1,278 results on '"UDP"'
Search Results
102. Microglial P2Y6 calcium signaling promotes phagocytosis and shapes neuroimmune responses in epileptogenesis.
- Author
-
Umpierre, Anthony D., Li, Bohan, Ayasoufi, Katayoun, Simon, Whitney L., Zhao, Shunyi, Xie, Manling, Thyen, Grace, Hur, Benjamin, Zheng, Jiaying, Liang, Yue, Bosco, Dale B., Maynes, Mark A., Wu, Zhaofa, Yu, Xinzhu, Sung, Jaeyun, Johnson, Aaron J., Li, Yulong, and Wu, Long-Jun
- Subjects
- *
PHAGOCYTOSIS , *MICROGLIA , *CALCIUM , *URIDINE diphosphate , *MYELOID cells , *CALCIUM channels - Abstract
Microglial calcium signaling is rare in a baseline state but strongly engaged during early epilepsy development. The mechanism(s) governing microglial calcium signaling are not known. By developing an in vivo uridine diphosphate (UDP) fluorescent sensor, GRAB UDP1.0 , we discovered that UDP release is a conserved response to seizures and excitotoxicity across brain regions. UDP can signal through the microglial-enriched P2Y 6 receptor to increase calcium activity during epileptogenesis. P2Y 6 calcium activity is associated with lysosome biogenesis and enhanced production of NF-κB-related cytokines. In the hippocampus, knockout of the P2Y 6 receptor prevents microglia from fully engulfing neurons. Attenuating microglial calcium signaling through calcium extruder ("CalEx") expression recapitulates multiple features of P2Y 6 knockout, including reduced lysosome biogenesis and phagocytic interactions. Ultimately, P2Y 6 knockout mice retain more CA3 neurons and better cognitive task performance during epileptogenesis. Our results demonstrate that P2Y 6 signaling impacts multiple aspects of myeloid cell immune function during epileptogenesis. [Display omitted] • A UDP1.0 sensor reports enhanced UDP release following hyperexcitability • UDP-P2Y 6 signaling transduces microglial calcium activity in epileptogenesis • P2Y 6 signaling enhances lysosome biogenesis and inflammatory cytokine production • Preventing P2Y 6 signaling preserves neurons and cognition Umpierre, Li, et al. demonstrate that post-seizure UDP release can activate microglial calcium activity through the P2Y 6 receptor. UDP-P2Y 6 signaling engages multiple aspects of immune function during early epilepsy development, including engulfment of neuronal somata and pro-inflammatory cytokine production. P2Y 6 deficiency attenuates pyramidal cell loss and cognitive impairment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
103. UDP Flooding Attack Detection Using Information Metric Measure
- Author
-
Boro, Debojit, Basumatary, Himant, Goswami, Tribeni, Bhattacharyya, Dhruba K., Kacprzyk, Janusz, Series editor, Satapathy, Suresh Chandra, editor, Joshi, Amit, editor, Modi, Nilesh, editor, and Pathak, Nisarg, editor
- Published
- 2016
- Full Text
- View/download PDF
104. MyMic – Mobile Application as a Replacement of Wireless Microphones Using UDP Over WiFi
- Author
-
Elbatsh, Kholoud, Eslim, Tarek, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, García, Carmelo R., editor, Caballero-Gil, Pino, editor, Burmester, Mike, editor, and Quesada-Arencibia, Alexis, editor
- Published
- 2016
- Full Text
- View/download PDF
105. Performance Evaluation of AODV Routing Protocol Using Different Parameters Under Black Hole Attack
- Author
-
Barinderpal Singh, Rahul Hans, Shetty, N. R., editor, Prasad, N Hamsavath, editor, and Nalini, N., editor
- Published
- 2016
- Full Text
- View/download PDF
106. UDP/P2Y6 receptor signaling regulates IgE-dependent degranulation in human basophils
- Author
-
Manabu Nakano, Koichi Ito, Takeo Yuno, Nobuyuki Soma, Syun Aburakawa, Kosuke Kasai, Toshiya Nakamura, and Hideki Takami
- Subjects
Basophil ,IgE-dependent degranulation ,MRS2578 ,P2Y6 ,UDP ,Immunologic diseases. Allergy ,RC581-607 - Abstract
Background: P2Y purinergic receptors (P2YR) are G protein-coupled receptors that are stimulated by extracellular nucleotides. They mediate cellular effects by regulating cAMP production, protein kinase C activation, inositol trisphosphate generation, and Ca2+ release from intracellular stores. The P2Y6 receptor of this family is selectively stimulated by UDP, and selectively inhibited by MRS2578. In the present study, we examined the effect of UDP/P2Y6 receptor signaling on IgE-dependent degranulation in human basophils. Methods: Basophils were purified from human peripheral blood. The mRNA expression of genes encoding P2YR and ecto-nucleoside triphosphate diphosphohydrolase (ENTPDase) was measured by RT-PCR. Intracellular Ca2+ influx via UDP/P2Y6 receptor signaling in basophils was detected using a calcium probe. The effect of UDP/P2Y6 receptor signaling on IgE-dependent degranulation in basophils was confirmed by measuring CD63 expression by flow cytometry. Autocrine secretion of nucleotides was detected by HPLC analysis. Results: We showed that purified basophils express P2Y6 mRNA and that UDP increased intracellular Ca2+, which was reduced by MRS2578 treatment. UDP promoted IgE-dependent degranulation. Furthermore, MRS2578 inhibited IgE-dependent degranulation in basophils. HPLC analysis indicated that basophils spontaneously secrete UTP. In addition, basophils expressed the extracellular nucleotide hydrolases ENTPDase2, ENTPDase3, and ENTPDase8. Conclusions: This study showed that UDP/P2Y6 receptor signaling is involved in the regulation of IgE-dependent degranulation in basophils, which might stimulate the P2Y6 receptor via the autocrine secretion of UTP. Thus, this receptor represents a potential target to regulate IgE-dependent degranulation in basophils during allergic diseases.
