ) of ≥3. IH was defined as target core body temperature of 35 °C. Hypothermic patients were matched with two patients, one from hospital B and one from hospital C using age and AIS Head . The effect of IH on the transfusion rate, complications and mortality was quantified with 95 % confidence intervals (CI). Patients not treated with IH in hospital A and those from hospital B and C, who were not matched, were used to adjust the CI for the effect of inter-hospital therapy protocol differences. Mean age of patients in the IH-group (n = 43) was 35.7 years, mean ISS 30 points and sex distribution showed 83.7 % male. Mean age of matched patients in the normotherm-group (n = 86) was 36.7 years, mean ISS 33 points and there were 75.6 % males. For the hypothermic patients, we pointed out an estimate of mean difference for the number of transfused units of packed red blood cells as well as for mortality which does not indicate a decrease in the benefit gained by hypothermia. It is suggested that hypothermic patients tend to a higher rate of lung failure and thromboembolisms. Though tending to an increased rate of complications, there is no evidence for a difference in both; rate of transfusion and mortality in SIP. Mild IH as an option for severe head injuries seems as well-being practicable in the presence of multiple severe injuries. Further, clinical studies regarding the side effects are necessary.

  13. Development and feasibility of a Swallowing intervention Package (SiP) for patients receiving radiotherapy treatment for head and neck cancer-the SiP study protocol.

    PubMed

    Wells, Mary; King, Emma; Toft, Kate; MacAulay, Fiona; Patterson, Joanne; Dougall, Nadine; Hulbert-Williams, Nick; Boa, Sally; Slaven, Eleanor; Cowie, Julie; McGarva, John; Niblock, Patricia Gail; Philp, Julie; Roe, Justin

    2016-01-01

    Head and neck cancer (HNC) is the sixth most common cancer worldwide, and the functional, psychological and social consequences of HNC cancer and its treatment can be severe and chronic. Dysphagia (swallowing problems) affects up to two thirds of patients undergoing combined chemoradiotherapy. Recent reviews suggest that prophylactic swallowing exercises may improve a range of short- and long-term outcomes; however, the importance of psychological and behavioural factors on adherence to swallowing exercises has not been adequately studied. This study aims to develop and test the feasibility of a Swallowing intervention Package (SiP) designed in partnership with patients, speech and language therapists (SLTs) and other members of the head and neck multi-disciplinary team (MDT), for patients undergoing chemoradiotherapy (CRT) or radiotherapy (RT) for head and neck cancer. This feasibility study uses quantitative and qualitative research methods, within a quasi-experimental design, to assess whether patients will tolerate and adhere to the SiP intervention, which aspects of the intervention can be implemented and which cannot, whether treatment fidelity can be achieved across different contexts, whether study processes and outcome measures will be feasible and acceptable and to what extent the intervention is likely to have an impact on swallowing dysfunction and quality of life. Patients are being recruited from five sites in Scotland and England (three interventions and two usual care). The SLT based in the relevant intervention centre teaches the exercise programme and provides supporting materials. A combination of patient-reported outcome measures (PROMs), adherence measures and clinical swallowing assessments are used prior to intervention (baseline), at the end of treatment, 3 and 6 months post-treatment. This collaborative study has taken a unique approach to the development of a patient-centred and evidence-based swallowing intervention. The introduction of an e-SiP app provides an exploration of the use of technology in delivering this intervention. The study provides an opportunity to examine the feasibility of delivering and participating in a supported swallowing intervention across several different NHS sites and will provide the evidence needed to refine intervention and study processes for a future trial. NCRI portfolio, 18192 & 20259.

  14. An Item Response Theory (IRT) analysis of the Short Inventory of Problems-Alcohol and Drugs (SIP-AD) among non-treatment seeking men-who-have-sex-with-men: evidence for a shortened 10-item SIP-AD.

    PubMed

    Hagman, Brett T; Kuerbis, Alexis N; Morgenstern, Jon; Bux, Donald A; Parsons, Jeffrey T; Heidinger, Bram E

    2009-11-01

    The Short Inventory of Problems-Alcohol and Drugs (SIP-AD) is a 15-item measure that assesses concurrently negative consequences associated with alcohol and illicit drug use. Current psychometric evaluation has been limited to classical test theory (CTT) statistics, and it has not been validated among non-treatment seeking men-who-have-sex-with-men (MSM). Methods from Item Response Theory (IRT) can improve upon CTT by providing an in-depth analysis of how each item performs across the underlying latent trait that it is purported to measure. The present study examined the psychometric properties of the SIP-AD using methods from both IRT and CTT among a non-treatment seeking MSM sample (N=469). Participants were recruited from the New York City area and were asked to participate in a series of studies examining club drug use. Results indicated that five items on the SIP-AD demonstrated poor item misfit or significant differential item functioning (DIF) across race/ethnicity and HIV status. These five items were dropped and two-parameter IRT analyses were conducted on the remaining 10 items, which indicated a restricted range of item location parameters (-.15 to -.99) plotted at the lower end of the latent negative consequences severity continuum, and reasonably high discrimination parameters (1.30 to 2.22). Additional CTT statistics were compared between the original 15-item SIP-AD and the refined 10-item SIP-AD and suggest that the differences were negligible with the refined 10-item SIP-AD indicating a high degree of reliability and validity. Findings suggest the SIP-AD can be shortened to 10 items and appears to be a non-biased reliable and valid measure among non-treatment seeking MSM.

