799 resultados para Delay Tolerant Networking


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of the present study is mapping the nature of possible contributions of participatory online platforms in citizen actions that may contribute in the fight against cancer and its associated consequences. These platforms are usually associated with entertainment: in that sense, we intent to test their validity in other domains such as health, as well as contribute to an expanded perception of their potential by their users. The research is based on the analysis of online solidarity networks, namely the ones residing on Facebook, Orkut and the blogosphere, that citizens have been gradually resorting to. The research is also based on the development of newer and more efficient solutions that provide the individual (directly or indirectly affected by issues of oncology) with the means to overcome feelings of impotence and fatality. In this article, we aim at summarizing the processes of usage of these decentralized, freer participatory platforms by citizens and institutions, while attempting to unravel existing hype and stigma; we also provide a first survey of the importance and the role of institutions in this kind of endeavor; lastly, we present a prototype, developed in the context of the present study, that is specifically dedicated to addressing oncology through social media. This prototype is already available online at www.talkingaboutcancer.org, however, still under development and testing. The main objective of this platform is to allow every citizen to freely build their network of contacts and information, according to their own individual and/ or collective needs and desires.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business social networking is a facilitator of several business activities, such as market studies, communication with clients, and identification of business partners. This paper traduces the results of a study undertaken with the purpose of getting to know how the potential of networking is perceived in the promotion of business by participants of the LinkedIn network, and presents two main contributions: (1) to disseminate within the business community which is the relevance given to social networking; and (2) which are the social networks best suitable to the promotion of business, to support the definition of strategies and approaches accordingly. The results confirm that LinkedIn is the most suitable network to answer the needs of those that look for professional contacts and for the promotion of business, while innovation is the most recognized factor in the promotion of business through social networking. This study contributes to a better understanding of the potential of different business social networking sites, to support organizations and professionals to align their strategies with the perceived potential of each network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose - To study the influence of protein structure on the immunogenicity in wildtype and immune tolerant mice of well-characterized degradation products of recombinant human interferon alpha2b (rhIFNα2b). Methods - RhIFNα2b was degraded by metal catalyzed oxidation (M), crosslinking with glutaraldehyde (G), oxidation with hydrogen peroxide (H) and incubation in a boiling water bath (B). The products were characterized with UV absorption, circular dichroism and fluorescence spectroscopy, gel permeation chromatography, reversed-phase HPLC, SDS-PAGE, Western blotting and mass spectrometry. The immunogenicity of the products was evaluated in wildtype mice and in transgenic mice immune tolerant for hIFNα2. Serum antibodies were detected by ELISA or surface plasmon resonance. Results - M-rhIFNα2b contained covalently aggregated rhIFNα2b with three methionines partly oxidized to methionine sulfoxides. G-rhIFNα2b contained covalent aggregates and did not show changes in secondary structure. H-rhIFNα2b was only chemically changed with four partly oxidized methionines. B-rhIFNα2b was largely unfolded and heavily aggregated. Native (N) rhIFNα2b was immunogenic in the wildtype mice but not in the transgenic mice, showing that the latter were immune tolerant for rhIFNα2b. The antirhIFNα2b antibody levels in the wildtype mice depended on the degradation product: M-rhIFNα2b > H-rhIFNα2b ~ N-rhIFNα2b >> B-rhIFNα2b; G-rhIFNα2b did not induce anti-rhIFNα2b antibodies. In the transgenic mice, only M-rhIFNα2b could break the immune tolerance. Conclusions - RhIFNα2b immunogenicity is related to its structural integrity. Moreover, the immunogenicity of aggregated rhIFNα2b depends on the structure and orientation of the constituent protein molecules and/or on the aggregate size.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: This study was conducted to study the influence of protein structure on the immunogenicity in wild-type and immune tolerant mice of well-characterized degradation products of recombinant human interferon alpha2b (rhIFNα2b). Methods: RhIFNα2b was degraded by metal-catalyzed oxidation (M), cross-linking with glutaraldehyde (G), oxidation with hydrogen peroxide (H), and incubation in a boiling water bath (B). The products were characterized with UV absorption, circular dichroism and fluorescence spectroscopy, gel permeation chromatography, reverse-phase high-pressure liquid chromatography, sodium dodecyl sulfate polyacrylamide gel electrophoresis, Western blotting, and mass spectrometry. The immunogenicity of the products was evaluated in wild-type mice and in transgenic mice immune tolerant for hIFNα2. Serum antibodies were detected by enzyme-linked immunosorbent assay or surface plasmon resonance. Results: M-rhIFNα2b contained covalently aggregated rhIFNα2b with three methionines partly oxidized to methionine sulfoxides. G-rhIFNα2b contained covalent aggregates and did not show changes in secondary structure. H-rhIFNα2b was only chemically changed with four partly oxidized methionines. B-rhIFNα2b was largely unfolded and heavily aggregated. Nontreated (N) rhIFNα2b was immunogenic in the wild-type mice but not in the transgenic mice, showing that the latter were immune tolerant for rhIFNα2b. The anti-rhIFNα2b antibody levels in the wild-type mice depended on the degradation product: M-rhIFNα2b > H-rhIFNα2b ∼ N-rhIFNα2b ≫ B-rhIFNα2b; G-rhIFNα2b did not induce anti-rhIFNα2b antibodies. In the transgenic mice, only M-rhIFNα2b could break the immune tolerance. Conclusions: RhIFNα2b immunogenicity is related to its structural integrity. Moreover, the immunogenicity of aggregated rhIFNα2b depends on the structure and orientation of the constituent protein molecules and/or on the aggregate size.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mestrado em Engenharia Electrotécnica e de Computadores

