905 research outputs found

    A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Get PDF
    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users

    Design and Simulation of a MEMS Structure for Electrophoretic and Dielectrophoretic Separation of Particles by Contactless Electrodes

    Get PDF
    Rapid identification of pathogenic bacterial species is an important factor in combating public health problems such as E. coli contamination. Food and waterborne pathogens account for sickness in 76 million people annually (CDC). Diarrheagenic E. coli is a major source of gastrointestinal illness. Severe sepsis and Septicemia within the hospital environment are also major problems. 75 1,000 cases annually with a 30-50% mortality rate (Crit Care Med, July '01, Vol. 29, 1303-10). Patient risks run the continuum from fever to organ failure and death. Misdiagnosis or inappropriate treatment increases mortality. There exists a need for rapid screening of samples for identification of pathogenic species (Certain E. coli strains are essential for health). Critical to the identification process is the ability to isolate analytes of interest rapidly. This poster discusses novel devices for the separation of particles on the basis of the dielectric properties, mass and surface charge characteristics is presented. Existing designs involve contact between electrode surfaces and analyte medium resulting in contamination of the electrode bearing elements Two different device designs using different bulk micromachining MEMS processes (PolyMUMPS and a PyrexBIGold electrode design) are presented. These designs cover a range of particle sizes from small molecules through eucaryotic cells. The application of separation of bacteria is discussed in detail. Simulation data for electrostatic and microfluidic characteristics are provided. Detailed design characteristics and physical features of the as fabricated PolyMUMPS design are provided. Analysis of the simulation data relative to the expected performance of the devices will be provided and subsequent conclusions discussed

    Alien Registration- Shaw, Harry M. (Houlton, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/34895/thumbnail.jp

    Alien Registration- Shaw, Harry F. (Easton, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/26436/thumbnail.jp

    The Forms of Historical Fiction

    Get PDF
    Harry Shaw’s aim is to promote a fuller understanding of nineteenth-century historical fiction by revealing its formal possibilities and limitations. His wide-ranging book establishes a typology of the ways in which history was used in prose fiction during the nineteenth century, examining major works by Sir Walter Scott—the first modern historical novelist—and by Balzac, Hugo, Anatole France, Eliot, Thackeray, Dickens, and Tolstoy

    Alien Registration- Shaw, Harry M. (Houlton, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/34895/thumbnail.jp

    Mapping the nomological networks of sustainability constructs as foundations for social marketing programmes.

    Get PDF
    Doctoral Degree. University of KwaZulu-Natal, Pietermaritzburg.Sustainability is thought of as one of the most complex challenges of our time; one which social marketers can contribute to achieving. However, sustainability has a complicated language that can be easily misinterpreted and misguide social marketing efforts. Two constructs contributing to sustainability’s multi-faceted language that social marketers could draw inspiration from to develop sustainability programmes are sustainable development and degrowth. Yet how is it possible to develop a social marketing programme addressing sustainability when sustainability’s language is complicated to understand and/or open to misinterpretation and misguidance? Five research objectives were developed to answer this question: 1. Map the basic nomological networks of sustainable degrowth and sustainable development. 2. Compare the basic networks to identify overlapping areas. 3. Identify proposed actions common to both constructs that can be used within a social marketing framework. 4. Make recommendations for social marketers developing programmes for the common actions guided by the theories underpinning social marketing. 5. Analyse existing social marketing processes and if necessary develop an appropriate social marketing process specifically intended for social marketers to tackle the sustainability challenge. The research objectives were ascertained under a qualitative approach using an application of nomological networks to thematically map each construct’s elements. In search of commonalities and differences, analyses and comparison of these elements identified several coinciding actions at surface level. The four theoretical paradigms underpinning social marketing (critical thinking, systems thinking, value and relational thinking) were applied to common actions determining the extent to which actions could reduce misinterpretation and misguidance (the higher the commonality, the greater the chance of reducing misinterpretation and misguidance). Guidelines and recommendations for developing successful programmes around each of the common actions also emerged. Through this process ecovillages, renewable energy, transforming food systems and voluntary simplicity and sustainable consumption (to some extent) were deemed more applicable to sustainability than others thus simplifying sustainability’s language from a social marketer’s perspective. Key contributions include guidelines for social marketers to reduce misinterpretation and misguidance, broadening critical marketing thinking in social marketing, a most-appropriate social marketing planning process and adaptations thereof and the utility of nomological networks as a methodological tool

    Methods of mining and the preparation of coal in the Belleville, Illinois District

    Get PDF
    The methods of mining and the preparation of coal for the market in the Belleville District represent the most modern and up-to-date methods in the state of Illinois. Mine No. 17 of the Consolidated Coal Company is the largest in the district and the methods used here are typical of the entire district --page 6

    Network Security via Biometric Recognition of Patterns of Gene Expression

    Get PDF
    Molecular biology provides the ability to implement forms of information and network security completely outside the bounds of legacy security protocols and algorithms. This paper addresses an approach which instantiates the power of gene expression for security. Molecular biology provides a rich source of gene expression and regulation mechanisms, which can be adopted to use in the information and electronic communication domains. Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography. Security protocols are being undermined by social engineering and substandard implementations by IT organizations. Molecular biology can provide countermeasures to these weak points with the current security approaches. Future advances in instruments for analyzing assays will also enable this protocol to advance from one of cryptographic algorithms to an integrated system of cryptographic algorithms and real-time expression and assay of gene expression products

    City to Order (reprint from Collier\u27s)

    Get PDF
    On the rolling hills south of Chicago a city for 30,000 people is being built in one operation. Its creators, the American Community Builders, have taken all the essentials for an ideal community and are piecing them together like a jigsaw puzzle
    • …
    corecore