To see the other types of publications on this topic, follow the link: Chain message.

Journal articles on the topic 'Chain message'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Chain message.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

VUJASINOVIC, MARKO, EDWARD BARKMEYER, NENAD IVEZIC, and ZORAN MARJANOVIC. "INTEROPERABLE SUPPLY-CHAIN APPLICATIONS: MESSAGE METAMODEL-BASED SEMANTIC RECONCILIATION OF B2B MESSAGES." International Journal of Cooperative Information Systems 19, no. 01n02 (March 2010): 31–69. http://dx.doi.org/10.1142/s0218843010002103.

Full text
Abstract:
Supply-chain applications exchange numerous electronic business-to-business (B2B) messages of varied types. Traditionally, prior to a message exchange, partners adopt one particular message specification that constrains message structure and syntax to implement compatible application message interfaces. However, in open, dynamic supply-chains, the applications need to interact even though their message interfaces are based on different, yet incompatible message specifications. To achieve such interactions, we propose the Message Metamodel-based semantic reconciliation of B2B messages. The Message Metamodel is a novel, ontological form that provides for common representation of B2B message specifications and messages of various syntaxes, such as Extensible Markup Language (XML) or Electronic Data Interchange (EDI). The experimental investigation showed that proposed semantic reconciliation architecture built atop the Message Metamodel (1) insulates the reconciliation activities from the specific message syntaxes, (2) supports the reconciliation of messages irrespective of message standards used, and (3) enables seamless interoperable message exchange between heterogeneous supply-chain applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Hoque, Faika, and Sungoh Kwon. "An Emergency Packet Forwarding Scheme for V2V Communication Networks." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/480435.

Full text
Abstract:
This paper proposes an effective warning message forwarding scheme for cooperative collision avoidance. In an emergency situation, an emergency-detecting vehicle warns the neighbor vehicles via an emergency warning message. Since the transmission range is limited, the warning message is broadcast in a multihop manner. Broadcast packets lead two challenges to forward the warning message in the vehicular network: redundancy of warning messages and competition with nonemergency transmissions. In this paper, we study and address the two major challenges to achieve low latency in delivery of the warning message. To reduce the intervehicle latency and end-to-end latency, which cause chain collisions, we propose a two-way intelligent broadcasting method with an adaptable distance-dependent backoff algorithm. Considering locations of vehicles, the proposed algorithm controls the broadcast of a warning message to reduce redundant EWM messages and adaptively chooses the contention window to compete with nonemergency transmission. Via simulations, we show that our proposed algorithm reduces the probability of rear-end crashes by 70% compared to previous algorithms by reducing the intervehicle delay. We also show that the end-to-end propagation delay of the warning message is reduced by 55%.
APA, Harvard, Vancouver, ISO, and other styles
3

A, Krishna Chaitanya. "Cryptographic based Message Transfer using Block chain Technology." International Journal of Advanced Trends in Computer Science and Engineering 8, no. 1.3 (July 15, 2019): 45–50. http://dx.doi.org/10.30534/ijatcse/2019/1081.32019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ginzboorg, Philip, Valtteri Niemi, and Jörg Ott. "Message fragmentation for a chain of disrupted links." Computer Communications 48 (July 2014): 84–97. http://dx.doi.org/10.1016/j.comcom.2014.03.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cucchiara, Courtney, Soyeon Kwon, and Sejin Ha. "Message framing and consumer responses to organic seafood labeling." British Food Journal 117, no. 5 (May 5, 2015): 1547–63. http://dx.doi.org/10.1108/bfj-07-2014-0261.

Full text
Abstract:
Purpose – The purpose of this paper is to examine the effects of different label-message formats (positively vs negatively framed messages) on consumers’ purchase intentions in an organic seafood shopping setting, along with the moderating effects of two individual characteristics (purchase-decision involvement and perceived consumer effectiveness (PCE)) on the message-framing performance. Design/methodology/approach – Data were gathered from 1,698 consumers of a supermarket chain in the northeast region of the USA using a web-based experiment. Findings – Results of this study support the superiority of a positively framed message over a negatively framed message in persuading consumers to buy organic food. In addition, this effect of framing on persuasion is contingent upon different levels of consumer purchase-decision involvement as well as PCE concerning organic products. Practical implications – This study offers managerial implications for marketers and retailers, messages appealing the environmental and health benefits of organic seafood consumption (positively framed arguments) would be more persuasive to increase consumer purchase intention than negatively framed ones. In addition, individual characteristics of their target market should be taken into account in communication design and implementation. Originality/value – This survey research offers insights into the organic food consumption literature by validating the applicability of message framing in the organic seafood labelling setting and identifying consumers’ individual characteristics (purchase-decision involvement regarding organic seafood and PCE) moderating the message framing effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
6

Bajorski, Peter, and Michael Kurdziel. "A Markov-Chain-Based Model for Group Message Distribution in Connected Networks." International Journal of Data Analytics 1, no. 2 (July 2020): 13–29. http://dx.doi.org/10.4018/ijda.2020070102.

Full text
Abstract:
The authors introduce a stochastic Markov-chain-based model for the recursive distribution of a message from the source node to all remaining nodes. This recursive message distribution process produces a spanning tree topology over the connected network of nodes. The model has five input parameters: (1) the number of nodes n in the group, (2) the maximum number of child nodes, (3) the number of sub-message components needed to transfer a single message, (4) the probability p1 that two adjacent nodes in a network initiate a connection (edge) in the spanning tree, and (5) the probability p2 that each sub-message component is transferred correctly between nodes. The authors derive a closed-form expression for the expected group message distribution time, measured in discrete-time epochs, that is verified via Monte Carlo simulations. Since both the closed-form formulas and the Monte Carlo simulations are computationally intensive for networks with a large number of nodes n, this paper derives a reliable approximate formula for the expected distribution time for networks as large as n = 1000.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Taeyoon, Taewon Song, and Sangheon Pack. "An Energy Efficient Message Dissemination Scheme in Platoon-Based Driving Systems." Energies 13, no. 15 (August 1, 2020): 3940. http://dx.doi.org/10.3390/en13153940.

Full text
Abstract:
With the development of the convergence of IT and automotive technology, platoon-based driving systems are getting more attention and how to disseminate messages in the platoon is an important issue. In this paper, to enhance the energy efficiency and traffic throughput (e.g., average velocity) while meeting transmission deadlines, we propose an energy efficient message dissemination scheme (EMDS) in platoon-based driving systems, which also provides proper power control and relay selection. To find out the optimal policy to balance the probability of successful message dissemination and transmission power cost in EMDS, we formulate a Markov decision process (MDP) problem that considers the velocity of the vehicles in the platoon. To evaluate the performance of EMDS, we analyze the outage probability, the average velocity, and the expected power consumption using the discrete-time Markov chain (DTMC) model. Evaluation results demonstrate EMDS with the optimal policy improves the average velocity and the energy efficiency of message dissemination compared with the conventional message dissemination schemes, while reducing the message dissemination failure rate.
APA, Harvard, Vancouver, ISO, and other styles
8

Ghate, Archis. "Decentralized search on spheres using small-world Markov chains: expected hitting times and structural properties." Advances in Applied Probability 40, no. 04 (December 2008): 966–78. http://dx.doi.org/10.1017/s0001867800002925.

