716 research outputs found

    How do Wireless Chains Behave? The Impact of MAC Interactions

    Full text link
    In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent processes that arise as the sources of different chain hops compete to transmit their packets on the shared medium. In this paper, we show that MAC level interactions play the primary role in determining the behavior of chains. We evaluate the types of chains that occur based on the MAC interactions between different links using realistic propagation and packet forwarding models. We discover that the presence of destructive interactions, due to different forms of hidden terminals, does not impact the throughput of an isolated chain significantly. However, due to the increased number of retransmissions required, the amount of bandwidth consumed is significantly higher in chains exhibiting destructive interactions, substantially influencing the overall network performance. These results are validated by testbed experiments. We finally study how different types of chains interfere with each other and discover that well behaved chains in terms of self-interference are more resilient to interference from other chains

    The effect of introducing IGRA to screen French healthcare workers for tuberculosis and potential conclusions for the work organisation

    Get PDF
    INTRODUCTION: In France, pre-employment screening for tuberculosis (TB) is performed for healthcare workers (HCW). Screening is repeated when exposure to TB patients or infectious material occurs. The results of these TB screenings were analysed in a retrospective analysis. METHOD: Tuberculin skin tests (TST) and interferon-gamma release assays (QuantiFERON® Gold In-Tube - QFT) were used to perform the TB screenings. The screening results of 637 HCWs on whom QFT was performed were taken from the records of the University Hospital of Nantes. RESULTS: In three (0.5%) HCW, the QFT was indeterminate. In 22.2%, the QFT was positive. A second QFT was performed in 118 HCWs. The reversion rate was 42% (5 out of 17). The conversion rate was 6% (6 out of 98). A TST was performed on 466 (73.5%) of the HCWs. Results for TST > 10 mm were 77.4%. In those with a TST < 10 mm, QFT was positive in 14% and in those with a TST ≥ 10 mm, QFT was positive in 26.7%. Depending on the definition for conversion in the QFT, the annual attack rate was 4.1% or 7.3%. X-ray and pneumology consultation was based on positive QFT rather than TST alone (52 out of 56). No active TB was detected. CONCLUSION: The TST overestimated the prevalence of LTBI in this cohort. The decision about X-ray and consultation regarding preventive treatment should be based on the QFT rather than the TST results. The high reversion rate should be taken into consideration when consulting with HCWs regarding preventive treatment. The high conversion rate seems to indicate that preventive measures such as wearing masks should be improved

    Targeting protein kinases to manage or prevent Alzheimer’s disease

    Get PDF
    Due to the pressing need for new disease-modifying drugs for Alzheimer’s disease (AD), new treatment strategies and alternative drug targets are currently being heavily researched. One such strategy is to modulate protein kinases such as cyclin-dependent kinase 1 (CDK1), cyclin-dependent kinase 5 (CDK5), glycogen synthase kinase-3 (GSK-3α and GSK-3β), and the protein kinase RNA-like endoplasmic reticulum kinase (PERK). AD intervention by reduction of amyloid beta (Aβ) levels is also possible through development of protein kinase C-epsilon (PKC-ϵ) activators to recover α-secretase levels and decrease toxic Aβ levels, thereby restoring synaptogenesis and cognitive function. In this way, we aim to develop new AD drugs by targeting kinases that participate in AD pathophysiology. In our studies, comparative modeling was performed to construct 3D models for kinases whose crystal structures have not yet been identified. The information from structurally similar proteins was used to define the amino acid residues in the ATP binding site as well as other important sites and motifs. We searched for the comstructural motifs and domains of GSK-3β, CDK5 and PERK. Further, we identified the conserved water molecules in GSK-3β, CDK5 and PERK through calculation of the degree of water conservation. We investigated the protein-ligand interaction profiles of CDK1, CDK5, GSK-3α, GSK-3β and PERK based on molecular dynamics (MD) simulations, which provided a time-dependent demonstration of the interactions and contacts for each ligand. In addition, we explored the protein-protein interactions between CDK5 and p25. Small molecules which target this interaction may offer a prospective therapeutic benefit for AD. In order to identify new modulators for protein kinase targets in AD, we implemented three virtual screening protocols. The first protocol was a combined ligand- and protein structure-based approach to find new PERK inhibitors. In the second protocol, protein structure-based virtual screening was applied to find multiple-kinase inhibitors through parallel docking simulations into validated models of CDK1, CDK5 and GSK-3 kinases. In the third protocol, we searched for potential activators of PKC-ϵ based on the structure of its C1B domain

