523 research outputs found

    On Security and reliability using cooperative transmissions in sensor networks

    Get PDF
    Cooperative transmissions have received recent attention and research papers have demonstrated their benefits for wireless networks. Such benefits include improving the reliability of links through diversity and/or increasing the reach of a link compared to a single transmitter transmitting to a single receiver (single-input single-output or SISO). In one form of cooperative transmissions, multiple nodes can act as virtual antenna elements and provide diversity gain or range improvement using space-time coding. In a multi-hop ad hoc or sensor network, a source node can make use of its neighbors as relays with itself to reach an intermediate node with greater reliability or at a larger distance than otherwise possible. The intermediate node will use its neighbors in a similar manner and this process continues till the destination is reached. Thus, for the same reliability of a link as SISO, the number of hops between a source and destination may be reduced using cooperative transmissions as each hop spans a larger distance. However, the presence of ma-licious or compromised nodes in the network impacts the benefits obtained with cooperative transmissions. Using more relays can increase the reach of a link, but if one or more relays are malicious, the transmission may fail. However, the relationships between the number of relays, the number of hops, and success probabilities are not trivial to determine. In this paper, we analyze this problem to understand the conditions under which cooperative transmissions fare better or worse than SISO transmissions. We take into consideration additional parameters such as the path-loss exponent and provide a framework that allows us to evaluate the conditions when cooperative transmissions are better than SISO transmissions. This analysis provides insights that can be employed before resorting to simulations or experimentation. © Springer Science+Business Media, LLC 2012

    The human CNOT1-CNOT10-CNOT11 complex forms a structural platform for protein-protein interactions

    Get PDF
    The evolutionary conserved CCR4-NOT complex functions in the cytoplasm as the main mRNA deadenylase in both constitutive mRNA turnover and regulated mRNA decay pathways. The versatility of this complex is underpinned by its modular multi-subunit organization, with distinct structural modules actuating different functions. The structure and function of all modules are known, except for that of the N-terminal module. Using different structural approaches, we obtained high-resolution data revealing the architecture of the human N-terminal module composed of CNOT1, CNOT10, and CNOT11. The structure shows how two helical domains of CNOT1 sandwich CNOT10 and CNOT11, leaving the most conserved domain of CNOT11 protruding into solvent as an antenna. We discovered that GGNBP2, a protein identified as a tumor suppressor and spermatogenic factor, is a conserved interacting partner of the CNOT11 antenna domain. Structural and biochemical analyses thus pinpoint the N-terminal CNOT1-CNOT10-CNOT11 module as a conserved protein-protein interaction platform

    The association between coronary flow rate and impaired heart rate recovery in patients with metabolic syndrome: A preliminary report

    Get PDF
    Background: The aim of this study is to evaluate heart rate recovery (HRR) and association between coronary flow rate and HRR in patients with metabolic syndrome (MS) who had morphologically normal coronary angiogram.Methods: Study population included 43 patients with MS and 37 control subjects without MS. All patients were selected from individuals who had recently undergone coronary angiography in our hospital and were diagnosed as having angiographically normal coronary arteries. Exercise stress test results obtained prior to coronary angiography were evaluated for calculating HRR and other parameters. In addition, coronary flow was objectively evaluated for each major coronary artery in each subject using TIMI frame count method.Results: All HRR values calculated were detected significantly lower in MS group compared to controls (HRR first: 32 ± 9 vs. 37 ± 10; p = 0.01, second: 46 ± 11 vs. 52 ± 11; p = 0.03, third: 51 ± 12 vs. 59 ± 12; p = 0.00, fourth: 54 ± 13 vs. 61 ± 2; p = 0.02). TIMI frame counts for each major epicardial coronary artery and mean TIMI frame count were also found to be significantly higher in MS group compared to controls (left anterior descending artery:51 ± 24 vs. 39 ± 15; p = 0.009, left circumflex artery: 32 ± 11 vs. 24 ± 7; p = 0.001, right coronary artery: 33 ± 14 vs. 24 ± 10; p = 0.003, mean TIMI frame count: 38 ± 15 vs. 29 ± 9;p = 0.002). Additionally, significant negative correlations were also detected between HRR first minute and coronary TIMI frame count values in patients with MS. None of MS parameters did not affect HRR values, however mean TIMI frame count independently associated with HRR first minute (p = 0.04) in patients with MS.Conclusions: Impaired coronary blood flow occurring in MS might be a clue of autonomic dysfunction in addition to previously known endothelial dysfunction.

    A Computational Approach for Designing Tiger Corridors in India

    Full text link
    Wildlife corridors are components of landscapes, which facilitate the movement of organisms and processes between intact habitat areas, and thus provide connectivity between the habitats within the landscapes. Corridors are thus regions within a given landscape that connect fragmented habitat patches within the landscape. The major concern of designing corridors as a conservation strategy is primarily to counter, and to the extent possible, mitigate the effects of habitat fragmentation and loss on the biodiversity of the landscape, as well as support continuance of land use for essential local and global economic activities in the region of reference. In this paper, we use game theory, graph theory, membership functions and chain code algorithm to model and design a set of wildlife corridors with tiger (Panthera tigris tigris) as the focal species. We identify the parameters which would affect the tiger population in a landscape complex and using the presence of these identified parameters construct a graph using the habitat patches supporting tiger presence in the landscape complex as vertices and the possible paths between them as edges. The passage of tigers through the possible paths have been modelled as an Assurance game, with tigers as an individual player. The game is played recursively as the tiger passes through each grid considered for the model. The iteration causes the tiger to choose the most suitable path signifying the emergence of adaptability. As a formal explanation of the game, we model this interaction of tiger with the parameters as deterministic finite automata, whose transition function is obtained by the game payoff.Comment: 12 pages, 5 figures, 6 tables, NGCT conference 201

    Opportunistic relay selection for cooperative networks with secrecy constraints

    Full text link

    Gravitational hedgehog, stringy hedgehog and stringy sphere

    Full text link
    We investigate the solutions of Einstein equations such that a hedgehog solution is matched to different exterior or interior solutions via a spherical shell. In the case where both the exterior and the interior regions are hedgehog solutions or one of them is flat, the resulting spherical shell becomes a stringy shell. We also consider more general matchings and see that in this case the shell deviates from its stringy character.Comment: 11 page

    Default Risk and Equity Returns: A Comparison of the Bank-Based German and the U.S. Financial System

    Get PDF
    In this paper, we address the question whether the impact of default risk on equity returns depends on the financial system firms operate in. Using an implementation of Merton's option-pricing model for the value of equity to estimate firms' default risk, we construct a factor that measures the excess return of firms with low default risk over firms with high default risk. We then compare results from asset pricing tests for the German and the U.S. stock markets. Since Germany is the prime example of a bank-based financial system, where debt is supposedly a major instrument of corporate governance, we expect that a systematic default risk effect on equity returns should be more pronounced for German rather than U.S. firms. Our evidence suggests that a higher firm default risk systematically leads to lower returns in both capital markets. This contradicts some previous results for the U.S. by Vassalou/Xing (2004), but we show that their default risk factor looses its explanatory power if one includes a default risk factor measured as a factor mimicking portfolio. It further turns out that the composition of corporate debt affects equity returns in Germany. Firms' default risk sensitivities are attenuated the more a firm depends on bank debt financing
    • …
    corecore