In peer-to-peer (P2P) networks, reputation aggregation and ranking are the most time-consuming and space-demanding operations. This paper proposes a new gossip protocol for fast score aggregation. We ...developed a Bloom filter architecture for efficient score ranking. These techniques do not require any secure hashing or fast lookup mechanism, thus are applicable to both unstructured and structured P2P networks. We report the design principles and performance results of a simulated GossipTrust reputation system. Randomized gossiping with effective use of power nodes enables light-weight aggregation and fast dissemination of global scores in O(log 2 n) time steps, where n is the P2P network size. The Gossip-based protocol is designed to tolerate dynamic peer joining and departure, as well as to avoid possible peer collusions. The scheme has a considerably low gossiping message overhead, i.e. O(n log 2 n) messages for n nodes. Bloom filters demand at most 512 KB memory per node for a 10,000-node network. We evaluate the performance of GossipTrust with distributed P2P file-sharing and parameter-sweeping applications. The simulation results demonstrate that GossipTrust has small aggregation time, low memory demand, and high ranking accuracy. These results suggest promising advantages of using the GossipTrust system for trusted P2P applications.
With the growing popularity of mobile devices, a new type of peer-to-peer communication mode for mobile cloud computing has been introduced. By applying a variety of short-range wireless ...communication technologies to establish connections with nearby mobile devices, we can construct a mobile cloudlet in which each mobile device can either works as a computing service provider or a service requester. Although the paradigm of mobile cloudlet is cost-efficient in handling computation-intensive tasks, the understanding of its corresponding service mode from a theoretic perspective is still in its infancy. In this paper, we first propose a new mobile cloudlet-assisted service mode named Opportunistic task Scheduling over Co-located Clouds (OSCC), which achieves flexible cost-delay tradeoffs between conventional remote cloud service mode and mobile cloudlets service mode. Then, we perform detailed analytic studies for OSCC mode, and solve the energy minimization problem by compromising among remote cloud mode, mobile cloudlets mode and OSCC mode. We also conduct extensive simulations to verify the effectiveness of the proposed OSCC mode, and analyze its applicability. Moreover, experimental results show that when the ratio of data size after task execution over original data size associated with the task is smaller than 1 (i.e., r <; 1) and the average meeting rate of two mobile devices λ is larger than 0:00014, our proposed OSCC mode outperforms existing service modes.
Hubs in the human brain support behaviors that arise from brain network interactions. Previous studies have identified hub regions in the human thalamus that are connected with multiple functional ...networks. However, the behavioral significance of thalamic hubs has yet to be established. Our framework predicts that thalamic subregions with strong hub properties are broadly involved in functions across multiple cognitive domains. To test this prediction, we studied human patients with focal thalamic lesions in conjunction with network analyses of the human thalamocortical functional connectome. In support of our prediction, lesions to thalamic subregions with stronger hub properties were associated with widespread deficits in executive, language, and memory functions, whereas lesions to thalamic subregions with weaker hub properties were associated with more limited deficits. These results highlight how a large-scale network model can broaden our understanding of thalamic function for human cognition.
Processing large volumes of data has presented a challenging issue, particularly in data-redundant systems. As one of the most recognized models, the conditional random fields (CRF) model has been ...widely applied in biomedical named entity recognition (Bio-NER). Due to the internally sequential feature, performance improvement of the CRF model is nontrivial, which requires new parallelized solutions. By combining and parallelizing the limited-memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) and Viterbi algorithms, we propose a parallel CRF algorithm called MapReduce CRF (MRCRF) in this paper, which contains two parallel sub-algorithms to handle two time-consuming steps of the CRF model. The MapReduce L-BFGS (MRLB) algorithm leverages the MapReduce framework to enhance the capability of estimating parameters. Furthermore, the MapReduce Viterbi (MRVtb) algorithm infers the most likely state sequence by extending the Viterbi algorithm with another MapReduce job. Experimental results show that the MRCRF algorithm outperforms other competing methods by exhibiting significant performance improvement in terms of time efficiency as well as preserving a guaranteed level of correctness.
This study investigated whether visit-to-visit fasting plasma glucose (FPG) variability, as measured by the coefficient of variation (CV), increased peripheral artery disease (PAD) risk.
Individuals ...with type 2 diabetes from the National Diabetes Care Management Program during the period 2002-2004, ≥ 30 years of age, and free of PAD (n = 30,932) were included and monitored until 2011. Cox proportional hazards regression models were implemented to analyze related determinants of PAD.
A total of 894 incident cases of PAD were identified during an average 8.2 years of follow-up, resulting in a crude incidence rate of 3.53 per 1000 person-years. Both FPG-CV and HbA1c were significantly associated with PAD after multivariate adjustment, with corresponding hazard ratios of 1.24 95% confidence interval (CI) 1.04-1.47 for FPG-CV in the third tertile and 1.50 (95% CI 1.10-2.04) for HbA1c ≥ 10%. The findings of the sensitivity analysis remained consistent after excluding potential confounders, demonstrating the consistency of the results.
The associations between HbA1c, variability in FPG-CV, and PAD suggest a linked pathophysiological mechanism, suggesting the crucial role of glycemic variability in clinical management and therapeutic goals in preventing PAD in type 2 diabetes.
The introduction of left ventricular assist device (LVAD) has improved survival rates for patients with end-stage heart failure. Two categories of VADs exist: one generates pulsatile flow and the ...other produces nonpulsatile continuous flow. Survival is better for patients with continuous-flow LVADs. With improved survival, more of such patients now present for noncardiac surgery (NCS). This review, written for the general anesthesiologists, addresses the perioperative considerations when the patient undergoes NCS. For best outcomes, a multidisciplinary approach is essential in perioperative management of the patient.
