832 resultados para role based access control


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tuber formation in potato (Solanum tuberosum) is promoted by short photoperiods and is inhibited by gibberellins (GAs). Endogenous levels of GA1 were shown to decrease in stolons and leaves of potato plants induced to tuberize, which suggests that photoperiodic regulation of GA biosynthesis may play a role in tuber induction. We report the isolation of three potato cDNA clones (StGA20ox1–3) encoding GA 20-oxidase, a key regulatory enzyme in the GA-biosynthetic pathway. Using northern analysis, we detected a differential pattern of tissue-specific expression of the mRNAs corresponding to these clones. StGA20ox mRNAs were also very abundant in leaves of the potato ga1 mutant, which is blocked in the 13-hydroxylation step, and were strongly down-regulated by gibberellic acid, suggesting a feedback regulation of these genes. In plants grown in short-day (inductive) conditions, levels of the StGA20ox transcripts in leaves fluctuated during a 24-h period, with a peak of accumulation observed about 4 h after the lights were turned off. Interruption of the night with a 30-min “night break” of light (noninductive conditions) did not have a marked effect on the levels of accumulation of the three GA 20-oxidase mRNAs during the day, but it induced a second peak of expression of StGA20ox1 and StGA20ox3 transcripts late in the night. This observation, together with the finding that StGA20ox1 mRNA is expressed at high levels in leaves, suggests that night-break induction of this gene might play a role in the control of tuberization by regulating endogenous levels of GAs in response to daylength conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Foster parents have the potential to effect lasting therapeutic change through their role with the children they temporarily foster. Therapists working with foster parents can understand, support, and inform foster parents in their role based on a commonality that exists between the roles of therapists and foster parents. Similarities at different stages of both the therapeutic and foster parenting relationships are addressed, as well as the use of these relationships in a therapeutic manner. Advantages (for foster parents, foster children, therapists, and the foster care system) of articulating the foster parenting relationship through the lens of the therapeutic relationship are also discussed. Future research into the experience of foster parents in their role will be essential in creating an effective and sustainable system of care for vulnerable children.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Barrett's esophagus, a metaplastic precursor to esophageal adenocarcinoma, is becoming increasingly prevalent in many populations. Clinical studies suggest acid reflux causes Barrett's esophagus; however, no population-based estimates of risk have been reported, and the role of other health factors in modifying risk is unclear. Methods: We conducted a population-based case-control study in Brisbane, Australia. Cases were 167 patients with histologically confirmed Barrett's esophagus diagnosed between February and December 2003. Age-matched and sex-matched controls (n = 261) were randomly selected from a population register. Data on exposure to self-reported symptoms of acid reflux, smoking, obesity, and other factors were collected through self-completed questionnaires followed by telephone interview. Risks of Barrett's esophagus and Barrett's esophagus with dysplasia associated with these exposures were estimated by the odds ratio (OR) and 95% confidence interval (95% Cl), both crude and adjusted for other factors. Results: Self-reported weekly episodes of acid reflux were associated with greatly increased risks of Barrett's esophagus (adjusted OR, 29.7; 95% CI, 12.2-72.6) and Barrett's esophagus with dysplasia (OR, 59.7; 95% CI, 18.5-193). Smoking was also associated with risk of Barrett's esophagus. We found evidence of interactions between symptoms of acid reflux and smoking and obesity. Obese people with self-reported symptoms of acid reflux had markedly higher risks of Barrett's esophagus (OR, 34.4; 95% CI, 6.3-188) than people with reflux alone (OR, 9.3; 95% CI, 1.4-62.2) or obesity alone (OR, 0.7,95% CI, 0.2-2.4). Similarly, those reporting both acid reflux symptoms and smoking were at substantially higher risks of Barrett's esophagus (OR, 51.4; 95% CI, 14.1-188) than those reporting acid reflux or smoking alone. Conclusions: Although history of symptoms of acid reflux is the principle factor associated with Barrett's esophagus, risks are substantially increased by obesity and smoking.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of click-stream data will lead to capture usage pattern information. Nowadays Web usage mining technique has become one of most widely used methods for Web recommendation, which customizes Web content to user-preferred style. Traditional techniques of Web usage mining, such as Web user session or Web page clustering, association rule and frequent navigational path mining can only discover usage pattern explicitly. They, however, cannot reveal the underlying navigational activities and identify the latent relationships that are associated with the patterns among Web users as well as Web pages. In this work, we propose a Web recommendation framework incorporating Web usage mining technique based on Probabilistic Latent Semantic Analysis (PLSA) model. The main advantages of this method are, not only to discover usage-based access pattern, but also to reveal the