202 research outputs found

    UV induced DNA damage and repair in marine bacteria

    Get PDF
    The continuous depletion of the Earth's ozone layer by anthropogenic activities has fueled concern about the impact of increasing solar ultraviolet-B radiation (UV-B) on aquatic ecosystems. The DNA is one of the key targets for UV-induced damage in the aquatic organisms.. Thus, the aquatic organisms have developed a number of enzymes, repair and tolerance mechanisms to counteract the damaging effects of UV. The continuing ozone depletion not only caused DNA damage but also causes an abrupt collapse of primary photosynthetic production, resulting in subtle, community-level responses that could ultimately impact on higher trophic levels. The pH of oceans is also changing due to increase in amount of dissolved CO2 thus causing ocean acidification and disturbing the biogeochemical cycles in the marine environment. To study the consequences of ocean acidification, the response of marine bacteria (in terms of survival) under pH changes upon UVR exposure, preliminary work has been done on marine bacteria Pseudomonas pseudoalcaligenes NP103 and P. aeruginosa N6P6 isolated from Odisha coast. The sensitivity of the bacterium to UV-B under different dosages has been determined by colony counting and spectrophotometry growth method. The percentage survival calculated by colony counting method was about 0.005% and 0.004% for P. pseudoalcaligenes NP103 and P. aeruginosa N6P6 respectively (UVR exposure of 5 sec). The survival upon exposure to different UV dosage was studied spectrophotometrically. In case of P. pseudoalcaligenes NP103 the survival was maximum at pH 8 which decreased with decline in pH of the medium. Whereas in P. aeruginosa N6P6, optimum growth and survival was observed at pH 7. The preliminary findings suggest that pH has a crucial role in DNA repair system and response varies with bacterial species. Decline in ocean water pH from current pH 8.2-8.4 is expected to affect the survival of marine bacteria upon UV damage in some bacterial group

    On Selfish Behavior in CSMA/CA Networks

    Get PDF
    CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. This can be dangerous, since the nodes themselves control their random deferment. Indeed, with the higher programmability of the network adapters, the temptation to tamper with the software or firmware is likely to grow; by doing so, a user could obtain a much larger share of the available bandwidth at the expense of other users. We use a game-theoretic approach to investigate the problem of the selfish behavior of nodes in CSMA/CA networks, specifically geared towards the most widely accepted protocol in this class of protocols, IEEE~802.11. We characterize two families of Nash equilibria in a single stage game, one of which always results in a network collapse. We argue that this result provides an incentive for cheaters to cooperate with each other. Explicit cooperation among nodes is clearly impractical. By applying the model of dynamic games borrowed from game theory, we derive the conditions for the stable and optimal functioning of a population of cheaters. We use this insight to develop a simple, localized and distributed protocol that successfully guides multiple selfish nodes to a Pareto-optimal Nash equilibrium

    The Effects of Working Hours on Nerve Conduction Test in Computer Operators

    Get PDF
    BACKGROUND: Long hours of work at a computer can result in potential adverse effects such as pain, paraesthesia, and subjective weakness of upper extremities with associated decreased nerve conduction velocities of peripheral nerves (median and ulnar). Objective: To determine whether repetitive tasks performed for long hours by computer operators can lead to peripheral neuropathy as measured by nerve conduction studies of upper extremities. Material And METHODS: We performed nerve conduction tests on 50 computer operators in two study groups. Group I consisted of computer operators who worked a minimum of 6 hours per day at the computer while Group II worked a maximum of 2 hours per day. RESULTS: Significant differences were observed between groups for most physical signs. In addition, there were significant differences between the groups for nerve conduction velocities of the medial (motor & sensory) and ulnar (motor & sensory) nerves. CONCLUSION: We found symptoms of pain, paraesthesia and subjective weaknesses as well as decreased conduction velocities of peripheral nerves in computer operators who work long hours. Further nerve conduction studies are needed to confirm predictive value for the development of carpal tunnel syndrome

    A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems

    Get PDF
    Trust and reputation models for distributed, collaborative systems have been studied and applied in several domains, in order to stimulate cooperation while preventing selfish and malicious behaviors. Nonetheless, such models have received less attention in the process of specifying and analyzing formally the functionalities of the systems mentioned above. The objective of this paper is to define a process algebraic framework for the modeling of systems that use (i) trust and reputation to govern the interactions among nodes, and (ii) communication models characterized by a high level of adaptiveness and flexibility. Hence, we propose a formalism for verifying, through model checking techniques, the robustness of these systems with respect to the typical attacks conducted against webs of trust.Comment: In Proceedings FORECAST 2016, arXiv:1607.0200

    A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory

    Get PDF
    For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that ‘hard to acquire and easy to lose’. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation

    Detecting unknown attacks in wireless sensor networks that contain mobile nodes

    Get PDF
    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised

    A Signal Normalization Technique for Illumination-Based Synchronization of 1,000-fps Real-Time Vision Sensors in Dynamic Scenes

    Get PDF
    To acquire images of dynamic scenes from multiple points of view simultaneously, the acquisition time of vision sensors should be synchronized. In this paper, an illumination-based synchronization derived from the phase-locked loop (PLL) mechanism based on the signal normalization method is proposed and evaluated. To eliminate the system dependency due to the amplitude fluctuation of the reference illumination, which may be caused by the moving objects or relative positional distance change between the light source and the observed objects, the fluctuant amplitude of the reference signal is normalized framely by the estimated maximum amplitude between the reference signal and its quadrature counterpart to generate a stable synchronization in highly dynamic scenes. Both simulated results and real world experimental results demonstrated successful synchronization result that 1,000-Hz frame rate vision sensors can be successfully synchronized to a LED illumination or its reflected light with satisfactory stability and only 28-ÎŒs jitters

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    Get PDF
    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods

    Determining the Best Sensing Coverage for 2-Dimensional Acoustic Target Tracking

    Get PDF
    Distributed acoustic target tracking is an important application area of wireless sensor networks. In this paper we use algebraic geometry to formally model 2-dimensional acoustic target tracking and then prove its best degree of required sensing coverage. We present the necessary conditions for three sensing coverage to accurately compute the spatio-temporal information of a target object. Simulations show that 3-coverage accurately locates a target object only in 53% of cases. Using 4-coverage, we present two different methods that yield correct answers in almost all cases and have time and memory usage complexity of Θ(1). Analytic 4-coverage tracking is our first proposed method that solves a simultaneous equation system using the sensing information of four sensor nodes. Redundant answer fusion is our second proposed method that solves at least two sets of simultaneous equations of target tracking using the sensing information of two different sets of three sensor nodes, and fusing the results using a new customized formal majority voter. We prove that 4-coverage guarantees accurate 2-dimensional acoustic target tracking under ideal conditions
    • 

    corecore