843 resultados para Predictable routing


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most organisms use circadian oscillators to coordinate physiological and developmental processes such as growth with predictable daily environmental changes like sunrise and sunset. The importance of such coordination is highlighted by studies showing that circadian dysfunction causes reduced fitness in bacteria and plants, as well as sleep and psychological disorders in humans. Plant cell growth requires energy and water-factors that oscillate owing to diurnal environmental changes. Indeed, two important factors controlling stem growth are the internal circadian oscillator and external light levels. However, most circadian studies have been performed in constant conditions, precluding mechanistic study of interactions between the clock and diurnal variation in the environment. Studies of stem elongation in diurnal conditions have revealed complex growth patterns, but no mechanism has been described. Here we show that the growth phase of Arabidopsis seedlings in diurnal light conditions is shifted 8-12 h relative to plants in continuous light, and we describe a mechanism underlying this environmental response. We find that the clock regulates transcript levels of two basic helix-loop-helix genes, phytochrome-interacting factor 4 (PIF4) and PIF5, whereas light regulates their protein abundance. These genes function as positive growth regulators; the coincidence of high transcript levels (by the clock) and protein accumulation (in the dark) allows them to promote plant growth at the end of the night. Thus, these two genes integrate clock and light signalling, and their coordinated regulation explains the observed diurnal growth rhythms. This interaction may serve as a paradigm for understanding how endogenous and environmental signals cooperate to control other processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A common operation in wireless ad hoc networks is the flooding of broadcast messages to establish network topologies and routing tables. The flooding of broadcast messages is, however, a resource consuming process. It might require the retransmission of messages by most network nodes. It is, therefore, very important to optimize this operation. In this paper, we first analyze the multipoint relaying (MPR) flooding mechanism used by the Optimized Link State Routing (OLSR) protocol to distribute topology control (TC) messages among all the system nodes. We then propose a new flooding method, based on the fusion of two key concepts: distance-enabled multipoint relaying and connected dominating set (CDS) flooding. We present experimental simulationsthat show that our approach improves the performance of previous existing proposals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the evolution of the P2P research eld, new problems, such as those related with information security, have arisen. It is important to provide security mechanisms to P2P systems, since it has already become one of the key issues when evaluating them. However, even though many P2P systems have been adapted to provide a security baseline to their underlying applications, more advanced capabilities are becoming necessary. Speci cally, privacy preservation and anonymity are deemed essential to make the information society sustainable. Unfortunately, sometimes, it may be di cult to attain anonymity unless it is included into the system's initial design. The JXTA open protocols speci cation is a good example of this kind of scenario. This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints'identities to third parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Las redes móviles ad hoc son redes formadas por lainterconexión de terminales inalámbricos que de manera autónoma,sin ninguna administración central, establecen enlaces decomunicación entre ellos. La infraestructura de red la componenlos propios terminales de usuarios que actúan de gestores yencaminadores de paquetes. Así, un usuario cualquiera puedeconectarse con un terminal remoto a través de una conexiónmultisalto entre diferentes usuarios. En este tipo de redes tanabiertas, uno de los retos prioritarios es proteger el anonimatode los sujetos y sus localizaciones. En este artículo hacemos unrepaso de las técnicas existentes a través de los protocolos que sehan propuesto en la literatura, y exponemos los problemas queaun quedan abiertos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los mecanismos de seguridad son uno de losrequisitos fundamentales para el buen funcionamiento de los protocolos de redes ad hoc móviles. En este artículo se analizan los problemas de seguridad de los protocolos de encaminamiento básicos, se describen las soluciones de seguridad existentes, y se hace un estudio del coste computacional y energético que supone para el sistema la inclusión de mecanismosde seguridad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Broadcast transmission mode in ad hoc networks is critical to manage multihop routing or providing medium accesscontrol (MAC)-layer fairness. In this paper, it is shown that ahigher capacity to exchange information among neighbors may beobtained through a physical-MAC cross-layer design of the broadcastprotocol