- Published
- 2017
- Full Text
- View/download PDF
107. Quantitative analysis of the security performance in wireless LANs
- Author
-
Poonam Jindal and Brahmjit Singh
- Subjects
Frame loss ,Roaming network ,Security protocols ,Throughput ,TCP ,UDP ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11 b/g/n standards in various network scenarios is presented in this paper. By setting-up an experimental testbed we have measured results for a layered security model in terms of throughput, response time, encryption overheads, frame loss and jitter. Through numerical results obtained from the testbed, we have presented quantitative as well as realistic findings for both security mechanisms and network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance. It is observed that the non-roaming network always performs better than the roaming network under all network scenarios. To analyze the benefits offered by a particular security protocol a relative security strength index model is demonstrated. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The presented analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application.
- Published
- 2017
- Full Text
- View/download PDF
108. Estudi de controladors MPPT per a generadors fotovoltaics sobre la plataforma Raspberry PI mitjançant Hardware-in-theloop
- Author
-
Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, Salaet Pereira, Juan Fernando, Argudo Batalla, Manuel, Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, Salaet Pereira, Juan Fernando, and Argudo Batalla, Manuel
- Abstract
A pesar de tots els avantatges que presenta la generació d’energia a partir de l’ús de generadors FVs, l’eficiència de la conversió energètica d’aquests encara és relativament baixa i el cost inicial de les instal·lacions representa una despesa important. Per tant, resulta essencial introduir tècniques per extreure la màxima potència del sistema i aconseguir així la màxima eficiència que permet la instal·lació. En concret, per ajudar al disseny i optimització d’aquest sistemes, en aquesta tesi de màster es proposa la idea d’utilitzar un Single-Board Computer (SBC) per implementar una plataforma Hardware-in-the-loop (HIL) i comprovar les possibilitats de prototipat i validació que ofereixen aquest tipus de dispositius en un entorn de simulació en temps real. Per fer-ho, es proposa una configuració d’un sistema FV per al que es desenvolupen diferents tipus de controladors de seguiment del punt de màxima potència (MPPT), entre els que s’inclou un ampli espectre de solucions tals com les tècniques clàssiques, les basades en intel·ligència artificial o processos d’optimització, tant per un entorn de simulació pura com es MATLAB-SimulinkTM com per la plataforma HIL basada en una Raspberry PiTM. En ambdós casos, s’analitza el comportament dels controladors sota diferents condicions de treball: condicions de test estàndard (STC), variació de la irradiància, variació de la temperatura i condicions d’ombrejat parcial (PSC). Els resultats obtinguts, a pesar de les limitacions entre la comunicació i potència de càlcul de la plataforma HIL respecte l’entorn de simulació, demostren que sí es possible utilitzar l’enfoc proposat per desenvolupar controladors MPPT de baix cost, contribuint al desenvolupament i implementació de solucions més eficients i sostenibles per a la optimització de l’energia energètica proporcionada pels generadors FVs
- Published
- 2023
109. A Peer-to-Peer Networking Framework for Scalable Massively Multiplayer Online Game Development in Unity
- Author
-
Forsbacka, Jakob, Sollenius, Gustav, Forsbacka, Jakob, and Sollenius, Gustav
- Abstract
This thesis investigates designing and implementing a peer-to-peer (P2P) networking frameworkfor Unity, a popular game engine, intending to offer a scalable and efficient solution forconstructing networked multiplayer games. The research covers an analysis of a P2P networkarchitecture, transport layer protocols, challenges in NAT traversal, and peer list management.A framework is proposed, incorporating NAT traversal, remote procedural calls (RPC), synchronization variables (SyncVar), interest management (IM), and a lobby system. The framework’sperformance is evaluated through integration, network, and game performance tests. Resultsdemonstrate the framework’s capacity to accommodate up to 50 players, with a theoreticalmaximum of 200 players, but further optimization techniques could increase this limit. IMsolutions are suggested to improve scalability, rendering the framework a more viable optionfor MMOGs. Additionally, this thesis seeks to contribute to comprehending P2P networkingframework design and implementation for Unity while emphasizing potential directions forfuture research and how they should be optimized, Denna uppsats undersöker design och implementering av ett peer-to-peer (P2P) nätverksramverk för Unity, en populär spelmotor, med målet att erbjuda en skalbar och effektiv lösning för att bygga nätverksbaserade flerspelarspel. Uppsatsen omfattar en analys av P2P-nätverksarkitektur, transportlagerprotokoll, utmaningar vid NAT-Travesering och hantering av peerlistor. Ett ramverk som inkluderar NAT-Travesering, fjärrproceduranrop (RPC), synkroniseringsvariabler (SyncVar), Interest Management (IM) och ett lobby-system föreslås. Ramverkets prestanda utvärderas genom integrationstester, nätverksprestandatester och spel-prestandatester. Resultaten visar att ramverket kan hantera upp till 50 spelare, med en teoretisk maximal kapacitet på 200 spelare, men ytterligare optimiserings tekniker kan öka denna gränsen. IM-lösningar föreslås för att förbättra skalbarheten, vilket gör ramverket till ett bättre alternativ för MMOG. Dessutom syftar denna uppsats till att bidra till förståelsen för design och implementering av P2P-nätverksramverk för Unity, samtidigt som den betonar potentiella riktningar för framtida forskning och hur dessa ska kunna optimeras.
- Published
- 2023
110. Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
- Author
-
Aroosh Amjad, Tahir Alyas, Umer Farooq, and Muhammad Tariq
- Subjects
cloud computing ,ddos ,vulnerability ,sql injection ,mitigation ,tcp/ip ,udp ,icmp packets ,malicious ,exploit ,Management information systems ,T58.6-58.62 - Abstract
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloudconsumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naïve Bayes and Random forest. This paper also focused the categories of attacks on cloud computing.