  15. Executive function is necessary for the regulation of the stepping activity when stepping in place in older adults.

    PubMed

    Dalton, Christopher; Sciadas, Ria; Nantel, Julie

    2016-10-01

    To determine the effect of age on stepping performance and to compare the cognitive demand required to regulate repetitive stepping between older and younger adults while performing a stepping in place task (SIP). Fourteen younger (25.4 ± 6.5) and 15 older adults (71.0 ± 9.0) participated in this study. They performed a seated category fluency task and Stroop test, followed by a 60 s SIP task. Following this, both the cognitive and motor tasks were performed simultaneously. We assessed cognitive performance, SIP cycle duration, asymmetry, and arrhythmicity. Compared to younger adults, older adults had larger SIP arrhythmicity both as a single task and when combined with the Category (p < 0.001) and Stroop (p < 0.01) tasks. Older adults also had larger arrhythmicity when dual tasking compared to SIP alone (p < 0.001). Older adults showed greater SIP asymmetry when combined with Category (p = 0.006) and Stroop (p = 0.06) tasks. Finally, they had lower cognitive performance than younger adults in both single and dual tasks (p < 0.01). Age and type of cognitive task performed with the motor task affected different components of stepping. While SIP arrhythmicity was larger for all conditions in older compared to younger adults, cycle duration was not different, and asymmetry tended to be larger during SIP when paired with a verbal fluency task. SIP does not require a high level of control for dynamic stability, therefore demonstrating that higher-level executive function is necessary for the regulation of stepping activity independently of the regulation of postural balance. Furthermore, older adults may lack the cognitive resources needed to adequately regulate stepping activity while performing a cognitive task relying on the executive function.

  16. BioBarcode: a general DNA barcoding database and server platform for Asian biodiversity resources

    PubMed Central

    2009-01-01

    Background DNA barcoding provides a rapid, accurate, and standardized method for species-level identification using short DNA sequences. Such a standardized identification method is useful for mapping all the species on Earth, particularly when DNA sequencing technology is cheaply available. There are many nations in Asia with many biodiversity resources that need to be mapped and registered in databases. Results We have built a general DNA barcode data processing system, BioBarcode, with open source software - which is a general purpose database and server. It uses mySQL RDBMS 5.0, BLAST2, and Apache httpd server. An exemplary database of BioBarcode has around 11,300 specimen entries (including GenBank data) and registers the biological species to map their genetic relationships. The BioBarcode database contains a chromatogram viewer which improves the performance in DNA sequence analyses. Conclusion Asia has a very high degree of biodiversity and the BioBarcode database server system aims to provide an efficient bioinformatics protocol that can be freely used by Asian researchers and research organizations interested in DNA barcoding. The BioBarcode promotes the rapid acquisition of biological species DNA sequence data that meet global standards by providing specialized services, and provides useful tools that will make barcoding cheaper and faster in the biodiversity community such as standardization, depository, management, and analysis of DNA barcode data. The system can be downloaded upon request, and an exemplary server has been constructed with which to build an Asian biodiversity system http://www.asianbarcode.org. PMID:19958506

  17. A price and performance comparison of three different storage architectures for data in cloud-based systems

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Jelenak, A.; Potter, N.; Fulker, D. W.; Habermann, T.

    2017-12-01

    Providing data services based on cloud computing technology that is equivalent to those developed for traditional computing and storage systems is critical for successful migration to cloud-based architectures for data production, scientific analysis and storage. OPeNDAP Web-service capabilities (comprising the Data Access Protocol (DAP) specification plus open-source software for realizing DAP in servers and clients) are among the most widely deployed means for achieving data-as-service functionality in the Earth sciences. OPeNDAP services are especially common in traditional data center environments where servers offer access to datasets stored in (very large) file systems, and a preponderance of the source data for these services is being stored in the Hierarchical Data Format Version 5 (HDF5). Three candidate architectures for serving NASA satellite Earth Science HDF5 data via Hyrax running on Amazon Web Services (AWS) were developed and their performance examined for a set of representative use cases. The performance was based both on runtime and incurred cost. The three architectures differ in how HDF5 files are stored in the Amazon Simple Storage Service (S3) and how the Hyrax server (as an EC2 instance) retrieves their data. The results for both the serial and parallel access to HDF5 data in the S3 will be presented. While the study focused on HDF5 data, OPeNDAP and the Hyrax data server, the architectures are generic and the analysis can be extrapolated to many different data formats, web APIs, and data servers.

  18. Efficient transmission of compressed data for remote volume visualization.

    PubMed

    Krishnan, Karthik; Marcellin, Michael W; Bilgin, Ali; Nadar, Mariappan S

    2006-09-01

    One of the goals of telemedicine is to enable remote visualization and browsing of medical volumes. There is a need to employ scalable compression schemes and efficient client-server models to obtain interactivity and an enhanced viewing experience. First, we present a scheme that uses JPEG2000 and JPIP (JPEG2000 Interactive Protocol) to transmit data in a multi-resolution and progressive fashion. The server exploits the spatial locality offered by the wavelet transform and packet indexing information to transmit, in so far as possible, compressed volume data relevant to the clients query. Once the client identifies its volume of interest (VOI), the volume is refined progressively within the VOI from an initial lossy to a final lossless representation. Contextual background information can also be made available having quality fading away from the VOI. Second, we present a prioritization that enables the client to progressively visualize scene content from a compressed file. In our specific example, the client is able to make requests to progressively receive data corresponding to any tissue type. The server is now capable of reordering the same compressed data file on the fly to serve data packets prioritized as per the client's request. Lastly, we describe the effect of compression parameters on compression ratio, decoding times and interactivity. We also present suggestions for optimizing JPEG2000 for remote volume visualization and volume browsing applications. The resulting system is ideally suited for client-server applications with the server maintaining the compressed volume data, to be browsed by a client with a low bandwidth constraint.

  19. Data Transfer Efficiency Over Satellite Circuits Using a Multi-Socket Extension to the File Transfer Protocol (FTP)

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn; Kruse, Hans

    1996-01-01

    In several experiments using NASA's Advanced Communications Technology Satellite (ACTS), investigators have reported disappointing throughput using the transmission control protocol/Internet protocol (TCP/IP) protocol suite over 1.536Mbit/sec (T1) satellite circuits. A detailed analysis of file transfer protocol (FTP) file transfers reveals that both the TCP window size and the TCP 'slow starter' algorithm contribute to the observed limits in throughput. In this paper we summarize the experimental and and theoretical analysis of the throughput limit imposed by TCP on the satellite circuit. We then discuss in detail the implementation of a multi-socket FTP, XFTP client and server. XFTP has been tested using the ACTS system. Finally, we discuss a preliminary set of tests on a link with non-zero bit error rates. XFTP shows promising performance under these conditions, suggesting the possibility that a multi-socket application may be less effected by bit errors than a single, large-window TCP connection.

