1,374 research outputs found
A formal methodology to design and deploy dependable wireless sensor networks
Wireless Sensor Networks (WSNs) are being increasingly adopted in critical applications, where verifying the correct operation of sensor nodes is a major concern. Undesired events may undermine the mission of the WSNs. Hence their effects need to be properly assessed before deployment to obtain a good level of expected performance and during the operation in order to avoid dangerous unexpected results. In this paper we propose amethodology that aims at assessing and improving the dependability level of WSNs by means of an event-based formal verification technique. The methodology includes a process to guide designers towards the realization of dependable WSN and a tool ("ADVISES") to simplify its adoption. The tool is applicable to homogeneous WSNs with static routing topologies. It allows to generate automatically formal specifications used to check correctness properties and evaluate dependability metrics at design time and at runtime for WSNs where an acceptable percentage of faults can be defined. During the runtime we can check the behavior of the WSN accordingly to the results obtained at design time and we can detect sudden and unexpected failures, in order to trigger recovery procedures. The effectiveness of the methodology is shown in the context of two case studies, as proof-of-concept, aiming to illustrate how the tool is helpful to drive design choices and to check the correctness properties of the WSN at runtime. Although the method scales up to very large WSNs, the applicability of the methodology maybe compromised by the state space explosion of the reasoning model, which must be faced partitioning large topologies into sub-topologies
Static verification of wireless sensor networks with formal methods
Wireless Sensor Networks (WSNs) are widely recognized as a solution to build monitoring systems, even in critical environments. WSNs, however, are subjected to faults due to several causes (i.e. rain, EMF radiations, vibrations, etc..) and tools and methodologies for the design of dependable WSN-based systems are needed. Formal methods partially meet such needs by assessing the degree of correctness of design models and identifying potential system bottlenecks. The aim of this paper is to define a methodology for the static verification of WSN based systems using a formal language (Event Calculus). In particular we show how the formal specification can be used to verify the design of a WSN in terms of its dependability properties. To this aim, we define a set of correctness specifications that apply to a generic WSN, coupled with specific structural specifications describing the target network topology to evaluate. Finally, after having presented an automatic tool, designed to support the designer, we adopt this methodology to a case study
Contraceptive use and sexual function: a comparison of Italian female medical students and women attending family planning services
Objectives: The aims of the study were to understand how education relates to contraceptive choice and how sexual function can vary in relation to the use of a contraceptive method. Methods: We surveyed female medical students and women attending a family planning service (FPS) in Italy. Participants completed an online questionnaire which asked for information on sociodemographics, lifestyle, sexuality and contraceptive use and also included items of the Female Sexual Function Index (FSFI). Results: The questionnaire was completed by 413 women (362 students and 51 women attending the FPS) between the ages of 18 and 30 years. FSFI scores revealed a lower risk of sexual dysfunction among women in the control group who did not use oral hormonal contraception. The differences in FSFI total scores between the two study groups, when subdivided by the primary contraceptive method used, was statistically significant (p < 0.005). Women using the vaginal ring had the lowest risk of sexual dysfunction, compared with all other women, and had a positive sexual function profile. In particular, the highest FSFI domain scores were lubrication, orgasm and satisfaction, also among the control group. Expensive contraception, such as long-acting reversible contraception, was not preferred by this young population, even though such methods are more contemporary and manageable. Compared with controls, students had lower compliance with contraception and a negative attitude towards voluntary termination of pregnancy. Conclusion: Despite their scientific knowledge, Italian female medical students were found to need sexual and contraceptive assistance. A woman's sexual function responds to her awareness of her body and varies in relation to how she is guided in her contraceptive choice. Contraceptive counselling is an excellent means to improve female sexuality
The heuristic strategies for assessing wireless sensor network: an event-based formal approach
Wireless Sensor Networks (WSNs) are increasingly being adopted in critical applications. In these networks undesired events may undermine the reliability level; thus their effects need to be properly assessed from the early stages of the development process onwards to minimize the chances of unexpected problems during use. In this paper we propose two heuristic strategies: what-if analysis and robustness checking. They allow to drive designers towards optimal WSN deployment solutions, from the point of view of the connection and data delivery resiliency, exploiting a formal approach based on the event calculus formal language. The heuristics are backed up by a support tool aimed to simplify their adoption by system designers. The tool allows to specify the target WSN in a user-friendly way and it is able to elaborate the two heuristic strategies by means of the event calculus specifications automatically generated. The WSN reliability is assessed computing a set of specific metrics. The effectiveness of the strategies is shown in the context of three case studies
