A large percentage of older Americans are at risk for malnutrition. This puts them at risk for premature institutionalization, creating a financial burden. The objective of this survey was to determine the nutritional health of clients receiving home delivered meals in Lake County, Indiana and the impact that home delivered meals had on them. Nutrition Screening Initiative (NSI) Determine Your Nutritional Health Checklists were mailed to recipients of meals; 58.3% were returned. Twenty-eight percent were found to be at no nutritional risk, 39% at moderate nutritional risk and 33% at high nutritional risk. One-hundred-thirty clients that scored three or more on the "Checklist" were visited by a Registered Dietitian for further screening using the NSI Level I Screen. This screen found many nutritional problems but the fact that the clients did receive home delivered meals decreased the risk. It was determined by the author that 68% of these clients could not function in their own homes without home delivered meals. 相似文献
In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.
Wireless Personal Communications - In the recent past, the Cognitive Radio Network (CRN) plays significant role in mobile technology for energy efficient wireless 5G communication. The Non... 相似文献
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table. 相似文献
The recent research in biocompatible materials has been useful in replacing and supporting the fractured natural human bones/joints. Under some condition, negative reaction like release of ions from the bare metal toward the human body fluid leads to corrosion. In this proposed research paper, the biocompatibility of the laser surface-modified austenitic stainless steel (SS316L) and nickel-based superalloy (Inconel 718) was studied. The investigation on laser-modified surfaces is evaluated through electrochemical polarization analysis using simulated body fluid (SBF). The samples subjected to electrochemical polarization analysis were characterized by optical image analysis, SEM, EDS, and XRD analysis. It was inferred that laser surface-modified materials provided enhanced corrosion resistance and bare nickel alloy is more susceptible to corrosion by SBF. 相似文献
The inverse problem of reconstructing the location and size of defects in a coated metallic pipe from single frequency limited view electromagnetic scattered field is considered. Specifically, the paper addresses the problem of assessing shape changes in the shadow region entailed by limited view data in 2D by operating in an intermediate size parameter (ka) range. The inverse scattering problem is formulated as a non-linear optimization problem solved through genetic algorithm that seeks to minimize in the least-squared sense the difference between measured data and simulated data through iterations of the solution to a forward problem. The hybrid finite element boundary integral formulations were used to solve the forward problem of coated metallic pipe with defects. The proposed inversion methodology was applied for shadow region shape change assessment to determine whether a metal pipe is coated or not, and to reconstruct the location and size of corrosion-like defect, over a range of size parameters. The study is carried out using transverse electric and transverse magnetic polarized fields. To understand the effect of coating on backscattered fields, parametric studies are conducted using numerical data. A range for size parameter \(2.0\le ka\le 4\) was found to produce the highest contrast between defect free pipe and coated metallic pipes with defects in the deep shadow region. The experiments are carried out using vector network analyzer in an anechoic chamber. The inversion results obtained using measured data were found be in good agreement with inversion results obtained using synthetic data. Estimated extent of corrosion in deep shadow region of a coated metallic pipe was found to be within 9 % of actual extent of corrosion. 相似文献
Near infrared (NIR) light utilization in a range of current technologies has gained huge significance due to its abundance in nature and nondestructive properties. NIR active lanthanide (Ln) doped upconversion nanomaterials synthesized in controlled shape, size, and surface functionality can be combined with various pertinent materials for extensive applications in diverse fields. Upconversion nanophosphors (UCNP) possess unique abilities, such as deep tissue penetration, enhanced photostability, low toxicity, sharp emission peaks, long anti‐Stokes shift, etc., which have bestowed them with prodigious advantages over other conventional luminescent materials. As new generation fluorophores, UCNP have found a wide range of applications in various fields. In this Review, a comprehensive overview of lanthanide doped NIR active UCNP is provided by discussing the fundamental concepts including the different mechanisms proposed for explaining the upconversion processes, followed by the different strategies employed for the synthesis of these materials, and finally the technological applications of UCNP, mainly in the fields of bioimaging, drug delivery, sensing, and photocatalysis by highlighting the recent works in these areas. In addition, a brief note on the applications of UCNP in other fields is also provided along with the summary and future perspectives of these materials. 相似文献
Monocytes/macrophages (M/M) and CD4+ T cells are two important targets of human immunodeficiency virus (HIV) infection. Different strains of HIV-1 vary markedly in their abilities to infect cells belonging to the M/M lineage. Macrophagetropic (M-tropic) HIV-1 strains replicate well in primary lymphocytes as well as in primary macrophages; however, they generally infect T-cell lines poorly, if at all. Although promonocytic cell lines such as U937 have been used as in vitro models of HIV-1 infection of M/M, these cell lines are susceptible to certain T-cell-tropic (T-tropic) HIV-1 strains but are resistant to M-tropic HIV-1. In this study, we demonstrate that (i) certain U937 clones ("plus" clones), which are susceptible only to T-tropic HIV-1, become highly susceptible to M-tropic HIV-1 upon differentiation with retinoic acid (RA); (ii) other U937 clones ("minus" clones), which are resistant to both T- and M-tropic HIV-1, remain resistant to both viruses; and (iii) RA treatment induces expression of CCR5, a fusion/entry cofactor for M-tropic HIV-1 in both types of U937 clones, and yet enhances the fusogenicity of the plus clones, but not the minus clones, with M-tropic Env's. These results indicate that the major restriction of M-tropic HIV-1 infection in promonocytic cells occurs at the fusion/entry level, that differentiation into macrophage-like phenotypes renders some of these cells highly susceptible to infection with M-tropic HIV-1, and that CD4 and CCR5 may not be the only determinants of fusion/entry of M-tropic HIV-1 in these cells. 相似文献