103 research outputs found

    Scheduling And Resource Allocation In Wireless Sensor Networks

    Full text link
    In computer science and telecommunications, wireless sensor networks are an active research area. Each sensor in a wireless sensor network has some pre-defined or on demand tasks such as collecting or disseminating data. Network resources, such as broadcast channels, number of sensors, power, battery life, etc., are limited. Hence, a schedule is required to optimally allocate network resources so as to maximize some profit or minimize some cost. This thesis focuses on scheduling problems in the wireless sensor networks environment. In particular, we study three scheduling problems in the wireless sensor networks: broadcast scheduling, sensor scheduling for area monitoring, and content distribution scheduling. For each problem the goal is to find efficient scheduling algorithms that have good approximation guarantees and perform well in practice

    Applying CS and WSN methods for improving efficiency of frozen and chilled aquatic products monitoring system in cold chain logistics

    Get PDF
    Wireless Sensor Network (WSN) is applied widely in food cold chain logistics. However, traditional monitoring systems require significant real-time sensor data transmission which will result in heavy data traffic and communication systems overloading, and thus reduce the data collection and transmission efficiency. This research aims to develop a temperature Monitoring System for Frozen and Chilled Aquatic Products (MS-FCAP) based on WSN integrated with Compressed Sending (CS) to improve the efficiency of MS-FCAP. Through understanding the temperature and related information requirements of frozen and chilled aquatic products cold chain logistics, this paper illustrates the design of the CS model which consists of sparse sampling and data reconstruction, and shelf-life prediction. The system was implemented and evaluated in cold chain logistics between Hainan and Beijing in China. The evaluation result suggests that MS-FCAP has a high accuracy in reconstructing temperature data under variable temperature condition as well as under constant temperature condition. The result shows that MS-FCAP is capable of recovering the sampled sensor data accurately and efficiently, reflecting the real-time temperature change in the refrigerated truck during cold chain logistics, and providing effective decision support traceability for quality and safety assurance of frozen and chilled aquatic products.Agro-scientific Researc

    Anterior urethral strictures - actual questions of treatment

    Get PDF
    The article presents data on modern methods of reconstructive surgery of the anterior urethra stricture. Compared the effectiveness of various methods of graft augmentation urethroplasty techniques (ventral, dorsal, lateral bulbar augmentation urethroplasty, Asopa and Palminteri techniques). Authors give recommendation of technical advantages of using a particular surgery method. Provides information on the graft selection and some features of its fixation. Highlight aspects of the treatment of urethra stricture in the future.В статье представлены данные о современных реконструктивно-пластических методиках хирургического лечения стриктур передней уретры. Представлен анализ данных 66 статей, посвященных сравнению эффективности различных методик заместительной пластики уретры (вентральная, дорсальная, латеральная методика, техники Asopa и Palminteri и др.) и их отдаленных результатов. Даются рекомендации по технике и преимуществам использования той или иной методики. Приведена информация по вопросам выбора трансплантата и так же особенностям его забора и фиксации. Освещены аспекты развития методов лечения стриктурной болезни уретры в будущем

    GADD34 keeps the mTOR pathway inactivated in endoplasmic reticulum stress related autophagy

