885 resultados para synchronization protocols
Resumo:
Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1–14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30–60 min. Image processing and analysis can take <1 d, but it is dependent on the number of samples in the data set. The CUBIC clearing protocol can process multiple samples simultaneously. We previously used CUBIC to image whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.
Resumo:
This paper is aimed at reviewing the notion of Byzantine-resilient distributed computing systems, the relevant protocols and their possible applications as reported in the literature. The three agreement problems, namely, the consensus problem, the interactive consistency problem, and the generals problem have been discussed. Various agreement protocols for the Byzantine generals problem have been summarized in terms of their performance and level of fault-tolerance. The three classes of Byzantine agreement protocols discussed are the deterministic, randomized, and approximate agreement protocols. Finally, application of the Byzantine agreement protocols to clock synchronization is highlighted.
Resumo:
Purpose This study evaluated the impact of a daily and weekly image-guided radiotherapy protocols in reducing setup errors and setting of appropriate margins in head and neck cancer patients. Materials and methods Interfraction and systematic shifts for the hypothetical day 1–3 plus weekly imaging were extrapolated from daily imaging data from 31 patients (964 cone beam computed tomography (CBCT) scans). In addition, residual setup errors were calculated by taking the average shifts in each direction for each patient based on the first three shifts and were presumed to represent systematic setup error. The clinical target volume (CTV) to planning target volume (PTV) margins were calculated using van Herk formula and analysed for each protocol. Results The mean interfraction shifts for daily imaging were 0·8, 0·3 and 0·5 mm in the S-I (superior-inferior), L-R (left-right) and A-P (anterior-posterior) direction, respectively. On the other hand the mean shifts for day 1–3 plus weekly imaging were 0·9, 1·8 and 0·5 mm in the S-I, L-R and A-P direction, respectively. The mean day 1–3 residual shifts were 1·5, 2·1 and 0·7 mm in the S-I, L-R and A-P direction, respectively. No significant difference was found in the mean setup error for the daily and hypothetical day 1–3 plus weekly protocol. However, the calculated CTV to PTV margins for the daily interfraction imaging data were 1·6, 3·8 and 1·4 mm in the S-I, L-R and A-P directions, respectively. Hypothetical day 1–3 plus weekly resulted in CTV–PTV margins of 5, 4·2 and 5 mm in the S-I, L-R and A-P direction. Conclusions The results of this study show that a daily CBCT protocol reduces setup errors and allows setup margin reduction in head and neck radiotherapy compared to a weekly imaging protocol.
Resumo:
Cooperative relay communication in a fading channel environment under the orthogonal amplify-and-forward (OAF), nonorthogonal and orthogonal selection decode-and-forward (NSDF and OSDF) protocols is considered here. The diversity-multiplexing gain tradeoff (DMT) of the three protocols is determined and DMT-optimal distributed space-time (ST) code constructions are provided. The codes constructed are sphere decodable and in some instances incur minimum possible delay. Included in our results is the perhaps surprising finding that the orthogonal and the nonorthogonal amplify-and-forward (NAF) protocols have identical DMT when the time durations of the broadcast and cooperative phases are optimally chosen to suit the respective protocol. Moreover our code construction for the OAF protocol incurs less delay. Two variants of the NSDF protocol are considered: fixed-NSDF and variable-NSDF protocol. In the variable-NSDF protocol, the fraction of time occupied by the broadcast phase is allowed to vary with multiplexing gain. The variable-NSDF protocol is shown to improve on the DMT of the best previously known static protocol when the number of relays is greater than two. Also included is a DMT optimal code construction for the NAF protocol.