- Published
- 2019
- Full Text
- View/download PDF
111. Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services
- Author
-
Booth, Todd G., Andersson, Karl, Doss, Robin, editor, Piramuthu, Selwyn, editor, and ZHOU, Wei, editor
- Published
- 2015
- Full Text
- View/download PDF
112. On the Performance Assessment of the OLSR Protocol in Mobile Ad hoc Networks Using TCP and UDP
- Author
-
Ahmad, Mushtaq, Khan, Zahid, Chen, Qingchun, Najam-ul-Islam, Muhammad, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Hsu, Ching-Hsien, editor, Xia, Feng, editor, Liu, Xingang, editor, and Wang, Shangguang, editor
- Published
- 2015
- Full Text
- View/download PDF
113. Comparison of Real-time Streaming Performance Between UDP and TCP Based Delivery Over LTE
- Author
-
Park, Sookyung, Kim, Kyeongwon, Suh, Doug Young, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Ho, Yo-Sung, editor, Sang, Jitao, editor, Ro, Yong Man, editor, Kim, Junmo, editor, and Wu, Fei, editor
- Published
- 2015
- Full Text
- View/download PDF
114. Architecture of Desktop Presentation Tool for E-Learning Support and Problem of Visual Data Transfer over Computer Network
- Author
-
Kökörčený, Michal, Bodnárová, Agáta, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Nguyen, Ngoc Thanh, editor, Trawiński, Bogdan, editor, and Kosala, Raymond, editor
- Published
- 2015
- Full Text
- View/download PDF
115. DOI: 10.33393/dti.2020.2103 Targeting Streptococcus pneumoniae UDP-glucose pyrophosphorylase (UGPase): in vitro validation of a putative inhibitor.
- Author
-
Sharma, Monica, Sharma, Swati, Ray, Pallab, and Chakraborti, Anuradha
- Subjects
- *
STREPTOCOCCUS pneumoniae , *TUMOR necrosis factors , *URIDINE diphosphate , *CELL adhesion , *MACROPHAGES - Abstract
Background: Genome plasticity of Streptococcus pneumoniae is responsible for the reduced efficacy of various antibiotics and capsular polysaccharide-based vaccines. Therefore, targets independent of capsular types are sought to control the pneumococcal pathogenicity. UDP-glucose pyrophosphorylase (UGPase) is one such desired candidate being responsible for the synthesis of UDP-glucose, a sugar precursor in capsular biosynthesis and metabolic Leloir pathway. Being crucial to pneumococcal pathobiology, the effect of UGPase inhibition on virulence was evaluated in vitro. Methods: A putative inhibitor, uridine diphosphate (UDP), was evaluated for effective inhibitory concentration in S. pneumoniae and A549 cells, its efficacy and toxicity. The effect of UDP on adherence and phagocytosis was measured in human respiratory epithelial (A549 and HEp-2) and macrophage (THP1 and J774.A.1) cell lines respectively. Results: A differential effective inhibitory concentration of UDP for UGPase inhibition was observed in S. pneumoniae and A549 cells, that is, 5 and 100 µM respectively. UDP treatments lowered percent cytotoxicity in pneumococcal-infected monolayers and didn't exert adverse effects on viabilities. S. pneumoniae adherence to host cells decreased significantly with UDP treatments. UDP induced the secretion of interleukin (IL)-1ß, tumor necrosis factor (TNF)-a, IL-6, and IL-8 and increased pneumococcal phagocytosis. Conclusion: Our study shows UDP-mediated decrease in the virulence of S. pneumoniae and demonstrates UDP as an effective inhibitor of pneumococcal UGPase. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
116. Symmetric Measure of Network Traffic using Packet Ratio and Packet Symmetry.
- Author
-
Devi, B.S. Kiruthika, Dudeja, K., John, A.V., Marcin, K., and Subbulakshmi, T.
- Subjects
TCP/IP ,DENIAL of service attacks ,SYMMETRY ,TRAFFIC flow - Abstract
Flood attacks on a network occur when attackers send a very high volume of traffic to a system. This leads to an exhaustion of resources of the targeted system. Such a system or infrastructure under attack won't be able to cope up with the services it needs to provide due to capacity overload. These types of attacks are also called as Denial of Service (DoS) attacks. As it is essential for companies and organizations to provide high speed and high-quality services the network in which it operates needs to be secured against DoS attacks. As it is said prevention is better than cure, it is always better to detect an attack in the preliminary stages itself and deny an attacker any opportunity to continue the assault on the system. There are various kinds of DoS attacks, in this study the focus is on three kinds of attacks and its detection ICMP flood attack, UDP flood attack and TCP SYN flood attack. The detection mechanism employed is based on packet symmetry which can be used in to monitor the data flow in a network and detect any malicious anomalies in the network traffic at any instant. The experimental results, show that the packet symmetry is a reliable metric to detect attacks on the network by checking the data flow in the ICMP, UDP and TCP layers. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
117. Application of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) in Teleconference System.
- Author
-
Taye Oladele, ARO, Saheed Adekunle, ADEKEYE, Hakeem Babalola, AKANDE, and Bukola Omolara, FUNSO
- Subjects
TCP/IP ,TELECONFERENCING ,COMPUTER network protocols ,QUALITY of service ,TASK analysis ,TELECOMMUNICATION - Abstract
Teleconferencing is the act of meeting and exchanging information through a telecommunication medium. In teleconferencing system, network engineers are faced with different challenges like best protocols requirements; impact of Quality of Service (QoS) to be used to meet up with the latest network protocols and appliances in the design of teleconference system. This paper presented a comparative analysis on two network protocols in a teleconference system, Transmission Control Protocol (TCP) versus a User Datagram Protocol (UDP) was evaluated and compared applying Optimized Network Engineering Tools (OPNET) simulator. The experimental result showed differences in number of videoconference sessions, with few Packet Per Seconds (PPS) recorded in both the UDP and TCP, thereby reflecting the correctness of this comparative evaluation task. [ABSTRACT FROM AUTHOR]
- Published
- 2019
118. Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm.
- Author
-
Amjad, Aroosh, Alyas, Tahir, Farooq, Umer, and Tariq, Muhammad Arslan
- Subjects
DENIAL of service attacks ,CLOUD computing ,MACHINE learning ,NAIVE Bayes classification ,RANDOM forest algorithms - Abstract
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloud consumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naive Bayes and Random forest. This paper also focused the categories of attacks on cloud computing. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
119. Design and Review of Water Management System Using Ethernet, Wi-Fi 802.11n, Modbus, and Other Communication Standards.