underlying latent factor as well. With the discovered user access pattern, we then present user more interested content via collaborative recommendation. To validate the effectiveness of proposed approach, we conduct experiments on real world datasets and make comparisons with some existing traditional techniques. The preliminary experimental results demonstrate the usability of the proposed approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A local area network that can support both voice and data packets offers economic advantages due to the use of only a single network for both types of traffic, greater flexibility to changing user demands, and it also enables efficient use to be made of the transmission capacity. The latter aspect is very important in local broadcast networks where the capacity is a scarce resource, for example mobile radio. This research has examined two types of local broadcast network, these being the Ethernet-type bus local area network and a mobile radio network with a central base station. With such contention networks, medium access control (MAC) protocols are required to gain access to the channel. MAC protocols must provide efficient scheduling on the channel between the distributed population of stations who want to transmit. No access scheme can exceed the performance of a single server queue, due to the spatial distribution of the stations. Stations cannot in general form a queue without using part of the channel capacity to exchange protocol information. In this research, several medium access protocols have been examined and developed in order to increase the channel throughput compared to existing protocols. However, the established performance measures of average packet time delay and throughput cannot adequately characterise protocol performance for packet voice. Rather, the percentage of bits delivered within a given time bound becomes the relevant performance measure. Performance evaluation of the protocols has been examined using discrete event simulation and in some cases also by mathematical modelling. All the protocols use either implicit or explicit reservation schemes, with their efficiency dependent on the fact that many voice packets are generated periodically within a talkspurt. Two of the protocols are based on the existing 'Reservation Virtual Time CSMA/CD' protocol, which forms a distributed queue through implicit reservations. This protocol has been improved firstly by utilising two channels, a packet transmission channel and a packet contention channel. Packet contention is then performed in parallel with a packet transmission to increase throughput. The second protocol uses variable length packets to reduce the contention time between transmissions on a single channel. A third protocol developed, is based on contention for explicit reservations. Once a station has achieved a reservation, it maintains this effective queue position for the remainder of the talkspurt and transmits after it has sensed the transmission from the preceeding station within the queue. In the mobile radio environment, adaptions to the protocols were necessary in order that their operation was robust to signal fading. This was achieved through centralised control at a base station, unlike the local area network versions where the control was distributed at the stations. The results show an improvement in throughput compared to some previous protocols. Further work includes subjective testing to validate the protocols' effectiveness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this thesis was to extend previous research on intentional forgetting in depressed states. The first experiment used the think/no-think paradigm, and found that although dysphoric individuals were significantly worse at suppressing emotional (positive and negative) words than non-dysphoric individuals, both groups were unsuccessful at direct thought suppression. However, there was no effect of rumination on dysphoric individuals' ability to intentionally forget material. Furthermore, there was also no group differences in attentional measures of Stroop and IDEO. The second experiment involved modifying the TNT task, by including the use of substitute words in the suppression phase, in order to determine whether recalling substitute words during suppression would increase the level of forgetting. The findings from the study revealed that both dysphoric and non-dysphoric individuals were successful at intentionally forgetting neutral words using a thought substitution strategy. However, both groups were impaired at suppressing words in the direct thought substitution condition. The third experiment investigated the influence of thought substitution on intentional forgetting of emotional words in dysphoria. The study replicated experiment two, but used emotional (i.e. positive and depression-relevant) words instead of neutral words. The study found that dysphoric individuals were still impaired in their ability to suppress emotional material. Furthermore, dysphoric individuals were recalling significantly more depression­ relevant respond and previously-suppressed words. The fourth experiment examined the role of executive control in intentional forgetting. In the study, dysphoric and non­ dysphoric participants were categorised as having good or poor executive control based on their scores on the operation span with words task (OSPAN). The study found that non-dysphoric individuals with good control demonstrated successful suppression. However, dysphoric individuals with good control were unsuccessful at suppression. The fifth experiment