Full text
Abstract:
We build a family of Markov chains on a sphere using distance-based long-range connection probabilities to model the decentralized message-passing problem that has recently gained significant attention in the small-world literature. Starting at an arbitrary source point on the sphere, the expected message delivery time to an arbitrary target on the sphere is characterized by a particular expected hitting time of our Markov chains. We prove that, within this family, there is a unique efficient Markov chain whose expected hitting time is polylogarithmic in the relative size of the sphere. For all other chains, this expected hitting time is at least polynomial. We conclude by defining two structural properties, called scale invariance and steady improvement, of the probability density function of long-range connections and prove that they are sufficient and necessary for efficient decentralized message delivery.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghate, Archis. "Decentralized search on spheres using small-world Markov chains: expected hitting times and structural properties." Advances in Applied Probability 40, no. 4 (December 2008): 966–78. http://dx.doi.org/10.1239/aap/1231340160.

Full text
Abstract:
We build a family of Markov chains on a sphere using distance-based long-range connection probabilities to model the decentralized message-passing problem that has recently gained significant attention in the small-world literature. Starting at an arbitrary source point on the sphere, the expected message delivery time to an arbitrary target on the sphere is characterized by a particular expected hitting time of our Markov chains. We prove that, within this family, there is a unique efficient Markov chain whose expected hitting time is polylogarithmic in the relative size of the sphere. For all other chains, this expected hitting time is at least polynomial. We conclude by defining two structural properties, called scale invariance and steady improvement, of the probability density function of long-range connections and prove that they are sufficient and necessary for efficient decentralized message delivery.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Hai Yan, and Wei Liu. "Research on the Security Technology of Mobile Communication Information." Applied Mechanics and Materials 687-691 (November 2014): 2736–39. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2736.

Full text
Abstract:
This article presents a new solution of mobile and portable electronically published content protection which using function area and algorithm to ensure the mobile storage media security and secure authentication protocols to protect communication between data in storage media and document server, on condition that no security system installed on the target computer, the theft of mobile storage media, and key stolen when user access to the documents etc. To facilitate the communication between inside and outside of enterprise, while at the same time guarantee the authorization of confidential message, an information protection proxy-based system and method to authorize the confidential message is provided. User sends its message for outside receiver to his/her approver, and approver check the message and send the message to proxy if he/she agrees. The information protection system is based on a hash chain-based authorization protocol. The information protection proxy can prevent enterprise users from sending confidential involved messages to outside without approval, and at the same time audit the whole information authorization process. The authorization procedure is based on peer to peer mode and the proxy overhead is very low, and can also be used in mobile internet applications.
APA, Harvard, Vancouver, ISO, and other styles
11

Holers, V. M., T. G. Ruff, D. L. Parks, J. A. McDonald, L. L. Ballard, and E. J. Brown. "Molecular cloning of a murine fibronectin receptor and its expression during inflammation. Expression of VLA-5 is increased in activated peritoneal macrophages in a manner discordant from major histocompatibility complex class II." Journal of Experimental Medicine 169, no. 5 (May 1, 1989): 1589–605. http://dx.doi.org/10.1084/jem.169.5.1589.

Full text
Abstract:
Human fibronectin receptor (VLA-5) alpha and beta chain probes were used to identify their mouse homologues in a thioglycollate-elicited peritoneal exudate cell cDNA library. Sequence analysis of both alpha and beta chain-related murine clones revealed approximately 90% homology to their human counterparts by both nucleotide and derived amino acid sequence comparisons. Detectable alpha chain transcripts were seen predominantly in total RNA of peritoneal macrophages. beta chain expression, however, was detected at higher levels in lung, heart, brain, and kidney, suggesting the presence of a large murine VLA family similar to the human family. Analysis of levels of expression comparing resting peritoneal macrophages with macrophages elicited using inflammatory stimuli indicated that alpha chain message and surface VLA-5 expression were significantly increased using thioglycollate or Listeria monocytogenes as stimuli to elicit cells. Interestingly, beta chain message was unaffected by these inflammatory stimuli, suggesting that VLA-5 expression is regulated by VLA-5 alpha chain message levels. These results indicate that macrophage VLA-5 expression can be modulated in vivo and may provide an important mechanism by which macrophages are recruited to or adhere to fibronectin in inflammatory foci.
APA, Harvard, Vancouver, ISO, and other styles
12

De Haan, Job A. C., and Macarena Sacristán-Díaz. "Measuring performance at the supply chain level: the role of the chain director." WPOM-Working Papers on Operations Management 7, no. 1 (May 11, 2016): 1. http://dx.doi.org/10.4995/wpom.v7i1.5380.

Full text
Abstract:
<p class="Abstract">Supply chains lack their own across-the-board managers that can design and implement a performance measurement system (PMS), nor do they have an explicit overall strategy from which the PMS can be derived. The focus of this article is to develop a qualitative theoretical model on PM in supply chains to explore how to adopt PMS as a tool to implement collaboration and integration in chains. The exploratory nature of the research question determined our use of a multiple case study. Two focal firms in the agro-food sector from Spain and the Netherlands, serving a total of five different chains, illustrate the message of the model.</p>The findings show when an attempt to implement a PMS at the supply chain level might be appropriate and effective (if a chain exists and has a director), and how the system’s content should be focused on what is needed to improve chain performance (with end customers’ demands as a starting point). The paper highlights the benefits obtained by the other partners if they comply with the best informed supply chain member in the development of the chain’s PMS, as well as how a PMS cannot be developed when none of the partners can be labelled as chain director.
APA, Harvard, Vancouver, ISO, and other styles
13

Covaci, Florina Livia. "Automating Forward and Reverse Supply Chains in the Context of Industry 4.0." Studia Universitatis Babes-Bolyai Oeconomica 64, no. 1 (April 1, 2019): 16–32. http://dx.doi.org/10.2478/subboec-2019-0002.