  20. The Simulation of Read-time Scalable Coherent Interface

    NASA Technical Reports Server (NTRS)

    Li, Qiang; Grant, Terry; Grover, Radhika S.

    1997-01-01

    Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.

  1. Blind quantum computation over a collective-noise channel

    NASA Astrophysics Data System (ADS)

    Takeuchi, Yuki; Fujii, Keisuke; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki

    2016-05-01

    Blind quantum computation (BQC) allows a client (Alice), who only possesses relatively poor quantum devices, to delegate universal quantum computation to a server (Bob) in such a way that Bob cannot know Alice's inputs, algorithm, and outputs. The quantum channel between Alice and Bob is noisy, and the loss over the long-distance quantum communication should also be taken into account. Here we propose to use decoherence-free subspace (DFS) to overcome the collective noise in the quantum channel for BQC, which we call DFS-BQC. We propose three variations of DFS-BQC protocols. One of them, a coherent-light-assisted DFS-BQC protocol, allows Alice to faithfully send the signal photons with a probability proportional to a transmission rate of the quantum channel. In all cases, we combine the ideas based on DFS and the Broadbent-Fitzsimons-Kashefi protocol, which is one of the BQC protocols, without degrading unconditional security. The proposed DFS-based schemes are generic and hence can be applied to other BQC protocols where Alice sends quantum states to Bob.

  2. Towards a Standard Psychometric Diagnostic Interview for Subjects at Ultra High Risk of Psychosis: CAARMS versus SIPS

    PubMed Central

    Fusar-Poli, P.; Cappucciati, M.; Rutigliano, G.; Lee, T. Y.; Beverly, Q.; Bonoldi, I.; Lelli, J.; Kaar, S. J.; Gago, E.; Rocchetti, M.; Patel, R.; Bhavsar, V.; Tognin, S.; Badger, S.; Calem, M.; Lim, K.; Kwon, J. S.; Perez, J.; McGuire, P.

    2016-01-01

    Background. Several psychometric instruments are available for the diagnostic interview of subjects at ultra high risk (UHR) of psychosis. Their diagnostic comparability is unknown. Methods. All referrals to the OASIS (London) or CAMEO (Cambridgeshire) UHR services from May 13 to Dec 14 were interviewed for a UHR state using both the CAARMS 12/2006 and the SIPS 5.0. Percent overall agreement, kappa, the McNemar-Bowker χ 2 test, equipercentile methods, and residual analyses were used to investigate diagnostic outcomes and symptoms severity or frequency. A conversion algorithm (CONVERT) was validated in an independent UHR sample from the Seoul Youth Clinic (Seoul). Results. There was overall substantial CAARMS-versus-SIPS agreement in the identification of UHR subjects (n = 212, percent overall agreement = 86%; kappa = 0.781, 95% CI from 0.684 to 0.878; McNemar-Bowker test = 0.069), with the exception of the brief limited intermittent psychotic symptoms (BLIPS) subgroup. Equipercentile-linking table linked symptoms severity and frequency across the CAARMS and SIPS. The conversion algorithm was validated in 93 UHR subjects, showing excellent diagnostic accuracy (CAARMS to SIPS: ROC area 0.929; SIPS to CAARMS: ROC area 0.903). Conclusions. This study provides initial comparability data between CAARMS and SIPS and will inform ongoing multicentre studies and clinical guidelines for the UHR psychometric diagnostic interview. PMID:27314005

  3. Interoperability In The New Planetary Science Archive (PSA)

    NASA Astrophysics Data System (ADS)

    Rios, C.; Barbarisi, I.; Docasal, R.; Macfarlane, A. J.; Gonzalez, J.; Arviset, C.; Grotheer, E.; Besse, S.; Martinez, S.; Heather, D.; De Marchi, G.; Lim, T.; Fraga, D.; Barthelemy, M.

    2015-12-01

    As the world becomes increasingly interconnected, there is a greater need to provide interoperability with software and applications that are commonly being used globally. For this purpose, the development of the new Planetary Science Archive (PSA), by the European Space Astronomy Centre (ESAC) Science Data Centre (ESDC), is focused on building a modern science archive that takes into account internationally recognised standards in order to provide access to the archive through tools from third parties, for example by the NASA Planetary Data System (PDS), the VESPA project from the Virtual Observatory of Paris as well as other international institutions. The protocols and standards currently being supported by the new Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet-Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. The architecture of the PSA consists of a Geoserver (an open-source map server), the goal of which is to support use cases such as the distribution of search results, sharing and processing data through a OGC Web Feature Service (WFS) and a Web Map Service (WMS). This server also allows the retrieval of requested information in several standard output formats like Keyhole Markup Language (KML), Geography Markup Language (GML), shapefile, JavaScript Object Notation (JSON) and Comma Separated Values (CSV), among others. The provision of these various output formats enables end-users to be able to transfer retrieved data into popular applications such as Google Mars and NASA World Wind.

  4. On-line data display

    NASA Astrophysics Data System (ADS)

    Lang, Sherman Y. T.; Brooks, Martin; Gauthier, Marc; Wein, Marceli

    1993-05-01

    A data display system for embedded realtime systems has been developed for use as an operator's user interface and debugging tool. The motivation for development of the On-Line Data Display (ODD) have come from several sources. In particular the design reflects the needs of researchers developing an experimental mobile robot within our laboratory. A proliferation of specialized user interfaces revealed a need for a flexible communications and graphical data display system. At the same time the system had to be readily extensible for arbitrary graphical display formats which would be required for data visualization needs of the researchers. The system defines a communication protocol transmitting 'datagrams' between tasks executing on the realtime system and virtual devices displaying the data in a meaningful way on a graphical workstation. The communication protocol multiplexes logical channels on a single data stream. The current implementation consists of a server for the Harmony realtime operating system and an application written for the Macintosh computer. Flexibility requirements resulted in a highly modular server design, and a layered modular object- oriented design for the Macintosh part of the system. Users assign data types to specific channels at run time. Then devices are instantiated by the user and connected to channels to receive datagrams. The current suite of device types do not provide enough functionality for most users' specialized needs. Instead the system design allows the creation of new device types with modest programming effort. The protocol, design and use of the system are discussed.