exploiting signal separation principles. Coherentdetection and separation of contending nodes is possible throughtraining sequences which are selected at random from a reducedset. Guidelines for the design of this set are derived for a lowimpact on the network performance and the receiver complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Suomen Viestintävirasto Ficora on antanut määräyksen 13/2005M, jonka mukaan internet-palveluntarjoajalla tulee olla ennalta määritellyt prosessit ja toimintamallit sen omista asiakasliittymistä internetiin lähtevän haitallisen liikenteen havaitsemiseksi ja suodattamiseksi. Määräys ei sinällään aseta ehtoja, kuinka asetetut vaatimukset kukin internet-palveluntarjoaja täyttää. Tässä diplomityössä annetaan määritelmät haitalliselle liikenteelle ja tutkitaan menetelmiä, joilla sitä voidaan havainnoida ja suodattaa paikallisen internet-palveluntarjoajan operaattoriverkoissa. Suhteutettunapaikallisen internet-palveluntarjoajan asiakasliittymien määrään, uhkien vakavuuteen ja tällaisen systeemin kustannuksiin, tullaan tämän työn pohjalta ehdottamaan avoimen lähdekoodin tunkeutumisenhavaitsemistyökalua nopeaa reagointia vaativiin tietoturvaloukkauksiin ja automatisoitua uudelleenreitititystä suodatukseen. Lisäksi normaalin työajan puitteissa tapahtuvaan liikenteen seurantaan suositetaan laajennettua valvontapöytää, jossa tarkemmat tutkimukset voidaan laittaa alulle visualisoitujen reaaliaikaisten tietoliikenneverkon tietovoiden kautta.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Langattoman laajakaistaisen tietoliikennetekniikan kehittyminen on herättänyt kiinnostuksen sen ammattimaiseen hyödyntämiseen yleisen turvallisuuden ja kriisinhallinnan tarpeisiin. Hätätilanteissa usein olemassa olevat kiinteät tietoliikennejärjestelmät eivät ole ollenkaan käytettävissä tai niiden tarjoama kapasiteetti ei ole riittävä. Tästä syystä on noussut esiin tarve nopeasti toimintakuntoon saatettaville ja itsenäisille langattomille laajakaistaisille järjestelmille. Tässä diplomityössä on tarkoitus tutkia langattomia ad hoc monihyppy -verkkoja yleisen turvallisuuden tarpeiden pohjalta ja toteuttaa testialusta, jolla voidaan demonstroida sekä tutkia tällaisen järjestelmän toimintaa käytännössä. Työssä tutkitaan pisteestä pisteeseen sekä erityisesti pisteestä moneen pisteeseen suoritettavaa tietoliikennettä. Mittausten kohteena on testialustan tiedonsiirtonopeus, lähetysteho ja vastaanottimen herkkyys. Näitä tuloksia käytetään simulaattorin parametreina, jotta simulaattorin tulokset olisivat mahdollisimman aidot ja yhdenmukaiset testialustan kanssa. Sen jälkeen valitaan valikoima yleisen turvallisuuden vaatimusten mukaisia ohjelmia ja sovellusmalleja, joiden suorituskyky mitataan erilaisten reititysmenetelmien alaisena sekä testialustalla että simulaattorilla. Tuloksia arvioidaan ja vertaillaan. Multicast monihyppy -video päätettiin sovelluksista valita tutkimusten pääkohteeksi ja sitä sekä sen ominaisuuksia on tarkoitus myös oikeissa kenttäkokeissa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Zygomatic implants are a good rehabilitation alternative for upper maxilla with severe bone reabsorption. These implants reduce the need for onlay-type bone grafting in the posterior sectors and for maxillary sinus lift procedures - limiting the use of bone grafts to the anterior zone of the upper jaw in those cases where grafting is considered necessary. Objective: To evaluate the survival of 101 zygomatic implants placed in upper maxilla presenting important bone reabsorption, with a follow-up of 1-72 months. Patients and methods: A retrospective study was made of 101 Zygoma® implants (Nobel Biocare, Göteborg, Sweden) placed in 54 patients with totally edentulous and atrophic upper maxilla, in the period between 1998-2004. There were 35 women and 19 men, subjected to rehabilitation in the form of fixed prostheses and overdentures using 1-2 zygomatic implants and 2-7 implants in the anterior maxillary zone. The principal study variables were smoking, a history of sinusitis, the degree of bone reabsorption, and peri-implant bone loss, among others. Results: The descriptive analysis of the 101 zygomatic implants placed in 54 patients with a mean age of 56 years (range 38-75) yielded a percentage survival of 96.04%, with four failed implants that were removed (two before and two after prosthetic loading). Nine patients were smokers, and none of the 54 subjects reported a history of sinus disorders. Discussion and conclusions: Zygomatic implants are designed for use in compromised upper maxilla. They allow the clinician to shorten the treatment time, affording an interesting alternative for fixed prosthetic rehabilitation. This study confirms that zygomatic bone offers predictable anchorage and acceptable support function for prostheses in atrophic jaws. However, these implants are not without complications. Longer-term evaluations are needed of zygomatic implant survival in order to establish a correct clinical prognosis