investigated whether experimentally induced changes in mood state would alter an individual's ability to intentionally forget emotional material. Non-dysphoric healthy participants were given a positive or negative autobiographical memory and music mood induction. They completed two modified think/no-think tasks, one prior to the mood induction and one after the mood induction. The study found that transient negative mood state impaired intentional forgetting of depression-relevant material. Summary: Taken together, the findings suggest that individuals in a depressed mood are impaired in their ability to intentionally forget emotional material, even with the use of a thought substitution strategy. Furthermore, the findings implicate poor executive control and negative mood state in impaired intentional forgetting. An important theme emerging from the findings was the role of an inhibitory mechanism in intentional forgetting. The findings reported in this thesis suggest that thought substitution involves engaging an inhibitory control mechanism that contributes to successful intentional forgetting. The findings have clear implications on depressed individuals everyday functioning, and suggest that even with the presence of effective distraction, dysphoric indivduals are imapired in their ability to suppress emotional material. Furthermore, it is suggested that impaired intentional forgetting of emotional material may contribute to the maintenance of depressed mood, and could potentially worsen ongoing depression.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dedicated short range communications (DSRC) has been regarded as one of the most promising technologies to provide robust communications for large scale vehicle networks. It is designed to support both road safety and commercial applications. Road safety applications will require reliable and timely wireless communications. However, as the medium access control (MAC) layer of DSRC is based on the IEEE 802.11 distributed coordination function (DCF), it is well known that the random channel access based MAC cannot provide guaranteed quality of services (QoS). It is very important to understand the quantitative performance of DSRC, in order to make better decisions on its adoption, control, adaptation, and improvement. In this paper, we propose an analytic model to evaluate the DSRC-based inter-vehicle communication. We investigate the impacts of the channel access parameters associated with the different services including arbitration inter-frame space (AIFS) and contention window (CW). Based on the proposed model, we analyze the successful message delivery ratio and channel service delay for broadcast messages. The proposed analytical model can provide a convenient tool to evaluate the inter-vehicle safety applications and analyze the suitability of DSRC for road safety applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network's performance compared to WCPS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IEEE 802.16 standards have been developed as one of the technical solutions for broadband wireless access systems. It has high data rate, large network coverage, flexible QoS schemes and cheap network deployment. Various flexible mechanisms related to QoS provisioning have been specified for uplink traffic at the medium access control (MAC) layer in the standards. Among the mechanisms, contention based bandwidth request scheme can be used to indicate bandwidth demands to the base station for the non-real-time polling and besteffort services. These two services are used for most application with unknown traffic characteristics. Due to the diverse QoS requirements of those applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth allocation priorities. The effectiveness of the differentiation schemes are evaluated by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth allocation priority, the SD performances will be better. ©2008 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed network utility maximization (NUM) is receiving increasing interests for cross-layer optimization problems in multihop wireless networks. Traditional distributed NUM algorithms rely heavily on feedback information between different network elements, such as traffic sources and routers. Because of the distinct features of multihop wireless networks such as time-varying channels and dynamic network topology, the feedback information is usually inaccurate, which represents as a major obstacle for distributed NUM application to wireless networks. The questions to be answered include if distributed NUM algorithm can converge with inaccurate feedback and how to design effective distributed NUM algorithm for wireless networks. In this paper, we first use the infinitesimal perturbation analysis technique to provide an unbiased gradient estimation on the aggregate rate of traffic sources at the routers based on locally available information. On the basis of that, we propose a stochastic approximation algorithm to solve the distributed NUM problem with inaccurate feedback. We then prove that the proposed algorithm can converge to the optimum solution of distributed NUM with perfect feedback under certain conditions. The proposed algorithm is applied to the joint rate and media access control problem for wireless networks. Numerical results demonstrate the convergence of the proposed algorithm. © 2013 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IEEE 802.15.4 networks (also known as ZigBee networks) has the features of low data rate and low power consumption. In this paper we propose an adaptive data transmission scheme which is based on CSMA/CA access control scheme, for applications which may have heavy traffic loads such as smart grids. In the proposed scheme, the personal area network (PAN) coordinator will adaptively broadcast a frame length threshold, which is used by the sensors to make decision whether a data frame should be transmitted directly to the target destinations, or follow a short data request frame. If the data frame is long and prone to collision, use of a short data request frame can efficiently reduce the costs of the potential collision on the energy and bandwidth. Simulation results demonstrate the effectiveness of the proposed scheme with largely improve bandwidth and power efficiency. © 2011 Springer-Verlag.