564 research outputs found

    Off-Street Vehicular Fog for Catering Applications in 5G/B5G: A Trust-based Task Mapping Solution and Open Research Issues

    Get PDF
    One of the key enablers in serving the applications requiring stringent latency in 5G networks is fog computing as it is situated closer to the end users. With the technological advancement of vehicles’ on-board units, their computing capabilities are becoming robust, and considering the underutilization of the off-street vehicles, we envision that the off-street vehicles can be an enormously useful computational source for the fog computing. Additionally, clustering the vehicles would be advantageous in order to improve the service availability. As the vehicles become highly connected, trust is needed especially in distributed environments. However, vehicles are made from different manufacturers, and have different platforms, security mechanisms, and varying parking duration. These lead to the unpredictable behavior of the vehicles where quantifying trust value of vehicles would be difficult. A trust-based solution is necessary for task mapping as a task has a set of properties including expected time to complete, and trust requirements that need to be met. However, the existing metrics used for trust evaluation in the vehicular fog computing such as velocity and direction are not applicable in the off-street vehicle fog environments. In this paper, we propose a framework for quantifying the trust value of off-street vehicle fog computing facilities in 5G networks and forming logical clusters of vehicles based on the trust values. This allows tasks to be shared with multiple vehicles in the same cluster that meets the tasks’ trust requirements. Further, we propose a novel task mapping algorithm to increase the vehicle resource utilization and meet the desired trust requirements while maintaining imposed latency requirements of 5G applications. Results obtained using iFogSim simulator demonstrate that the proposed solution increases vehicle resource utilization and reduces task drop noticeably. This paper presents open research issues pertaining to the study to lead..

    Find My Trustworthy Fogs: A Fuzzy-based Trust Evaluation Framework

    Get PDF
    The growth of IoT is proven with the massive amount of data generated in 2015, and expected to be even more in the years to come. Relying on the cloud to meet the expanding volume, variety, and velocity of data that the IoT generates may not be feasible. In the last two years, fog computing has become a considerably important research topic in an attempt to reduce the burden on cloud and solve cloud's inability to meet the IoT latency requirement. However, fog environment is different than in cloud since fog environment is far more distributed. Due to the dynamic nature of fog, backups such as redundant power supply would deem unnecessary, and relying on just one Internet Service Provider for their fog device would be sufficient. If obstacles arise in this fog environment, factors such as latency, availability or reliability would in turn be unstable. Fogs become harder to trust, and this issue is more complicated and challenging in comparison to the conventional cloud. This implies that trustworthiness in fog is an imperative issue that needs to be addressed. With the help of a broker, managing trust in a distributive environment can be tackled. Acting as an intermediary, a broker helps in facilitating negotiation between two parties. Although the brokering concept has been around for a long time and is widely used in the cloud, it is a new concept in fog computing. As of late, there are several research studies that incorporates broker in fog where these brokers focus towards pricing management. However to the best of our knowledge there is no literature on broker-based trust evaluation in fog service allocation. This is the first work that proposes broker-based trust evaluation framework that focuses on identifying a trustworthy fog to fulfi ll the user requests. In this paper, fuzzy logic is used as the basis for the evaluation while considering the availability and cost of fog. We propose Request Matching algorithm to identify a user request, and Fuzzy-based Filtering algorithm to match the request with one of the predefi ned sets created and managed by the broker. In this paper, we present a use case that illustrates how fuzzy logic works in determining the trustworthiness of a fog. Our findings suggest that the algorithms can successfully provide users a trustworthy fog that matches their requirement

    A stable pattern of EEG spectral coherence distinguishes children with autism from neuro-typical controls - a large case control study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The autism rate has recently increased to 1 in 100 children. Genetic studies demonstrate poorly understood complexity. Environmental factors apparently also play a role. Magnetic resonance imaging (MRI) studies demonstrate increased brain sizes and altered connectivity. Electroencephalogram (EEG) coherence studies confirm connectivity changes. However, genetic-, MRI- and/or EEG-based diagnostic tests are not yet available. The varied study results likely reflect methodological and population differences, small samples and, for EEG, lack of attention to group-specific artifact.</p> <p>Methods</p> <p>Of the 1,304 subjects who participated in this study, with ages ranging from 1 to 18 years old and assessed with comparable EEG studies, 463 children were diagnosed with autism spectrum disorder (ASD); 571 children were neuro-typical controls (C). After artifact management, principal components analysis (PCA) identified EEG spectral coherence factors with corresponding loading patterns. The 2- to 12-year-old subsample consisted of 430 ASD- and 554 C-group subjects (n = 984). Discriminant function analysis (DFA) determined the spectral coherence factors' discrimination success for the two groups. Loading patterns on the DFA-selected coherence factors described ASD-specific coherence differences when compared to controls.</p> <p>Results</p> <p>Total sample PCA of coherence data identified 40 factors which explained 50.8% of the total population variance. For the 2- to 12-year-olds, the 40 factors showed highly significant group differences (<it>P </it>< 0.0001). Ten randomly generated split half replications demonstrated high-average classification success (C, 88.5%; ASD, 86.0%). Still higher success was obtained in the more restricted age sub-samples using the jackknifing technique: 2- to 4-year-olds (C, 90.6%; ASD, 98.1%); 4- to 6-year-olds (C, 90.9%; ASD 99.1%); and 6- to 12-year-olds (C, 98.7%; ASD, 93.9%). Coherence loadings demonstrated reduced short-distance and reduced, as well as increased, long-distance coherences for the ASD-groups, when compared to the controls. Average spectral loading per factor was wide (10.1 Hz).</p> <p>Conclusions</p> <p>Classification success suggests a stable coherence loading pattern that differentiates ASD- from C-group subjects. This might constitute an EEG coherence-based phenotype of childhood autism. The predominantly reduced short-distance coherences may indicate poor local network function. The increased long-distance coherences may represent compensatory processes or reduced neural pruning. The wide average spectral range of factor loadings may suggest over-damped neural networks.</p