- Author
-
Pandey, Bishwajeet, Farulla, Giuseppe Airo, Indaco, Marco, Iovino, Ludovico, and Prinetto, Paolo
- Subjects
DETECTORS ,ACTUATORS ,ELECTRIC controllers ,WATER management ,INTERNET of things ,INTERNET protocol address - Abstract
Sensors, actuators, and controllers communicate with each other in our Water Management Cyber Physical System (WM-CPS). This WM-CPS is also Internet of Things (IoTs) enable because controllers used in WM-CPS always get a unique IP address during connection with internet. In our work, various communication standards like Ethernet/IP, Modbus/TCP, Modbus/RTU, Wi-Fi 802.11n/IP, Wi-Fi 802.11n/UDP, and Wi-Fi 802.11n/TCP are taken under consideration. Raspberry Pi-3 (RPi-3) board is a controller. Relay and Pump are actuators. Our system works on two layers. Sensors and actuators communicate with controllers on Layer 0 (L0). Controller communicate with data base management system (DBMS), web Interface and virtual private server (VPS) at Layer 1 (L1). We have design and develop web interface of our system available with http://cps4wm.info domain name. This WM-CPS is scalable and able to integrate many more sensors and actuators. We have surveyed 22 communication standards for our future WM-CPS. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
120. On the Issue of Multimodal Data Flow Control on Limited Communication Channels.
- Author
-
Morin, Y. N.
- Abstract
The article discusses methods for constructing the transmission of multimodal data in conditions of limited communication channels. The method of transmitting multimodal data using caching repeaters is considered in detail. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
121. QoS Performance Analysis of Bit Rate Video Streaming in Next Generation Networks Using TCP, UDP and a TCP+UDP Hybrid
- Author
-
Xolani Dlamini, Francis L. Lugayizi, and Esiefarienrhe, Bukohwo M.
- Subjects
quality of service ,qos ,bit rate ,video streaming ,qos routing ,tcp ,udp ,Technology ,Information technology ,T58.5-58.64 - Abstract
The growth in users streaming videos on the Internet has led to increased demand for improved video quality and reception. In next generation networks (NGNs), such as 3G and 4G LTE, quality of service (QoS) implementation is one of the ways in which good video quality and good video reception can be achieved. QoS mainly involves following an industry-wide set of standard metrics and mechanisms to achieve high-quality network performance in respect of video streaming. Adopting routing and communication protocols is one way QoS is implemented in NGNs. This article describes QoS of bit rate video streaming, and QoS performance analysis of video streaming, in relation to the main network transport protocols, namely transmission control protocol (TCP) and user datagram protocol (UDP). A simulation test bed was set up using OPNET modeller 14.5. In this setup, a network topology was created and duplicated three times, in order to configure two simulation scenarios (each using the distinct protocols), and a third simulation scenario using both protocols in hybrid form. The findings in the simulations indicated that, when a network is configured with both TCP and UDP protocols in video streaming, there is a positive change in the degree of performance in terms of the QoS of videostreaming applications, unlike when the protocols are used independently.
- Published
- 2016
- Full Text
- View/download PDF
122. Gigabit Ethernet Data Transfer Based on FPGA
- Author
-
Zhou, Shihong, Yao, Lin, Yuan, Yuyu, editor, Wu, Xu, editor, and Lu, Yueming, editor
- Published
- 2014
- Full Text
- View/download PDF
123. Realization of Streaming Media Data Multicast Based on UDP
- Author
-
Zhang, Zhenchuan, Lun, Zhanqun, Kacprzyk, Janusz, Series editor, Patnaik, Srikanta, editor, and Li, Xiaolong, editor
- Published
- 2014
- Full Text
- View/download PDF
124. QoE of YouTube Video Streaming for Current Internet Transport Protocols
- Author
-
Hoßfeld, Tobias, Schatz, Raimund, Krieger, Udo R., Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Nierstrasz, Oscar, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Sudan, Madhu, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Vardi, Moshe Y., Editorial Board Member, Weikum, Gerhard, Editorial Board Member, Fischbach, Kai, editor, and Krieger, Udo R., editor
- Published
- 2014
- Full Text
- View/download PDF
125. UDP-Based Reliable File Delivery Mechanisms for Video Streaming over Unstable Wireless Networks
- Author
-
Chang, Shih-Ying, Yeh, Xin-Yan, Chiao, Hsin-Ta, Sun, Hung-Min, Chang, Ruay-Shiung, editor, Jain, Lakhmi C., editor, and Peng, Sheng-Lung, editor
- Published
- 2013
- Full Text
- View/download PDF
126. A Competitive Performance Analysis of Proactive Routing Protocols of MANET Under Short Time Communication Scenario
- Author
-
Janani, A. P., Sakthivel, M., Baskaran, K., S, Mohan, editor, and Kumar, S Suresh, editor
- Published
- 2013
- Full Text
- View/download PDF
127. The Design of Port Scanning Tool Based on TCP and UDP
- Author
-
Liang, Hu, Qiansheng, Zhang, and Du, Zhenyu, editor
- Published
- 2013
- Full Text
- View/download PDF
128. Study of controlling a humanoid robot using gesture recognition
- Subjects
Gesture recognition ,PoseNet ,MediaPipe ,Human-machine ,remote control ,Pepper ,UDP - Abstract
We have studied the possibility to achieve human-machine communication using gesture recognition methods with a popular and low-price camera module that is a candidate for simple and unified interface device. We used Pepper, which is a semi-humanoid robot manufactured by SoftBank Robotics and designed with the ability to read emotions, as the control target in our experiment. We also used PoseNet and MediaPipe, which offer real-time keypoint detection libraries for body and hands estimation, in our gesture recognition program. After defining several combinations of the gestures and the poses of Pepper, we installed them in the codes for a PC and Pepper and confirmed the operation. As an application of our gesture-based control system, we introduced a remote control system using an online meeting platform in addition to our developed system.