Resumo:
Aim: To develop a surveillance support model that enables prediction of areas susceptible to invasion, comparative analysis of surveillance methods and intensity and assessment of eradication feasibility. To apply the model to identify surveillance protocols for generalized invasion scenarios and for evaluating surveillance and control for a context-specific plant invasion. Location: Australia. Methods: We integrate a spatially explicit simulation model, including plant demography and dispersal vectors, within a Geographical Information System. We use the model to identify effective surveillance protocols using simulations of generalized plant life-forms spreading via different dispersal mechanisms in real landscapes. We then parameterize the surveillance support model for Chilean needle grass [CNG; Nassella neesiana (Trin. & Rupr.) Barkworth], a highly invasive tussock grass, which is an eradication target in south-eastern Queensland, Australia. Results: General surveillance protocols that can guide rapid response surveillance were identified; suitable habitat that is susceptible to invasion through particular dispersal syndromes should be targeted for surveillance using an adaptive seek-and-destroy method. The search radius of the adaptive method should be based on maximum expected dispersal distances. Protocols were used to define a surveillance strategy for CNG, but simulations indicated that despite effective and targeted surveillance, eradication is implausible at current intensities. Main conclusions: Several important surveillance protocols emerged and simulations indicated that effectiveness can be increased if they are followed in rapid response surveillance. If sufficient data are available, the surveillance support model should be parameterized to target areas susceptible to invasion and determine whether surveillance is effective and eradication is feasible. We discovered that for CNG, regardless of a carefully designed surveillance strategy, eradication is implausible at current intensities of surveillance and control and these efforts should be doubled if they are to be successful. This is crucial information in the face of environmentally and economically damaging invasive species and large, expensive and potentially ineffective control programmes.
Resumo:
BACKGROUND The emergence of high levels of resistance in Cryptolestes ferrugineus (Stephens) in recent years threatens the sustainability of phosphine, a key fumigant used worldwide to disinfest stored grain. We aimed at developing robust fumigation protocols that could be used in a range of practical situations to control this resistant pest. RESULTS Values of the lethal time to kill 99.9% (LT99.9, in days) of mixed-age populations, containing all life stages, of a susceptible and a strongly resistant C. ferrugineus population were established at three phosphine concentrations (1.0, 1.5 and 2.0 mg L−1) and three temperatures (25, 30 and 35 °C). Multiple linear regression analysis revealed that phosphine concentration and temperature both contributed significantly to the LT99.9 of a population (P < 0.003, R2 = 0.92), with concentration being the dominant variable, accounting for 75.9% of the variation. Across all concentrations, LT99.9 of the strongly resistant C. ferrugineus population was longest at the lowest temperature and shortest at the highest temperature. For example, 1.0 mg L−1 of phosphine is required for 20, 15 and 15 days, 1.5 mg L−1 for 12, 11 and 9 days and 2.0 mg L−1 for 10, 7 and 6 days at 25, 30 and 35 °C, respectively, to achieve 99.9% mortality of the strongly resistant C. ferrugineus population. We also observed that phosphine concentration is inversely proportional to fumigation period in regard to the population extinction of this pest. CONCLUSION The fumigation protocols developed in this study will be used in recommending changes to the currently registered rates of phosphine in Australia towards management of strongly resistant C. ferrugineus populations, and can be repeated in any country where this type of resistance appears.