  5. MSFC institutional area network and ATM technology

    NASA Technical Reports Server (NTRS)

    Amin, Ashok T.

    1994-01-01

    The New Institutional Area Network (NEWIAN) at Marshall supports over 5000 end users with access to 26 file servers providing work presentation services. It is comprised of some 150 Ethernet LAN's interconnected by bridges/routers which are in turn connected to servers over two dual FDDI rings. The network supports various higher level protocols such as IP, IPX, AppleTalk (AT), and DECNet. At present IPX and AT protocols packets are routed, and IP protocol packets are bridged; however, work is in progress to route all IP packets. The impact of routing IP packets on network operation is examined. Broadband Integrated Services Data Network (BISDN), presently at various stages of development, is intended to provide voice, video, and data transfer services over a single network. BISDN will use asynchronous transfer mode (ATM) as a data transfer technique which provides for transmission, multiplexing, switching, and relaying of small size data units called cells. Limited ATM Wide Area Network (WAN) services are offered by Wiltel, AT&T, Sprint, and others. NASA is testing a pilot ATM WAN with a view to provide Program Support Communication Network services using ATM. ATM supports wide range of data rates and quality of service requirements. It is expected that ATM switches will penetrate campus networks as well. However, presently products in these areas are at various stages of development and standards are not yet complete. We examine development of ATM to help assess its role in the evolution of NEWIAN.

  6. 77 FR 58032 - Approval and Promulgation of Implementation Plans; New Mexico; Albuquerque/Bernalillo County...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... prevention of significant deterioration (PSD) measures required in the SIP of any other state, with regard to... modify the PSD SIP to include nitrogen oxides (NO X ) as an ozone precursor. EPA is approving revisions to the Albuquerque/Bernalillo County PSD SIP that identify the PM 2.5 precursors and establish...

  7. 77 FR 31358 - Disease, Disability, and Injury Prevention and Control Special Interest Projects (SIPs): Initial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... announced below concerns Research to Enhance Community- Based Fall Prevention among Older Adults, SIP12-058, and Developing a Compendium of Measures and Questions to Assess Mobility: A Focus on Older Adult... Older Adults, SIP12-058, and Developing a Compendium of Measures and Questions to Assess Mobility: A...

  8. 40 CFR 52.1489 - Particulate matter (PM-10) Group II SIP commitments.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Particulate matter (PM-10) Group II SIP commitments. 52.1489 Section 52.1489 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate matter (PM-10) Group II SIP commitments. (a) On March 29, 1989, the Air Quality Officer for the...

  9. 40 CFR 52.1489 - Particulate matter (PM-10) Group II SIP commitments.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 4 2011-07-01 2011-07-01 false Particulate matter (PM-10) Group II SIP commitments. 52.1489 Section 52.1489 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Particulate matter (PM-10) Group II SIP commitments. (a) On March 29, 1989, the Air Quality Officer for the...

  10. 75 FR 6813 - Approval of Air Quality Implementation Plans; New Mexico; Albuquerque/Bernalillo County

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-11

    ...). ACTION: Direct final rule. SUMMARY: The EPA is approving revisions to the State Implementation Plan (SIP.... Background III. Summary of Changes to the New Mexico SIP IV. Final Action V. Statutory and Executive Order Reviews I. What Action Is EPA Taking? Today we are approving revisions to the New Mexico SIP, submitted by...

  11. 77 FR 67596 - Approval and Promulgation of Air Quality Implementation Plans; Montana; Revisions to the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-13

    ... Proposed Action on SIP Revisions V. Summary of EPA's Proposed Action VI. Statutory and Executive Order... Program, unless the context indicates otherwise. (xi) The initials SIP mean or refer to State... September 23, 2011 the State of Montana submitted new rules and revisions to revise the Montana SIP. The...

  12. 75 FR 6336 - Approval and Promulgation of Air Quality Implementation Plans; West Virginia; Removal of NOX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-09

    ... Promulgation of Air Quality Implementation Plans; West Virginia; Removal of NOX SIP Call Rules AGENCY... Implementation Plan (SIP) revision submitted by the State of West Virginia that removes West Virginia's nitrogen oxides (NOx) SIP Call rules. In the Final Rules section of this Federal Register, EPA is approving the...

  13. 78 FR 17108 - Approval and Promulgation of Implementation Plans; State of Washington; Revised Format for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... Plan Section H. When a SIP Revision Becomes Federally Enforceable I. The Historical Record of SIP... business assistance programs. H. When a SIP Revision Becomes Federally Enforceable All revisions to the... Administrative Code, Chapter 173-430--Burning of Field and Forage and Turf Grasses Grown for Seed Open Burning...

  14. Do Social Information-Processing Models Explain Aggressive Behaviour by Children with Mild Intellectual Disabilities in Residential Care?

    ERIC Educational Resources Information Center

    van Nieuwenhuijzen, M.; de Castro, B. O.; van der Valk, I.; Wijnroks, L.; Vermeer, A.; Matthys, W.