- Published
- 2022
129. Analysis of Cloud Security and a Reliable Transmission Based on UDP
- Author
-
Su, Dixin, Zhou, Zhiping, Lei, Jingsheng, editor, Wang, Fu Lee, editor, Li, Mo, editor, and Luo, Yuan, editor
- Published
- 2012
- Full Text
- View/download PDF
130. Research and Design of Web Management System for Data Manipulation Base on the Internet of Things
- Author
-
Xiang, Qiyao, Zhang, Yongjun, Gu, Wanyi, Kou, Jiarui, Yang, Yuhang, editor, and Ma, Maode, editor
- Published
- 2012
- Full Text
- View/download PDF
131. The Application of Network Simulation Software NS-2 Based on SVM
- Author
-
Renjie, Wu and Lee, Gary, editor
- Published
- 2012
- Full Text
- View/download PDF
132. Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links
- Author
-
Goyal, Mayank Kumar, Verma, Yatendra Kumar, Bassi, Paras, Misra, Paurush Kumar, Meghanathan, Natarajan, editor, Nagamalai, Dhinaharan, editor, and Chaki, Nabendu, editor
- Published
- 2012
- Full Text
- View/download PDF
133. Performance Evaluation of TCP and UDP Traffic in IEEE 1451 Compliant Healthcare Infrastructure
- Author
-
Chaudhry, Junaid Ahsenali, Qidwai, Uvais A., Ahmad, Mudassar, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Huang, Tingwen, editor, Zeng, Zhigang, editor, Li, Chuandong, editor, and Leung, Chi Sing, editor
- Published
- 2012
- Full Text
- View/download PDF
134. Modified UDP-Based Semi-supervised Learning for Fruit Internal Quality Detection
- Author
-
Zhu, Peiyi, Xu, Benlian, Gao, Jue, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Tan, Ying, editor, Shi, Yuhui, editor, and Ji, Zhen, editor
- Published
- 2012
- Full Text
- View/download PDF
135. Design and Implementation a Server Receiving Data in Both Forms TCP and UDP Through the Same Port and its Impact on the Network Performance
- Author
-
Husam Ali Abdulmohsin
- Subjects
multithreading technology ,tlt ,node connectivity ,lan ,tus ,udp server ,udp ,tcp ,Science ,Technology - Abstract
Internet is the largest network that transfers a huge amount of information through the web and that requires data transfer between many network bottlenecks, devices and different hardware technologies. This data movement requires data transfer between many application, software’s and operating systems. Many theses and researches were published in the topic of solving the issue of extreme data transfer rate; this issue causes time consuming problems. There are many technologies of transferring data across the internet; two of the major data transfer technologies are the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP). Those different data transfer technologies through the internet cause most of the servers much of their time translating the data from one technology to another because most of the servers deal with one data transfer technology and therefore it has to translate all other technologies to the technology that it deals with. This research establishes a Server named TCP-UDP Server (TUS), to receive data from both UDP and TCP nodes through the same path without the need of changing the network entities or protocols connected to the server and to avoid the need for transferring the data from the (UDP) form to the (TCP) form and vise versa. All the operations performed by the server are accomplished without any hardware intrusion to avoid time consuming. The TUS server as many servers support the multithreading technology to serve a large amount of nodes at the same time. Each node has its own thread to deal with. This thread has its own life time determined by many facts, and that in turn decides to terminate the thread or not.
- Published
- 2016
- Full Text
- View/download PDF
136. Simulator mobilnega robota v skladiščnem okolju, zasnovan v okoljih Unity in Matlab
- Author
-
DOLINAR, ALJAŽ and Klančar, Gregor
- Subjects
mobilni robot ,pathfinding ,Unity ,Simulink ,iskanje poti ,vodenje ,simulation ,simulacija ,mobile robot ,PID-regulator ,UDP ,PID control ,control ,Matlab - Abstract
V okviru magistrskega dela smo ustvarili orodje za simulacijo kolesnih mobilnih robotov v skladiščnih okoljih. Orodje sestavljata dva ključna gradnika: simulator mobilnega robota in sistem vodenja. Simulacija je realizirana v razvojnem okolju Unity, vodenje pa v okolju Matlab-Simulink. Med seboj komunicirata preko internetnega komunikacijskega protokola UDP. Simulacija je namenjena predvsem, da služi kot učni pripomoček študentom robotike. Dodatno smo implementirali še nekaj pogostih algoritmov vodenja, ki služijo kot primeri uporabe razvite rešitve. V uvodnih dveh poglavjih magistrske naloge je predstavljena tematika kolesnih mobilnih robotov: njihova umestitev v robotiki in industriji, njihova tipična okolica in senzorika. Poudarek je na razumevanju elementov mobilnih robotov, ki bodo relevantni v kasnejših poglavjih kot del simulacije. V naslednjem poglavju je predstavljena simulacija, ki smo jo ustvarili v okviru tega dela. Za pomoč pri razumevanju so na kratko predstavljene glavne uporabljene komponente in pomembni pojmi okolja Unity. Razloženi so vsi ključni elementi programa: kontrolnik kamere, kontrolnik grajenja, sistem shranjevanja in nalaganja, simulacija samega robota in implementacija UDP komunikacije z okoljem Matlab-Simulink. Predstavljene so tudi implementacije simuliranih senzorjev: svetlobni merilnik razdalje Lidar, senzor za sledenje črti in senzor za zaznavo NFC značk. V nadaljevanju je predstavljenih nekaj pogostih rešitev iskanja optimalne poti za mobilne robote: algoritem Dijkstra, algoritem A* ter iskanje v širino in iskanje v globino. Podrobno je predstavljena tudi izvedba algoritma A*, ki je bila v okviru tega magistrskega dela implementirana v okolju Matlab. V sklepnem delu je predstavljenih še nekaj najpogostejših algoritmov vodenja, ki smo jih kot primer uporabe za končnega uporabnika simulacije razvili v okolju Matlab-Simulink. Gre za algoritme vodenja v točko, vodenja po črti in izogibanja trkov. Within the scope of this thesis, we created a tool for simulating wheeled mobile robots in warehouse-like enviroments. It contains two key elements: a mobile robot simulator and its control system. The simulation was created in Unity development platform and the control system was made in Matlab-Simulink environment. The two elements communicate via the UDP internet communcication protocol. The simulation is intended to serve as a learning assist to robotics students. Additionally, we implemented a few common control algorithms, which serve as usage examples of the developed solution. In the opening two chapters of the thesis, the topic of wheeled mobile robotics is presented: its place in robotics and industrial applications, their typical environment and sensorics. An emphasis is placed on understanding those elements of mobile robots, that will be relevant in the upcoming chapters as parts of the simulation. Next chapter presents the simulation, that was created in the scope of this thesis. The most important used components and concepts of Unity environment are briefly explained to aid the reader's understanding. Key elements of the program are explained: a camera controller, a building controller, a save and load system, the robot simulation itself and the implementation of communication between the two used environments via UDP. Additionally, implementations of simulated sensors are also presented: Light ranging and detection sensor (Lidar), Line following sensor and NFC tag reader. Afterwards, a few common optimal path finding solutions are presented: Dijkstra's Algorithm, Algorithm A*, Breadth-first Search and Depth-first Search. The chapter also contains a detailed explanation of the implemented A* algorithm. A few of the most common control algorithms are presented in the closing chapter. We developed the following control algorithms in the Matlab-Simulink environment: control to point, line following control and obstacle avoidance. These serve as usage examples for the end user of the developed simulation.
