753 research outputs found

    Analyzing the service quality in mobile ad hoc networks

    Get PDF
    Providing the quality of service is one of the complicated issues in mobile ad hoc networks. Providing the service quality in these dynamic networks due to the changes of topology and also using the same media by network nodes is a very difficult task to do. A lot of researches have been done recently in order to provide the quality of service in these networks, such as providing the service quality by routing protocols. The necessity of real applications working with expanded mobile networks makes it necessary to provide quality of service for them. In this research, we study a new approach in providing the quality of service. In current wireless networks, gaining access to mobile wireless networks and communication equipment is limited by the interference elements between the mobile device and immobile station. In this paper we try to analyzing new solution to increase the quality of service.

    Analyzing the service quality in mobile ad hoc networks

    Get PDF
    Providing the quality of service is one of the complicated issues in mobile ad hoc networks. Providing the service quality in these dynamic networks due to the changes of topology and also using the same media by network nodes is a very difficult task to do. A lot of researches have been done recently in order to provide the quality of service in these networks, such as providing the service quality by routing protocols. The necessity of real applications working with expanded mobile networks makes it necessary to provide quality of service for them. In this research, we study a new approach in providing the quality of service. In current wireless networks, gaining access to mobile wireless networks and communication equipment is limited by the interference elements between the mobile device and immobile station. In this paper we try to analyzing new solution to increase the quality of service.

    Analyzing the service quality in mobile ad hoc networks

    Get PDF
    Providing the quality of service is one of the complicated issues in mobile ad hoc networks. Providing the service quality in these dynamic networks due to the changes of topology and also using the same media by network nodes is a very difficult task to do. A lot of researches have been done recently in order to provide the quality of service in these networks, such as providing the service quality by routing protocols. The necessity of real applications working with expanded mobile networks makes it necessary to provide quality of service for them. In this research, we study a new approach in providing the quality of service. In current wireless networks, gaining access to mobile wireless networks and communication equipment is limited by the interference elements between the mobile device and immobile station. In this paper we try to analyzing new solution to increase the quality of service.

    Cyber-security of Cyber-Physical Systems (CPS)

    Get PDF
    This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of industrial engineering at UiT campus Narvik. The CPS targets connecting distinctive robots in the laboratory in the department of industrial engineering. The ultimate objective of the department is to propose such a system for the industry. The thesis focuses on the network architecture of the CPS and the availability principle of security. This report states three research questions that are aimed to be answered. The questions are: what a secure CPS architecture for the purpose of the existing system is, how far the current state of system is from the defined secure architecture, and how to reach the proposed architecture. Among the three question, the first questions has absorbed the most attention of this project. The reason is that a secure and robust architecture would provide a touchstone that makes answering the second and third questions easier. In order to answer the questions, Cisco SAFE for IoT threat defense for manufacturing approach is chosen. The architectural approach of Cisco SAFE for IoT, with similarities to the Cisco SAFE for secure campus networks, provides a secure network architecture based on business flows/use cases and defining related security capabilities. This approach supplies examples of scenarios, business flows, and security capabilities that encouraged selecting it. It should be noted that Cisco suggests its proprietary technologies for security capabilities. According to the need of the project owners and the fact that allocating funds are not favorable for them, all the suggested security capabilities are intended to be open-source, replacing the costly Cisco-proprietary suggestions. Utilizing the approach and the computer networking fundamentals resulted in the proposed secure network architecture. The proposed architecture is used as a touchstone to evaluate the existing state of the CPS in the department of industrial engineering. Following that, the required security measures are presented to approach the system to the proposed architecture. Attempting to apply the method of Cisco SAFE, the identities using the system and their specific activities are presented as the business flow. Based on the defined business flow, the required security capabilities are selected. Finally, utilizing the provided examples of Cisco SAFE documentations, a complete network architecture is generated. The architecture consists of five zones that include the main components, security capabilities, and networking devices (such as switches and access points). Investigating the current state of the CPS and evaluating it by the proposed architecture and the computer networking fundamentals, helped identifying six important shortcomings. Developing on the noted shortcomings, and identification of open-source alternatives for the Cisco-proprietary technologies, nine security measures are proposed. The goal is to perform all the security measures. Thus, the implementations and solutions for each security measure is noted at the end of the presented results. The security measures that require purchasing a device were not considered in this project. The reasons for this decision are the time-consuming process of selecting an option among different alternatives, and the prior need for grasping the features of the network with the proposed security capabilities; features such as amount and type of traffic inside the network, and possible incidents detected using an Intrusion Detection Prevention System. The attempts to construct a secure cyber-physical system is an everlasting procedure. New threats, best practices, guidelines, and standards are introduced on a daily basis. Moreover, business needs could vary from time to time. Therefore, the selected security life-cycle is required and encouraged to be used in order to supply a robust lasting cyber-physical system

    Performance of planted maple In Western Guilan Province, Iran

    Get PDF
    The success of planted Acer velutinum was investigated in western Guilan Province, Iran. This region had been reforested in 1985.The study was carried out in the autumn of 2003 using the full callipering method. The goal of this paper is to review the maple plantation, in order to present a background that is useful for an ecological evaluation of the maple plantations in Iranian forests. Some quantity and quality factors about bole and crown were evaluated. The resistance of maple to difficult conditions including irregular cutting, and fire and full sun make this species highly valuable for plantations. This study showed that, after a period of 21 years, maple is suitable for plantations on the Caspian Sea flat area and the slopes of the Alborz Mountains, and can financially compete with other endemic and exotic species