Full text
Abstract:
Abstract The 4th industrial revolution brings in a transformation of the traditional supply chain towards a digital supply chain. The machines will be able to use algorithms that will enable them to automate the supply chain formation process and to quickly react to disruptions. The current approach proposes a mechanism based on a message passing inference scheme in order to address the automated supply chain formation problem in a closed-loop supply chain by integrating forward and reverse supply chains. Forward supply chain imply a series of activities required to produce new products from virgin materials and distribute them to consumers while reverse supply chains require collecting used products from consumers and reprocessing them to either recover their leftover market values or dispose of them. It has become common for companies involved in a forward supply chain to also carry out collection and reprocessing of used products. Strict environmental regulations and diminishing raw material resources have intensified the importance of reverse supply chains at an increasing rate. The proposed mechanism is evaluated using two type of supply chain configurations from textile and automobile industry, demonstrating that automated integration of reverse supply chains along with forward supply chains, lead to benefits for the participants in the supply chain.
APA, Harvard, Vancouver, ISO, and other styles
14

Kerr, Tom. "Covering the supply chain industry [Message from the Series Editor]." IEEE Communications Magazine 45, no. 9 (September 2007): 3. http://dx.doi.org/10.1109/mcom.2007.4342871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Heoncheol, Kipyo Kim, Yongsung Kwon, and Eonpyo Hong. "Real-Time Particle Swarm Optimization on FPGA for the Optimal Message-Chain Structure." Electronics 7, no. 11 (October 24, 2018): 274. http://dx.doi.org/10.3390/electronics7110274.

Full text
Abstract:
This paper addresses the real-time optimization problem of the message-chain structure to maximize the throughput in data communications based on half-duplex command-response protocols. This paper proposes a new variant of the particle swarm optimization (PSO) algorithm to resolve real-time optimization, which is implemented on field programmable gate arrays (FPGA) to be performed faster in parallel and to avoid the delays caused by other tasks on a central processing unit. The proposed method was verified by finding the optimal message-chain structure much faster than the original PSO, as well as reliably with different system and algorithm parameters.
APA, Harvard, Vancouver, ISO, and other styles
16

Choi, J. K., S. Holtzer, S. A. Chacko, Z. X. Lin, R. K. Hoffman, and H. Holtzer. "Phorbol esters selectively and reversibly inhibit a subset of myofibrillar genes responsible for the ongoing differentiation program of chick skeletal myotubes." Molecular and Cellular Biology 11, no. 9 (September 1991): 4473–82. http://dx.doi.org/10.1128/mcb.11.9.4473.

Full text
Abstract:
Phorbol esters selectively and reversibly disassemble the contractile apparatus of cultured skeletal muscle as well as inhibit the synthesis of many contractile proteins without inhibiting that of housekeeping proteins. We now demonstrate that phorbol esters reversibly decrease the mRNA levels of at least six myofibrillar genes: myosin heavy chain, myosin light chain 1/3, myosin light chain 2, cardiac and skeletal alpha-actin, and skeletal troponin T. The steady-state message levels decrease 50- to 100-fold after 48 h of exposure to phorbol esters. These decreases can be attributed at least in part to decreases in transcription rates. For at least two genes, cardiac and skeletal alpha-actin, some of the decreases are the result of increased mRNA turnover. In contrast, the cardiac troponin T steady-state message level does not change, and its transcription rate decreases only transiently upon exposure to phorbol esters. Phorbol esters do not decrease the expression of the housekeeping genes, alpha-tubulin, beta-actin, and gamma-actin. Phorbol esters do not decrease the steady-state message levels of MyoD1, a gene known to be important in the activation of many skeletal muscle-specific genes. Cycloheximide blocks the phorbol ester-induced decreases in transcription, message stability, and the resulting steady-state message level but does not block the tetradecanoyl phorbol acetate-induced rapid disassembly of the I-Z-I complexes. These results suggests a common mechanism for the regulation of many myofibrillar genes independent of MyoD1 mRNA levels, independent of housekeeping genes, but dependent on protein synthesis.
APA, Harvard, Vancouver, ISO, and other styles
17

Choi, J. K., S. Holtzer, S. A. Chacko, Z. X. Lin, R. K. Hoffman, and H. Holtzer. "Phorbol esters selectively and reversibly inhibit a subset of myofibrillar genes responsible for the ongoing differentiation program of chick skeletal myotubes." Molecular and Cellular Biology 11, no. 9 (September 1991): 4473–82. http://dx.doi.org/10.1128/mcb.11.9.4473-4482.1991.

Full text
Abstract:
Phorbol esters selectively and reversibly disassemble the contractile apparatus of cultured skeletal muscle as well as inhibit the synthesis of many contractile proteins without inhibiting that of housekeeping proteins. We now demonstrate that phorbol esters reversibly decrease the mRNA levels of at least six myofibrillar genes: myosin heavy chain, myosin light chain 1/3, myosin light chain 2, cardiac and skeletal alpha-actin, and skeletal troponin T. The steady-state message levels decrease 50- to 100-fold after 48 h of exposure to phorbol esters. These decreases can be attributed at least in part to decreases in transcription rates. For at least two genes, cardiac and skeletal alpha-actin, some of the decreases are the result of increased mRNA turnover. In contrast, the cardiac troponin T steady-state message level does not change, and its transcription rate decreases only transiently upon exposure to phorbol esters. Phorbol esters do not decrease the expression of the housekeeping genes, alpha-tubulin, beta-actin, and gamma-actin. Phorbol esters do not decrease the steady-state message levels of MyoD1, a gene known to be important in the activation of many skeletal muscle-specific genes. Cycloheximide blocks the phorbol ester-induced decreases in transcription, message stability, and the resulting steady-state message level but does not block the tetradecanoyl phorbol acetate-induced rapid disassembly of the I-Z-I complexes. These results suggests a common mechanism for the regulation of many myofibrillar genes independent of MyoD1 mRNA levels, independent of housekeeping genes, but dependent on protein synthesis.
APA, Harvard, Vancouver, ISO, and other styles
18

Tarasov, Evgenij F. "Do Communicants Transmit Information in Course of Speech Communication?" RUDN Journal of Language Studies, Semiotics and Semantics 12, no. 2 (December 15, 2021): 255–68. http://dx.doi.org/10.22363/2313-2299-2021-12-2-255-268.

Full text
Abstract:
The article questions if human speech communication (SC) involves a transfer of information. The information functioning in speech communication is dwelled upon in the information and systemic activity approaches. The informational approach adequately explains only the direct method of information transfer, while the systemic activity approach is relevant for the sign-mediated speech communication typical for human interaction. The more heuristic thesis is that the perception of the chain of linguistic sign bodies produced in the intersubjective space only starts the construction of the perceived speech message content by the recipient. The completeness of the constructed speech message content depends entirely on the recipient, who has the optimal common consciousness with the speaker. The purpose of speech messages is not the actual construction of the content by the recipient, but the development of the message personal meaning. In human speech communication, the communicants do not transmit information, but use verbal signs bodies to actualize images of consciousness which are developed within a single ethnic culture and therefore are common for them. The incentive for the common consciousness development by the communicants is their participation in joint activities that ensure their earthly existence.
APA, Harvard, Vancouver, ISO, and other styles
19

XU, CHUN-JIE, YI-MIN LIU, XIAO-FENG YIN, and ZHAN-JUN ZHANG. "A NOTE ON "CHAIN TELEPORTATION WITH PARTIALLY ENTANGLED STATES"." International Journal of Quantum Information 08, no. 08 (December 2010): 1421–26. http://dx.doi.org/10.1142/s0219749910006393.

