460 research outputs found

    A novel platform for context maintenance and discovery in a ubiquitous environment

    Get PDF
    Context maintenance and discovery, which aim to represent, manage and share context information, have been discussed since context-awareness was presented in the 1990s. These become more challenging when being applied to a ubiquitous environment where dynamic and distributed computing happens anytime, anywhere. In this paper, a platform for ubiquitous context representation and its distribution is introduced. Five semantic dimensions are used to recognize and organize potential context information. A context information base (CiB), a context repository, is integrated in each device of a ubiquitous network to maintain context parameters discovered from neighbor nodes. The CiComm protocol distributes context information and accordingly realizes the capabilities of context deployment and retrieval. The resulting architecture is fully extensible being infrastructure-less and based on an ontological model. Simulations carried out using NS-2 have also demonstrated the operations of the protocol and proven through experimental results that it works efficiently in a dynamic ubiquitous environment

    Problem-based learning as an effective tool for teaching computer network design

    Get PDF
    This paper addresses the challenge of developing techniques for the effective teaching of computer network design. It reports on the experience of using the technique of problem-based learning as a key pedagogical method for teaching practical network design within the context of a Master's program module in data telecommunications and networks at the University of Salford, Salford, Greater Manchester, U.K. A two-threaded approach was adopted that comprised a problem-based learning thread and a conventional lecture thread. The problem-based learning thread within the module comprised sessions designed to place the students in the position of network design consultants who are introduced to scenarios that have a high degree of realism in which a client has specific business requirements that can be met through the adoption of a network solution. In this way, the problem-based learning thread allows the students to develop their design skills, while the lecture thread uses traditional teaching methods to allow students to develop their understanding of key network components and architectures. A formal evaluation of this approach has been carried out and demonstrated a very effective and realistic learning experience for the students. Therefore, the authors propose that problem-based learning is an ideal pedagogical tool for the teaching of computer network design

    Active router approach to defeating denial-of-service attacks in networks

    Get PDF
    Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These active routers offer the combined benefits of intrusion detection, firewall functionality and data encryption and work collaboratively to provide a distributed defence mechanism. The paper provides a detailed description of the design and operation of the algorithms used by the active routers and demonstrates how this approach is able to defeat a SYN and SMURF attack. Other approaches to network design, such as the introduction of a firewall and intrusion detection systems, can be used to protect networks, however, weaknesses remain. It is proposed that the adoption of an active router approach to protecting networks overcomes many of these weaknesses and therefore offers enhanced protection

    Molecular basis of FIR-mediated c-myc transcriptional control

    Get PDF
    The far upstream element (FUSE) regulatory system promotes a peak in the concentration of c-Myc during cell cycle. First, the FBP transcriptional activator binds to the FUSE DNA element upstream of the c-myc promoter. Then, FBP recruits its specific repressor (FIR), which acts as an on/off transcriptional switch. Here we describe the molecular basis of FIR recruitment, showing that the tandem RNA recognition motifs of FIR provide a platform for independent FUSE DNA and FBP protein binding and explaining the structural basis of the reversibility of the FBP-FIR interaction. We also show that the physical coupling between FBP and FIR is modulated by a flexible linker positioned sequentially to the recruiting element. Our data explain how the FUSE system precisely regulates c-myc transcription and suggest that a small change in FBP-FIR affinity leads to a substantial effect on c-Myc concentration.MRC Grant-in-aid U11757455

    Solution structure of a repeated unit of the ABA-1 nematode polyprotein allergen of ascaris reveals a novel fold and two discrete lipid-binding sites

    Get PDF
    Parasitic nematode worms cause serious health problems in humans and other animals. They can induce allergic-type immune responses, which can be harmful but may at the same time protect against the infections. Allergens are proteins that trigger allergic reactions and these parasites produce a type that is confined to nematodes, the nematode polyprotein allergens (NPAs). These are synthesized as large precursor proteins comprising repeating units of similar amino acid sequence that are subsequently cleaved into multiple copies of the allergen protein. NPAs bind small lipids such as fatty acids and retinol (Vitamin A) and probably transport these sensitive and insoluble compounds between the tissues of the worms. Nematodes cannot synthesize these lipids, so NPAs may also be crucial for extracting nutrients from their hosts. They may also be involved in altering immune responses by controlling the lipids by which the immune and inflammatory cells communicate. We describe the molecular structure of one unit of an NPA, the well-known ABA-1 allergen of Ascaris and find its structure to be of a type not previously found for lipid-binding proteins, and we describe the unusual sites where lipids bind within this structur

    Magical attachment: Children in magical relations with hospital clowns

    Get PDF
    The aim of the present study was to achieve a theoretical understanding of several different-age children's experiences of magic relations with hospital clowns in the context of medical care, and to do so using psychological theory and a child perspective. The method used was qualitative and focused on nine children. The results showed that age was important to consider in better understanding how the children experienced the relation with the hospital clowns, how they described the magical aspects of the encounter and how they viewed the importance of clown encounters to their own well-being. The present theoretical interpretation characterized the encounter with hospital clowns as a magical safe area, an intermediate area between fantasy and reality. The discussion presented a line of reasoning concerning a magical attachment between the child and the hospital clowns, stating that this attachment: a) comprised a temporary relation; b) gave anonymity; c) entailed reversed roles; and d) created an emotional experience of boundary-transcending opportunities

    Landscape of international event-based biosurveillance

    Get PDF
    Event-based biosurveillance is a scientific discipline in which diverse sources of data, many of which are available from the Internet, are characterized prospectively to provide information on infectious disease events. Biosurveillance complements traditional public health surveillance to provide both early warning of infectious disease events and situational awareness. The Global Health Security Action Group of the Global Health Security Initiative is developing a biosurveillance capability that integrates and leverages component systems from member nations. This work discusses these biosurveillance systems and identifies needed future studies
    corecore