    Get PDF
    The balance of protein synthesis and proteolysis (i.e. proteostasis) is maintained by a complex regulatory network in which mTOR (mechanistic target of rapamycin serine/threonine kinase) pathway and unfolded protein response are prominent positive and negative actors. The interplay between the two systems has been revealed; however the mechanistic details of this crosstalk are largely unknown. The aim of the present study was to investigate the elements of crosstalk during endoplasmic reticulum stress and to verify the key role of GADD34 in the connection with the mTOR pathway. Here, we demonstrate that a transient activation of autophagy is present in endoplasmic reticulum stress provoked by thapsigargin or tunicamycin, which is turned into apoptotic cell death. The transient phase can be characterized by the elevation of the autophagic marker LC3II/I, by mTOR inactivation, AMP-activated protein kinase activation and increased GADD34 level. The switch from autophagy to apoptosis is accompanied with the appearance of apoptotic markers, mTOR reactivation, AMP-activated protein kinase inactivation and a decrease in GADD34. Inhibition of autophagy by 3-methyladenine shortens the transient phase, while inhibition of mTOR by rapamycin or resveratrol prolongs it. Inhibition of GADD34 by guanabenz or transfection of the cells with siGADD34 results in down-regulation of autophagy-dependent survival and a quick activation of mTOR, followed by apoptotic cell death. The negative effect of GADD34 inhibition is diminished when guanabenz or siGADD34 treatment is combined with rapamycin or resveratrol addition. These data confirm that GADD34 constitutes a mechanistic link between endoplasmic reticulum stress and mTOR inactivation, therefore promotes cell survival during endoplasmic reticulum stress. © 2016 Holczer et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited

    Expression of phosphorylated eIF4E-binding protein 1, but not of eIF4E itself, predicts survival in male breast cancer

    Get PDF
    Background: Male breast cancer is rare and treatment is based on data from females. High expression/activity of eukaryotic initiation factor 4E (eIF4E) denotes a poor prognosis in female breast cancer, and the eIF4E pathway has been targeted therapeutically. eIF4E activity in female breast cancer is deregulated by eIF4E over-expression and by phosphorylation of its binding protein, 4E-BP1, which relieves inhibitory association between eIF4E and 4E-BP1. The relevance of the eIF4E pathway in male breast cancer is unknown. Methods: We have assessed expression levels of eIF4E, 4E-BP1, 4E-BP2 and phosphorylated 4E-BP1 (p4E-BP1) using immunohistochemistry in a large cohort of male breast cancers (n=337) and have examined correlations with prognostic factors and survival. Results: Neither eIF4E expression or estimated eIF4E activity were associated with prognosis. However, a highly significant correlation was found between p4E-BP1 expression and disease-free survival, linking any detectable p4E-BP1 with poor survival (univariate log rank p=0.001; multivariate HR 8.8, p=0.0001). Conclusions: Our data provide no support for direct therapeutic targeting of eIF4E in male breast cancer, unlike in females. However, as p4E-BP1 gives powerful prognostic insights that are unrelated to eIF4E function, p4E-BP1 may identify male breast cancers potentially suitable for therapies directed at the upstream kinase, mTOR

    DISTRIBUTED SYSTEM MODEL FOR KEY MANAGEMENT

    Get PDF
    Key management plays a crucial role in cryptography, as the basis for secure information exchange, data identification and integrity. There are software and hardware key management tools that support Crypto APIs and Cryptography Next Generation APIs(CNG API), Public Key Cryptography Standards (PKCS). These tools store cryptographic keys on hard disks, smart cards, tokens, and in other storage media. To use the cryptographic keys stored on these smart cards and tokens, you need to connect them to the appropriate hardware. The cryptographic keys stored on the hard drives of a computer or a laptop are used by the programs of these devices. If it becomes necessary to use a single key in different systems, then you will have to create copies of the key on all these devices. This complicates the process of key management, raises tasks of securely store keys, keys access control. This paper proposes a distributed system model for key management and a protocol of interaction of the distributed system modules. The proposed model provides the ability to store keys in a smartphone, and access to keys from other devices. The system described in the model consists of 3 modules. The module 1 has computer version and smartphone version, and serves to send a request for signing, signature verification, hashing. The module 2, a smartphone software, provides key pair generation, storing, encrypting and decrypting, archiving keys, export/import keys, keys access control, and destroying keys. The module 3, web service, provides communication of the first and second modules. In addition, the system, which was created based on the current model, provides the ability to use digital signatures in web applications. The Module 1 operates as a local web service that accepts requests from a web page running in a browser. A special script in a web page sends http requests that include cryptographic operations to the specified localhost port and accepts responses
    corecore