261 research outputs found

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks

    Get PDF
    Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. In the face of this increasingly complex traffic mix, where each service imposes different requirements, QoS provisioning and guarantee for multimedia services have become increasingly important. This is partially due to the users' requirements and poses a difficult challenge for network service providers. The tasks are more challenging than those in the wired networks due to the shortage of resources and the mobility present in wireless networks. The mobility factor causes severe fluctuations of resource usage. In this research, the QoS provisioning and resource utilization for multimedia services in wireless/mobile networks aspects are addressed. The first proposed scheme is called Adaptive Multi-Class Services Controller scheme (AMCSC). This scheme harnesses the combinations of Call Admission Control (CAC), an Adaptive Bandwidth Allocation (ABA) algorithm with micro-Acceptable Bandwidth Level (micro-ABL) and the Connection Management Table (CMT). The specific objective in designing the AMCSC Scheme is to reduce the New Connection Blocking Probability (NCBP) and the Handoff Connection Dropping Probability (HCDP) by managing resource allocation to address. The insufficient resource problem is experienced by the MTs. This scheme supports multiple classes of non-adaptive and adaptive multimedia services with diverse QoS requirements. The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). Two proposed MPSs are deployed to predict the mobility movement of mobiles. The first MPS obtains the user mobility information by Received Signal Strength (RSS) which also includes the direction of the MT. This is enhanced based also on the position of the MT within a sector and zones of the cell. The second MPS obtains the user mobility information using the road map information of the cell and the integrated RSS and Global Position System (GPS) measurements. The simulation results show that the proposed scheme enhances the estimation of the target cell. This shown by the reduction of the signalling traffic in wireless cellular networks, reduction of the number of terminated ongoing calls of non-real time traffic and reduction of the number of cancelled reservation due to false reservation. The third proposed framework is an integration of the AMCSC scheme and the bandwidth reservation done based on the MPS. This integration is used to achieve the ideal balance between the users' QoS guarantee of multiple classes of wireless multimedia and maximizing the bandwidth utilization. The performance result of the proposed framework has proven to improve the achieved performance metrics. The performances analysis in this research is discrete simulation. The proposed schemes have proven to enhance the performance in terms of NCBP and HCDP for each type of traffic, management the resource for multiple traffics with diverse requirement, bandwidth utilization and predicting the target cell in the right time and place

    Localisation in Equivariant Cohomology

    Full text link
    Equivariant cohomology, a captivating fusion of symmetry and abstract mathematics, illuminates the profound role of group actions in shaping geometric structures. At its core lies the Atiyah-Bott Localization Theorem, a mathematical jewel unveiling the art of localization. This theorem simplifies intricate integrals on symplectic manifolds with Lie group actions, revealing the hidden elegance within complexity. Our paper embarks on a journey to explore the theoretical foundations and practical applications of equivariant cohomology, demonstrating its transformative power in diverse fields, from theoretical physics to geometry. As we delve into the symphonic interplay between geometry and symmetry, readers are invited to witness the beauty of mathematical patterns emerging from abstraction. This mathematical voyage unveils the harmonious marriage of symmetry, topology, and elegance in the captivating realm of equivariant cohomology.Comment: 30 pages, 3 figure

    Application and Performance Analysis of DSDV Routing Protocol in ad-hoc Wireless Sensor Network with Help of NS2 Knowledge

    Get PDF
    Wireless Sensor Networks (WSNs) are characterized by multi-hop wireless connectivity, frequently changing network topology and need for efficient routing protocols. The purpose of this paper is to evaluate performance of routing protocol DSDV in wireless sensor network (WSN) scales regarding the End-to-End delay and throughput PDR with mobility factor .Routing protocols are a critical aspect to performance in mobile wireless networks and play crucial role in determining network performance in terms of packet delivery fraction, end-to-end delay and packet loss. Destination-sequenced distance vector (DSDV) protocol is a proactive protocol depending on routing tables which are maintained at each node. The routing protocol should detect and maintain optimal route(s) between source and destination nodes. In this paper, we present application of DSDV in WSN as extend to our pervious study to the design and implementation the details of the DSDV routing protocol in MANET using the ns-2 network simulator. also, the performance of DSDV protocol in sensor network of randomly distributed mobile nodes with mobile source and sink nodes is investigated for MAC IEEE802.15.4 network by ns-2 simulator.