    2006-01-01

    Background: This study aimed to examine whether the social information-processing model (SIP model) applies to aggressive behaviour by children with mild intellectual disabilities (MID). The response-decision element of SIP was expected to be unnecessary to explain aggressive behaviour in these children, and SIP was expected to mediate the…

  15. 75 FR 16706 - Approval and Promulgation of Implementation Plans; Texas; Revisions to Voiding of Permits and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... Promulgation of Implementation Plans; Texas; Revisions to Voiding of Permits and Extension of Permits AGENCY... Implementation Plan (SIP). Within this SIP submittal, the State repealed a paragraph of the SIP rule pertaining... met, including a health effects review. EPA is proposing to approve the new replacement rule for this...

  16. Research on TCP/IP network communication based on Node.js

    NASA Astrophysics Data System (ADS)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  17. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    NASA Astrophysics Data System (ADS)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  18. Relationship between pore geometric characteristics and SIP/NMR parameters observed for mudstones

    NASA Astrophysics Data System (ADS)

    Robinson, J.; Slater, L. D.; Keating, K.; Parker, B. L.; Robinson, T.

    2017-12-01

    The reliable estimation of permeability remains one of the most challenging problems in hydrogeological characterization. Cost effective, non-invasive geophysical methods such as spectral induced polarization (SIP) and nuclear magnetic resonance (NMR) offer an alternative to traditional sampling methods as they are sensitive to the mineral surfaces and pore spaces that control permeability. We performed extensive physical characterization, SIP and NMR geophysical measurements on fractured rock cores extracted from a mudstone site in an effort to compare 1) the pore size characterization determined from traditional and geophysical methods and 2) the performance of permeability models based on these methods. We focus on two physical characterizations that are well-correlated with hydraulic properties: the pore volume normalized surface area (Spor) and an interconnected pore diameter (Λ). We find the SIP polarization magnitude and relaxation time are better correlated with Spor than Λ, the best correlation of these SIP measures for our sample dataset was found with Spor divided by the electrical formation factor (F). NMR parameters are, similarly, better correlated with Spor than Λ. We implement previously proposed mechanistic and empirical permeability models using SIP and NMR parameters. A sandstone-calibrated SIP model using a polarization magnitude does not perform well while a SIP model using a mean relaxation time performs better in part by more sufficiently accounting for the effects of fluid chemistry. A sandstone-calibrated NMR permeability model using an average measure of the relaxation time does not perform well, presumably due to small pore sizes which are either not connected or contain water of limited mobility. An NMR model based on the laboratory determined portions of the bound versus mobile portions of the relaxation distribution performed reasonably well. While limitations exist, there are many opportunities to use geophysical data to predict permeability in mudstone formations.

  19. SSL - THE SIMPLE SOCKETS LIBRARY

    NASA Technical Reports Server (NTRS)

    Campbell, C. E.

    1994-01-01

    The Simple Sockets Library (SSL) allows C programmers to develop systems of cooperating programs using Berkeley streaming Sockets running under the TCP/IP protocol over Ethernet. The SSL provides a simple way to move information between programs running on the same or different machines and does so with little overhead. The SSL can create three types of Sockets: namely a server, a client, and an accept Socket. The SSL's Sockets are designed to be used in a fashion reminiscent of the use of FILE pointers so that a C programmer who is familiar with reading and writing files will immediately feel comfortable with reading and writing with Sockets. The SSL consists of three parts: the library, PortMaster, and utilities. The user of the SSL accesses it by linking programs to the SSL library. The PortMaster initializes connections between clients and servers. The PortMaster also supports a "firewall" facility to keep out socket requests from unapproved machines. The "firewall" is a file which contains Internet addresses for all approved machines. There are three utilities provided with the SSL. SKTDBG can be used to debug programs that make use of the SSL. SPMTABLE lists the servers and port numbers on requested machine(s). SRMSRVR tells the PortMaster to forcibly remove a server name from its list. The package also includes two example programs: multiskt.c, which makes multiple accepts on one server, and sktpoll.c, which repeatedly attempts to connect a client to some server at one second intervals. SSL is a machine independent library written in the C-language for computers connected via Ethernet using the TCP/IP protocol. It has been successfully compiled and implemented on a variety of platforms, including Sun series computers running SunOS, DEC VAX series computers running VMS, SGI computers running IRIX, DECstations running ULTRIX, DEC alpha AXPs running OSF/1, IBM RS/6000 computers running AIX, IBM PC and compatibles running BSD/386 UNIX and HP Apollo 3000/4000/9000/400T computers running HP-UX. SSL requires 45K of RAM to run under SunOS and 80K of RAM to run under VMS. For use on IBM PC series computers and compatibles running DOS, SSL requires Microsoft C 6.0 and the Wollongong TCP/IP package. Source code for sample programs and debugging tools are provided. The documentation is available on the distribution medium in TeX and PostScript formats. The standard distribution medium for SSL is a .25 inch streaming magnetic tape cartridge (QIC-24) in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format and a 5.25 inch 360K MS-DOS format diskette. The SSL was developed in 1992 and was updated in 1993.

  20. 75 FR 19467 - Approval and Promulgation of Implementation Plans; Texas; Revisions to the New Source Review (NSR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-14

    ...EPA is taking final action to disapprove revisions to the SIP submitted by the State of Texas that relate to the Modification of Existing Qualified Facilities (the Qualified Facilities Program or the Program). EPA is disapproving the Texas Qualified Facilities Program because it does not meet the Minor NSR SIP requirements nor does it meet the NSR SIP requirements for a substitute Major NSR SIP revision. EPA is also approving three definitions that are severable from the Qualified Facilities submittals. These three definitions we are approving are, ``grandfathered facility,'' ``maximum allowable emission rate table (MAERT),'' and ``new facility.'' Moreover, we are making an administrative correction to the SIP-approved definition of ``facility.'' We are taking this action under section 110, part C, and part D of the Federal Clean Air Act (the Act or CAA).

