12 research outputs found

    Optimizing the DFCN Broadcast Protocol with a Parallel Cooperative Strategy of Multi-Objective Evolutionary Algorithms

    Get PDF
    Proceeding of: 5th International Conference, EMO 2009, Nantes, France, April 7-10, 2009This work presents the application of a parallel coopera- tive optimization approach to the broadcast operation in mobile ad-hoc networks (manets). The optimization of the broadcast operation im- plies satisfying several objectives simultaneously, so a multi-objective approach has been designed. The optimization lies on searching the best configurations of the dfcn broadcast protocol for a given manet sce- nario. The cooperation of a team of multi-objective evolutionary al- gorithms has been performed with a novel optimization model. Such model is a hybrid parallel algorithm that combines a parallel island- based scheme with a hyperheuristic approach. Results achieved by the algorithms in different stages of the search process are analyzed in order to grant more computational resources to the most suitable algorithms. The obtained results for a manets scenario, representing a mall, demon- strate the validity of the new proposed approach.This work has been supported by the ec (feder) and the Spanish Ministry of Education and Science inside the ‘Plan Nacional de i+d+i’ (tin2005-08818-c04) and (tin2008-06491-c04-02). The work of Gara Miranda has been developed under grant fpu-ap2004-2290.Publicad

    Bayesian signaling game based efficient security model for MANETs

    Get PDF
    Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This paper offers a Bayesian-Signaling game model capable of analysing the behaviour associated with regular as well as malicious nodes. In the proposed model, the utility of normal nodes has been increased while reducing the utility linked to malicious nodes. Moreover, the system employs a reputation system capable of stimulating best cooperation between the nodes. The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate

    Bioavailability of Vitamin D from Fortified Process Cheese and Effects on Vitamin D Status in the Elderly

    No full text
    We conducted 2 studies to determine the effect of vitamin D-fortified cheese on vitamin D status and the bioavailability of vitamin D in cheese. The first study was designed to determine the effect of 2 mo of daily consumption of vitamin D3-fortified (600 IU/d) process cheese on serum 25-hydroxyvitamin D (25-OHD), parathyroid hormone (PTH), and osteocalcin (OC) concentrations among 100 older (≥60 yr) men and women. Participants were randomized to receive vitamin Dfortified cheese, nonfortified cheese, or no cheese. Serum levels of 25-OHD, PTH, and OC were measured at the beginning and end of the study. There were no differences in 25-OHD, PTH, or OC after 2 mo of fortified cheese intake. The vitamin D-fortified cheese group had a greater decrease in 25-OHD than other groups, due to higher baseline 25-OHD. A second study was conducted to determine whether the bioavailability of vitamin D2 in cheese (delivering 5880 IU of vitamin D2/56.7-g serving) and water (delivering 32,750 IU/250 mL) is similar and whether absorption differs between younger and older adults. The second study was a crossover trial involving 2 groups of 4 participants each (younger and older group) that received single acute feedings of either vitamin D2-fortified cheese or water. Serial blood measurements were taken over 24 h following the acute feeding. Peak serum vitamin D and area under the curve were similar between younger (23 to 50 yr) and older (72 to 84 yr) adults, and vitamin D2 was absorbed more efficiently from cheese than from water. These studies demonstrated that vitamin D in fortified process cheese is bioavailable, and that young and older adults have similar absorption. Among older individuals, consuming 600 IU of vitamin D3 daily from cheese for 2 mo was insufficient to increase serum 25- OHD during limited sunlight exposure

    Furthest South

    Get PDF
    For Violin Solo. -Region One- -Region Two- -Region Three- -Region Four- -Region Five-6 page

    Constructing and validating ternary phase diagrams as basis for polymer dissolution recycling

    No full text
    One of the recycling methods for polymer waste is the dissolution-precipitation process, which is based on dissolving the polymer in a suitable solvent followed by contaminant removal by, optionally filtration, and polymer precipitation through the addition of a nonsolvent. As showcased for poly(vinyl chloride) (PVC), a polymer used in the construction sector and for packaging, the current work makes clear that the less studied ternary phase diagrams are a very promising tool for the ideal solvent-nonsolvent selection. Such ternary phase diagrams provide compositional information concerning the phase separation process pushing forward the dissolution-precipitation recycling technology. It is demonstrated that these diagrams can be constructed by connecting the Flory-Huggins theory, Hansen solubility parameters and UNIQUAC activity coefficients. Model validation is performed via cloud point measurements for which one can utilize labour-intensive visual inspection or, as demonstrated in this work, one can also apply dynamic light scattering and turbidimetry, with the latter as the preferred method that is cheaper and faster. Ternary phase diagrams for multiple solvent-nonsolvent systems are theoretically constructed and experimentally validated, considering cyclohexanone-ethanol and THF-ethanol as solvent-nonsolvent pairs. It follows that PVC phase diagrams are inherently different compared to other, more commonly studied polymers, such as polyethersulfone (PES) and that for PVC the addition of a ternary interaction parameter might be required

    Identifying and Characterizing Duck Parasites Using PCR and Bioinformatics Tools: Parasitology Class Project

    No full text
    The identification and characterization of duck (Family: Anatidae) parasites is crucial for developing effective strategies to manage and prevent their transmission. Polymerase Chain Reaction (PCR), sequencing and analysis of DNA extracted from duck parasites has become an essential tool for diagnosing and understanding the diversity of these parasites. This research used the results of PCR amplification and sequencing of DNA extracted from duck parasites to identify the organisms using bioinformatics tools. The results showed the successful identification and characterization of several duck parasites. Confirmation of the parasite identifications were completed by morphologic analysis by another group. Overall, this study provided a foundation for further investigation into the genetic diversity of duck parasites and their impact on the health of ducks

    A Context-Aware Broadcast Protocol for Mobile Wireless Networks

    Get PDF
    International audienceDelay Tolerant Networks (DTNs) are a sub-class of mobile ad hoc networks (MANETs). They are mobile wireless networks that feature inherent connection disruption. In particular such networks are generally non-connected. In this paper we focus on defining a broadcast service which operate on DTNs. A number of protocols solving the problem of broadcasting across DTNs have been proposed in the past, but all of them exhibit a static behavior, i.e. they provide no control parameter. However, at the application level, flexible broadcasting schemes are desirable. In particular, it is important that the user (the source of the broadcast message) can control the way the message gets spread across the network. This paper introduces a new broadcasting protocol dedicated to DTNs, called Context-Aware Broadcasting Protocol (CABP), which adapts its greediness according to the “urgency” (priority) of the broadcast message. A formal presentation of its strategy is proposed and through preliminary experiments, the cost-effectiveness of CABP is enlightened
    corecore