    Eklentiler kullanarak veri kaybını engelleme

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Bir çok organizasyon için çalışanlar tarafından farkında olmayarak veri sızıntısı oluşması büyük bir problem oluşturmaktadır. Organizasyonlar veri gizliliğini sağlamak için gün geçtikçe veri kaybı/sızıntısı önleme (DLP-Data Loss/Leakage Prevention) çözümlerini daha fazla kullanmaktadır. Şu anda, DLP çözümleri gizli verileri ayırt etmekte zorluk çekmektedir. Ayrıca, kullanıcıların gizli verileri gizli olmayan verilerden ayırt etmelerine çok az izin vermektedir. Üstelik, organizasyon çalışanlarının çalışma alanları haricinde çalışmalarına sınırlar konulmaktadır. Bu sorunu çözmek için, veri sahiplerinin dosyanın tüm yaşam döngüsü boyunca (oluşturma, düzenleme, vb.) dosyaların gizliliğini sınıflandırarak tanımlayabilecekleri bir DLP Eklentileri modeli sunmak önemlidir. Bu model, organizyon içinde çalışanlar tarafından sınıflandırılmış dosyaların kazayla sızmasını önlemek için veri şifreleme ve erişim kontrolü gibi güvenlik önlemlerini kullanır. Bu yaklaşım, doğru kullanıcının organizasyon içindeki veya dışındaki güvenlik erişim ayrıcalığına göre doğru dosyalara erişebileceğini garanti eder. Yani sınıflandırılmış dosyaları her zaman şifrelenmiş olarak tutmak, bu dosyaları; dinlenme, hareket halinde veya kullanırken koruyacaktır. DLP-Eklentisi, kullanıcılara dosyaların şifrelenmesi veya şifresini çözmek için herhangi bir ek prosedür eklemek zorunluluğu olmadan dosyalara doğru bir şekilde erişebilmelerini garanti edmektedir. Kullanıcının normalde olduğu gibi tek yapması gereken dosyayı açmak ve kapatmaktır. DPL-Eklentileri ile veri kaybı önleme çözümünün uygulanmasına yönelik bu yaklaşım, verilerinin korunması için Microsoft Office, pdf okuyucular, metin editörü, medya oynatıcılar ve posta uygulamaları gibi yaygın ofis uygulamalarına rahatlıkla eklenebilir. Bu amaçla, DLPEklentileri modellerinden bir tanesini Microsoft offıce Word kelime işlemci uygulamasında gerçekleştirilmiştir.Inadvertent Data leakage by insiders is considered a serious problem to many organizations. Organizations are increasingly implementing Data Leakage/Loss Prevention solutions also know as (DLP), to protect the confidentiality of their data. Currently, DLP solutions have difficulties to identify confidential data as well lack the ability to allow users to distinguish confidential from non-confidential data. Moreover, they are limited to work outside the organizations. In order to solve this problem, it is important to introduce a DLP-Plugins model where the data owners can identify the privacy of the files during their entire lifecycle (creating, editing, etc.) by classifying them. This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. This approach will guarantee that the right user will have access to the correct files according to their security access privilege inside or outside the organization. By always keeping classified files encrypted this will protect them all the time and everywhere i.e. at rest, in motion, and in use. The DLP-Plugin shall guarantee the usability for the users, so that they will be able to have the right access to the files, just in case they don't need to enforce any additional procedures to encrypt or decrypt the file. All that will be required is to simply open and close the file as they do normally. This approach to implementing data shrinkage and loss prevention solution with DPL-Plugins, can be added into the legacy applications like Microsoft Office, pdf readers, text editor, media players, and mail applications to protect their data. As an example to this DLP-Plugins model, we have built a DLP-Plugin for Microsoft offıce Word

    Oral Health Status, Oral Health Care And Dietary Practices Of Special Needs Children

    Get PDF
    Oral health is multifactorial. Children with special health care needs are at greater risk for poorer oral health than normal children Objectives: This study aimed to determine the prevalence of dental caries, periodontal disease, oral hygiene status and oral health care practices and dietary practices and explore its associations among special needs children. Methodology: This cross-sectional descriptive study involved 125 special needs school children in Kota Bharu district. DMFT, CPI and OHI-S indices were used to evaluate caries experience, periodontal status and oral hygiene status respectively. Dental examination was done on portable dental chair with portable light and mobile dental bus equipped with dental chair and lighting