- Published
- 2023
137. Protokoli za razmjenu poruka u sinkrofazorskim mrežama
- Author
-
Kaliterna, Fabjan
- Subjects
Sinkofazorske mreže ,komunikacijski ,protokol ,podatak ,PMU uređaj ,IP ,TCP ,UDP ,STTP ,standard ,elektroenergetske mreže ,energetske distribucijske mreže - Abstract
U radu su obrađeni standardi koji definiraju prijenos podataka u sinkrofazorskim mrežama i primjena pametnih mreža za nadzor elektroenergetskog sustava. U radu je prikazana analiza metoda prikupljanja podataka, obrade podataka i razmjene informacija između više različitih komunikacijskih elemenata u sinkrofazorskoj mreži (engl. synchrophasor network) primjenom različitih komunikacijskih standarda i protokola za razmjenu podataka. U sinkrofazorskim mrežama podatci se razmjenjuju primjenom standardiziranih protokola sa ciljem da se omogući upravljanje radom elektroenergetske mreže. Time se omogućuje napredak u efikasnosti rada elektroenergetske mreže, kao i smanjenje potencijalnih oštećenja i gubitaka podataka prilikom njihovog prijenosa u sinkrofoazorskim mrežama. U radu je opisana potreba, korisnost i zahtjevi za primjenu sinkrofazorskih mreža, rad PMU (engl. phasor measurement unit) uređaja za prikupljanje i slanje podataka te je dan opis različitih protokola za mjerenje i prijenos podataka u sinkrofazorskim mrežama. Također je opisana važnost pravilne organizacije arhitekture sinkrofazorske mreže te posljedice prilikom nepravilnog ili neadekvatnog odabira načina kojim se ostvaruje rad mreže. Prikazano je da postoje očigledne razlike u radu mreže u slučaju kada se primjenjuju različiti protokoli za razmjenu informacija u sinkrofazorskoj mreži, a koje utječu na sigurnost, pouzdanost te kašnjenje podataka ili skupa podataka u sinkrofazorskim mrežama. Opisana su svojstva protokola IEEE C37.118.2-2011 koji se koristi kao standard za određivanje strukture i razmjene poruka u sinkrofazorskim mrežama, a zbog svoje jednostavnosti i efikasnosti je najkorišteniji protokol za kontinuirani prijenos podataka u praksi. Također je opisan i protokol IEC TR 6185-90-5 koji se koristi za kontinuirani prijenos sinkrofazorskih podataka u realnom vremenu, a koji je kao i protokol IEEE C37.118.2011 usmjeren na uređaje koji rade sa skupovima podataka koji su odašiljani nakon grupiranja podataka od strane mjernih uređaja u sinkrofazorskoj mreži. U radu su analizirana četiri protokola za prijenos podataka u sinkrofazorskim mrežama i to: IP (engl. Internet protocol) protokol, TCP (engl. Transmission Control Protocol) protokol, UDP (engl. User Datagram Prtocol) protokol i STTP (engl. Secure Token Transfer Protocol) protokol. IP je najčešće korišteni protokol za prijenos različitih vrsta podataka u sinkrofazorskoj mreži. Protokol TCP je baziran na pouzdanosti, a omogućuje ponovno slanje neisporučenih paketa podataka i provjeru isporučenosti paketa, što osigurava pouzdanost prijenosa podataka ali i potencijalno dovodi do umanjenja propusnosti mreže. TCP protokol zajedno sa IP protokolom se koristi za upravljanje ponovnim prijenosom neisporučenih paketa podataka u svrhu osiguranja pouzdane isporuke podataka. Korištenjem UDP protokola u sinkrofazorskim mrežama postoji mogućnost pojave gubitaka podataka uslijed nepostojanja ponovnog slanja neisporučenih paketa podataka. UDP protokol zajedno sa IP protokolom u sinkrofazorskim mrežama osigurava pravovremenu isporuku podataka bez garantiranja pouzdanosti u prijenosu podataka. Time se smanjuje sigurnost prijenosa podataka ali se i omogućuje manja zahtjevnost u pogledu podatkovne propusnosti sinkrofazorske mreže. U ovom radu je također opisan i STTP protokol koji je pogodan za prijenos velikih količina podataka u sinkrofazorskim IP mrežama. Prijenos većih količina podataka je primjenom STTP protokola moguć, zbog nepostojanja povećanja kašnjenja u prijenosu podataka ukoliko se ponovno slanje podataka obavlja preko TCP protokola, pri čemu se podatci pri korištenju STTP protokola prije slanja trebaju komprimirati. U radu je potvrđeno da se korištenjem sinkrofazorskih mreža osigurava mogućnost razmjene podataka koji se koriste za pouzdano upravljanje elektroenergetskom mrežom. Međutim, sam rad sinkrofazorske mreže uvelike ovisi o korištenim protokolima za razmjenu informacija u mreži. Prilikom odabira korištenih protokola, potrebno je voditi računa o potrebama koje protokol mora zadovoljiti, kao što su brzina i pouzdanost prijenosa, sigurnost prijenosa, minimalni gubitci pri prijenosu paketa podataka, minimalno usporavanje mreže i minimalno povećanje kašnjenja pri prijenosu podataka. //The thesis discusses the standards that define data transmission in synchrophasor networks and the application of smart networks for power system monitoring. The paper presents an analysis of methods for data collection, data processing and information exchange between several different communication elements in a synchrophasor network using different communication standards and data exchange protocols. In synchrophasor networks, data is exchanged using standardized protocols with the aim of enabling power network operation management. This enables progress in the efficiency of the power grid as well as the reduction of potential damage and data loss during data transmission in synchrophasor networks. The thesis