This paper presents a new distributed approach to detecting DDoS (distributed denial of services) flooding attacks at the traffic-flow level The new defense system is suitable for efficient ...implementation over the core networks operated by Internet service providers (ISPs). At the early stage of a DDoS attack, some traffic fluctuations are detectable at Internet routers or at the gateways of edge networks. We develop a distributed change-point detection (DCD) architecture using change aggregation trees (CAT). The idea is to detect abrupt traffic changes across multiple network domains at the earliest time. Early detection of DDoS attacks minimizes the floe cling damages to the victim systems serviced by the provider. The system is built over attack-transit routers, which work together cooperatively. Each ISP domain has a CAT server to aggregate the flooding alerts reported by the routers. CAT domain servers collaborate among themselves to make the final decision. To resolve policy conflicts at different ISP domains, a new secure infrastructure protocol (SIP) is developed to establish mutual trust or consensus. We simulated the DCD system up to 16 network domains on the Cyber Defense Technology Experimental Research (DETER) testbed, a 220-node PC cluster for Internet emulation experiments at the University of Southern California (USC) Information Science Institute. Experimental results show that four network domains are sufficient to yield a 98 percent detection accuracy with only 1 percent false-positive alarms. Based on a 2006 Internet report on autonomous system (AS) domain distribution, we prove that this DDoS defense system can scale well to cover 84 AS domains. This security coverage is wide enough to safeguard most ISP core networks from real-life DDoS flooding attacks.
Thalamocortical interaction is a ubiquitous functional motif in the mammalian brain. Previously (Hwang et al., 2021), we reported that lesions to network hubs in the human thalamus are associated ...with multi-domain behavioral impairments in language, memory, and executive functions. Here, we show how task-evoked thalamic activity is organized to support these broad cognitive abilities. We analyzed functional magnetic resonance imaging (MRI) data from human subjects that performed 127 tasks encompassing a broad range of cognitive representations. We first investigated the spatial organization of task-evoked activity and found a basis set of activity patterns evoked to support processing needs of each task. Specifically, the anterior, medial, and posterior-medial thalamus exhibit hub-like activity profiles that are suggestive of broad functional participation. These thalamic task hubs overlapped with network hubs interlinking cortical systems. To further determine the cognitive relevance of thalamic activity and thalamocortical functional connectivity, we built a data-driven thalamocortical model to test whether thalamic activity can be used to predict cortical task activity. The thalamocortical model predicted task-specific cortical activity patterns, and outperformed comparison models built on cortical, hippocampal, and striatal regions. Simulated lesions to low-dimensional, multi-task thalamic hub regions impaired task activity prediction. This simulation result was further supported by profiles of neuropsychological impairments in human patients with focal thalamic lesions. In summary, our results suggest a general organizational principle of how the human thalamocortical system supports cognitive task activity.
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and low-rate in attack ...volume, very different from the flooding type of attacks. They are launched with high narrow spikes in very low frequency, periodically. Thus, shrew attacks may endanger the victim systems for a long time without being detected. In other words, such attacks may reduce the quality of services unnoticeably. Our defense method calls for
collaborative detection and filtering (CDF) of shrew DDoS attacks. We detect shrew attack flows hidden in legitimate TCP/UDP streams by spectral analysis against pre-stored template of average attack spectral characteristics. This novel scheme is suitable for either software or hardware implementation.
The CDF scheme is implemented with the NS-2 network simulator using real-life Internet background traffic mixed with attack datasets used by established research groups. Our simulated results show high detection accuracy by merging alerts from cooperative routers. Both theoretical modeling and simulation experimental results are reported here. The experiments achieved up to 95% successful detection of network anomalies along with a low 10% false positive alarms. The scheme cuts off malicious flows containing shrew attacks using a newly developed packet-filtering scheme. Our filtering scheme retained 99% of legitimate TCP flows, compared with only 20% TCP flows retained by using the Drop Tail algorithm. The paper also considers DSP, FPGA, and network processor implementation issues and discusses limitations and further research challenges.
Beyond the Recycle of Raw Chicken Fat Hwang, Kai-Neng; Tung, Huey-Ping; Shaw, Huey-Mei
Journal of Oleo Science,
01/2020, Volume:
69, Issue:
3
Journal Article
Open access
The wasted raw fat of chicken was extracted and recrystallized with slowly stir at various cooling temperature to get a clear out-looking and liquid chicken oil. The recovery percentage of liquid ...chicken oil is about 100, 87, 78, 49 and 0% at 25, 21, 17, 13 and 9°C. The chicken liquid oil has a new composition of fatty acids than the original oil (p < 0.05) and has a safety range in acid value and peroxide value. The fatty acid ratio of the liquid chicken oil obtained at 13°C to be 1:1.6:0.9 (SFA: MUFA: PUFA) is believed to be good dietary oil. The concept of ideal fatty acid ratio comes from Hayes’ report (1:1.5:1, SFA: MUFA: PUFA) which is also found to mimic to human lipid fatty acid ratio. Statistically evaluation on Hayes’ basis, it showed that the liquid chicken oil scored even better than the extra virgin olive oil. In conclusion, this study not only first open a new gate for the recycle of global raw chicken fat to a dietary oil but also give an evidence that the chicken oil seems more compatible to human lipid on the hypothetic basis of biocompatibility.