    Mikrogefäßdichte als prognostisches Faktor in Plattenepithelkarzinom des Penis

    Get PDF
    OBJECTIVE: To examine the potential effect of tumor-induced angiogenesis in squamous cell carcinoma of the penis as a possible prognostic factor. PATIENTS AND METHODS: Immunohistochemistry was preformed to detect microvessels in tumor samples of 64 patients with squamous cell carcinoma of the penis. We used a monoclonal mouse antibody directed against CD34 antigen. Only 61 (30 with and 31 without metastasis) patients had good staining properties and were included. After immunostaining, the entire tumor section was scanned microscopically at low power (× 40) to identify hot spots within the tumor and at its periphery. Individual tumor microvessels were then counted under high power (× 200) to obtain a vessel count in a defined area, and the mean of the 3 highest microvessel counts was taken as the microvessel density (MVD). Microvessel counting was performed using a computer-aided image analysis system. The nodal status was based on histopathologic examination or an uneventful follow-up ≥ 2 years. RESULTS: The 5-year overall survival (OAS) was 75% and 30 % for those with high and low peritumoral MVD, respectively (log rank P = 0.01). No difference was noticed within the tumor with regard to high (5-year OAS of 65.03%) and low (5-year OAS of 60.56%) intratumoral MVD (log rank P = 0.99). The mean intratumoral MVD was 32.35 (3.16), 37.94 (3.35), and 62.66 (5.47) in T1, T2, and T3 respectively (ANOVA P = 0.0006), with increasing tendency. The mean peritumoral MVD was 55.91 (5.60), 56.8 (4.00), and 78.86 (8.71), respectively (P = 0.06). No correlation between MVD lymph node status and tumor grade was seen (P > 0.05). CONCLUSION: In our group of patients, a high peritumoral MVD was associated with a better 5-year OAS. However, for a reliable and reproducible assessment of tumor angiogenesis in penile squamous cell carcinoma, validation procedures and quality control protocols are mandatory

    Analysis of Transmitted Resistance to Raltegravir and Selective Pressure among HIV-1-Infected Patients on a Failing HAART in São Paulo, Brazil

    Get PDF
    We studied the presence of primary resistance to raltegravir (RAL), natural polymorphisms, and selection pressure on HIV-1 integrase. We found a high frequency of integrase polymorphisms related to the resistance to RAL and sequence stability. Further studies are needed to determine the importance of these polymorphisms to RAL resistance.Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)Fed Univ São Paulo UNIFESP, Div Infect Dis, Retrovirol Lab, São Paulo, BrazilLusiada Fdn Santos, Mol Biol Lab, Dept Med, Santos, BrazilUniv São Paulo, Div Clin Immunol & Allergy, São Paulo, BrazilFed Univ São Paulo UNIFESP, Div Infect Dis, Retrovirol Lab, São Paulo, BrazilFAPESP: 09/05712-3Web of Scienc

    Techniques used to identify the Brazilian variant of HIV-1 subtype B

    Get PDF
    The purpose of the present study was to compare the sensitivity and specificity of V3 enzyme immunoassay (solid phase EIA and EIA inhibition) and restriction fragment length polymorphism (RFLP) with the DNA sequencing "gold standard" to identify the Brazilian HIV-1 variants of subtype B and B"-GWGR. Peripheral blood mononuclear cells were collected from 61 HIV-1-infected individuals attending a clinic in São Paulo. Proviral DNA was amplified and sequentially cleaved with the Fok I restriction enzyme. Plasma samples were submitted to a V3-loop biotinylated synthetic peptide EIA. Direct partial DNA sequencing of the env gene was performed on all samples. Based on EIA results, the sensitivity for detecting B-GPGR was 70%, compared to 64% for the Brazilian variant B"-GWGR while, the specificity of B-GPGR detection was 85%, compared to 88% for GWGR. The assessment of RFLP revealed 68% sensitivity and 94% specificity for the B-GPGR strain compared to 84 and 90% for the B"-GWGR variant. Moreover, direct DNA sequencing was able to detect different base sequences corresponding to amino acid sequences at the tip of the V3 loop in 22 patients. These results show a similar performance of V3 serology and RLFP in identifying the Brazilian variant GWGR. However, V3 peptide serology may give indeterminate results. Therefore, we suggest that V3 serology be used instead of DNA sequencing where resources are limited. Samples giving indeterminate results by V3 peptide serology should be analyzed by direct DNA sequencing to distinguish between B-GPGR and the Brazilian variant B"-GWGR
    corecore