describes the need, usefulness and requirements for the application of synchrophasor networks, the operation of the PMU (phasor measurement unit) device for collecting and sending data, and gives a description of various protocols for measuring and transmitting data in synchrophasor networks. The importance of the correct organization of the architecture of the synchrophasor network and the consequences of improper or inadequate selection of the way the network works, are also described. It is shown that there are obvious differences in network operation in the case when different protocols are applied for information exchange in a synchrophasor network, which affects security, reliability and the transmission delay of individual data packets or data sets in synchrophasor networks. The properties of the IEEE C37.118.2-2011 protocol are described, which is used as a standard for determining the structure and exchange of messages in synchrophasor networks. Due to its simplicity and efficiency, the IEEE C37.118.2-2011 protocol is the most used protocol for continuous data transfer in practice. Also described is the IEC TR 6185-90-5 protocol, which is used for the continuous transmission of real-time synchrophasor data. Like the IEEE C37.118.2011 protocol, the IEC TR 6185-90-5 protocol is aimed at PMU devices working with data sets transmitted after data grouping in the synchrophasor network. The paper analyzed four protocols for data transmission in synchrophasor networks, namely IP (Internet protocol) protocol, TCP (Transmission Control Protocol) protocol, UDP (User Datagram Protocol) protocol and STTP (Secure Token Transfer Protocol) protocol. IP is the most commonly used protocol for the transmission of various types of data in a synchrophasor network. The TCP protocol allows the resending of undelivered data packets and checking the delivery of packets, which ensures the reliability of data transmission, while also potentially leading to a decrease in network bandwidth. The TCP protocol together with the IP protocol is used to manage the retransmission of undelivered data packets in order to ensure reliable data delivery. By using the UDP protocol in synchrophasor networks, there is a possibility of data loss due to the lack of resending of undelivered data packets. The UDP protocol together with the IP protocol in synchrophasor networks, therefore, ensures the timely delivery of data, without guaranteeing reliability in data transmission. This reduces the security of data transmission, while also allowing for lower requirements regarding the data bandwidth of the synchrophasor network. This paper also describes the STTP protocol, which is suitable for transferring large amounts of data in synchrophasor IP networks, where the data must be compressed before sending. Using STTP protocol for data transfer results in the absence of an increase in the delay in data transfer if resending data is done via the TCP protocol. Presented in thesis confirmed that the use of synchrophasor networks ensures the possibility of exchanging data used for reliable power grid management. However, the operation of the synchrophasor network largely depends on the protocols used for exchanging information in the synchrophasor network. When choosing the protocols used, it is necessary to take into account the needs that the protocol must meet, such as speed and reliability of transmission, security of transmission, minimal losses during the transmission of data packets, minimal network slowdown and minimal increase in delay during data transmission.
- Published
- 2023
138. Evaluation of Protocols and Algorithms for Improving the Performance of TCP over Wireless/Wired Network
- Author
-
Vasanthi, V., Ajith Singh, N., Romen Kumar, M., Hemalatha, M., Das, Vinu V, editor, and Thankachan, Nessy, editor
- Published
- 2011
- Full Text
- View/download PDF
139. Throughput Analysis of Wireless Mesh Network Test-Bed
- Author
-
Singh, Madhusudan, Lee, Song-Gon, Tan, Whye Kit, Lam, Jun Huy, Lee, Geuk, editor, Howard, Daniel, editor, and Ślęzak, Dominik, editor
- Published
- 2011
- Full Text
- View/download PDF
140. Improving Network Performance by Enabling Explicit Congestion Notification (ECN) in SCTP Control Chunks
- Author
-
Tahir, Hatim Mohamad, Md Said, Abas, Elhalabi, Mohammed J. M., Puteh, Nurnasran, Othman, Azliza, Muhd Zain, Nurzaid, Md Dahalin, Zulkhairi, Ismail, Muhammad Hafiz, Mohd Zaini, Khuzairi, Zabidin Hussin, Mohd, Snasel, Vaclav, editor, Platos, Jan, editor, and El-Qawasmeh, Eyas, editor
- Published
- 2011
- Full Text
- View/download PDF
141. UDP NAT and Firewall Puncturing in the Wild
- Author
-
Halkes, Gertjan, Pouwelse, Johan, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Domingo-Pascual, Jordi, editor, Manzoni, Pietro, editor, Palazzo, Sergio, editor, Pont, Ana, editor, and Scoglio, Caterina, editor
- Published
- 2011
- Full Text
- View/download PDF
142. Gateway Strategies for Embedding of Automotive CAN-Frames into Ethernet-Packets and Vice Versa
- Author
-
Kern, Andreas, Reinhard, Dominik, Streichert, Thilo, Teich, Jürgen, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Berekovic, Mladen, editor, Fornaciari, William, editor, Brinkschulte, Uwe, editor, and Silvano, Cristina, editor