    A Taxonomy of Free Network Sniffers for Teaching and Research

    Get PDF
    Today\u27s networking environment has become very complex. Networks have been growing in size rapidly and have come to support more complex applications. As result, troubleshooting and maintaining networks has become cumbersome and has created the need for new specialized tools such as Network Protocol Analyzers, better known as Network Sniffers .Network Sniffers have become critical tools in today\u27s networking management and troubleshooting processes. They enable network managers to evaluate and examine the data running through their network by troubleshooting network performance problems and identifying certain network faults. Network Sniffers can help identify network attacks and detect security threats; they can be used in intrusion detection systems.Besides their usage in the technical environment, network sniffers can be used for educational and research purposes. They can be used to help understand packets\u27 architecture and traffic patterns generated by common network applications. Network Sniffers can also be used to evaluate protocol performance and assist in protocol development. Despite their usefulness, network sniffers can be harmful when used by hackers. With network sniffers, hackers can capture data and steal information from targeted networks.This study consists of two major efforts. The first major effort entails researching and determining a set of criteria to use in evaluating and comparing network sniffers. The second major effort involves using the criteria to evaluate and compare three free network sniffers, thus building a taxonomy. The three free network sniffers used in this study were Ethereal, EtherSnoop and Packetyzer. Each of these three sniffers was evaluated and tested. Then their features and capabilities were compared

    Secure quantum key distribution system by applying decoy states protocol

    Get PDF
    Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states

    A novel optimal small cells deployment for next-generation cellular networks

    Get PDF
    Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations

    Genetic Interaction Studies in Soybean Plants Prepared Using Sodium Azide and its Effect on Several Traits in the M2 Generation

    Get PDF
    The research was done in the coastal region (of Syria) at Tishreen University during the agricultural seasons 2022-2023. The research included exposing the seeds of three genotypes of soybeans (sb44, sb239, and sb337) which were obtained from the General Authority for Agricultural research for mutagenesis using the chemical mutagen Sodium Azide (NaN3) in concentrations (0 mM, 1 mM, 2 mM, 3 mM, and 4 mM) with soaking it for different periods of time (4, 8, and 12 hours) within each concentration. In the purpose of studying the effect of Sodium azide concentrations and the periods of soaking on some morphologies, productive and quality traits of the three genotypes, in addition to determining the best concentration of sodium azide, soaking period and genotype of soybeans that has good productivity and quality. The results obtained indicated the presence of new mutations affected many morphological traits and production components, and the chemical mutagen is effective in causing mutations in soybeans with a different response from the genotype to the different concentrations and periods of soaking, as there was for the concentration C1 (1 mM) the biggest positive effect and stimulating on the most of the studied traits and dependent on it many plants were nominated and a significant decrease in most of the traits of the second generation (M2) plants with increasing the soaking period. Also a gradual decrease in the most of studied traits with the increasing concentrations of the mutagen and the increase of the soaking periods within each concentration. Additionally, there were the best interactions values at concentration C1 (1mM) and time T1 (4 hours of soaking)

    Apoptotic Potential of Artemsia sieberia Besser (Asteraceae) Fraction against Human Cancer Cell Lines

    Get PDF
    Purpose: To investigate the anti-proliferative and apoptotic activity of crude and dichloromethane fraction of A. sieberi against seven cancer cell lines (Colo20, HCT116, DLD, MCF7, Jurkat, HepG2 and L929).Methods: A. sieberi was extracted with methanol and further purification was carried out using liquidliquid extraction with hexane, dichloromethane and ethyl acetate. Each extract was assayed for cytotoxic potential against cancer cell lines using 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium Bromide (MTT) assay. The morphology of the HepG2 cell nucleus was investigated by Hoechst 33342, DNA-binding dye. A Tali™ image-based cytometer was used to assess cell viability, death and apoptosis using annexin-v /pi (propidium iodide). A chromatographic fingerprint was constructed using high performance liquid chromatography (HPLC).Results: The most effective anticancer activity of the unrefined methanol extract was against HepG2 cell lines (LC50 = 161.5 μg/mL). The hexane and ethyl acetate fractions showed no antiproliferative activity. The dichloromethane fraction displayed higher cytotoxic activity (LC50 = 61.75 μg/mL) and also repressed the migration of the cells. About 50 % of HepG2 cells were apoptotic when treated for 24 h with the dichloromethane fraction at the concentration of 120 μg/mLConclusion: A. sieberi possesses apoptotic activity and inhibited the migration of the HepG2 cell lines.Keywords: Artemsia Sieberia, Apoptosiss, Cytotoxicity, Hoescht staining, HepG2 cell line
    corecore