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Various flexible mechanisms related to quality of service (QoS) provisioning have been specified for uplink traffic at the medium access control (MAC) layer in the IEEE 802.16 standards. Among the mechanisms, contention based bandwidth request scheme can be used to indicate bandwidth demands to the base station for the non-real-time polling and best-effort services. These two services are used for most applications with unknown traffic characteristics. Due to the diverse QoS requirements of those applications, service differentiation (SD) is anticipated over the contention based bandwidth request scheme. In this paper we investigate the SD with the bandwidth request scheme by means of assigning different channel access parameters and bandwidth allocation priorities at different packets arrival probability. The effectiveness of the differentiation schemes is evaluated by simulations. It is observed that the initial backoff window can be efficient in SD, and if combined with the bandwidth allocation priority, the SD performances will be better.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the features of low-power and flexible networking capabilities IEEE 802.15.4 has been widely regarded as one strong candidate of communication technologies for wireless sensor networks (WSNs). It is expected that with an increasing number of deployments of 802.15.4 based WSNs, multiple WSNs could coexist with full or partial overlap in residential or enterprise areas. As WSNs are usually deployed without coordination, the communication could meet significant degradation with the 802.15.4 channel access scheme, which has a large impact on system performance. In this thesis we are motivated to investigate the effectiveness of 802.15.4 networks supporting WSN applications with various environments, especially when hidden terminals are presented due to the uncoordinated coexistence problem. Both analytical models and system level simulators are developed to analyse the performance of the random access scheme specified by IEEE 802.15.4 medium access control (MAC) standard for several network scenarios. The first part of the thesis investigates the effectiveness of single 802.15.4 network supporting WSN applications. A Markov chain based analytic model is applied to model the MAC behaviour of IEEE 802.15.4 standard and a discrete event simulator is also developed to analyse the performance and verify the proposed analytical model. It is observed that 802.15.4 networks could sufficiently support most WSN applications with its various functionalities. After the investigation of single network, the uncoordinated coexistence problem of multiple 802.15.4 networks deployed with communication range fully or partially overlapped are investigated in the next part of the thesis. Both nonsleep and sleep modes are investigated with different channel conditions by analytic and simulation methods to obtain the comprehensive performance evaluation. It is found that the uncoordinated coexistence problem can significantly degrade the performance of 802.15.4 networks, which is unlikely to satisfy the QoS requirements for many WSN applications. The proposed analytic model is validated by simulations which could be used to obtain the optimal parameter setting before WSNs deployments to eliminate the interference risks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed network utility maximization (NUM) is receiving increasing interests for cross-layer optimization problems in multihop wireless networks. Traditional distributed NUM algorithms rely heavily on feedback information between different network elements, such as traffic sources and routers. Because of the distinct features of multihop wireless networks such as time-varying channels and dynamic network topology, the feedback information is usually inaccurate, which represents as a major obstacle for distributed NUM application to wireless networks. The questions to be answered include if distributed NUM algorithm can converge with inaccurate feedback and how to design effective distributed NUM algorithm for wireless networks. In this paper, we first use the infinitesimal perturbation analysis technique to provide an unbiased gradient estimation on the aggregate rate of traffic sources at the routers based on locally available information. On the basis of that, we propose a stochastic approximation algorithm to solve the distributed NUM problem with inaccurate feedback. We then prove that the proposed algorithm can converge to the optimum solution of distributed NUM with perfect feedback under certain conditions. The proposed algorithm is applied to the joint rate and media access control problem for wireless networks. Numerical results demonstrate the convergence of the proposed algorithm. © 2013 John Wiley & Sons, Ltd.