GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Electronic data processing -- Distributed processing. ; Electronic books.
    Description / Table of Contents: This book examines leading research and developments in Internet technology, including contributions from academic researchers as well as industry experts discussing new paradigms in Software, Protocols, Supply Chain Management, Security and Cloud Computing.
    Type of Medium: Online Resource
    Pages: 1 online resource (83 pages)
    Edition: 1st ed.
    ISBN: 9783642354618
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.203
    Language: English
    Note: Title Page -- Preface -- Contents -- Enhanced Mobile Ad hoc Routing Protocol Using Cross Layer Design in Wireless Sensor Networks -- Introduction -- Theory -- IEEE 802.15.4 Standard -- Ad hoc On-Demand Distance Vector (AODV) Protocol -- Cross Layer Design -- Propose Energy Weigh - AODV Protocol -- The Simulation -- Result and Performance Analysis -- Conclusion -- References -- Decision Support in Supply Chain Management for Disaster Relief in Somalia -- Introduction -- The Importance of Disaster Management -- Somalia as a Case Study -- Literature Review -- Problem Variants -- Existing Solutions -- Preemptive Multiobjective Programming -- Research Methodology -- Preemptive Optimization -- Data Gathering -- Results and Findings -- Conclusion and Future Work -- References -- Challenges in Cloud Environment -- System Quality Attributes -- Portability -- Recoverability -- Maintainability -- Transparency and Control -- Security -- OS Support -- RHEL Migration on AWS Cloud - An Experience -- Amazon as-is Architecture -- Migration from DevPay to Hourly on Demand -- Infrastructure as Code -- Recommendations -- Manageability -- Configurability -- Maintainability -- Portability -- Conclusion -- Challenges on Amazon Cloud in Load Balancing, Performance Testing and Upgrading -- Hosting a Web Application on Cloud -- Issues with Traditional Infrastructure -- Typical Web Application Topology -- Web Application on AWS -- Components Used -- Learning and Recommendations -- Load Balancers -- Auto Discovery of EC2 Nodes -- Performance Testing Environment -- Application Setup -- Load Generation Strategy -- Measurable Parameters -- Test Results -- Observations -- Recommendation -- Learning -- Conclusion -- A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment -- Introduction -- Objectives -- Resource Manager -- Related Work. , Rule Based Resource Manager -- Experimental Evaluation -- Conclusion -- References -- Browser Based IDE to Code in the Cloud -- Introduction -- Cloud Computing -- Integrated Development Environment -- Browser Based Integrated Development Environment -- Real Time Collaboration -- Forums -- Technical Blogs -- Existing Browser Based Coding Environment -- Cloud9 IDE -- CodeRun Studio [7] -- Eclipse Orion [8] -- Ideone -- eXo Cloud IDE -- Proposed System -- Design -- Real Time Collaboration -- Integrated Forum -- Technical Blogs -- Conclusion -- Zero Knowledge Password Authentication Protocol -- Introduction -- Motivation -- Contribution -- Organization of Paper -- Notations and Definitions -- Notations -- Definitions -- Relevance to Prior Work -- Cryptographic Primitives -- The Proposed Security Protocol : Zero Knowledge Password Authentication Protocol (ZK-PAP) -- ZK-PAP with PKE -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2011-04-16
    Description: Transforming growth factor-beta (TGFbeta) signaling drives aneurysm progression in multiple disorders, including Marfan syndrome (MFS), and therapies that inhibit this signaling cascade are in clinical trials. TGFbeta can stimulate multiple intracellular signaling pathways, but it is unclear which of these pathways drives aortic disease and, when inhibited, which result in disease amelioration. Here we show that extracellular signal-regulated kinase (ERK) 1 and 2 and Smad2 are activated in a mouse model of MFS, and both are inhibited by therapies directed against TGFbeta. Whereas selective inhibition of ERK1/2 activation ameliorated aortic growth, Smad4 deficiency exacerbated aortic disease and caused premature death in MFS mice. Smad4-deficient MFS mice uniquely showed activation of Jun N-terminal kinase-1 (JNK1), and a JNK antagonist ameliorated aortic growth in MFS mice that lacked or retained full Smad4 expression. Thus, noncanonical (Smad-independent) TGFbeta signaling is a prominent driver of aortic disease in MFS mice, and inhibition of the ERK1/2 or JNK1 pathways is a potential therapeutic strategy for the disease.〈br /〉〈br /〉〈a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3111087/" target="_blank"〉〈img src="https://static.pubmed.gov/portal/portal3rc.fcgi/4089621/img/3977009" border="0"〉〈/a〉   〈a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3111087/" target="_blank"〉This paper as free author manuscript - peer-reviewed and accepted for publication〈/a〉〈br /〉〈br /〉〈span class="detail_caption"〉Notes: 〈/span〉Holm, Tammy M -- Habashi, Jennifer P -- Doyle, Jefferson J -- Bedja, Djahida -- Chen, YiChun -- van Erp, Christel -- Lindsay, Mark E -- Kim, David -- Schoenhoff, Florian -- Cohn, Ronald D -- Loeys, Bart L -- Thomas, Craig J -- Patnaik, Samarjit -- Marugan, Juan J -- Judge, Daniel P -- Dietz, Harry C -- P01 AR049698/AR/NIAMS NIH HHS/ -- P01 AR049698-07/AR/NIAMS NIH HHS/ -- R01 AR041135/AR/NIAMS NIH HHS/ -- R01 AR041135-12/AR/NIAMS NIH HHS/ -- R01 AR041135-17/AR/NIAMS NIH HHS/ -- Howard Hughes Medical Institute/ -- Intramural NIH HHS/ -- New York, N.Y. -- Science. 2011 Apr 15;332(6027):358-61. doi: 10.1126/science.1192149.〈br /〉〈span class="detail_caption"〉Author address: 〈/span〉Howard Hughes Medical Institute and Institute of Genetic Medicine, Johns Hopkins University School of Medicine, Baltimore, MD 21205, USA.〈br /〉〈span class="detail_caption"〉Record origin:〈/span〉 〈a href="http://www.ncbi.nlm.nih.gov/pubmed/21493862" target="_blank"〉PubMed〈/a〉
    Keywords: Animals ; Anthracenes/pharmacology/therapeutic use ; Aorta/pathology ; Aortic Aneurysm/*metabolism/pathology/physiopathology/prevention & control ; Diphenylamine/analogs & derivatives/pharmacology/therapeutic use ; Disease Models, Animal ; Disease Progression ; Enzyme Activation ; Losartan/pharmacology/therapeutic use ; *MAP Kinase Signaling System ; Marfan Syndrome/drug therapy/*metabolism/pathology ; Mice ; Mitogen-Activated Protein Kinase 1/antagonists & inhibitors/*metabolism ; Mitogen-Activated Protein Kinase 3/antagonists & inhibitors/*metabolism ; Mitogen-Activated Protein Kinase 8/antagonists & inhibitors/metabolism ; Protein Kinase Inhibitors/pharmacology/therapeutic use ; Smad2 Protein/metabolism ; Smad4 Protein/deficiency/genetics ; Sulfonamides/pharmacology/therapeutic use ; Transforming Growth Factor beta/antagonists & inhibitors/immunology/*metabolism
    Print ISSN: 0036-8075
    Electronic ISSN: 1095-9203
    Topics: Biology , Chemistry and Pharmacology , Computer Science , Medicine , Natural Sciences in General , Physics
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...