Full text
Abstract:
The global chain teleportation protocol (GCTP) [Eur. Phys. J. D54 (2009) 111] is revisited via a three-node instantiation. The required operation ability and manipulation orderings of the three participants are sightly changed so that in the improved version, three additional important merits are resultant with consuming only an additional one-classical-bit message.
APA, Harvard, Vancouver, ISO, and other styles
20

Lee, Heoncheol, and Kipyo Kim. "Real-Time Monte Carlo Optimization on FPGA for the Efficient and Reliable Message Chain Structure." Electronics 8, no. 8 (August 5, 2019): 866. http://dx.doi.org/10.3390/electronics8080866.

Full text
Abstract:
This paper addresses the real-time optimization problem to find the most efficient and reliable message chain structure in data communications based on half-duplex command–response protocols such as MIL-STD-1553B communication systems. This paper proposes a real-time Monte Carlo optimization method implemented on field programmable gate arrays (FPGA) which can not only be conducted very quickly but also avoid the conflicts with other tasks on a central processing unit (CPU). Evaluation results showed that the proposed method can consistently find the optimal message chain structure within a quite small and deterministic time, which was much faster than the conventional Monte Carlo optimization method on a CPU.
APA, Harvard, Vancouver, ISO, and other styles
21

Weisberg, LJ, DT Shiu, PR Conkling, and MA Shuman. "Identification of normal human peripheral blood monocytes and liver as sites of synthesis of coagulation factor XIII a-chain." Blood 70, no. 2 (August 1, 1987): 579–82. http://dx.doi.org/10.1182/blood.v70.2.579.579.

Full text
Abstract:
Abstract Factor XIII is the fibrin-stabilizing factor that covalently cross- links fibrin monomers to form a highly organized, stable fibrin clot. The plasma form of factor XIII is a heterodimer, a2b2, consisting of two a-chains and two b-chains; the intracellular form, such as in platelets and placenta, is a dimer, a2, consisting of a-chains only. The catalytic function of factor XIII, a transglutaminase, resides in the a-chain. To address questions regarding sites of synthesis of factor XIII a-chain, an EcoRI restriction fragment from the protein- coding region of the factor XIII a-chain cDNA was used as a probe for Northern blot analysis. The cDNA probe showed hybridization with a single approximately 4.0-kilobase (kb) message in poly (A)+ mRNA prepared from normal human peripheral blood monocytes and normal human liver. The results demonstrate conclusively that factor XIII a-chains are actively synthesized in circulating monocytes and in liver. To our knowledge, these data represent the first demonstration of synthesis of any blood coagulation factor in primary uncultured and unstimulated monocytes or macrophage cells.
APA, Harvard, Vancouver, ISO, and other styles
22

Weisberg, LJ, DT Shiu, PR Conkling, and MA Shuman. "Identification of normal human peripheral blood monocytes and liver as sites of synthesis of coagulation factor XIII a-chain." Blood 70, no. 2 (August 1, 1987): 579–82. http://dx.doi.org/10.1182/blood.v70.2.579.bloodjournal702579.

Full text
Abstract:
Factor XIII is the fibrin-stabilizing factor that covalently cross- links fibrin monomers to form a highly organized, stable fibrin clot. The plasma form of factor XIII is a heterodimer, a2b2, consisting of two a-chains and two b-chains; the intracellular form, such as in platelets and placenta, is a dimer, a2, consisting of a-chains only. The catalytic function of factor XIII, a transglutaminase, resides in the a-chain. To address questions regarding sites of synthesis of factor XIII a-chain, an EcoRI restriction fragment from the protein- coding region of the factor XIII a-chain cDNA was used as a probe for Northern blot analysis. The cDNA probe showed hybridization with a single approximately 4.0-kilobase (kb) message in poly (A)+ mRNA prepared from normal human peripheral blood monocytes and normal human liver. The results demonstrate conclusively that factor XIII a-chains are actively synthesized in circulating monocytes and in liver. To our knowledge, these data represent the first demonstration of synthesis of any blood coagulation factor in primary uncultured and unstimulated monocytes or macrophage cells.
APA, Harvard, Vancouver, ISO, and other styles
23

Hakeem, Shimaa A. Abdel, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography." Sensors 20, no. 19 (October 8, 2020): 5719. http://dx.doi.org/10.3390/s20195719.

Full text
Abstract:
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.
APA, Harvard, Vancouver, ISO, and other styles
24

Jia, Xiaoli, Peilin Liu, and Sumxin Jiang. "Speech Compressive Sampling Using Approximate Message Passing and a Markov Chain Prior." Sensors 20, no. 16 (August 17, 2020): 4609. http://dx.doi.org/10.3390/s20164609.

Full text
Abstract:
By means of compressive sampling (CS), a sparse signal can be efficiently recovered from its far fewer samples than that required by the Nyquist–Shannon sampling theorem. However, recovering a speech signal from its CS samples is a challenging problem, as it is not sparse enough on any existing canonical basis. To solve this problem, we propose a method which combines the approximate message passing (AMP) and Markov chain that exploits the dependence between the modified discrete cosine transform (MDCT) coefficients of a speech signal. To reconstruct the speech signal from CS samples, a turbo framework, which alternately iterates AMP and belief propagation along the Markov chain, is utilized. In addtion, a constrain is set to the turbo iteration to prevent the new method from divergence. Extensive experiments show that, compared to other traditional CS methods, the new method achieves a higher signal-to-noise ratio, and a higher perceptual evaluation of speech quality (PESQ) score. At the same time, it maintaines a better similarity of the energy distribution to the original speech spectrogram. The new method also achieves a comparable speech enhancement effect to the state-of-the-art method.
APA, Harvard, Vancouver, ISO, and other styles
25

Tarigan, Pilipus, Hery Sunandar, Bersama Sinuraya, Zekson Arizona Matondang, and Garuda Ginting. "Implementation Of Triangle Chain Cipher Algorithm in Security Message of Social Media." Journal of Physics: Conference Series 1573 (July 2020): 012024. http://dx.doi.org/10.1088/1742-6596/1573/1/012024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kuznetsov, Alexandr, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko, and Andrii Kolhatin. "Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.02.01.