- Published
- 2011
- Full Text
- View/download PDF
143. Purinergic and Pyriminergic Activation of the Endothelium in Regulation of Tissue Perfusion
- Author
-
Erlinge, David, Gerasimovskaya, Evgenia, editor, and Kaczmarek, Elzbieta, editor
- Published
- 2010
- Full Text
- View/download PDF
144. Uridine diphosphate release mechanism in O-N-acetylglucosamine (O-GlcNAc) transferase catalysis.
- Author
-
She, Nai, Zhao, Yuan, Hao, Jingjing, Xie, Songqiang, and Wang, Chaojie
- Subjects
- *
URIDINE diphosphate , *N-acetylglucosaminyltransferase , *SERINE , *THREONINE , *HYDROGEN bonding - Abstract
Abstract O-linked N -acetylglucosamine transferase (OGT) is an essential enzyme that catalyzes the covalent bonding of N -acetylglucosamine (GlcNAc) to the hydroxyl group of a serine or threonine in the target protein. It plays an important role in many important cellular physiological catalytic reactions. Here, we determine the binding mode and the binding free energy of the OGT product (uridine diphosphate, UDP) as well as the hydrogen-bond-dependent release mechanism using extensive molecular dynamic simulations. The Lys634, Asn838, Gln839, Lys842, His901, and Asp925 residues were identified to play a major role in the UDP stabilization in the active site of OGT, where hydrogen bonding and π-π interactions mainly occur. The calculations on the mutant forms support our results. Sixteen possible release channels were identified while the two most favorable channels were determined using random acceleration molecular dynamics (RAMD) simulations combined with the constant velocity pulling (PCV) method. The thermodynamic and dynamic properties as along with the corresponding mechanism were determined and discussed according to the umbrella sampling technique. For the most optimal channel, the main free energy barrier is 13 kcal/mol, which probably originates from the hydrogen bonds between UDP and the Ala896 and Asp925 residues. Moreover, the unstable hydrogen bonds and the rollback of the ligand likely cause the other two small obstacles. This work clarifies the ligand transport mechanism in the OGT enzymatic process and is a great resource for designing inhibitors based on UDP or UDP-GlcNAc. Graphical abstract Unlabelled Image Highlights • Sixteen plausible channels for UDP transportation in OGT are detected. • The key residues that influence the UDP binding and release are identified. • The thermodynamic and dynamic properties for the most two favorable channels of UDP release are obtained. • Hydrogen-bond-dependent product release mechanism in OGT is first revealed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
145. From Malware Testing to Virtualization.
- Author
-
Révay, Lukáš
- Subjects
VIRTUAL reality ,MALWARE prevention ,MALWARE ,STEVEDORES - Abstract
Viruses are everywhere around us. Not only in our environment but also in virtual environment we are now using on daily basis. To be able to predict their growth it is necessary to understand them or even to develop them. The main problem was how to get rid of any harm in computer or even infrastructure and still be possible to simulate infiltration. Of course it is not an infiltration from real deep point of view. This paper describes how this problem was handled, which type of malware was used, briefly introduces its implementation and also virtual environment this threat was tested. As preferred virtualization tool docker was chosen. Images created in docker and after then run as a containers fit to this work. Alpine was chosen as mini virtual docker image for our purposes. For implementation part C++and a Qt5 framework was utilized to reduce the time with implementation which are already done. Frameworks or OS-es do not provide all important tools and this happened also in this case. Because of that some additional tools has been installed. Most of them are network based tools which are important for this work because this worm implementation communicates over the LAN and communication is on udp based packets. Result of this investigation is fully virtual platform which can be used for testing and improved also for other types of features related to viral usage. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
146. UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW.
- Author
-
Hanafi Ichsan, Mochammad Hannats, Kurniawan, Wijaya, and Akbar, Sabriansyah Rizqika
- Subjects
HOME automation ,HOME environment ,UBIQUITOUS computing ,HOME wireless technology ,INTERNET of things ,INTERNET privacy ,PROGRAMMING languages ,SOCIAL interaction - Abstract
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
147. The Impact of Ingress Packet Size on the Performance of TCP and UDP in Survivable Networks.
- Author
-
Saini, Himanshi and Garg, Amit Kumar
- Subjects
TCP/IP ,BANDWIDTHS ,WIRELESS communications ,SOFTWARE measurement ,TELECOMMUNICATION - Abstract
Survivability is an issue of great concern in high speed networks. Optical Packet Switching (OPS) is an established technique in the area of survivable high speed future networks. In this paper, network performance is evaluated in response to ingress packet size variation. The performance is evaluated for both protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Analysis is performed on mesh networks for different ingress packet size. Response of both transport layer protocols has been observed under single link failure. Network throughput with TCP is higher as compared to throughput with UDP. Network throughput is highest at 500 byte packet size, which is less than the configured Maximum Segment Size (MSS) of transport layer protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2018
148. Energy Based Performance analysis of AODV Routing Protocol under TCP and UDP Environments.
- Author
-
Shaf, Ahmad, Ali, Tariq, Draz, Umar, and Yasin, Sana
- Subjects
AD hoc computer networks ,ENERGY consumption ,WIRELESS sensor networks ,COMMUNICATION ,SYNCHRONIZATION - Abstract
Mobile Ad hoc Network (MANET) is a combination of wireless nodes that share resources and information. One of the major issues in MANET is to minimize the energy consumption of wireless nodes. Higher energy consumption nodes minimize the network life while lower energy consumption nodes increase the network life. Various routing protocols have been proposed for energy saving. Ad hoc On-demand Distance Vector (AODV) is an energy efficient routing protocol. In this paper, the energy based performance of AODV routing protocol is evaluated under Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) by using different simulation scenarios. NS2 has been used for simulation purposes. An energy model is defined in which power for receiving and transmitting one packet, initial energy, sleep power, idle power, transition power and transition time values are kept constant for different simulation scenarios. The simulation results show that AODV routing protocol consumes less energy in TCP environment as compared to UDP environment. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
149. Design and Implementation of Chat Room Based on UDP
- Author
-
Zheng, Zhao-na, Sun, Peng, and Qi, Luo, editor
- Published
- 2009
- Full Text
- View/download PDF
150. A Novel Local Sensitive Frontier Analysis for Feature Extraction
- Author
-
Wang, Chao, Huang, De-Shuang, Li, Bo, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Huang, De-Shuang, editor, Jo, Kang-Hyun, editor, Lee, Hong-Hee, editor, Kang, Hee-Jun, editor, and Bevilacqua, Vitoantonio, editor
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.