743 research outputs found

    Aerosol Characterization in Egypt Urban and Rural Measurements

    Full text link
    Characterization of the size distribution of airborne particulate matter, atmospheric aerosols, is valuable and represents an important key for the assessment of air quality and human health. Moreover, aerosol composition and, in particular, the size differentiated composition may provide information in sources responsible for the airborne particles

    Location prediction based on a sector snapshot for location-based services

    Get PDF
    In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique

    Computational investigation of mechanistic insights of Aβ42 interactions against extracellular domain of nAChRα7 in Alzheimer's disease

    Get PDF
    Aim: Amyloid beta (Aβ) 1-42, which is a basic constituent of amyloid plaques, binds with extracellular transmembrane receptor nicotine acetylcholine receptor α7 (nAChRα7) in Alzheimer’s disease. Materials and Methods: In the current study, a computational approach was employed to explore the active binding sites of nAChRα7 through Aβ 1–42 interactions and their involvement in the activation of downstream signalling pathways. Sequential and structural analyses were performed on the extracellular part of nAChRα7 to identify its core active binding site. Results: Results showed that a conserved residual pattern and well superimposed structures were observed in all nAChRs proteins. Molecular docking servers were used to predict the common interactive residues in nAChRα7 and Aβ1–42 proteins. The docking profile results showed some common interactive residues such as Glu22, Ala42 and Trp171 may consider as the active key player in the activation of downstream signalling pathways. Moreover, the signal communication and receiving efficacy of best-docked complexes was checked through DynOmic online server. Furthermore, the results from molecular dynamic simulation experiment showed the stability of nAChRα7. The generated root mean square deviations and fluctuations (RMSD/F), solvent accessible surface area (SASA) and radius of gyration (Rg) graphs of nAChRα7 also showed its backbone stability and compactness, respectively. Conclusion: Taken together, our predicted results intimated the structural insight on the molecular interactions of beta amyloid protein involved in the activation of nAChRα7 receptor. In future, a better understanding of nAChRα7 and their interconnected proteins signalling cascade may be consider as target to cure Alzheimer’s disease.This was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2017R1D1A1B03034948).Scopu

    An Effective Satellite Remote Sensing Tool Combining Hardware and Software Solutions

    Get PDF
    In this paper we propose a new effective remote sensing tool combining hardware and software solutions as an extension of our previous work. In greater detail the tool consists of a low cost receiver subsystem for public weather satellites and a signal and image processing module for several tasks such as signal and image enhancement, image reconstruction and cloud detection. Our solution allows to manage data from satellites effectively with low cost components and portable software solutions. We aim at sampling and processing of the modulated signal entirely in software enabled by Software Defined Radios (SDR) and CPU computational speed overcoming hardware limitation such as high receiver noise and low ADC resolution. Since we want to extend our previous method to demodulate signals coming from various meteorological satellites, we propose a new high frequency receiving system designed to receive and demodulate signals transmitted at 1.7 GHz. The signals coming from satellites are demodulated, synchronized and enhanced by using low level image processing techniques, then cloud detection is performed by using the well known K-means clustering algorithm. The hardware and software architecture extensions make our solution able to receive and demodulate high frequency and bandwidth meteorological satellite signals, such as those transmitted by NOAA POES, NOAA GOES, EUMETSAT Metop, Meteor-M and FengYun

    Securing Remote Access Inside Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse carrier-managed services. As a particular example we consider the scenario where a mobile device initially registered for the use with one wireless network (its home network) moves to the area covered by another network inside the same mesh. The goal is to establish a secure access to the home network using the infrastructure of the mesh. Classical mechanisms such as VPNs can protect end-to-end communication between the mobile device and its home network while remaining transparent to the routing infrastructure. In WMNs this transparency can be misused for packet injection leading to the unnecessary consumption of the communication bandwidth. This may have negative impact on the cooperation of mesh routers which is essential for the connection establishment. In this paper we describe how to establish remote connections inside WMNs while guaranteeing secure end-to-end communication between the mobile device and its home network and secure transmission of the corresponding packets along the underlying multi-hop path. Our solution is a provably secure, yet lightweight and round-optimal remote network access protocol in which intermediate mesh routers are considered to be part of the security architecture. We also sketch some ideas on the practical realization of the protocol using known standards and mention extensions with regard to forward secrecy, anonymity and accounting

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Resilient distributed collection through information speed thresholds

    Get PDF
    Part 6: Large-Scale Decentralised SystemsInternational audienceOne of the key coordination problems in physically-deployed distributed systems, such as mobile robots, wireless sensor networks, and IoT systems in general, is to provide notions of “distributed sensing” achieved by the strict, continuous cooperation and interaction among individual devices. An archetypal operation of distributed sensing is data summarisation over a region of space, by which several higher-level problems can be addressed: counting items, measuring space, averaging environmental values, and so on. A typical coordination strategy to perform data summarisation in a peer-to-peer scenario, where devices can communicate only with a neighbourhood, is to progressively accumulate information towards one or more collector devices, though this typically exhibits problems of reactivity and fragility, especially in scenarios featuring high mobility. In this paper, we propose coordination strategies for data summarisation involving both idempotent and arithmetic aggregation operators, with the idea of controlling the minimum information propagation speed, so as to improve the reactivity to input changes. Given suitable assumptions on the network model, and under the restriction of no data loss, these algorithms achieve optimal reactivity. By empirical evaluation via simulation, accounting for various sources of volatility, and comparing to other existing implementations of data summarisation algorithms, we show that our algorithms are able to retain adequate accuracy even in high-variability scenarios where all other algorithms are significantly diverging from correct estimations

    Transient peak-strain matching partially recovers the age-impaired mechanoadaptive cortical bone response

    Get PDF
    Mechanoadaptation maintains bone mass and architecture; its failure underlies age-related decline in bone strength. It is unclear whether this is due to failure of osteocytes to sense strain, osteoblasts to form bone or insufficient mechanical stimulus. Mechanoadaptation can be restored to aged bone by surgical neurectomy, suggesting that changes in loading history can rescue mechanoadaptation. We use non-biased, whole-bone tibial analyses, along with characterisation of surface strains and ensuing mechanoadaptive responses in mice at a range of ages, to explore whether sufficient load magnitude can activate mechanoadaptation in aged bone. We find that younger mice adapt when imposed strains are lower than in mature and aged bone. Intriguingly, imposition of short-term, high magnitude loading effectively primes cortical but not trabecular bone of aged mice to respond. This response was regionally-matched to highest strains measured by digital image correlation and to osteocytic mechanoactivation. These data indicate that aged bone’s loading response can be partially recovered, non-invasively by transient, focal high strain regions. Our results indicate that old murine bone does respond to load when the loading is of sufficient magnitude, and bones’ age-related adaptation failure may be due to insufficient mechanical stimulus to trigger mechanoadaptation
    corecore