Resumo:
BACKGROUND The emergence of high levels of resistance in Cryptolestes ferrugineus (Stephens) in recent years threatens the sustainability of phosphine, a key fumigant used worldwide to disinfest stored grain. We aimed at developing robust fumigation protocols that could be used in a range of practical situations to control this resistant pest. RESULTS Values of the lethal time to kill 99.9% (LT99.9, in days) of mixed-age populations, containing all life stages, of a susceptible and a strongly resistant C. ferrugineus population were established at three phosphine concentrations (1.0, 1.5 and 2.0 mg L−1) and three temperatures (25, 30 and 35 °C). Multiple linear regression analysis revealed that phosphine concentration and temperature both contributed significantly to the LT99.9 of a population (P < 0.003, R2 = 0.92), with concentration being the dominant variable, accounting for 75.9% of the variation. Across all concentrations, LT99.9 of the strongly resistant C. ferrugineus population was longest at the lowest temperature and shortest at the highest temperature. For example, 1.0 mg L−1 of phosphine is required for 20, 15 and 15 days, 1.5 mg L−1 for 12, 11 and 9 days and 2.0 mg L−1 for 10, 7 and 6 days at 25, 30 and 35 °C, respectively, to achieve 99.9% mortality of the strongly resistant C. ferrugineus population. We also observed that phosphine concentration is inversely proportional to fumigation period in regard to the population extinction of this pest. CONCLUSION The fumigation protocols developed in this study will be used in recommending changes to the currently registered rates of phosphine in Australia towards management of strongly resistant C. ferrugineus populations, and can be repeated in any country where this type of resistance appears. © 2014 Commonwealth of Australia. Pest Management Science © 2014 Society of Chemical Industry
Resumo:
Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we turn to desktop search. Users often possess multiple devices, and synchronize (subsets of) information between them. This makes file synchronization more important. This thesis presents Dessy, a desktop search and synchronization framework for mobile devices. Dessy uses desktop search techniques, such as indexing, query and index term stemming, and search relevance ranking. Dessy finds files by their content, metadata, and context information. For example, PDF files may be found by their author, subject, title, or text. EXIF data of JPEG files may be used in finding them. User–defined tags can be added to files to organize and retrieve them later. Retrieved files are ranked according to their relevance to the search query. The Dessy prototype uses the BM25 ranking function, used widely in information retrieval. Dessy provides an interface for locating files for both users and applications. Dessy is closely integrated with the Syxaw file synchronizer, which provides efficient file and metadata synchronization, optimizing network usage. Dessy supports synchronization of search results, individual files, and directory trees. It allows finding and synchronizing files that reside on remote computers, or the Internet. Dessy is designed to solve the problem of efficient mobile desktop search and synchronization, also supporting remote and Internet search. Remote searches may be carried out offline using a downloaded index, or while connected to the remote machine on a weak network. To secure user data, transmissions between the Dessy client and server are encrypted using symmetric encryption. Symmetric encryption keys are exchanged with RSA key exchange. Dessy emphasizes extensibility. Also the cryptography can be extended. Users may tag their files with context tags and control custom file metadata. Adding new indexed file types, metadata fields, ranking methods, and index types is easy. Finding files is done with virtual directories, which are views into the user’s files, browseable by regular file managers. On mobile devices, the Dessy GUI provides easy access to the search and synchronization system. This thesis includes results of Dessy synchronization and search experiments, including power usage measurements. Finally, Dessy has been designed with mobility and device constraints in mind. It requires only MIDP 2.0 Mobile Java with FileConnection support, and Java 1.5 on desktop machines.
Resumo:
Background Several prospective studies have suggested that gait and plantar pressure abnormalities secondary to diabetic peripheral neuropathy contributes to foot ulceration. There are many different methods by which gait and plantar pressures are assessed and currently there is no agreed standardised approach. This study aimed to describe the methods and reproducibility of three-dimensional gait and plantar pressure assessments in a small subset of participants using pre-existing protocols. Methods Fourteen participants were conveniently sampled prior to a planned longitudinal study; four patients with diabetes and plantar foot ulcers, five patients with diabetes but no foot ulcers and five healthy controls. The repeatability of measuring key biomechanical data was assessed including the identification of 16 key anatomical landmarks, the measurement of seven leg dimensions, the processing of 22 three-dimensional gait parameters and the analysis of four different plantar pressures measures at 20 foot regions. Results The mean inter-observer differences were within the pre-defined acceptable level (<7 mm) for 100 % (16 of 16) of key anatomical landmarks measured for gait analysis. The intra-observer assessment concordance correlation coefficients were > 0.9 for 100 % (7 of 7) of leg dimensions. The coefficients of variations (CVs) were within the pre-defined acceptable level (<10 %) for 100 % (22 of 22) of gait parameters. The CVs were within the pre-defined acceptable level (<30 %) for 95 % (19 of 20) of the contact area measures, 85 % (17 of 20) of mean plantar pressures, 70 % (14 of 20) of pressure time integrals and 55 % (11 of 20) of maximum sensor plantar pressure measures. Conclusion Overall, the findings of this study suggest that important gait and plantar pressure measurements can be reliably acquired. Nearly all measures contributing to three-dimensional gait parameter assessments were within predefined acceptable limits. Most plantar pressure measurements were also within predefined acceptable limits; however, reproducibility was not as good for assessment of the maximum sensor pressure. To our knowledge, this is the first study to investigate the reproducibility of several biomechanical methods in a heterogeneous cohort.