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities
Critical Infrastructures (CIs), such as smart power grids, transport systems,
and financial infrastructures, are more and more vulnerable to cyber threats,
due to the adoption of commodity computing facilities. Despite the use of
several monitoring tools, recent attacks have proven that current defensive
mechanisms for CIs are not effective enough against most advanced threats. In
this paper we explore the idea of a framework leveraging multiple data sources
to improve protection capabilities of CIs. Challenges and opportunities are
discussed along three main research directions: i) use of distinct and
heterogeneous data sources, ii) monitoring with adaptive granularity, and iii)
attack modeling and runtime combination of multiple data analysis techniques.Comment: EDCC-2014, BIG4CIP-201
Identification and characterization of citrus concave gum-associated virus infecting citrus and apple trees by serological, molecular and high-throughput sequencing approaches
Citrus concave gum-associated virus (CCGaV) is a negative-stranded RNA virus, first reported a few years ago in citrus trees from Italy. It has been reported in apple trees in the USA and in Brazil, suggesting a wider host range and geographic distribution. Here, an anti-CCGaV polyclonal antiserum to specifically detect the virus has been developed and used in a standard double antibody sandwich enzyme-linked immunosorbent assay (DAS-ELISA) that has been validated as a sensitive and reliable method to detect this virus both in citrus and apple trees. In contrast, when the same antiserum was used in direct tissue-blot immunoassay, CCGaV was efficiently detected in citrus but not in apple. Using this antiserum, the first apple trees infected by CCGaV were identified in Italy and the presence of CCGaV in several apple cultivars in southern Italy was confirmed by field surveys. High-throughput sequencing (HTS) allowed for the assembling of the complete genome of one CCGaV Italian apple isolate (CE-c3). Phylogenetic analysis of Italian CCGaV isolates from apple and citrus and those available in the database showed close relationships between the isolates from the same genus (Citrus or Malus), regardless their geographical origin. This finding was further confirmed by the identification of amino acid signatures specific of isolates infecting citrus or apple hosts. Analysis of HTS reads also revealed that the CE-c3 Italian apple tree, besides CCGaV, was simultaneously infected by several viruses and one viroid, including apple rubbery wood virus 2 which is reported for the first time in Italy. The complete or almost complete genomic sequences of the coinfecting agents were determined
Sensible heat flux and boundary layer depth measurements by Doppler SODAR and sonic anemometer data
A validation of a simple mixed-layer similarity relationship, firstly proposed by Panofsky and McCormick (1960), is presented for wind speeds up to 7 ms21 and over an uneven terrain. The surface heat flux and the Planetary
Boundary Layer depth, zi, are retrieved from this relationship, by using SODAR measurements of the vertical velocity variance s 2 w, under the hypothesis that the
heat flux linearly decreases with height. All the measurements are relative to days characterized by
high-pressure conditions, during periods of well-developed
convection. The values of the surface heat flux obtained from such a method are compared with those obtained by applying the eddy correlation technique to the vertical wind velocities and virtual temperatures measured by a sonic anemometer. The values of zi obtained from the same relationship are compared with the height of the lowest inversion layer estimated from the facsimile record of the echoes received by the vertical antenna of the SODAR. The spectral behavior of vertical and longitudinal wind velocity from the anemometer and the SODAR is examined, too. In such a way an independent estimate of zi is obtained from the position of the spectral maximum
Ultrasound delivery of Surface Enhanced InfraRed Absorption active gold-nanoprobes into fibroblast cells: a biological study via Synchrotron-based InfraRed microanalysis at single cell level
Ultrasound (US) induced transient membrane permeabilisation has emerged as a hugely promising tool for the delivery of exogenous vectors through the cytoplasmic membrane, paving the way to
the design of novel anticancer strategies by targeting functional nanomaterials to specific biological sites. An essential step towards this end is the detailed recognition of suitably marked nanoparticles in sonoporated cells and the investigation of the potential related biological effects. By taking advantage of Synchrotron Radiation fourier transform infrared micro-spectroscopy (SR-microftiR) in providing highly sensitive analysis at the single cell level, we studied the internalisation of a nanoprobe within fibroblasts (NIH-3T3) promoted by low-intensity US. To this aim we employed 20 nm gold nanoparticles conjugated with the IR marker 4-aminothiophenol. The significant Surface Enhanced Infrared Absorption provided by the nanoprobes, with an absorbance increase up to two orders of magnitude, allowed us to efficiently recognise their inclusion within cells. Notably, the selective and stable SR- microftiR detection from single cells that have internalised the nanoprobe exhibited clear changes in both shape and intensity of the spectral profile, highlighting the occurrence of biological effects. Flow cytometry, immunofluorescence and murine cytokinesis-block micronucleus assays confirmed the presence of slight but significant cytotoxic and genotoxic events associated with the US-nanoprobe combined treatments. our results can provide novel hints towards US and nanomedicine combined strategies for cell spectral imaging as well as drug delivery-based therapies
- …