  1. Multi-board kernel communication using socket programming for embedded applications

    NASA Astrophysics Data System (ADS)

    Mishra, Ashish; Girdhar, Neha; Krishnia, Nikita

    2016-03-01

    It is often seen in large application projects, there is a need to communicate between two different processors or two different kernels. The aim of this paper is to communicate between two different kernels and use efficient method to do so. The TCP/IP protocol is implemented to communicate between two boards via the Ethernet port and use lwIP (lightweight IP) stack, which is a smaller independent implementation of the TCP/IP stack suitable for use in embedded systems. While retaining TCP/IP functionality, lwIP stack reduces the use of memory and even size of the code. In this process of communication we made Raspberry pi as an active client and Field programmable gate array(FPGA) board as a passive server and they are allowed to communicate via Ethernet. Three applications based on TCP/IP client-server network communication have been implemented. The Echo server application is used to communicate between two different kernels of two different boards. Socket programming is used as it is independent of platform and programming language used. TCP transmit and receive throughput test applications are used to measure maximum throughput of the transmission of data. These applications are based on communication to an open source tool called iperf. It is used to measure the throughput transmission rate by sending or receiving some constant piece of data to the client or server according to the test application.

  2. A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking

    NASA Astrophysics Data System (ADS)

    Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes

    We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.

  3. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  4. "How Would You Feel? What Would You Do?" Development and Underpinnings of Preschoolers' Social Information Processing

    ERIC Educational Resources Information Center

    Denham, Susanne A.; Bassett, Hideko Hamada; Way, Erin; Kalb, Sara; Warren-Khot, Heather; Zinsser, Katherine

    2014-01-01

    Young children's social information processing (SIP) encompasses a series of steps by which they make sense of encounters with other persons; cognitive and emotional aspects of SIP often predict adjustment in school settings. More attention is needed, however, to the development of preschoolers' SIP and its potential foundations. To this end, a…

  5. 40 CFR 57.205 - Submission of supplementary information upon relaxation of an SO2 SIP emission limitation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 5 2011-07-01 2011-07-01 false Submission of supplementary information upon relaxation of an SO2 SIP emission limitation. 57.205 Section 57.205 Protection of Environment... Application and the NSO Process § 57.205 Submission of supplementary information upon relaxation of an SO2 SIP...

  6. Examining Factors Associated with (In)Stability in Social Information Processing among Urban School Children: A Latent Transition Analytic Approach

    ERIC Educational Resources Information Center

    Goldweber, Asha; Bradshaw, Catherine P.; Goodman, Kimberly; Monahan, Kathryn; Cooley-Strickland, Michele

    2011-01-01

    There is compelling evidence for the role of social information processing (SIP) in aggressive behavior. However, less is known about factors that influence stability versus instability in patterns of SIP over time. Latent transition analysis was used to identify SIP patterns over one year and examine how community violence exposure, aggressive…

  7. Fact Sheet on Revisions to the Clean Air Act Section 110 Submission Requirements for State Implementation Plans and Notice of Availability of an Option for Electronic Reporting

    EPA Pesticide Factsheets

    On February 3, 2015, the U.S. Environmental Protection Agency notified state, local and tribal air agencies that they have the option to submit state implementation plans (SIPs) using the EPA’s new electronic web-based SIP (eSIP) submission system.

  8. SIP Shear Walls: Cyclic Performance of High-Aspect-Ratio Segments and Perforated Walls

    Treesearch

    Vladimir Kochkin; Douglas R. Rammer; Kevin Kauffman; Thomas Wiliamson; Robert J. Ross

    2015-01-01

    Increasing stringency of energy codes and the growing market demand for more energy efficient buildings gives structural insulated panel (SIP) construction an opportunity to increase its use in commercial and residential buildings. However, shear wall aspect ratio limitations and lack of knowledge on how to design SIPs with window and door openings are barriers to the...

  9. Prospective study of clinician-entered research data in the Emergency Department using an Internet-based system after the HIPAA Privacy Rule

    PubMed Central

    Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S

    2004-01-01

    Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471

  10. microRNA-145 modulates epithelial-mesenchymal transition and suppresses proliferation, migration and invasion by targeting SIP1 in human cervical cancer cells.

    PubMed

    Sathyanarayanan, Anusha; Chandrasekaran, Karthik Subramanian; Karunagaran, Devarajan

    2017-04-01

    Previously, it has been reported that microRNA-145 (miR-145) is lowly expressed in human cervical cancers and that its putative tumour suppressive role may be attributed to epithelial-mesenchymal transition (EMT) regulation. Here, we aimed to assess whether miR-145 may affect EMT-associated markers/genes and suppress cervical cancer growth and motility, and to provide a mechanistic basis for these phenomena. The identification of the SMAD-interacting protein 1 (SIP1) mRNA as putative miR-145 target was investigated using a 3' untranslated region (3'UTR) luciferase assay and Western blotting, respectively. The functional effects of exogenous miR-145 expression, miR-145 suppression or siRNA-mediated SIP1 expression down-regulation in cervical cancer-derived C33A and SiHa cells were analysed using Western blotting, BrdU incorporation (proliferation), transwell migration and invasion assays. In addition, the expression levels of miR-145 and SIP1 were determined in primary human cervical cancer and non-cancer tissue samples using qRT-PCR. We found that miR-145 binds to the wild-type 3'UTR of SIP1, but not to its mutant counterpart, and that, through this binding, miR-145 can effectively down-regulate SIP1 expression. In addition, we found that exogenous miR-145 expression or siRNA-mediated down-regulation of SIP1 expression attenuates the proliferation, migration and invasion of C33A and SiHa cells and alters the expression of the EMT-associated markers CDH1, VIM and SNAI1, whereas inhibition of endogenous miR-145 expression elicited the opposite effects. The expression of miR-145 in cervical cancer tissue samples was found to be low, while that of SIP1 was found to be high compared to non-cancerous cervical tissues. An inverse expression correlation between the two was substantiated through the anlaysis of data deposited in the TCGA database. Our data indicate that low miR-145 expression levels in conjunction with elevated SIP1 expression levels may contribute to cervical cancer development. MiR-145-mediated regulation of SIP1 provides a novel mechanistic basis for its tumour suppressive mode of action in human cervical cancer cells.