Full text
Abstract:
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Xinxing, Likui Feng, Satya Chinta, Prashant Singh, Yuting Wang, Joshawna K. Nunnery, and Rebecca A. Butcher. "Acyl-CoA oxidase complexes control the chemical message produced by Caenorhabditis elegans." Proceedings of the National Academy of Sciences 112, no. 13 (March 16, 2015): 3955–60. http://dx.doi.org/10.1073/pnas.1423951112.

Full text
Abstract:
Caenorhabditis elegans uses ascaroside pheromones to induce development of the stress-resistant dauer larval stage and to coordinate various behaviors. Peroxisomal β-oxidation cycles are required for the biosynthesis of the fatty acid-derived side chains of the ascarosides. Here we show that three acyl-CoA oxidases, which catalyze the first step in these β-oxidation cycles, form different protein homo- and heterodimers with distinct substrate preferences. Mutations in the acyl-CoA oxidase genes acox-1, -2, and -3 led to specific defects in ascaroside production. When the acyl-CoA oxidases were expressed alone or in pairs and purified, the resulting acyl-CoA oxidase homo- and heterodimers displayed different side-chain length preferences in an in vitro activity assay. Specifically, an ACOX-1 homodimer controls the production of ascarosides with side chains with nine or fewer carbons, an ACOX-1/ACOX-3 heterodimer controls the production of those with side chains with seven or fewer carbons, and an ACOX-2 homodimer controls the production of those with ω-side chains with less than five carbons. Our results support a biosynthetic model in which β-oxidation enzymes act directly on the CoA-thioesters of ascaroside biosynthetic precursors. Furthermore, we identify environmental conditions, including high temperature and low food availability, that induce the expression of acox-2 and/or acox-3 and lead to corresponding changes in ascaroside production. Thus, our work uncovers an important mechanism by which C. elegans increases the production of the most potent dauer pheromones, those with the shortest side chains, under specific environmental conditions.
APA, Harvard, Vancouver, ISO, and other styles
28

Xie, Man De. "Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 29-32 (August 2010): 2608–13. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2608.

Full text
Abstract:
In present, almost all of inline code dissemination algorithms focus on securing the propagation of code images and overlook the security vulnerabilities in the image management aspects of code dissemination, such as rebooting and erasing code images. In this paper, we first investigate the security issues in remote image management for code dissemination in wireless sensor networks and analyze the advantage and disadvantage of the algorithm proposed by Liu et al which employs three different key chains to design three different schemes. To reduce the computation load of authentication operation, a message cipher puzzle-based image management algorithm is proposed. In this approach, a one-way hash key chain is introduced to authenticate the Reboot and Erase command and a weak authentication mechanism is introduced to protect the version number. The message cipher puzzle-based authentication method is efficient, because it only introduces a few hash function operations and comparisons
APA, Harvard, Vancouver, ISO, and other styles
29

Gao, He Bei, Hong Li, and Chang Ji Qian. "Parallel Monte Carlo Simulation of Single Polymer Chain." Applied Mechanics and Materials 263-266 (December 2012): 3317–20. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3317.

Full text
Abstract:
We calculated the properties of a single flexible polymer chain adsorbed onto a planar surface with two types of nodes, denoted by letters A and B by Monte Carlo methods. One A-type node contacting to the surface has an attractive interaction of strength E=-1. One node of B-type has no affinity for the surface, E= 0. The polymer chain is modeled as a self-avoiding walk of N steps started at the center of the flat surface on the cubic lattice. Statistical properties of the polymer chain are computed by using message passing libraries. We obtain linear speedup by parallel computing the independent samples.
APA, Harvard, Vancouver, ISO, and other styles
30

Sun, Jiang Hong. "Kinematic Chain Isomorphism Identification Based on Loop-Code." Applied Mechanics and Materials 44-47 (December 2010): 3874–78. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3874.

Full text
Abstract:
A new method approach is presented to solve isomorphism identification of kinematic chain topology graphs. Kinematic chain topology graphs are depicted with loop-code based on the characteristic of kinematic chain topology graphs. The number of binary links in the limbs of topology graphs is arranged in group according to links with multi points of connection.Although the order of limbs in the groups and the order of links with multi points of connection outside the groups can change, the planar message of topology graphs can not change. Thereby forming loop-code.This representation is straightforward and not affected when drawing modes and labeling ways change in topology graphs.
APA, Harvard, Vancouver, ISO, and other styles
31

Ma, Xuefei, Zhaoqin Cheng, Hong Kong, Ying Wang, Helmut Unruh, Newman L. Stephens, and Michel Laviolette. "Changes in biophysical and biochemical properties of single bronchial smooth muscle cells from asthmatic subjects." American Journal of Physiology-Lung Cellular and Molecular Physiology 283, no. 6 (December 1, 2002): L1181—L1189. http://dx.doi.org/10.1152/ajplung.00389.2001.

Full text
Abstract:
Whether contractility of bronchial smooth muscle cells (BSMC) from asthmatic subjects is significantly altered has never been validated. We tested the hypothesis that such BSMC show increased contractility. Cells were isolated from endobronchial biopsies. BSMC shortening was measured under an inverted microscope. Statistically significant increases in maximum shortening capacity (Δ L max) and velocity ( V o) were found in asthmatic BSMC compared with normal cells. Mean Δ L max in asthmatic BSMC was 39.05 ± 1.99% (SE) of resting cell length compared with 28.6 ± 1.1% in normal cells; mean V o was 7.2 ± 0.8% of resting cell length/s in asthmatic cells and 5.23 ± 0.46% in normal cells. To investigate the mechanism of the increased contractility, we measured mRNA abundance of smooth muscle types of myosin light chain kinase (smMLCK) and myosin heavy chain. RT-PCR data revealed that smMLCK mRNA was higher in asthmatic BSMC (0.106 ± 0.021 arbitrary densitometric units, n = 7) than in control cells (0.04 ± 0.008, n = 11; P < 0.05). Messages for myosin heavy chain isoforms showed no difference. Increased kinase message content is an index of the mechanism for the increased velocity and capacity of shortening we report.
APA, Harvard, Vancouver, ISO, and other styles
32

Guggulothu, Thirupathi, and Salman Abdul Moiz. "Detection of Shotgun Surgery and Message Chain Code Smells using Machine Learning Techniques." International Journal of Rough Sets and Data Analysis 6, no. 2 (April 2019): 34–50. http://dx.doi.org/10.4018/ijrsda.2019040103.

Full text
Abstract:
Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measure and area under ROC, yet the tree-based classifiers are performing better than other classifiers.
APA, Harvard, Vancouver, ISO, and other styles
33

Ristagno, Giuseppe, Francesca Fumagalli, and Antonino Gullo. "The ‘take home message’ from the ‘Take Heart America’ program: Strengthen the chain!*." Critical Care Medicine 39, no. 1 (January 2011): 194–96. http://dx.doi.org/10.1097/ccm.0b013e3181feb669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Vanden Heuvel, G. B., and D. R. Abrahamson. "Quantitation and localization of laminin A, B1, and B2 chain RNA transcripts in developing kidney." American Journal of Physiology-Renal Physiology 265, no. 2 (August 1, 1993): F293—F299. http://dx.doi.org/10.1152/ajprenal.1993.265.2.f293.