    Resource allocation within the National AIDS Control Program of Pakistan: a qualitative assessment of decision maker's opinions

    Get PDF
    BACKGROUND: Limited resources, whether public or private, demand prioritisation among competing needs to maximise productivity. With a substantial increase in the number of reported HIV cases, little work has been done to understand how resources have been distributed and what factors may have influenced allocation within the newly introduced Enhanced National AIDS Control Program of Pakistan. The objective of this study was to identify perceptions of decision makers about the process of resource allocation within Pakistan's Enhanced National AIDS Control Program. METHODS: A qualitative study was undertaken and in-depth interviews of decision makers at provincial and federal levels responsible to allocate resources within the program were conducted. RESULTS: HIV was not considered a priority issue by all study participants and external funding for the program was thought to have been accepted because of poor foreign currency reserves and donor agency influence rather than local need. Political influences from the federal government and donor agencies were thought to manipulate distribution of funds within the program. These influences were thought to occur despite the existence of a well-laid out procedure to determine allocation of public resources. Lack of collaboration among departments involved in decision making, a pervasive lack of technical expertise, paucity of information and an atmosphere of ad hoc decision making were thought to reduce resistance to external pressures. CONCLUSION: Development of a unified program vision through a consultative process and advocacy is necessary to understand goals to be achieved, to enhance program ownership and develop consensus about how money and effort should be directed. Enhancing public sector expertise in planning and budgeting is essential not just for the program, but also to reduce reliance on external agencies for technical support. Strengthening available databases for effective decision making is required to make financial allocations based on real, rather than perceived needs. With a large part of HIV program funding dedicated to public-private partnerships, it becomes imperative to develop public sector capacity to administer contracts, coordinate and monitor activities of the non-governmental sector

    Retracting and seeking movements during laparoscopic goal-oriented movements. Is the shortest path length optimal?

    Get PDF
    Aims- Minimally invasive surgery (MIS) requires a high degree of eye–hand coordination from the surgeon. To facilitate the learning process, objective assessment systems based on analysis of the instruments’ motion are being developed. To investigate the influence of performance on motion characteristics, we examined goaloriented movements in a box trainer. In general, goal-oriented movements consist of a retracting and a seeking phase, and are, however, not performed via the shortest path length. Therefore, we hypothesized that the shortest path is not an optimal concept in MIS. Methods-Participants were divided into three groups (experts, residents, and novices). Each participant performed a number of one-hand positioning tasks in a box trainer. Movements of the instrument were recorded with the TrEndo tracking system. The movement from point A to B was divided into two phases: A-M (retracting) and M-B (seeking). Normalized path lengths (given in %) of the two phases were compared. Results- Thirty eight participants contributed. For the retracting phase, we found no significant difference between experts [median (range) %: 152 (129–178)], residents [164 (126–250)], and novices [168 (136–268)]. In the seeking phase, we find a significant difference (<0.001) between experts [180 (172–247)], residents [201 (163–287)], and novices [290 (244–469)]. Moreover, within each group, a significant difference between retracting and seeking phases was observed. Conclusions- Goal-oriented movements in MIS can be split into two phases: retracting and seeking. Novices are less effective than experts and residents in the seeking phase. Therefore, the seeking phase is characteristic of performance differences. Furthermore, the retracting phase is essential, because it improves safety by avoiding intermediate tissue contact. Therefore, the shortest path length, as presently used during the assessment of basic MIS skills, may be not a proper concept for analyzing optimal movements and, therefore, needs to be revised.Biomechanical EngineeringMechanical, Maritime and Materials Engineerin