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In real-time systems, there are two distinct trends for scheduling task sets on unicore systems: non-preemptive and preemptive scheduling. Non-preemptive scheduling is obviously not subject to any preemption delay but its schedulability may be quite poor, whereas fully preemptive scheduling is subject to preemption delay, but benefits from a higher flexibility in the scheduling decisions. The time-delay involved by task preemptions is a major source of pessimism in the analysis of the task Worst-Case Execution Time (WCET) in real-time systems. Preemptive scheduling policies including non-preemptive regions are a hybrid solution between non-preemptive and fully preemptive scheduling paradigms, which enables to conjugate both world's benefits. In this paper, we exploit the connection between the progression of a task in its operations, and the knowledge of the preemption delays as a function of its progression. The pessimism in the preemption delay estimation is then reduced in comparison to state of the art methods, due to the increase in information available in the analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In embedded systems, the timing behaviour of the control mechanisms are sometimes of critical importance for the operational safety. These high criticality systems require strict compliance with the offline predicted task execution time. The execution of a task when subject to preemption may vary significantly in comparison to its non-preemptive execution. Hence, when preemptive scheduling is required to operate the workload, preemption delay estimation is of paramount importance. In this paper a preemption delay estimation method for floating non-preemptive scheduling policies is presented. This work builds on [1], extending the model and optimising it considerably. The preemption delay function is subject to a major tightness improvement, considering the WCET analysis context. Moreover more information is provided as well in the form of an extrinsic cache misses function, which enables the method to provide a solution in situations where the non-preemptive regions sizes are small. Finally experimental results from the implementation of the proposed solutions in Heptane are provided for real benchmarks which validate the significance of this work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an algorithm for bandwidth allocation for delay-sensitive traffic in multi-hop wireless sensor networks. Our solution considers both periodic as well as aperiodic real-time traffic in an unified manner. We also present a distributed MAC protocol that conforms to the bandwidth allocation and thus satisfies the latency requirements of realtime traffic. Additionally, the protocol provides best-effort service to non real-time traffic. We derive the utilization bounds of our MAC protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sleep-states are emerging as a first-class design choice in energy minimization. A side effect of this is that the release behavior of the system is affected and subsequently the preemption relations between tasks. In a first step we have investigated how the behavior in terms of number of preemptions of tasks in the system is changed at runtime, using an existing procrastination approach, which utilizes sleepstates for energy savings purposes. Our solution resulted in substantial savings of preemptions and we expect from even higher yields for alternative energy saving algorithms. This work is intended to form the base of future research, which aims to bound the number of preemptions at analysis time and subsequently how this may be employed in the analysis to reduced the amount of system utilization, which is reserved to account for the preemption delay.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Many-core” systems based on the Network-on- Chip (NoC) architecture have brought into the fore-front various opportunities and challenges for the deployment of real-time systems. Such real-time systems need timing guarantees to be fulfilled. Therefore, calculating upper-bounds on the end-to-end communication delay between system components is of primary interest. In this work, we identify the limitations of an existing approach proposed by [1] and propose different techniques to overcome these limitations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The IEEE 802.15.4 protocol has the ability to support time-sensitive Wireless Sensor Network (WSN) applications due to the Guaranteed Time Slot (GTS) Medium Access Control mechanism. Recently, several analytical and simulation models of the IEEE 802.15.4 protocol have been proposed. Nevertheless, currently available simulation models for this protocol are both inaccurate and incomplete, and in particular they do not support the GTS mechanism. In this paper, we propose an accurate OPNET simulation model, with focus on the implementation of the GTS mechanism. The motivation that has driven this work is the validation of the Network Calculus based analytical model of the GTS mechanism that has been previously proposed and to compare the performance evaluation of the protocol as given by the two alternative approaches. Therefore, in this paper we contribute an accurate OPNET model for the IEEE 802.15.4 protocol. Additionally, and probably more importantly, based on the simulation model we propose a novel methodology to tune the protocol parameters such that a better performance of the protocol can be guaranteed, both concerning maximizing the throughput of the allocated GTS as well as concerning minimizing frame delay.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consider a wireless network where links may be unidirectional, that is, a computer node A can broadcast a message and computer node B will receive this message but if B broadcasts then A will not receive it. Assume that messages have deadlines. We propose a medium access control (MAC) protocol which replicates a message in time with carefully selected pauses between replicas, and in this way it guarantees that for every message at least one replica of that message is transmitted without collision. The protocol ensures this with no knowledge of the network topology and it requires neither synchronized clocks nor carrier sensing capabilities. We believe this result is significant because it is the only MAC protocol that offers an upper bound on the message queuing delay for unidirectional links without relying on synchronized clocks.