Full text
Abstract:
To quantitate expression of laminin A, B1, and B2 chains during kidney development, we prepared riboprobes of similar size (318-365 nucleotides) and carried out scanning densitometry of Northern blots from newborn mouse and rat kidneys. Much higher expression of B1 than A or B2 mRNAs was observed with an A-to-B1-to-B2 ratio of approximately 1:8:4 in mice and approximately 1:12:1 in rats. In addition to the 9.5-kb laminin A chain transcript, we also observed specific hybridization of the A chain probe to approximately 6-kb band in both newborn mice and rats. To localize these mRNAs, newborn rat kidneys were sieved to obtain separate glomerular and tubule fractions. Northern blots from these samples showed that most of the B1, B2, and 9.5-kb laminin A chain mRNAs were in glomerular fractions, whereas tubules contained more of the 6-kb A chain band. Analyses of poly(A)+ mRNA from newborn and adult kidneys showed severalfold decreases in adult RNA encoding the three laminin chains and the alpha 1-chain type IV collagen. However, only a 20% decline from newborn levels was seen for heparan sulfate proteoglycan (HSPG) core protein message. These quantitative results provide additional evidence that different laminin isoforms are present in separate kidney basement membranes and that HSPG core protein synthesis remains at relatively high levels in adult kidneys.
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 4 (December 1997): 986–1003. http://dx.doi.org/10.2307/1427850.

Full text
Abstract:
An important model in communications is the stochastic FM signal st = A cos , where the message process {mt} is a stochastic process. In this paper, we investigate the linear models and limit distributions of FM signals. Firstly, we show that this non-linear model in the frequency domain can be converted to an ARMA (2, q + 1) model in the time domain when {mt} is a Gaussian MA (q) sequence. The spectral density of {St} can then be solved easily for MA message processes. Also, an error bound is given for an ARMA approximation for more general message processes. Secondly, we show that {St} is asymptotically strictly stationary if {mt} is a Markov chain satisfying a certain condition on its transition kernel. Also, we find the limit distribution of st for some message processes {mt}. These results show that a joint method of probability theory, linear and non-linear time series analysis can yield fruitful results. They also have significance for FM modulation and demodulation in communications.
APA, Harvard, Vancouver, ISO, and other styles
36

Nuridaliya, Ida. "PENERAPAN TEKNIK CHAIN MESSAGE COOPERATIVE UNTUK MENINGKATKAN AKTIVITAS DAN HASIL BELAJAR PESERTA DIDIK PADA PEMBELAJARAN IPS." JURNAL PENDIDIKAN ILMU SOSIAL 25, no. 1 (September 1, 2016): 110. http://dx.doi.org/10.17509/jpis.v25i1.3674.

Full text
Abstract:
Langkah penting yang harus dilakukan oleh seorang guru dalam kegiatan pembelajaran adalah memilih, menyederhanakan, menyesuaikan, menetapkan dan menyusun bahan pelajaran menjadi materi yang mudah dimengerti, dicerna dan diterima oleh peserta didik sehingga dapat mencapai perubahan perilaku yang diinginkan. Oleh karena itu guru sebagai pelaksana pembelajaran hendaknya dapat mengambil isi materi yang penting agar dapat melatih peserta didik dalam mengidentifikasi peristiwa-peristiwa atau fakta-fakta yang ada disekitarnya yang akhirnya peserta didik dilatih mengambil kesimpulan dalam rangka membentuk konsep. Dalam penelitian tindakan kelas ini peneliti sebagai guru bidang studi IPS berusaha meningkatkan aktivitas dan hasil pembelajaran dengan menerapkan model cooperative teknik ’chain message’ yang dapat membangkitkan aktivitas belajar dan membantu mengatasi kesulitan peserta didik dalam memahami kompetensi usaha manusia memenuhi kebutuhan. Instrumen yang digunakan dalam penelitian ini terdiri dari Rencana Pelaksanaan Pembelajara (RPP), Alat Pembagi Kelompok, Leaflet, LKS, Lembar Observasi, Format Butir Soal, Penetapan Kriteria Ketuntasan Minimum, dan Angket. Penelitian Tindakan Kelas ini dilaksanakan di SMP Negeri 1 Jatinangor Kabupaten Sumedang, dengan subjek peserta didik kelas VII D. Pelaksanaan penelitian ini selama 4 bulan dimulai September sampai dengan Desember 2012 pada semester gasal tahun pembelajaran 2012-2013. Hasil penelitian menunjukkan aktivitas dan hasil belajar peserta didik mengalami peningkatan terutama pada siklus 2 mencapai 86 %. Hasil penilaian evaluasi dalam pemahaman konsep mengalami peningkatan hingga mencapai 82 % pada siklus 2. Penerapan teknik Chain Message Cooperative dalam pembelajaran khususnya pada Kompetensi Memahami Usaha Manusia Memenuhi Kebutuhan sangat membantu guru maupun peserta didik meningkatkan aktivitas dan hasil pembelajaran Ilmu Pengetahuan Sosial. Kata kunci: chain message,aktivitas,hasil belajar.
APA, Harvard, Vancouver, ISO, and other styles
37

Lin, Ting, Xu Yang, Taoyi Wang, Tu Peng, Feng Xu, Shengxiong Lao, Siyuan Ma, Hanfeng Wang, and Wenjiang Hao. "Implementation of High-Performance Blockchain Network Based on Cross-Chain Technology for IoT Applications." Sensors 20, no. 11 (June 8, 2020): 3268. http://dx.doi.org/10.3390/s20113268.

Full text
Abstract:
With the development of technology, the network structure has changed a lot. Many people regard the Internet of Things as the next-generation network structure, which means all the embedded devices can communicate with each other directly. However, some problems remain in IoT before it can be applied in a large scale. Blockchain, which has become a hot research topic in recent years, may be one of the solutions. However, currently, the transaction speed of blockchain is still a disadvantage compared to traditional transaction methods. This paper focuses on to implement a high-performance blockchain platform. After investigation of the current blockchain consensus algorithm and blockchain architecture, we propose: (1) an improved blockchain consensus algorithm, which is implemented based on the mortgage model instead of probability model; (2) a cross-chain protocol with transverse expansion capacity, which would support the message transmission among chains; (3) a high-performance cross-chain blockchain network structure, which could handle more than 1000 transactions per second per chain by verification. Experiments have been carried out, and shown that the cross-chain blockchain network structure we provided is feasible to meet the requirement of large-scale distributed IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
38

Gale, Rosemary E., Robin W. Freeburn, Asim Khwaja, Rajesh Chopra, and David C. Linch. "A Truncated Isoform of the Human β Chain Common to the Receptors for Granulocyte-Macrophage Colony-Stimulating Factor, Interleukin-3 (IL-3), and IL-5 With Increased mRNA Expression in Some Patients With Acute Leukemia." Blood 91, no. 1 (January 1, 1998): 54–63. http://dx.doi.org/10.1182/blood.v91.1.54.