    DNA topoisomerases participate in fragility of the oncogene RET

    Get PDF
    Fragile site breakage was previously shown to result in rearrangement of the RET oncogene, resembling the rearrangements found in thyroid cancer. Common fragile sites are specific regions of the genome with a high susceptibility to DNA breakage under conditions that partially inhibit DNA replication, and often coincide with genes deleted, amplified, or rearranged in cancer. While a substantial amount of work has been performed investigating DNA repair and cell cycle checkpoint proteins vital for maintaining stability at fragile sites, little is known about the initial events leading to DNA breakage at these sites. The purpose of this study was to investigate these initial events through the detection of aphidicolin (APH)-induced DNA breakage within the RET oncogene, in which 144 APHinduced DNA breakpoints were mapped on the nucleotide level in human thyroid cells within intron 11 of RET, the breakpoint cluster region found in patients. These breakpoints were located at or near DNA topoisomerase I and/or II predicted cleavage sites, as well as at DNA secondary structural features recognized and preferentially cleaved by DNA topoisomerases I and II. Co-treatment of thyroid cells with APH and the topoisomerase catalytic inhibitors, betulinic acid and merbarone, significantly decreased APH-induced fragile site breakage within RET intron 11 and within the common fragile site FRA3B. These data demonstrate that DNA topoisomerases I and II are involved in initiating APH-induced common fragile site breakage at RET, and may engage the recognition of DNA secondary structures formed during perturbed DNA replication

    Early efficacy of CABG care delivery in a low procedure-volume community hospital: operative and midterm results

    Get PDF
    BACKGROUND: The Leapfrog Group recommended that coronary artery bypass grafting (CABG) surgery should be done at high volume hospitals (>450 per year) without corresponding surgeon-volume criteria. The latter confounds procedure-volume effects substantially, and it is suggested that high surgeon-volume (>125 per year) rather than hospital-volume may be a more appropriate indicator of CABG quality. METHODS: We assessed 3-year isolated CABG morbidity and mortality outcomes at a low-volume hospital (LVH: 504 cases) and compared them to the corresponding Society of Thoracic Surgeons (STS) national data over the same period (2001–2003). All CABGs were performed by 5 high-volume surgeons (161–285 per year). "Best practice" care at LVH – including effective practice guidelines, protocols, data acquisition capabilities, case review process, dedicated facilities and support personnel – were closely modeled after a high-volume hospital served by the same surgeon-team. RESULTS: Operative mortality was similar for LVH and STS (OM: 2.38% vs. 2.53%), and the corresponding LVH observed-to-expected mortality (O/E = 0.81) indicated good quality relative to the STS risk model (O/E<1). Also, these results were consistent irrespective of risk category: O/E was 0, 0.9 and 1.03 for very-low risk (<1%), low risk (1–3%) and moderate-to-high risk category (>3%), respectively. Postoperative leg wound infections, ventilator hours, renal dysfunction (no dialysis), and atrial fibrillation were higher for LVH, but hospital stay was not. The unadjusted Kaplan-Meier survival for the LVH cohort was 96%, 94%, and 92% at one, two, and three years, respectively. CONCLUSION: Our results demonstrated that high quality CABG care can be achieved at LVH programs if 1) served by high volume surgeons and 2) patient care procedures similar to those of large programs are implemented. This approach may prove a useful paradigm to ensure high quality CABG care and early efficacy at low volume institutions that wish to comply with the Leapfrog standards

    Inhibitors of inflammation and endogenous surfactant pool size as modulators of lung injury with initiation of ventilation in preterm sheep

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Increased pro-inflammatory cytokines in tracheal aspirates correlate with the development of BPD in preterm infants. Ventilation of preterm lambs increases pro-inflammatory cytokines and causes lung inflammation.</p> <p>Objective</p> <p>We tested the hypothesis that selective inhibitors of pro-inflammatory signaling would decrease lung inflammation induced by ventilation in preterm newborn lambs. We also examined if the variability in injury response was explained by variations in the endogenous surfactant pool size.</p> <p>Methods</p> <p>Date-mated preterm lambs (n = 28) were operatively delivered and mechanically ventilated to cause lung injury (tidal volume escalation to 15 mL/kg by 15 min at age). The lambs then were ventilated with 8 mL/kg tidal volume for 1 h 45 min. Groups of animals randomly received specific inhibitors for IL-8, IL-1, or NF-ÎşB. Unventilated lambs (n = 7) were the controls. Bronchoalveolar lavage fluid (BALF) and lung samples were used to quantify inflammation. Saturated phosphatidylcholine (Sat PC) was measured in BALF fluid and the data were stratified based on a level of 5 ÎĽmol/kg (~8 mg/kg surfactant).</p> <p>Results</p> <p>The inhibitors did not decrease the cytokine levels or inflammatory response. The inflammation increased as Sat PC pool size in BALF decreased. Ventilated lambs with a Sat PC level > 5 ÎĽmol/kg had significantly decreased markers of injury and lung inflammation compared with those lambs with < 5 ÎĽmol/kg.</p> <p>Conclusion</p> <p>Lung injury caused by high tidal volumes at birth were decreased when endogenous surfactant pool sizes were larger. Attempts to decrease inflammation by blocking IL-8, IL-1 or NF-ÎşB were unsuccessful.</p
    • …
    corecore