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To investigate the effects of neonatal hypoglycemia on physical growth and neurocognitive function.Study design: A systematic detection of hypoglycemia (<2.6 mmol/L or 47 mg/dL) was carried out in 85 small-for-gestational-age preterm neonates. Prospective serial evaluations of physical growth and psychomotor development were performed. Retrospectively, infants were grouped according to their glycemic status. RESULTS: The incidence of hypoglycemia was 72.9%. Infants with repeated episodes of hypoglycemia had significantly reduced head circumferences and lower scores in specific psychometric tests at 3.5 years of age. Hypoglycemia also caused reduced head circumferences at 18 months and lower psychometric scores at 5 years of age. Infants with moderate recurrent hypoglycemia had lower scores at 3.5 and 5 years of age compared with the group of infants who had 1 single severe hypoglycemic episode. CONCLUSION: Recurrent episodes of hypoglycemia were strongly correlated with persistent neurodevelopmental and physical growth deficits until 5 years of age. Recurrent hypoglycemia also was a more predictable factor for long-term effects than the severity of a single hypoglycemic episode. Therefore repetitive blood glucose monitoring and rapid treatment even for mild hypoglycemia are recommended for small-for-gestational-age infants in the neonatal period.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Steep mountain catchments typically experience large sediment pulses from hillslopes which are stored in headwater channels and remobilized by debris-flows or bedload transport. Event-based sediment budget monitoring in the active Manival debris-flow torrent in the French Alps during a two-year period gave insights into the catchment-scale sediment routing during moderate rainfall intensities which occur several times each year. The monitoring was based on intensive topographic resurveys of low- and high-order channels using different techniques (cross-section surveys with total station and high-resolution channel surveys with terrestrial and airborne laser scanning). Data on sediment output volumes from the main channel were obtained by a sediment trap. Two debris-flows were observed, as well as several bedload transport flow events. Sediment budget analysis of the two debris-flows revealed that most of the debris-flow volumes were supplied by channel scouring (more than 92%). Bedload transport during autumn contributed to the sediment recharge of high-order channels by the deposition of large gravel wedges. This process is recognized as being fundamental for debris-flow occurrence during the subsequent spring and summer. A time shift of scour-and-fill sequences was observed between low- and high-order channels, revealing the discontinuous sediment transfer in the catchment during common flow events. A conceptual model of sediment routing for different event magnitude is proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Testbeds are a stage between the simulation and the production stages. To this end they must be as close as possible to production environments (i.e. real hardware, on the field deployments) while also keeping the traits of experimentation facilities (i.e. fault tolerance, ease of deployment, testing and data collection). This paper presents WiBed, a FOSS platform for WiFi testbeds based on OpenWRT Linux made to run oncommodity IEEE802.11 WiFi routers part of the Community-lab.net project, a global testbed for Community networks. WiBedhas been designed to support realistic low layer network exper-iments (according to the OSI model). This work recolects thedetails of the architecture, design and implementation of WiBed consolidated during its operation as a testbed. In addition to a set of routing experimentation results obtained during the Wireless Battlemesh v7 where WiBed was used as testbed platform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are several alternatives for valuing the future opportunities of firms. The traditional appraisal methods for single projects such as net present value, internalrate of return and payback rules have been criticized in recent years. It has been said that they do not take into account all growth opportunities of firms. At the company level, business valuation is traditionally based on financial and market information. Yield estimates, net worth values and market values of shares are commonly used. Naturally, all valuation methods have their own strengths and shortcomings. In the background of most estimation rules there is the idea that the future of the firms is quite clear and predictable. However, in recent times the business environment of most companies has changed to a more unpredictable direction and the effects of uncertainty have increased. There has been a growing interest in estimating the risks and values of future possibilities. The aim of the current paper is to describe the difference between the value of futureopportunities in information technology firms and forest companies, and also toanalyse the backgrounds for the observed gap.