992 resultados para ANIMAL MUTUALISTIC NETWORKS
Resumo:
Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.
Resumo:
Multihop ad-hoc networks have a dynamic topology. Retrieving a route towards a remote peer requires the execution of a recipient lookup, which can publicly reveal sensitive information about him. Within this context, we propose an efficient, practical and scalable solution to guaranteethe anonymity of recipients' nodes in ad-hoc networks.
Resumo:
Peer-reviewed
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
El objetivo de esta investigación fue evaluar los coeficientes de digestibilidad aparente de materia seca (MS), proteína y energía de alimentos de origen animal y vegetal, utilizados en raciones para cachama (Piaractus brachypomus). Fueron formuladas 15 dietas experimentales, compuestas por 69,5% de una dieta referencia semipurificada, 0,5% de óxido de cromo y 30% del ingrediente a evaluar. En cada experimento, fueron utilizados 90 peces que se alimentaron durante cinco días con la correspondiente dieta; al quinto día, los animales fueron trasladados a tanques cónicos para recolección de heces. Los coeficientes de digestibilidad aparente (CDA) de proteína variaron de 92,1 a 84,7% entre los ingredientes proteicos de origen vegetal, de 85,0 a 68,5% en los proteicos de origen animal, y de 83,7 a 57,6% entre los de origen vegetal con baja proteína. Los CDA de energía de torta de soya, gluten de maíz, harina de yuca integral y de todos los ingredientes de origen animal arrojaron valores superiores a 76%. Los máximos CDA de MS variaron entre 71 y 78% y fueron observados en gluten, harina de yuca y en los ingredientes de origen animal. La cachama tiene alta capacidad para aprovechar eficientemente ingredientes de origen animal y vegetal.
Resumo:
O objetivo deste trabalho foi avaliar o acúmulo de forragem, a estrutura do dossel, o valor nutritivo, o consumo de forragem e a produção animal, em pastos de Urochloa humidicola sob lotação contínua. As cultivares BRS Tupi e Comum foram avaliadas durante os períodos de seca e das águas (julho de 2011 a agosto de 2012), em delineamento experimental de blocos ao acaso, com dois tratamentos e seis repetições. Mensalmente, os animais foram pesados e os pastos amostrados para a determinação de: taxa de acúmulo de forragem (TAF); massa de forragem; percentagens de folha (PF), colmo e material morto (PM); e valor nutritivo. O consumo de matéria seca (CMS) foi determinado uma vez a cada período. 'BRS Tupi' apresentou maiores TAF e PF e menor PM do que a 'Comum', durante o período das águas. O valor nutritivo, o CMS e o ganho médio diário foram semelhantes entre as duas cultivares. O conteúdo de proteína bruta da forragem - 6,0 e 5,0%, respectivamente, para os períodos das águas e seco - foi o principal fator limitante ao CMS. 'BRS Tupi' recebeu maior taxa de lotação e, consequentemente, possibilitou maior ganho de peso vivo por área (192 kg ha-1 por ano) do que a 'Comum' (126 kg ha-1 por ano). A 'BRS Tupi' é uma boa alternativa para a diversificação de pastagens em solos de baixa fertilidade sujeitos a alagamento temporário.