Resumo:
This research addresses efficient use of the available energy in resource constrained mobile sensor nodes to prevent early depletion of the battery and maximize the packet delivery rate. This research contributes two energy-aware enhancement strategies to improve the network lifetime and delivery probability for energy constrained applications in the delay-tolerant networking environment.
Resumo:
Optimization in energy consumption of the existing synchronization mechanisms can lead to substantial gains in terms of network life in Wireless Sensor Networks (WSNs). In this paper, we analyze ERBS and TPSN, two existing synchronization algorithms for WSNs which use widely different approach, and compare their performance in large scale WSNs each of which consists of different type of platform and has varying node density. We, then, propose a novel algorithm, PROBESYNC, which takes advantage of differences in power required to transmit and receive a message on ERBS and TPSN and leverages the shortcomings of each of these algorithms. This leads to considerable improvement in energy conservation and enhanced life of large scale WSNs.
Resumo:
A system of many coupled oscillators on a network can show multicluster synchronization. We obtain existence conditions and stability bounds for such a multicluster synchronization. When the oscillators are identical, we obtain the interesting result that network structure alone can cause multicluster synchronization to emerge even when all the other parameters are the same. We also study occurrence of multicluster synchronization when two different types of oscillators are coupled.
Resumo:
In this thesis work, we design rigorous and efficient protocols/mechanisms for different types of wireless networks using a mechanism design [1] and game theoretic approach [2]. Our work can broadly be viewed in two parts. In the first part, we concentrate on ad hoc wireless networks [3] and [4]. In particular, we consider broadcast in these networks where each node is owned by independent and selfish users. Being selfish, these nodes do not forward the broadcast packets. All existing protocols for broadcast assume that nodes forward the transit packets. So, there is need for developing new broadcast protocols to overcome node selfishness. In our paper [5], we develop a strategy proof pricing mechanism which we call immediate predecessor node pricing mechanism (IPNPM) and an efficient new broadcast protocol based on IPNPM. We show the efficacy of our proposed broadcast protocol using simulation results.
Resumo:
Three different types of consistencies, viz., semiweak, weak, and strong, of a read-only transaction in a schedule s of a set T of transactions are defined and these are compared with the existing notions of consistencies of a read-only transaction in a schedule. We present a technique that enables a user to control the consistency of a read-only transaction in heterogeneous locking protocols. Since the weak consistency of a read-only transaction improves concurrency in heterogeneous locking protocols, the users can help to improve concurrency in heterogeneous locking protocols by supplying the consistency requirements of read-only transactions. A heterogeneous locking protocol P' derived from a locking protocol P that uses exclusive mode locks only and ensures serializability need not be deadlock-free. We present a sufficient condition that ensures the deadlock-freeness of Pprime, when P is deadlock-free and all the read-only transactions in Pprime are two phase.
Resumo:
Networks of biochemical reactions regulated by positive-and negative-feedback processes underlie functional dynamics in single cells. Synchronization of dynamics in the constituent cells is a hallmark of collective behavior in multi-cellular biological systems. Stability of the synchronized state is required for robust functioning of the multi-cell system in the face of noise and perturbation. Yet, the ability to respond to signals and change functional dynamics are also important features during development, disease, and evolution in living systems. In this paper, using a coupled multi-cell system model, we investigate the role of system size, coupling strength and its topology on the synchronization of the collective dynamics and its stability. Even though different coupling topologies lead to synchronization of collective dynamics, diffusive coupling through the end product of the pathway does not confer stability to the synchronized state. The results are discussed with a view to their prevalence in biological systems. Copyright (C) EPLA, 2010