  11. Vulnerability Analysis of the Player Command and Control Protocol

    DTIC Science & Technology

    2012-06-14

    client plug-ins currentl:v only exist for C++, . Java . and Python. Player is designed a.’:i a. client-server architecture in which robots running Player...I 0.. double -1.0272 angular velocity ;.... ~ va t- <ll ~ 38 2D 73 65 * :>, ""’::!’ ell I 0, +’ 00 00 00 01 uint8 t state 1 motor state v .S 2.5

  12. High Speed Oblivious Random Access Memory (HS-ORAM)

    DTIC Science & Technology

    2015-09-01

    Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors

  13. ReSTful OSGi Web Applications Tutorial

    NASA Technical Reports Server (NTRS)

    Shams, Khawaja; Norris, Jeff

    2008-01-01

    This slide presentation accompanies a tutorial on the ReSTful (Representational State Transfer) web application. Using Open Services Gateway Initiative (OSGi), ReST uses HTTP protocol to enable developers to offer services to a diverse variety of clients: from shell scripts to sophisticated Java application suites. It also uses Eclipse for the rapid development, the Eclipse debugger, the test application, and the ease of export to production servers.

  14. Technology: Cookies, Web Profilers, Social Network Cartography, and Proxy Servers

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…

  15. Protein-Protein Docking with F2Dock 2.0 and GB-Rerank

    PubMed Central

    Chowdhury, Rezaul; Rasheed, Muhibur; Keidel, Donald; Moussalem, Maysam; Olson, Arthur; Sanner, Michel; Bajaj, Chandrajit

    2013-01-01

    Motivation Computational simulation of protein-protein docking can expedite the process of molecular modeling and drug discovery. This paper reports on our new F2 Dock protocol which improves the state of the art in initial stage rigid body exhaustive docking search, scoring and ranking by introducing improvements in the shape-complementarity and electrostatics affinity functions, a new knowledge-based interface propensity term with FFT formulation, a set of novel knowledge-based filters and finally a solvation energy (GBSA) based reranking technique. Our algorithms are based on highly efficient data structures including the dynamic packing grids and octrees which significantly speed up the computations and also provide guaranteed bounds on approximation error. Results The improved affinity functions show superior performance compared to their traditional counterparts in finding correct docking poses at higher ranks. We found that the new filters and the GBSA based reranking individually and in combination significantly improve the accuracy of docking predictions with only minor increase in computation time. We compared F2 Dock 2.0 with ZDock 3.0.2 and found improvements over it, specifically among 176 complexes in ZLab Benchmark 4.0, F2 Dock 2.0 finds a near-native solution as the top prediction for 22 complexes; where ZDock 3.0.2 does so for 13 complexes. F2 Dock 2.0 finds a near-native solution within the top 1000 predictions for 106 complexes as opposed to 104 complexes for ZDock 3.0.2. However, there are 17 and 15 complexes where F2 Dock 2.0 finds a solution but ZDock 3.0.2 does not and vice versa; which indicates that the two docking protocols can also complement each other. Availability The docking protocol has been implemented as a server with a graphical client (TexMol) which allows the user to manage multiple docking jobs, and visualize the docked poses and interfaces. Both the server and client are available for download. Server: http://www.cs.utexas.edu/~bajaj/cvc/software/f2dock.shtml. Client: http://www.cs.utexas.edu/~bajaj/cvc/software/f2dockclient.shtml. PMID:23483883

  16. Oceanotron, Scalable Server for Marine Observations

    NASA Astrophysics Data System (ADS)

    Loubrieu, T.; Bregent, S.; Blower, J. D.; Griffiths, G.

    2013-12-01

    Ifremer, French marine institute, is deeply involved in data management for different ocean in-situ observation programs (ARGO, OceanSites, GOSUD, ...) or other European programs aiming at networking ocean in-situ observation data repositories (myOcean, seaDataNet, Emodnet). To capitalize the effort for implementing advance data dissemination services (visualization, download with subsetting) for these programs and generally speaking water-column observations repositories, Ifremer decided to develop the oceanotron server (2010). Knowing the diversity of data repository formats (RDBMS, netCDF, ODV, ...) and the temperamental nature of the standard interoperability interface profiles (OGC/WMS, OGC/WFS, OGC/SOS, OpeNDAP, ...), the server is designed to manage plugins: - StorageUnits : which enable to read specific data repository formats (netCDF/OceanSites, RDBMS schema, ODV binary format). - FrontDesks : which get external requests and send results for interoperable protocols (OGC/WMS, OGC/SOS, OpenDAP). In between a third type of plugin may be inserted: - TransformationUnits : which enable ocean business related transformation of the features (for example conversion of vertical coordinates from pressure in dB to meters under sea surface). The server is released under open-source license so that partners can develop their own plugins. Within MyOcean project, University of Reading has plugged a WMS implementation as an oceanotron frontdesk. The modules are connected together by sharing the same information model for marine observations (or sampling features: vertical profiles, point series and trajectories), dataset metadata and queries. The shared information model is based on OGC/Observation & Measurement and Unidata/Common Data Model initiatives. The model is implemented in java (http://www.ifremer.fr/isi/oceanotron/javadoc/). This inner-interoperability level enables to capitalize ocean business expertise in software development without being indentured to specific data formats or protocols. Oceanotron is deployed at seven European data centres for marine in-situ observations within myOcean. While additional extensions are still being developed, to promote new collaborative initiatives, a work is now done on continuous and distributed integration (jenkins, maven), shared reference documentation (on alfresco) and code and release dissemination (sourceforge, github).