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present dissertation is devoted to the systematic approach to the development of organic toxic and refractory pollutants abatement by chemical decomposition methods in aqueous and gaseous phases. The systematic approach outlines the basic scenario of chemical decomposition process applications with a step-by-step approximation to the most effective result with a predictable outcome for the full-scale application, confirmed by successful experience. The strategy includes the following steps: chemistry studies, reaction kinetic studies in interaction with the mass transfer processes under conditions of different control parameters, contact equipment design and studies, mathematical description of the process for its modelling and simulation, processes integration into treatment technology and its optimisation, and the treatment plant design. The main idea of the systematic approach for oxidation process introduction consists of a search for the most effective combination between the chemical reaction and the treatment device, in which the reaction is supposed to take place. Under this strategy,a knowledge of the reaction pathways, its products, stoichiometry and kinetics is fundamental and, unfortunately, often unavailable from the preliminary knowledge. Therefore, research made in chemistry on novel treatment methods, comprisesnowadays a substantial part of the efforts. Chemical decomposition methods in the aqueous phase include oxidation by ozonation, ozone-associated methods (O3/H2O2, O3/UV, O3/TiO2), Fenton reagent (H2O2/Fe2+/3+) and photocatalytic oxidation (PCO). In the gaseous phase, PCO and catalytic hydrolysis over zero valent ironsare developed. The experimental studies within the described methodology involve aqueous phase oxidation of natural organic matter (NOM) of potable water, phenolic and aromatic amino compounds, ethylene glycol and its derivatives as de-icing agents, and oxygenated motor fuel additives ¿ methyl tert-butyl ether (MTBE) ¿ in leachates and polluted groundwater. Gas-phase chemical decomposition includes PCO of volatile organic compounds and dechlorination of chlorinated methane derivatives. The results of the research summarised here are presented in fifteenattachments (publications and papers submitted for publication and under preparation).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The major objective of this thesis is to describe and analyse how a railcarrier is engaged in an intermodal freight transportation network through its role and position. Because of the fact that the role as a conceptualisation has a lot of parallels with the position, both these phenomena are evaluated theoretically and empirically. VR Cargo (a strategical business unitof the Finnish railway company VR Ltd.) was chosen to be the focal firm surrounded by the actors of the focal net. Because of the fact that networks are sets of relationships rather than sets of actors, it is essential to describe the dimensions of the relationships created through the time thus having a past, presentand future. The roles are created during long common history shared by the actors especially when IM networks are considered. The presence of roles is embeddedin the tasks, and the future is anchored to the expectations. Furthermore, in this study role refers to network dynamics, and to incremental and radical changes in the network, in a similar way as position refers to stability and to the influences of bonded structures. The main purpose of the first part of the study was to examine how the two distinctive views that have a dominant position in modern logistics ¿ the network view (particularly IMP-based network approach) and the managerial view (represented by Supply Chain Management) differ, especially when intermodalism is under consideration. In this study intermodalism was defined as a form of interorganisational behaviour characterized by the physical movement of unitized goods with Intermodal Transport Units, using more than one mode as performed by the net of operators. In this particular stage the study relies mainly on theoretical evaluation broadened by some discussions with the practitioners. This is essential, because the continuous dialogue between theory and practice is highly emphasized. Some managerial implications are discussed on the basis of the theoretical examination. A tentative model for empirical analysis in subsequent research is suggested. The empirical investigation, which relies on the interviews among the members in the focal net, shows that the major role of the focal company in the network is the common carrier. This role has some behavioural and functional characteristics, such as an executive's disclosure expressing strategic will attached with stable and predictable managerial and organisational behaviour. Most important is the notion that the focal company is neutral for all the other operators, and willing to enhance and strengthen the collaboration with all the members in the IM network. This also means that all the accounts are aimed at being equal in terms of customer satisfaction. Besides, the adjustments intensify the adopted role. However, the focal company is also obliged tosustain its role as it still has a government-erected right to maintain solely the railway operations on domestic tracks. In addition, the roles of a dominator, principal, partner, subcontractor, and integrator were present appearing either in a dyadic relationship or in net(work) context. In order to reveal differentroles, a dualistic interpretation of the concept of role/position was employed.