    Role of Apoptotic Biomarkers in Ameloblastoma and Dental Follicle

    Get PDF
    Objectives Ameloblastoma is an odontogenic neoplasm with locally aggressive behavior. Fas and FasL play important roles in apoptotic pathways. The aim of this study was to determine the possible role of expression of apoptotic pathways (Fas and FasL) in human ameloblastoma and the relationship of apoptosis with the clinical biological characteristics of ameloblastoma. Methods In this descriptive retrospective study, we investigated the anti-Fas and anti-FasL antibody expression in 11 dental follicles and 56 ameloblastoma specimens (35 conventional, 15 unicystic and 6 ameloblastic carcinoma samples) by immunohistochemical (IHC) staining and polymerase chain reaction (PCR). The percentage of positive cells was calculated by using the Mann-Whitney U test and Kruskal-Wallis test. Results The rate of expression of markers was significantly lower in dental follicles than all subtypes of ameloblastoma (P=0.01 for Fas, and P=0.0001 for FasL). The FasL proportional score was significantly higher in conventional ameloblastoma than in unicystic ameloblastoma and ameloblastic carcinoma (P=0.003). There was no significant relationship between the type of ameloblastoma and expression of Fas. Conclusion This study shows that the process of apoptosis in ameloblastomais a sign of behavioral change in odontogenic epithelial cells especially in conventional ameloblastoma and that the apoptotic factors may not play an effective role in the malignancy of ameloblastoma

    Report of an Uncommon Case of Huge Neurofibroma in the Buccal Mucosa

    Get PDF
    Objectives Neurofibroma (solitary or multiple) is a benign neurogenic jaw tumor with peripheral nerve origin. It is commonly found in the skin and the head and neck region but its occurrence in the oral cavity is rare. Case: This report presents a case of huge solitary neurofibroma in the maxillary vestibular mucosa in a 60-year-old male without any medical or family history of neurofibromatosis type 1. The diagnosis was made based on histopathological findings and IHC staining for the S-100 protein. No recurrence was noted at the 6-month follow-up after surgical excision of the lesion. Conclusion We reported a case of neurofibroma, which is a relatively rare benign tumor of the oral cavity, in the buccal mucosa in an elderly man based on histopathological and immunohistochemical findings. The propensity of neurofibromas to progress to neurofibromatosis or the primary disease undergoing malignant transformation (6-29%) has been reported in the literature. Therefore, a close follow-up of patients presenting initially only with neurofibroma is necessary. &nbsp

    Norepinephrine and Corticosterone in the neoCLOM Animal Model of Obsessive Compulsive Disorder: Effects of Treatment and Sex

    Get PDF
    This study examined a novel animal model of OCD, the neoCLOM model, in which rats are treated twice daily from postnatal Days 9-16 with 15 mg/kg of the serotonin-norepinephrine uptake inhibitor clomipramine. Results showed there was an effect of neonatal TREATMENT on levels of norepinephrine (NE) measured from micropunches of post-mortem brain tissue using High Performance Liquid Chromatography. Compared to control males, neoCLOM males had higher levels of NE in the amygdala and the lateral thalamus. Compared to control females, neoCLOM females had higher levels of NE in the motor cortex, orbitofrontal cortex, and the hypothalamus. There was also an effect of SEX. Versus control males, control females had higher levels of NE in the lateral thalamus, ventral striatum, and anterior cingulate cortex. Conversely, levels of NE in the hypothalamus were lower in the control females versus males. Compared to neoCLOM males, neoCLOM females had higher levels of NE in the prefrontal cortex and the motor cortex. SEX (but not treatment) had a significant effect on corticosterone levels (rat analog of cortisol) in post-mortem trunk blood. The current finding that the elevation of NE evidenced in OCD was mirrored by increased levels of NE in brain structures of the neoCLOM rats adds support for the validity of this new animal model.https://orb.binghamton.edu/research_days_posters_spring2020/1075/thumbnail.jp

    Dual Perspective On Customer Value In The Context Of A Smart And Connected Phenomenon: Case Innovative Product-service Bundle

    Get PDF
    Focusing on value creation in marketing has always been the key to success for companies. As a result, the definition, analysis and communication of value has gained importance. Companies are making an attempt to make a value proposition that is not only lucrative for the customer, but also has great returns for the company itself. Although this might sound simple on paper, since it is the basis for business logic, it is much more complicated in real life situations. With the service elements in the offering and the emergence of technologies such as smart and connected phenomenon, the business models become more innovative and more complexity is added to the analysis of value. The objective of this thesis is to introduce a method for the dual perspective of value in a bundle of product and service in a smart and connected context. This method draws from the customer value and customer lifetime value concepts to offer an all-inclusive study on value. This assists companies in crafting an appealing value proposition in a cost-saving offering for a client that offers value to the company over its lifetime. This study specifically deals with the state of the arts smart and connected phenomenon and provides a view on how value works in that context. The framework created through this study serves to help the company choose a client that is of most value to the firm over the time of their cooperation. It then leads the company towards a better fabrication of the offering that is not only an attractive proposition to the client but also for the company. It gives a close insight onto where the benefit comes from and how a smart and connected bundle of products, services and relationships must be put together for maximum results in the modern age
    • …
    corecore