scholarly journals TailTimer: A device for automating data collection in the rodent tail immersion assay

PLoS ONE ◽  
2021 ◽  
Vol 16 (8) ◽  
pp. e0256264
Author(s):  
Mallory E. Udell ◽  
Jie Ni ◽  
Angel Garcia Martinez ◽  
Megan K. Mulligan ◽  
Eva E. Redei ◽  
...  

The tail immersion assay is a widely used method for measuring acute thermal pain in a way which is quantifiable and reproducible. It is non-invasive and measures response to a stimulus that may be encountered by an animal in its natural environment. However, quantification of tail withdrawal latency relies on manual timing of tail flick using a stopwatch, and precise temperatures of the water at the time of measurement are most often not recorded. These two factors greatly reduce the reproducibility of tail immersion assay data and likely contribute to some of the discrepancies present among relevant literature. We designed a device, TailTimer, which uses a Raspberry Pi single-board computer, a digital temperature sensor, and two electrical wires, to automatically record tail withdrawal latency and water temperature. We programmed TailTimer to continuously display and record water temperature and to only permit the assay to be conducted when the water is within ± 0.25°C of the target temperature. Our software also records the identification of the animals using a radio frequency identification (RFID) system. We further adapted the RFID system to recognize several specific keys as user interface commands, allowing TailTimer to be operated via RFID fobs for increased usability. Data recorded using the TailTimer device showed a negative linear relationship between tail withdrawal latency and water temperature when tested between 47–50°C. We also observed a previously unreported, yet profound, effect of water mixing speed on latency. In one experiment using TailTimer, we observed significantly longer latencies following administration of oral oxycodone versus a distilled water control when measured after 15 mins or 1 h, but not after 4 h. TailTimer also detected significant strain differences in baseline latency. These findings valorize TailTimer in its sensitivity and reliability for measuring thermal pain thresholds.

2020 ◽  
Author(s):  
Mallory E. Udell ◽  
Angel Garcia Martinez ◽  
Tengfei Wang ◽  
Jie Ni ◽  
Christian Hurt ◽  
...  

AbstractThe tail immersion assay is a widely used method for measuring acute thermal pain in a way which is quantifiable and reproducible. It is non-invasive and measures response to a stimulus that may be encountered by an animal in its natural environment. However, tail withdrawal latency data are usually collected manually, and precise temperatures of the water at the time of measurement are most often not recorded. These two factors can reduce the reproducibility of tail immersion assay data. We designed a device, TailTimer, which uses the Raspberry Pi single-board computer and a temperature sensor, to automatically record both tail withdrawal latency and water temperature. The device has a radio frequency identification (RFID) system that can record the ID of animals. Our software recognizes several specific RFID keys as user interface commands, which allows TailTimer to be operated via RFID fobs. We also programmed the device to only allow tests to be conducted when the water is within ± 0.25 °C of the target temperature. Data recorded using the TailTimer device showed a linear relationship between tail withdrawal latency and water temperature when tested between 47 - 50 °C. We also observed a profound effect of water mixing speed on tail withdrawal latency. Our data further revealed significant strain and sex differences, valorizing TailTimer in its ability to detect genetically-determined variations in thermal pain sensitivity.Significance StatementQuantification of tail withdrawal latency in response to thermal pain has essentially remained the same since the method was first introduced decades ago and relies on manual recording of water temperature and tail withdrawal latency. Such manual methods engender relatively substantial variability and are potential contributors to some of the discrepancies present among relevant research. The open source TailTimer device we report here is simple and inexpensive to manufacture. The RFID-based user interface is ergonomic, especially in animal facilities where space is limited and gloves are mandatory. We anticipate that the increased reproducibility of tail withdrawal latency provided by TailTimer will augment its utility in nociception and addiction research.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


This paper discourses about a very general problem that occurs in everyday life. In many universities, students are at risk of misplacement or theft of valuables. So, to avoid such mis happening, the development of security system was designed for providing the safety of university student belongings. The proposed security system contains some common information, methodology, schematics and some details related to technical field that is employed into the system, such as RFID (Radio Frequency Identification) and barcode readers along with the design of the established system. For the functioning of the system in a most effectively manner, assumptions with some specific requirements that is needed to be met are encompassed in this paper


IoT (Internet of Things) made headway from Machine to Machine communication without human intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26 times more connected things than people. Hence, the concern of security rises along with the high installments. The BlockChain Technology takes place of all central entities, which is peer to peer communication with the distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification) reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the previous block must match with the previous hash of the next block. Then only the blocks of data are secured. While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly offered by the blockchain technology and how can we easily identify if the data has been tampered along the way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets in this paper.


2018 ◽  
Vol 23 (4) ◽  
pp. 614-628 ◽  
Author(s):  
Debbie Watson ◽  
Chloe Meineck ◽  
Beth Lancaster

This article presents an innovative project to develop and trial a prototype product called ‘trove’ to start to address challenges identified regarding current practice of life story work with children who are looked after and adopted. trove is a digitally enhanced memory box that utilises raspberry pi (a small single board computer) and radio-frequency identification (RFID) technologies to enable children to record their memories and to attach these to their precious objects using an electronic tag: providing a safe ‘container’ for their mementoes and memories. Located in theories of narrative identity and object attachment and drawing on Brodinsky’s concept of communicative openness, we describe the children’s engagements in the design and report the results of a small trial of 10 troves with adopted children in England.


2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Sign in / Sign up

Export Citation Format

Share Document