  17. Interventional effects of squid ink polysaccharides on cyclophosphamide-associated testicular damage in mice.

    PubMed

    Le, X Y; Luo, P; Gu, Y P; Tao, Y X; Liu, H Z

    2015-01-01

    Cyclophosphamide (CP) is a commonly used antitumour and immunosuppressive drug, but it is inevitable that the chemotherapeutic agent may cause long-term or permanent reproductive damage on young male patients through inducing oxidative stress in the testes. Squid ink polysaccharides (SIP), a newly found marine glycosaminoglycon have been proved to have antioxidant capabilities and chemotherapy-protective activities on model animals in our recent investigations. This study was conducted to assess whether or not SIP could protect male mice against gonadotoxicity during CP exposure. Sexually mature male Kunming mice were allocated to one of four groups. CP was abdominally administered at dose of 15 mg/kg body weight to two groups of mice for ten weeks, once a week, one group of mice received SIP at dose of 80 mg/kg body weight by gavage for ten weeks, once a day. The other two groups comprised a vehicle treated group and an SIP treated group. Toxicity of CP and protective activity of SIP on the testes were assessed by: sperm parameters, organ index, testicular antioxidant ability, activities of marker enzymes, sex hormone content, and histopathological features. Data showed CP-induced, serious negative changes on murine sperm parameters, organ index, testicular antioxidant ability, activities of marker enzymes, sexual hormone contents, and histopathological features which were all significantly impaired by SIP. This study found that SIP were demonstrated to offer protective effects against CP-induced toxicity on testes in mice (Tab. 2, Fig. 3, Ref. 29).

  18. Effectiveness of urban shelter-in-place—II: Residential districts

    NASA Astrophysics Data System (ADS)

    Chan, Wanyu R.; Nazaroff, William W.; Price, Phillip N.; Gadgil, Ashok J.

    In the event of a short-term, large-scale toxic chemical release to the atmosphere, shelter-in-place (SIP) may be used as an emergency response to protect public health. We modeled hypothetical releases using realistic, empirical parameters to explore how key factors influence SIP effectiveness for single-family dwellings in a residential district. Four classes of factors were evaluated in this case study: (a) time scales associated with release duration, SIP implementation delay, and SIP termination; (b) building air-exchange rates, including air infiltration and ventilation; (c) the degree of sorption of toxic chemicals to indoor surfaces; and (d) the shape of the dose-response relationship for acute adverse health effects. Houses with lower air leakage are more effective shelters, and thus variability in the air leakage of dwellings is associated with varying degrees of SIP protection in a community. Sorption on indoor surfaces improves SIP effectiveness by lowering the peak indoor concentrations and reducing the amount of contamination in the indoor air. Nonlinear dose-response relationships imply substantial reduction in adverse health effects from lowering the peak exposure concentration. However, if the scenario is unfavorable for indefinite sheltering (e.g. sheltering in leaky houses for protection against a nonsorbing chemical with a linear dose-response), the community must implement SIP without delay and exit from shelter when it first becomes safe to do so. Otherwise, the community can be subjected to even greater risk than if they did not take shelter indoors.

  19. Psychometric properties of a Spanish-language version of the Short Inventory of Problems

    PubMed Central

    Kiluk, Brian D.; Dreifuss, Jessica A.; Weiss, Roger D.; Horigian, Viviana E.; Carroll, Kathleen M.

    2013-01-01

    Hispanic Americans are substantially under-represented in clinical and research samples for substance use treatment, with language cited as one of the major barriers to their participation, indicating a need for more validated assessments in Spanish. This study evaluated the psychometric properties of a Spanish version of the Short Inventory of Problems (SIP), used in a multisite, randomized trial conducted for Spanish-speaking substance users. The sample included 405 Spanish-speaking treatment seekers, mostly male (88%) and legally mandated to treatment (71%). The Spanish version of the revised SIP (SIP-RS), as well as other commonly-used assessment measures translated into Spanish, were administered at baseline and at the end of treatment. Internal consistency was excellent (α = .96), and construct validity was supported through correlations with composite scores from the Addiction Severity Index (ASI) (e.g., r = .57, p<.01 for ASI drug composite), and through differential SIP-RS scores according to diagnostic criteria. The SIP-RS also demonstrated an association with substance use and treatment retention, with higher baseline scores associated with significantly less abstinence during treatment (β = −.22, p<.01) and fewer days retained in treatment (β = −.14, p<.05). However, the latter association was moderated by participants’ legal status. Nevertheless, this Spanish-translated version of the SIP (SIP-RS) appears to be a reliable and valid assessment of adverse consequences associated with alcohol and drug use, with psychometric properties comparable to the English version. PMID:23772760

  20. AsteriX: a Web server to automatically extract ligand coordinates from figures in PDF articles.

    PubMed

    Lounnas, V; Vriend, G

    2012-02-27

    Coordinates describing the chemical structures of small molecules that are potential ligands for pharmaceutical targets are used at many stages of the drug design process. The coordinates of the vast majority of ligands can be obtained from either publicly accessible or commercial databases. However, interesting ligands sometimes are only available from the scientific literature, in which case their coordinates need to be reconstructed manually--a process that consists of a series of time-consuming steps. We present a Web server that helps reconstruct the three-dimensional (3D) coordinates of ligands for which a two-dimensional (2D) picture is available in a PDF file. The software, called AsteriX, analyses every picture contained in the PDF file and attempts to determine automatically whether or not it contains ligands. Areas in pictures that may contain molecular structures are processed to extract connectivity and atom type information that allow coordinates to be subsequently reconstructed. The AsteriX Web server was tested on a series of articles containing a large diversity in graphical representations. In total, 88% of 3249 ligand structures present in the test set were identified as chemical diagrams. Of these, about half were interpreted correctly as 3D structures, and a further one-third required only minor manual corrections. It is principally impossible to always correctly reconstruct 3D coordinates from pictures because there are many different protocols for drawing a 2D image of a ligand, but more importantly a wide variety of semantic annotations are possible. The AsteriX Web server therefore includes facilities that allow the users to augment partial or partially correct 3D reconstructions. All 3D reconstructions are submitted, checked, and corrected by the users domain at the server and are freely available for everybody. The coordinates of the reconstructed ligands are made available in a series of formats commonly used in drug design research. The AsteriX Web server is freely available at http://swift.cmbi.ru.nl/bitmapb/.

Top