Full text
Abstract:
Abstract We report here a naturally occurring isoform of the human β chain common to the receptors for granulocyte-macrophage colony-stimulating factor (GM-CSF), interleukin-3 (IL-3), and IL-5 (GMRβC) with a truncated intracytoplasmic tail caused by deletion of a 104-bp exon in the membrane-proximal region of the chain. This β intracytoplasmic truncated chain (βIT) has a predicted tail of 46 amino acids, instead of 432 for βC, with 23 amino acids in common with βC and then a new sequence of 23 amino acids. In primary myeloid cells, βIT comprised approximately 20% of the total β chain message, but was increased up to 90% of total in blast cells from a significant proportion of patients with acute leukemia. Specific anti-βITantibodies demonstrated its presence in primary myeloid cells and cell lines. Coexpression of βIT converted low-affinity GMRα chains (KD 2.5 nmol/L) to higher-affinity αβ complexes (KD 200 pmol/L). These could bind JAK2 that was tyrosine-phosphorylated by stimulation with GM-CSF. βITdid not support GM-CSF–induced proliferation when cotransfected with GMRα into CTLL-2 cells. Therefore, it may interfere with the signal-transducing properties of the βC chain and play a role in the pathogenesis of leukemia.
APA, Harvard, Vancouver, ISO, and other styles
39

Gale, Rosemary E., Robin W. Freeburn, Asim Khwaja, Rajesh Chopra, and David C. Linch. "A Truncated Isoform of the Human β Chain Common to the Receptors for Granulocyte-Macrophage Colony-Stimulating Factor, Interleukin-3 (IL-3), and IL-5 With Increased mRNA Expression in Some Patients With Acute Leukemia." Blood 91, no. 1 (January 1, 1998): 54–63. http://dx.doi.org/10.1182/blood.v91.1.54.54_54_63.

Full text
Abstract:
We report here a naturally occurring isoform of the human β chain common to the receptors for granulocyte-macrophage colony-stimulating factor (GM-CSF), interleukin-3 (IL-3), and IL-5 (GMRβC) with a truncated intracytoplasmic tail caused by deletion of a 104-bp exon in the membrane-proximal region of the chain. This β intracytoplasmic truncated chain (βIT) has a predicted tail of 46 amino acids, instead of 432 for βC, with 23 amino acids in common with βC and then a new sequence of 23 amino acids. In primary myeloid cells, βIT comprised approximately 20% of the total β chain message, but was increased up to 90% of total in blast cells from a significant proportion of patients with acute leukemia. Specific anti-βITantibodies demonstrated its presence in primary myeloid cells and cell lines. Coexpression of βIT converted low-affinity GMRα chains (KD 2.5 nmol/L) to higher-affinity αβ complexes (KD 200 pmol/L). These could bind JAK2 that was tyrosine-phosphorylated by stimulation with GM-CSF. βITdid not support GM-CSF–induced proliferation when cotransfected with GMRα into CTLL-2 cells. Therefore, it may interfere with the signal-transducing properties of the βC chain and play a role in the pathogenesis of leukemia.
APA, Harvard, Vancouver, ISO, and other styles
40

Niu, Yingli, Xiangyu Bu, and Xinghua Zhang. "Single Chain Mean-Field Theory Study on Responsive Behavior of Semiflexible Polymer Brush." Materials 14, no. 4 (February 7, 2021): 778. http://dx.doi.org/10.3390/ma14040778.

Full text
Abstract:
The application of single chain mean-field theory (SCMFT) on semiflexible chain brushes is reviewed. The worm-like chain (WLC) model is the best mode of semiflexible chain that can continuously recover to the rigid rod model and Gaussian chain (GC) model in rigid and flexible limits, respectively. Compared with the commonly used GC model, SCMFT is more applicable to the WLC model because the algorithmic complexity of the WLC model is much higher than that of the GC model in self-consistent field theory (SCFT). On the contrary, the algorithmic complexity of both models in SCMFT are comparable. In SCMFT, the ensemble average of quantities is obtained by sampling the conformations of a single chain or multi-chains in the external auxiliary field instead of solving the modified diffuse equation (MDE) in SCFT. The precision of this calculation is controlled by the number of bonds Nm used to discretize the chain contour length L and the number of conformations M used in the ensemble average. The latter factor can be well controlled by metropolis Monte Carlo simulation. This approach can be easily generalized to solve problems with complex boundary conditions or in high-dimensional systems, which were once nightmares when solving MDEs in SCFT. Moreover, the calculations in SCMFT mainly relate to the assemble averages of chain conformations, for which a portion of conformations can be performed parallel on different computing cores using a message-passing interface (MPI).
APA, Harvard, Vancouver, ISO, and other styles
41

Ellis, R. H. "What the public want from agriculture: Introduction." Proceedings of the British Society of Animal Science 2003 (2003): 232. http://dx.doi.org/10.1017/s1752756200013880.

Full text
Abstract:
The overall title for these sessions is “Reconnecting the food chain linking farmers scientists and consumers”. Reconnecting the food supply chain was probably the strongest single message to come from the UK Government’s Policy Commission on the Future of Food and Farming (Anon., 2002). Progress on the Policy Commission’s recommendation to establish a Food Chain Centre will no doubt be reported by Dr Segal from DEFRA. The real task of linking farmers, scientists and consumers, however, cannot be accomplished by Government. It is not sensible to expect Government to take on such a role: have we not all got voices?
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Shanshen, and Xin Jing. "Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology." Complexity 2020 (December 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/6647039.

