sink location
Recently Published Documents


TOTAL DOCUMENTS

90
(FIVE YEARS 15)

H-INDEX

13
(FIVE YEARS 1)

Author(s):  
Thibault Bourdin ◽  
Alizée Monnier ◽  
Marie-Ève Benoit ◽  
Emilie Bédard ◽  
Michèle Prévost ◽  
...  

Molecular typing methods are used to characterize the relatedness between bacterial isolates involved in infections. These approaches rely mostly on discrete loci or whole genome sequences (WGS) analyses of pure cultures. On the other hand, their application to environmental DNA profiling to evaluate epidemiological relatedness amongst patients and environments has received less attention. We developed a specific, high-throughput short sequence typing (HiSST) method for the opportunistic human pathogen Serratia marcescens . Genes displaying the highest polymorphism were retrieved from the core genome of 60 S. marcescens strains. Bioinformatics analyses showed that use of only three loci (within bssA , gabR and dhaM ) distinguished strains with a high level of efficiency. This HiSST scheme was applied to an epidemiological survey of S. marcescens in a neonatal intensive care unit (NICU). In a first case study, a strain responsible for an outbreak in the NICU was found in a sink drain of this unit, by using HiSST scheme and confirmed by WGS. The HiSST scheme was also applied to environmental DNA extracted from sink-environment samples. Diversity of S. marcescens was modest, with 11, 6 and 4 different sequence types (ST) of gabR , bssA and dhaM loci amongst 19 sink drains, respectively. Epidemiological relationships amongst sinks were inferred on the basis of pairwise comparisons of ST profiles. Further research aimed at relating ST distribution patterns to environmental features encompassing sink location, utilization and microbial diversity is needed to improve the surveillance and management of opportunistic pathogens. Importance Serratia marcescens is an important opportunistic human pathogen, multidrug resistant and often involved in outbreaks of nosocomial infections in neonatal intensive care unit. Here, we propose a quick and user-friendly method to select the best typing scheme for nosocomial outbreaks in relating environmental and clinical sources. This method, named high-throughput short sequence typing (HiSST), allows to distinguish strains and to explore the diversity profile of non-culturable S. marcescens . The application of HiSST profile analysis for environmental DNA offers new possibilities to track opportunistic pathogens, identify their origin and relate their distribution pattern with environmental features encompassing sink location, utilization and microbial diversity. Adaptation of the method to other opportunistic pathogens is expected to improve knowledge regarding their ecology, which of significant interest for epidemiological risk assessment and elaborate outbreak mitigation strategies.


2021 ◽  
Vol 9 (4) ◽  
pp. 449
Author(s):  
Diky Rizky Awan ◽  
Agus Muliantara

Currently, the whole world is experiencing a pandemic outbreak of the COVID-19 virus, which is an infectious disease that is one of the types of coronavirus. Transmission of this virus can go through the surrounding goods that are touched by the hand so it is recommended to always maintain hand hygiene by washing hands with water and soap. Not at every entrance in Niti Mandala Renon field, there is a sink and no information about the location of the sink in this field, which can cause the community to be confused due to lack of information. Augmented Reality (AR) applications can be used to solve this problem because with AR can explain more interactive information because the information displayed through 3D objects is directly applied to the real world visually. In this case, AR is used to display the map of sink location information with an interactive 3D model that can be rotated and zoomed to help the community easily get the information. This application use marker-based AR with multi-target so that each map information is stored and display on the different marker. Users only need to install the application on their android device and scan the QR code provided, then the 3D map object will be displayed according to the registered marker. Based on testing this study gets a 100% success rate in functional aspects.


2021 ◽  
Vol 2 (10) ◽  
pp. 83-98
Author(s):  
Debbie Zubrick Romani ◽  

What if the world simply changed around you? How would you know and accept the new reality? In this work of philosophical short fiction, Mary walks into her kitchen one morning and finds the sink has changed locations. It is literally, in a different part of the kitchen from where she remembers it the day before! Everyone else in her family says the new sink location is where it has always been. How on earth would you even move a sink overnight? There is nothing wrong with Mary. She has no mental disease. She correctly remembers the sink location the day before. It has simply moved, but she is the only one who knows it. In this new world she is also an artist and, it seems, has been a very good one for many years. What else could have changed? And how did the woman she was in her youth become the person she is discovering today?


Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7282
Author(s):  
Cheonyong Kim ◽  
Sangdae Kim ◽  
Hyunchong Cho ◽  
Sangha Kim ◽  
Seungmin Oh

In wireless sensor networks (WSNs), detection and report of continuous object, such as forest fire and toxic gas leakage, is one of the major applications. In large-scale continuous object tracking in WSNs, there might be many source nodes simultaneously, detecting the continuous object. Each nodes reports its data to both a base station and mobile workers in the industry field. For communication between the source nodes and a mobile worker, sink location service is needed to continuously notify the location of the mobile worker. But, as the application has a large number of sources, it causes a waste of energy consumption. To address this issue, in this paper, we propose a two-phase sink location service scheme. In the first phase, the proposed scheme constructs a virtual grid structure for merging the source nodes. Then, the proposed scheme aggregates the merging points from an originated merging point as the second phase. Simulation results show that the proposed scheme is superior to other schemes in terms of energy consumption.


In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink’s location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet. The simulation results prove that EESLP can improve network life time and QOS (congestion, throughput, packet delivery rate) of sensor network while protecting sinks Location privacy.


Author(s):  
Taibo Luo ◽  
Hongmei Li ◽  
Shaofeng Ru ◽  
Weitian Tong ◽  
Yinfeng Xu

Author(s):  
Chitra Rajarama ◽  
Jagadeesha Narasimhamurthy Sugatoor ◽  
Yerri Swamy T

A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.


Sign in / Sign up

Export Citation Format

Share Document