Resumo:
Th2-solujen erilaistumista ohjaavat säätelyverkostot ja niiden tutkiminen proteomiikan avulla Astma ja allergiat ovat laajalle levinneitä ja vakavia sairauksia, joista kärsivät miljoonat ihmiset ympäri maailmaa. Koe-eläimillä tehdyt tutkimukset osoittavat, että interleukiini-4 (IL-4) on tärkeä allergisen astman ja allergioiden kehittymiselle ja kroonistumiselle. Se ohjaa T-auttajasolujen (Th-solujen) kehittymistä Th2-tyypin soluiksi, joilla on merkittävä rooli näiden tautien puhkeamisessa. Th2-solut tuottavat myös itse IL-4:ä, joka edesauttaa taudin seuraavien vaiheiden kehittymistä. Erityisesti STAT6-proteiini, joka aktivoituu IL-4-stimulaation seurauksena, on tarpeen Th2- vasteen syntymiselle ja kroonistumiselle antigeenin aiheuttamassa keuhkoputkien astmaattisessa tulehduksessa. Väitöskirjatyöni tarkoituksena oli käyttää kaksidimensionaaliseen elektroforeesiin (2- DE) perustuvaa proteomiikkaa ja massaspektrometriaa uusien Th2-solujen erilaistumista säätelevien proteiinien tunnistamiseksi. Erilaistumattomat Th-solut eristettiin vastasyntyneen napaverestä tai hiiren pernasta. Solut aktivoitiin Tsolureseptorin ja ns. ko-stimulatoristen reseptorien kautta ja erilaistettiin joko Th1- tai Th2-suuntaan vastaavasti erilaistavien IL-12- ja IL-4-sytokiinien avulla. Ensimmäisessä tutkimuksessa in vitro -erilaistettujen Th1- ja Th2-solujen proteomeja verrattiin keskenään proteiinien ilmenemisessä tai proteiinimodifikaatioissa olevien erojen tunnistamiseksi. Kaksi muuta päätutkimusta keskittyivät IL-4:n aiheuttamaan proteiinitason säätelyyn ensimmäisen vuorokauden aikana T-soluaktivaation jälkeen. Näistä ensimmäisessä IL-4:n aiheuttamia eroja tunnistettiin aktivoiduista ihmisen Thsoluista. IL-4:n todettiin säätelevän useita proteiineja kaspaasien välittämissä signalointiteissä sekä lisäävän T-solujen elävyyttä ja aktivoitumista. Toisessa tutkimuksessa STAT6-poistogeenisten hiirien lymfosyyttien proteomia verrattiin villityypin kontrollisoluihin T-soluaktivaation ja IL-4-stimulaation jälkeen. Näissä tutkimuksissa karakterisoitiin useita uusia IL-4:n ja STAT6:n kohdeproteiineja ja löydettiin uusia säätelyverkostoja. Tutkimustulokset ovat johtaneet uusiin Th2-erilaistumismekanismeja koskeviin hypoteeseihin.
Resumo:
In this paper we study the reconstruction of a network topology from the values of its betweenness centrality, a measure of the influence of each of its nodes in the dissemination of information over the network. We consider a simple metaheuristic, simulated annealing, as the combinatorial optimization method to generate the network from the values of the betweenness centrality. We compare the performance of this technique when reconstructing different categories of networks –random, regular, small-world, scale-free and clustered–. We show that the method allows an exact reconstruction of small networks and leads to good topological approximations in the case of networks with larger orders. The method can be used to generate a quasi-optimal topology fora communication network from a list with the values of the maximum allowable traffic for each node.
Resumo:
Broadcast transmission mode in ad hoc networks is critical to manage multihop routing or providing medium accesscontrol (MAC)-layer fairness. In this paper, it is shown that ahigher capacity to exchange information among neighbors may beobtained through a physical-MAC cross-layer design of the broadcastprotocol exploiting signal separation principles. Coherentdetection and separation of contending nodes is possible throughtraining sequences which are selected at random from a reducedset. Guidelines for the design of this set are derived for a lowimpact on the network performance and the receiver complexity.
Resumo:
The objective of this work was to develop, validate, and compare 190 artificial intelligence-based models for predicting the body mass of chicks from 2 to 21 days of age subjected to different duration and intensities of thermal challenge. The experiment was conducted inside four climate-controlled wind tunnels using 210 chicks. A database containing 840 datasets (from 2 to 21-day-old chicks) - with the variables dry-bulb air temperature, duration of thermal stress (days), chick age (days), and the daily body mass of chicks - was used for network training, validation, and tests of models based on artificial neural networks (ANNs) and neuro-fuzzy networks (NFNs). The ANNs were most accurate in predicting the body mass of chicks from 2 to 21 days of age after they were subjected to the input variables, and they showed an R² of 0.9993 and a standard error of 4.62 g. The ANNs enable the simulation of different scenarios, which can assist in managerial decision-making, and they can be embedded in the heating control systems.