Full text
Abstract:
The amazing rise of digital currency is not only favored by investors but also attractive to lawbreakers for its anonymity and decentralization. This paper mainly discusses the intelligent digital currency and dynamic coding service system based on Internet of Things technology. In this paper, the RDCAR algorithm is used to realize the routing discovery process of the wireless network. When the intermediate node receives the RREQ message, first of all, to avoid the loop, it checks whether the same RREQ message has been introduced. If it has received it, it will discard it. Otherwise, it will cache the message and attach its own neighbor node list to the signal-to-noise ratio of the channel link, update the RREQ message, and broadcast it. The payment cipher is managed by the bank. When the user opens an account, the bank registers and sends it to the user. The key is generated by the algorithm chip, and the public key is kept in the bank background server. When the bill is delivered to the bank, the bank inputs all the elements on the bill on the counter terminal and transmits it to the verification machine for verification through the bank network. If the verification is correct, it indicates that the bill is indeed issued by the customer, and all bill elements are correct, and payment can be made. The node operation protocol of public chain and alliance chain maintains the operation of the Internet of Things system. The nodes of alliance chain generate new blocks according to the interval of 30 s. When the node fails to complete the block generation within 30 s, it will rotate to the next node. The mkfile command is used to generate 16b, 1 KB, 1 MB, and 1 GB files as input. The peak speed of the encoding service system is about 370 mb/s. The results show that the system designed in this study is robust and suitable for complex trading environment.
APA, Harvard, Vancouver, ISO, and other styles
43

Kolegaeva, Irina, and Lesia Strochenko. "Academic and Literary Communication: Addressability, Statuses, and Functioning." Lege Artis 3, no. 2 (December 1, 2018): 72–104. http://dx.doi.org/10.2478/lart-2018-0015.

Full text
Abstract:
Abstract The article addresses the issue of creation and functioning of each link in the communication chain addresser/sender-message-addressee/recipient in three communicative statuses: external, internal, and potential. Personal and transpersonal communication is analyzed. Semantic and functional features of academic vs literary communication are considered.
APA, Harvard, Vancouver, ISO, and other styles
44

Huang, D. "Stochastic fm models and non-linear time series analysis." Advances in Applied Probability 29, no. 04 (December 1997): 986–1003. http://dx.doi.org/10.1017/s0001867800047984.

Full text
Abstract:
An important model in communications is the stochastic FM signal st = A cos , where the message process {m t} is a stochastic process. In this paper, we investigate the linear models and limit distributions of FM signals. Firstly, we show that this non-linear model in the frequency domain can be converted to an ARMA (2, q + 1) model in the time domain when {mt } is a Gaussian MA (q) sequence. The spectral density of {St } can then be solved easily for MA message processes. Also, an error bound is given for an ARMA approximation for more general message processes. Secondly, we show that {St } is asymptotically strictly stationary if {m t } is a Markov chain satisfying a certain condition on its transition kernel. Also, we find the limit distribution of st for some message processes {mt }. These results show that a joint method of probability theory, linear and non-linear time series analysis can yield fruitful results. They also have significance for FM modulation and demodulation in communications.
APA, Harvard, Vancouver, ISO, and other styles
45

Ilić, Velimir M., Dejan I. Mančev, Branimir T. Todorović, and Miomir S. Stanković. "Gradient computation in linear-chain conditional random fields using the entropy message passing algorithm." Pattern Recognition Letters 33, no. 13 (October 2012): 1776–84. http://dx.doi.org/10.1016/j.patrec.2012.05.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Linfeng, Ran Wang, and Jiagao Wu. "A time-inhomogeneous Markov chain and its distributed solution for message dissemination in OUSNs." Journal of Parallel and Distributed Computing 130 (August 2019): 179–92. http://dx.doi.org/10.1016/j.jpdc.2019.03.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Aslam, Muhammad Assad, Mir Farshid Alemdehy, Bingtao Hao, Peter H. L. Krijger, Colin E. J. Pritchard, Iris de Rink, Fitriari Izzatunnisa Muhaimin, et al. "The Ig heavy chain protein but not its message controls early B cell development." Proceedings of the National Academy of Sciences 117, no. 49 (November 23, 2020): 31343–52. http://dx.doi.org/10.1073/pnas.2004810117.

Full text
Abstract:
Development of progenitor B cells (ProB cells) into precursor B cells (PreB cells) is dictated by immunoglobulin heavy chain checkpoint (IgHCC), where the IgHC encoded by a productively rearrangedIghallele assembles into a PreB cell receptor complex (PreBCR) to generate signals to initiate this transition and suppressing antigen receptor gene recombination, ensuring that only one productiveIghallele is expressed, a phenomenon known asIghallelic exclusion. In contrast to a productively rearrangedIghallele, theIghmessenger RNA (mRNA) (IgHR) from a nonproductively rearrangedIghallele is degraded by nonsense-mediated decay (NMD). This fact prohibited firm conclusions regarding the contribution of stableIgHRto the molecular and developmental changes associated with the IgHCC. This point was addressed by generating theIghTer5H∆TMmouse model fromIghTer5Hmice having a premature termination codon at position +5 in leader exon ofIghTer5Hallele. This prohibited NMD, and the lack of a transmembrane region (∆TM) prevented the formation of any signaling-competent PreBCR complexes that may arise as a result of read-through translation across premature Ter5 stop codon. A highly sensitive sandwich Western blot revealed read-through translation ofIghTer5Hmessage, indicating that previous conclusions regarding a role ofIgHRin establishing allelic exclusion requires further exploration. As determined by RNA sequencing (RNA-Seq), this low amount of IgHC sufficed to initiate PreB cell markers normally associated with PreBCR signaling. In contrast, theIghTer5H∆TMknock-in allele, which generated stableIgHRbut no detectable IgHC, failed to induce PreB development. Our data indicate that the IgHCC is controlled at the level of IgHC and notIgHRexpression.
APA, Harvard, Vancouver, ISO, and other styles
48

Tan, Wenzhe, Yueting Chai, and Yi Liu. "A message-driving formalism for modeling and simulation of multi-agent supply chain systems." Journal of Systems Science and Systems Engineering 20, no. 4 (December 2011): 385–99. http://dx.doi.org/10.1007/s11518-011-5182-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ahmed, Idris, Anne James, and Dhananjay Singh. "Critical analysis of counter mode with cipher block chain message authentication mode protocol-CCMP." Security and Communication Networks 7, no. 2 (March 22, 2013): 293–308. http://dx.doi.org/10.1002/sec.733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Landar, Aimee L., Jaroslaw W. Zmijewski, Joo-Yeun Oh, and Victor M. Darley-Usmar. "Message from the cell's powerhouse: Mitochondrial signalling and redox therapeutics." Biochemist 27, no. 3 (June 1, 2005): 9–14. http://dx.doi.org/10.1042/bio02703009.

Full text
Abstract:
Some of the earliest studies in bioenergetics described a ‘leak’ of electrons from the mitochondrial respiratory chain to oxygen, with the resulting formation of the simple one-electron product, superoxide. Several lines of evidence led to the idea that this process is pathological. For example, formation of superoxide, and its dismutation product hydrogen peroxide, from the mitochondrion was enhanced by mitochondrial poisons and hyperoxia. Since these early beginnings, studies in the redox cell signalling field have shown that these same reactive oxygen species (ROS) and reactive nitrogen species (RNS), such as nitric oxide (NO), serve as signalling molecules in both physiological and pathological situations. These small molecules can act through several mechanisms, including the ability to act as reversible agonists for receptors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography