WorldWideScience

Sample records for adaptive medium access

  1. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  2. Traffic-adaptive, flow-specific medium access for wireless networks

    Walker, T. Owens; Tummala, Murali; McEachen, John

    2009-01-01

    In this report, we formally introduce the novel concept of traffic-adaptive, flow-specific medium access control and show that it outperforms contention, non-contention and hybrid medium access schemes. A traffic-adaptive, flow-specific mechanism is proposed that utilizes flow-specific queue size statistics to select between medium access modes. A general model for traffic adaptive, flow-specific medium access control is developed and it is shown that hybrid medium access as well as traditio...

  3. AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming

    Richa, Andrea; Schmid, Stefan; Zhang, Jin

    2010-01-01

    Intentional interference constitutes a major threat for communication networks operating over a shared medium and where availability is imperative. Jamming attacks are often simple and cheap to implement. In particular, today's jammers can perform physical carrier sensing in order to disrupt communication more efficiently, specially in a network of simple wireless devices such as sensor nodes, which usually operate over a single frequency (or a limited frequency band) and which cannot benefit from the use of spread spectrum or other more advanced technologies. This paper proposes the medium access (MAC) protocol \\textsc{AntiJam} that is provably robust against a powerful reactive adversary who can jam a $(1-\\epsilon)$-portion of the time steps, where $\\epsilon$ is an arbitrary constant. The adversary uses carrier sensing to make informed decisions on when it is most harmful to disrupt communications; moreover, we allow the adversary to be adaptive and to have complete knowledge of the entire protocol history....

  4. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  5. Efficient Distributed Medium Access

    Shah, Devavrat; Tetali, Prasad

    2011-01-01

    Consider a wireless network of n nodes represented by a graph G=(V, E) where an edge (i,j) models the fact that transmissions of i and j interfere with each other, i.e. simultaneous transmissions of i and j become unsuccessful. Hence it is required that at each time instance a set of non-interfering nodes (corresponding to an independent set in G) access the wireless medium. To utilize wireless resources efficiently, it is required to arbitrate the access of medium among interfering nodes properly. Moreover, to be of practical use, such a mechanism is required to be totally distributed as well as simple. As the main result of this paper, we provide such a medium access algorithm. It is randomized, totally distributed and simple: each node attempts to access medium at each time with probability that is a function of its local information. We establish efficiency of the algorithm by showing that the corresponding network Markov chain is positive recurrent as long as the demand imposed on the network can be supp...

  6. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    Maria Sefuba

    2015-09-01

    Full Text Available This paper presents an Energy Efficient Medium Access Control (MAC protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN. This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH, and the base station (BS. The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI for the relay cluster head (RCH. An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  7. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay. PMID:20703634

  8. Distributed medium access control in wireless networks

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  9. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  10. Random Access Game and Medium Access Control Design

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  11. Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks

    Mullins, Barry E.

    1997-01-01

    An adaptive MAC protocol is developed and analyzed that offers a "best case" scenario by allowing the MAC to control medium parameters thereby fully exploiting the channel of an ad hoc wireless LAN. This new, opportunistic medium access control protocol is called CATER (Code Adapts To Enhance Reliability) and is based on the proposed MAC standard for wireless local area networks (WLAN)-IEEE 802.11 [IEE96]. As currently proposed, IEEE 802.11 uses a fixed pseudo-noise (PN) code for spreading ...

  12. Accessing International Funding for Climate Change Adaptation

    Christiansen, Lars; Ray, Aaron D.; Smith, Joel B.;

    The primary aim of this guidebook is to provide countries participating in the Technology Needs Assessment (TNA) Project with practical guidance that will help them secure financing for adaptation technology transfer project profiles identified in their Technology Action Plans (TAPs). The TNA...... project is being implemented by United Nations Environment Programme (UNEP) on behalf of the Global Environment Facility (GEF). This guidebook provides a number of concrete tools and recommendations that will help TNA countries identify and access funding to implement their TAPs, such as: • An overview of...... eligibility criteria) for developing/ presenting adaptation project ideas to international donors. Using this format when communicating project ideas to international donors and agencies is likely to facilitate greater interest and increase the chances of successfully accessing available funding (Chapter 3...

  13. Evaluating accessible adaptable e-learning

    Douce, Christopher; Porch, Wendy

    2009-01-01

    Two different approaches can increase the accessibility of digital educational materials: content that has been built with the widest possible set of users in mind (universal design), or content that has been designed in such a way that it can be personalised to individual user needs and preferences (personalised design). This paper outlines a number of approaches that could be used to evaluate the provision of learning materials that have been adapted to or chosen for individual learners. A ...

  14. Small and Medium Enterprises` (SMEs) Access to Finance: Philippines

    Aldaba, Rafaelita M.

    2012-01-01

    Based on a survey of 97 firms in the garments, textiles, automotive, electrical and electronics, and food manufacturing industries; the paper highlights the difficulties faced by small and medium enterprises (SMEs) in accessing finance. For both firms with access to finance as well as those that did not make any finance request, financing obstacles posed as one of the top four serious problems for the growth of their businesses. The survey indicates the continued dependence of SMEs on interna...

  15. Efficient medium access control protocol for geostationary satellite systems

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  16. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  17. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Abdul Razaque; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  18. Collision-free prioritized medium access control in wireless networks with hidden nodes

    Andersson, Björn; Pereira, Nuno; Tovar, Eduardo

    2006-01-01

    We propose a collision-free medium access control (MAC) protocol, which implements static-priority scheduling and works in the presence of hidden nodes. The MAC protocol allows multiple masters and is fully distributed; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to sense the channel while transmitting to the channel. Our protocol is collision-free even in...

  19. Animal Locomotion in Different Mediums: The Adaptations of Wetland Organisms

    2016-06-01

    Wetlands are repositories of unique biodiversity. Wetlandorganisms are well adapted to their habitat, lying at theinterface of aquatic and terrestrial environments. In order tounderstand their adaptations in a better way, it is essential tograsp the basic properties of the medium in which variousorganisms live. This is attempted here by first examining theproperties of the two contrasting environments, terrestrialand aquatic. We focus primarily on locomotion, touchingupon related life processes like respiration, body size andmaintaining body balance by employing basic principles ofbiology and physics.

  20. The impact of energy constraints on the medium access

    Gkatzikis, Lazaros; Koutsopoulos, Iordanis

    2011-01-01

    Contemporary mobile devices are battery powered and due to their shrinking size and increasing complexity operate on a tight energy budget. Thus, energy consumption is becoming one of the major concerns regarding the current and upcoming wireless communication systems. On the other hand, the available bandwidth resources are limited and modern applications are throughput demanding, leading thus to strong competition for the medium. In this direction, we consider a stochastic contention based medium access scheme, where the devices may choose to turn off for some time in order to save energy. We perform an analysis for a slotted ALOHA scenario and we show that the energy constraints, if properly exploited, may reduce contention for the medium. Our results give valuable insights on the energy--throughput tradeoff for any contention based system.

  1. Analyzing Medium Access Techniques in Wireless Body Area Networks

    N. Javaid

    2014-01-01

    Full Text Available This paper presents comparison of Access Techniques used in Medium Access Control (MAC protocol for Wireless Body Area Networks (WBANs. Comparison is performed between Time Division Multiple Access (TDMA, Frequency Division Multiple Access (FDMA, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA, Pure ALOHA and Slotted ALOHA (S-ALOHA. Performance metrics used for comparison are Throughput (T, Delay (D and Offered Load (G. The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.

  2. Adapting the Medium: Dynamics of Intermedial Adaptation in Contemporary Japanese Popular Visual Culture

    Pusztai Beáta

    2015-08-01

    Full Text Available With respect to adaptation studies, contemporary Japanese popular culture signifies a unique case, as different types of media (be those textual, auditive, visual or audio-visual are tightly intertwined through the “recycling” of successful characters and stories. As a result, a neatly woven net of intermedial adaptations has been formed - the core of this complex system being the manga-anime-live-action film “adaptational triangle.” On the one hand, the paper addresses the interplay of the various factors by which the very existence of this network is made possible, such as the distinctive cultural attitude to “originality,” the structure of the comics, animation and film industries, and finally, the role of fictitious genealogies of both traditional and contemporary media in the negotiation of national identity. On the other hand, the essay also considers some of the most significant thematic, narrative, and stylistic effects this close interconnectedness has on the individual medium. Special attention is being paid to the nascent trend of merging the adaptive medium with that of the original story (viewing adaptation as integration, apparent in contemporary manga-based live- action comedies, as the extreme case of intermedial adaptation. That is, when the aim of the adaptational process is no longer the transposition of the story but the adaptation (i.e. the incorporation of the medium itself- elevating certain medium-specific devices into transmedial phenomena.

  3. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  4. Policy Defined Spectrum sharing and medium Access for Cognitive Radios

    Bernhard H. Walke

    2006-04-01

    Full Text Available

    Spectrum regulation will undergo elementary changes in the near future allowing a less restricted and more flexible access to radio spectrum. Intelligent radios, socalled cognitive radios, will realize the dynamic usage of frequency bands on an opportunistic basis, by identifying and using under-utilized spectrum. Such a flexible spectrum usage requires changes in regulation towards a more open spectrum. Policies which determine when spectrum is considered as opportunity and which define the possibilities of using these spectrum opportunities are needed. First, this article discusses an approach that intends to enable distributed QoS support in open spectrum. This algorithm is specified as policy in a machine-understandable policy description language, such that the cognitive radio is capable of reasoning about spectrum usage. Policies that enable a software defined medium access are the second focus of this article. We discuss a step towards the realization of such cognitive radios at the example of the well-known Enhanced Distributed Channel Access of IEEE 802.11e. This channel access protocol is here specified in a machine understandable policy language, instead of lengthy textual description. Such a machine- understandable description of the protocol enables cognitive radios to operate in distributed environments according to the 802.11(e standard.

  5. Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

    Vithanage, Madava D.; Fafoutis, Xenofon; Andersen, Claus Bo;

    2013-01-01

    the potential energy that can be harvested from Low Surface Temperature (LST) radiators. The experiments are based on a developed Energy-Harvesting Heat Cost Allocator (EH-HCA) prototype. On the basis of this measured power budget, we model and analytically compare the currently used Medium Access...... Control (MAC) scheme of an industrial case study (IMR+) to a MAC scheme specifically designed for energy harvesting systems (ODMAC). Our analytical comparison shows the efficiency of the latter, as well as its ability to adapt to harvested ambient energy....

  6. Implementing WAI Authoring Tool Accessibility Guidelines in Developing Adaptive Elearning

    Mahieddine Djoudi

    2012-09-01

    Full Text Available Adaptive learning technology allows for the development of more personalized online learning experiences with materials that adapt to student performance and skill level. The term “adaptive” is also used to describe Assistive Technologies that allow the usability of online based courses for learners with disabilities and special needs. Authoring tools can enable, encourage, and assist authors in the creation of elearning content. Because most of the content of the Web based adaptive learning is created using authoring tools, they may be accessible to authors regardless of disability and they may support and encourage the authors in creating accessible elearning content. This paper presents an authoring tool designed for developing accessible adaptive elearning. The authoring tool, dedicated to Algerian universities, is designed to satisfy the W3C/WAI Authoring Tool Accessibility Guidelines (ATAG, and to allow collaboration functionalities among teachers where building elearning courses. After presenting the W3C/WAI accessibility guidelines, the collaborative authoring tool is outlined.

  7. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  8. An Efficient Medium Access Control Protocol with Parallel Transmission for Wireless Sensor Networks

    Mitsuji Matsumoto

    2012-08-01

    Full Text Available In this paper, we present a novel low power medium access control protocol for wireless sensor networks (WSNs. The proposed protocol, EP-MAC (Efficient MAC with Parallel Transmission achieves high energy efficiency and high packet delivery ratio under different traffic load. EP-MAC protocol is basically based on the Time Division Multiple Access (TDMA approach. The power of Carrier Sense Multiple Access (CSMA is used in order to offset the fundamental problems that the stand-alone TDMA method suffers from, i.e., problems such as lack of scalability, adaptability to varying situations, etc. The novel idea behind the EP-MAC is that it uses the parallel transmission concept with the TDMA link scheduling. EP-MAC uses the methods for the transmission power adjustment, i.e., uses the minimum level power necessary to reach the intended neighbor within a specified bit error rate [BER] target. This reduces energy consumption, as well as further enhances the scope of parallel transmission of the protocol. The simulation studies support the theoretical results, and validate the efficiency of our proposed EP-MAC protocol.

  9. Sustainable medium access control: Implementation and evaluation of ODMAC

    Fafoutis, Xenofon; Di Mauro, Alessio; Dragoni, Nicola

    2013-01-01

    Harvesting small-scale ambient energy constitutes a promising source of power for wireless embedded devices. Due to the unpredictable nature of the harvested energy, adaptive radio duty cycling can lead to a long-term sustainable operation. In energy constrained conditions, very low duty cycles a...

  10. A survey of medium access control protocols for wireless ad hoc networks

    Elvio João Leonardo; Ailton Akira Shinoda

    2004-01-01

    A number of issues distinguishes Medium Access Control (MAC) protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “...

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  12. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  13. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise of...... contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell...

  14. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  15. Distributed Medium Access Control with SDMA Support for WLANs

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  16. Cognitive radio networks medium access control for coexistence of wireless systems

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  17. Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2008-01-01

    The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring the availability of channels and exploiting the opportunities identified thus far. Using a sequential design approach, an optimal medium access strategy is derived. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is also developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels.

  18. Virus spreading in wireless sensor networks with a medium access control mechanism

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  19. A survey of medium access control protocols for wireless ad hoc networks

    Elvio João Leonardo

    2004-01-01

    Full Text Available A number of issues distinguishes Medium Access Control (MAC protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “state-of-art” in this area, including solutions already commercially available as well as those still in study.

  20. Does Firm Profile Influence Financial Access among Small and Medium Enterprises in Kenya?

    2013-01-01

    The purpose of this research is to determine whether firm-specific factors influence Small and Medium Enterprises’ (SMEs) ability to access finance. To address the study objectives, data from a sample of 103 SMEs was used in the study. Using multiple regression analysis, we found that, firm profile such as ownership structure; size of the firm; business type; and age of the business indeed influence SMEs’ access to finance.

  1. Strategies for adaptation of mAb-producing CHO cells to serum-free medium

    Costa A; Rodrigues M.; Henriques Mariana; Oliveira Rosário; Azeredo Joana

    2011-01-01

    Large-scale production of biopharmaceuticals commonly requires the use of serum-free medium, for safety and cost reasons. However, serum is essential to most mammalian cells growth, and its removal implies a very time-consuming process for cell adaptation. Thus, the aim of the study was to evaluate different strategies for cell adaptation to serum-free medium. Three cell types were used to assess the impact of transfection on adaptation: one common CHO-K1 cell line and two CHO-K1 cells tr...

  2. Adaptability of the internal business environment of small and medium-sized enterprises in Slovakia

    Misunova Hudakova, Ivana; Misun, Juraj

    2014-01-01

    Companies that are exposed to an uncertain changing business environment must be able to adapt and change in order to achieve some compliance with the subject of business carried out and the objectives with the ambient conditions. Also these conditions can be a source of threats for small and medium-sized enterprises. In this context, we emphasize the adaptability of the enterprise. It is the active joining of resolving the conflict between the business entity and its environment. Signs of th...

  3. An adaptive digital controller for satellite medium power DC/DC converter

    Skup, Konrad R.; Grudziński, Paweł; Orleański, Orleański

    2011-01-01

    In this paper the work concerning an adaptive digital controller for satellite medium power DC/DC converters is presented. The adaptive techniques and methods developed in Space Research Centre allows an implemented in VHDL controller to modify its parameters according to detected changes in operating conditions. Inductor entering from discontinuous to continuous current mode and vice versa or moving sampling instants due to changes in duty time are good examples of varying operation...

  4. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  5. A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

    R. Murugan; Shanmugam, A.

    2010-01-01

    Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for&...

  6. A Study of Medium Access Control Protocols for Wireless Body Area Networks

    Ullah, Sana; Shen, Bin; Islam, S.M. Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satis...

  7. Onboard Interference Prediction for the Cognitive Medium Access in the LEO Satellite Uplink Transmission

    Zhuochen Xie; Huijie Liu; Xuwen Liang

    2014-01-01

    Cognitive radio (CR) is an efficient way to increase spectrum efficiency for the small low earth orbit (LEO) satellite communication system. Due to the implementation difficulties, we focus on the CR in the uplink transmission. In CR, the cognitive medium access (CMA) is designed to enable the coexistence with the interferences from other systems. However, the CMA schemes designed for the terrestrial system cannot deal well with the global history of interferences in our system. Here, we desi...

  8. Cross-layer rate control, medium access control and routing design in cooperative VANET

    Zhou, Liang; Zheng, Baoyu; Geller, Benoit; Wei, Anne; Xu, Shan; Li, Yajun

    2008-01-01

    In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-layer design. At first, we introduce the cooperative communication conception to VANET, and propose an opportunistic cooperation strategy to improve the system performance. And then, we develop a cross-layer solution which consists of the link capacity detection with adjusting persistence probability at the MAC Layer, th...

  9. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  10. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  11. Sensory and adaptive access of manufacturing equipment resources in cloud manufacturing

    Liu Mingli

    2015-01-01

    Full Text Available Sensory and adaptive access of manufacturing equipment (ME is the key of physical resources virtualization in cloud manufacturing (CM. Three aspects including status sensory of ME, Internet of Things (IoT and adaptive access of CM service platform were elaborated to analyze the characteristics and to investigate the related technologies. The importance of fiber Bragg grating sensing technology for ME sensory was analyzed. The heterogeneous fusion system and fusion access method as well as device of equipment resources were discussed. The access of ME resources for CM service platform was investigated based on three aspects including information fusion, description and retrieval and service release. Taking the realization of intelligent sensory and adaptive access for typical ME resources as an example, the prototype system, the sensory of ME resources and the realization of IoT of ME resources as well as the adaptive access method for CM service platform were expounded.

  12. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  13. Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

    Vithanage, Madava D.; Fafoutis, Xenofon; Andersen, Claus Bo; Dragoni, Nicola

    In this paper we investigate the feasibility of powering wireless metering devices, namely heat cost allocators, by thermal energy harvested from radiators. The goal is to take a first step toward the realization of Energy-Harvesting Advanced Metering Infrastructures (EH-AMIs). While traditional...... the potential energy that can be harvested from Low Surface Temperature (LST) radiators. The experiments are based on a developed Energy-Harvesting Heat Cost Allocator (EH-HCA) prototype. On the basis of this measured power budget, we model and analytically compare the currently used Medium Access...

  14. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  15. Adaptive scheduling in cellular access, wireless mesh and IP networks

    Nieminen, Johanna

    2011-01-01

    Networking scenarios in the future will be complex and will include fixed networks and hybrid Fourth Generation (4G) networks, consisting of both infrastructure-based and infrastructureless, wireless parts. In such scenarios, adaptive provisioning and management of network resources becomes of critical importance. Adaptive mechanisms are desirable since they enable a self-configurable network that is able to adjust itself to varying traffic and channel conditions. The operation of adaptive me...

  16. ACADA: Access Control-driven Architecture with Dynamic Adaptation

    Pereira, Óscar Narciso Mortágua; Rui L. Aguiar; Santos, Maribel Yasmina

    2012-01-01

    Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent components leading to a separation between policies and their enf...

  17. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  18. Scalable Lunar Surface Networks and Adaptive Orbit Access Project

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  19. Needs-Adapted Data Access and Data Presentation

    Bergenholtz, Henning

    2011-01-01

    This paper has two connected topics: 1. access to data in dictionaries, 2. monofunctional dictionaries. The first topic has not been in focus in the theoretical lexicography. It is somehow surprising, because a quick and an easy access to the data giving the user the needed information is the main...

  20. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  1. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  2. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  3. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  4. Access to finance for small and medium-sized enterprises in North Kosovo

    Ljumović Isidora

    2015-01-01

    Full Text Available The purpose of this paper is to identify the problems small and medium-sized enterprises (SMEs are facing in Serbian municipalities in North Kosovo. The experience and previous researches show that SMEs, especially those in crisis areas, have a greater demand than supply for financial resources. We have created a questionnaire in order to get relevant data from SMEs in North Kosovo and to assess the shortcomings of the system of financing. Results show that access to finance in North Kosovo is extremely limited. Entrepreneurs and SMEs are usually financed with own resources and with a help from friends or family, while the bank loans are not frequent and are very expensive.

  5. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    Kilhung Lee

    2010-03-01

    Full Text Available This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme.

  6. Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

    Tazeem Ahmad Khan

    2013-10-01

    Full Text Available Enhancement the Performance of MANET (Mobile Ad-hoc Network using spatial diversity. Spatial diversity implemented using cooperative transmission technique in Medium access control (MAC layer level protocol. In noisy environment limit the network performance like coverage area, limit number of node, degrade packet transmission rate, increase packet loss rate etc. In this paper enhance the source to destination transmission range, minimize the packet loss, improve packet transmission rate and appropriate end to end delay. When direct link is fail to transmit packet then Cooperative scheme help to transmit packet. Cooperative scheme is to help the packet transmission with five handshakes instead of four. This scheme implemented in MANET network on MAC layer protocol. Cooperative scheme improve the performance with help of intermediate node between sources to destination. We are performance analysis using discrete simulator NS-2 in MANET. Our performance based on MAC layer level with cooperative scheme in IEEE WLAN standard CSMA/CA protocol.

  7. Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks

    Phan, Khoa Tran; van der Schaar, Mihaela

    2010-01-01

    Distributed medium access control (MAC) protocols are essential for the proliferation of low cost, decentralized wireless local area networks (WLANs). Most MAC protocols are designed with the presumption that nodes comply with prescribed rules. However, selfish nodes have natural motives to manipulate protocols in order to improve their own performance. This often degrades the performance of other nodes as well as that of the overall system. In this work, we propose a class of protocols that limit the performance gain which nodes can obtain through selfish manipulation while incurring only a small efficiency loss. The proposed protocols are based on the idea of a review strategy, with which nodes collect signals about the actions of other nodes over a period of time, use a statistical test to infer whether or not other nodes are following the prescribed protocol, and trigger a punishment if a departure from the protocol is perceived. We consider the cases of private and public signals and provide analytical a...

  8. Speed regulating Effects of Incentive-based Intelligent Speed Adaptation in the short and medium term

    Agerholm, Niels

    Speed regulating Effects of Incentive-based Intelligent Speed Adaptation in the short and medium term Despite massive improvements in vehicles’ safety equipment, more information and safer road network, inappropriate road safety is still causing that more than 250 people are killed and several...... fewer speed limit violations. Estimation of safety effects showed various results and the reduction in the number of fatalities was estimated to be as high as 37 to 42% if ISA was fully implemented. Despite convincing effects of ISA in short term, it was found that the effect of ISA decreased over time...... activation of ISA. The effect was studied on the basis of the Danish ISA trial PAYS. Short term means 0-1.5 months after ISA activation, while medium-term means 3-4.5 months after ISA activation. Regarding short-term effects, it was found that the combination of informative and incentive ISA resulted in...

  9. Adapting Building Design to Access by Individuals with Intellectual Disability

    L Castell

    2012-11-01

    Full Text Available Over the last 15 years, since introductionof the Disability Discrimination Act (DDA(Commonwealth Government of Australia,1992, there has been much discussionabout the extent and nature of buildingaccess for the disabled, particularly inresponse to proposed revisions to theBuilding Code of Australia (BCA and theintroduction of a Premises Standardcovering building access. Much of theargument which contributed to the twoyear delay in submitting a final version ofthese documents for government approvalrelated to the extent of access provisionsand the burden of cost. The final versionsubmitted to government by the AustralianBuilding Codes Board (ABCB (notreleased publicly appears to still containinconsistencies between the DDA and theBCA in several areas such as wayfindingand egress.In the debate preceding submission of thefinal version there appears to have beenlittle reference to access requirements forindividuals with intellectual disability (ID.This may be due to a general lack ofresearch on the topic. Consequently, thispaper uses a combination of theknowledge gained from a limited numberof previous wayfinding studies, literaturedescribing general problems faced bythose with ID and the author’s personalexperience observing others with ID tocreate a list of probable difficulties andsuggested solutions. The paperconcludes with a discussion about theassociated cost implications and benefitsin providing the required access.

  10. Adaptive Traffic Control Systems in a medium-sized Scandinavian city

    Agerholm, Niels; Olesen, Anne Vingaard

    2016-01-01

    Adaptive Traffic Control Systems (ATCS) are aimed at reducing congestion. ATCS adapt to approaching traffic to continuously optimise the traffic flows in question. ATCS have been implemented in many locations, including the Scandinavian countries, with various effects. Due to congestion problems......, ATCS were installed in the eight signalised intersections of a 1.7 km stretch of the ring road in the medium-sized Danish city of Aalborg. To measure the effect of ATCS a with/without study was carried out. GPS data from a car following the traffic, recorded transportation times for buses in service...... morning peak and midday off-peak. The effect on crossing and turning traffic was slight, and while reduced transportation time was found in one part of the ring road in another part transportation time was seen to increase. The benefit to the ring road was partly gained at the cost of slightly increased...

  11. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  12. Transparent Adaptable Network Access and Service Content Differentiation

    Senneset, Thomas

    2006-01-01

    Today s most advanced mobile devices support communication through a variety of network technologies; GSM (including GPRS and EDGE), UMTS, WLAN, Bluetooth, and IR. This master thesis characterizes different network technologies and protocols available to mobile devices, phones in particular. In addition, service provisioning capabilities over different types of networks are identified. Internet access till now has been provided over GSM or UMTS, often via a WAP Gateway. With a WAP Gateway, ...

  13. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...... of information between the one which user uses and the one which is available at the source at the same instant of time. This leads to unreliable information being used by the application user for processing. Information accessing with minimal mismatch is desired by the WSN applications especially when WSN...

  14. Corporate Social Responsibility (CSR) for Global Market Access: A Malaysian Case Study on Small and Medium Enterprises (SMEs)

    Tareq Bin Hossain; Chamhuri Siwar; Mohd Fauzi Mohd Jani; Abul Bashar Bhuiyan

    2013-01-01

    The Corporate Social Responsibility (CSR) is a powerful tool or channel for ensuring greater market access and enables a better engagement in the global market. The study examines how Corporate Social Responsibility (CSR) is contributing to mass access of Small and Medium Enterprises (SMEs) in the global market. The study used cross section primary data from the level of executives of the corporations. Towards the achievement of its objectives this study uses descriptive statistical tools. Th...

  15. On the accessibility of adaptive phenotypes of a bacterial metabolic network.

    Wilfred Ndifon

    2009-08-01

    Full Text Available The mechanisms by which adaptive phenotypes spread within an evolving population after their emergence are understood fairly well. Much less is known about the factors that influence the evolutionary accessibility of such phenotypes, a pre-requisite for their emergence in a population. Here, we investigate the influence of environmental quality on the accessibility of adaptive phenotypes of Escherichia coli's central metabolic network. We used an established flux-balance model of metabolism as the basis for a genotype-phenotype map (GPM. We quantified the effects of seven qualitatively different environments (corresponding to both carbohydrate and gluconeogenic metabolic substrates on the structure of this GPM. We found that the GPM has a more rugged structure in qualitatively poorer environments, suggesting that adaptive phenotypes could be intrinsically less accessible in such environments. Nevertheless, on average approximately 74% of the genotype can be altered by neutral drift, in the environment where the GPM is most rugged; this could allow evolving populations to circumvent such ruggedness. Furthermore, we found that the normalized mutual information (NMI of genotype differences relative to phenotype differences, which measures the GPM's capacity to transmit information about phenotype differences, is positively correlated with (simulation-based estimates of the accessibility of adaptive phenotypes in different environments. These results are consistent with the predictions of a simple analytic theory that makes explicit the relationship between the NMI and the speed of adaptation. The results suggest an intuitive information-theoretic principle for evolutionary adaptation; adaptation could be faster in environments where the GPM has a greater capacity to transmit information about phenotype differences. More generally, our results provide insight into fundamental environment-specific differences in the accessibility of adaptive

  16. Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks

    Kohvakka Mikko

    2010-01-01

    Full Text Available In Wireless Sensor Networks (WSNs, a robust and energy-efficient Medium Access Control (MAC protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are common. This paper presents the design of a novel MAC protocol for low-power WSNs. The developed MAC protocol minimizes the energy overhead of idle time and collisions by strict frame synchronization and slot reservation. It combines a dynamic bandwidth adjustment mechanism, multi-cluster-tree network topology, and a network channel allowing rapid and low-energy neighbor discoveries. The protocol achieves high scalability by employing frequency and time division between clusters. Performance analysis shows that the MAC protocol outperforms current state-of-the-art protocols in energy efficiency, and the energy overhead compared to an ideal MAC protocol is only 2.85% to 27.1%. The high energy efficiency is achieved in both leaf and router nodes. The models and the feasibility of the protocol were verified by simulations and with a full-scale prototype implementation.

  17. Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting

    Iannello, Fabio; Spagnolini, Umberto

    2011-01-01

    The design of Medium Access Control (MAC) protocols for wireless sensor networks (WSNs) has been conventionally tackled by assuming battery-powered devices and by adopting the network lifetime as the main performance criterion. While WSNs operated by energy-harvesting (EH) devices are not limited by network lifetime, they pose new design challenges due to the uncertain amount of harvestable energy. Novel design criteria are thus required to capture the trade-offs between the potentially infinite network lifetime and the uncertain energy availability. This paper addresses the analysis and design of WSNs with EH devices by focusing on conventional MAC protocols, namely TDMA, Framed-ALOHA (FA) and Dynamic-FA (DFA), and by accounting for the performance trade-offs and design issues arising due to EH. A novel metric, referred to as delivery probability, is introduced to measure the capability of a MAC protocol to deliver the measure of any sensor in the network to the intended destination (or fusion center, FC). T...

  18. A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

    R. Murugan

    2010-01-01

    Full Text Available Problem statement: In Mobile Ad hoc Network (MANET, both the routing layer and the Medium Access Control (MAC layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for detecting MAC layers attacks, data forwarding behavior based detection technique for detecting packet drops and message authentication code based technique for packet modification. Results: Our combined solution presents a reputation value for detecting the malicious nodes and isolates them from further network participation till its revocation. Our approach periodically checks all nodes, including the isolated nodes, at regular time period λ. A node which recovers from its misbehaving condition is revoked to its normal condition after the time period λ. Conclusion/Recommendations: By simulation results, we show that our combined solution provides more security by increased packet delivery ratio and reduced packet drops. We also shown that our approach has less overhead compared to the existing technique.

  19. A Study of Medium Access Control Protocols for Wireless Body Area Networks

    Ullah, Sana; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup; 10.3390/s100100128

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.

  20. Improvement in Medium Access Control protocol based on new contention scheme for wireless ad hoc network

    C.Ellammal

    2012-05-01

    Full Text Available In todays wireless networks, stations using the IEEE 802.11 standard contend for the channel using the Distributed Coordination Function (DCF. Research has shown that DCF€™s performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, we present a Medium Access Control (MAC scheme for wireless LANs and compare its performance to DCF . Our scheme, which attempts to resolve the contention in a constant number of slots (or constant time, is called CONSTI. The contention resolution happens over a predefined number of slots. In a slot, the stations probabilistically send a jam signal on the channel. The stations listening retire if they hear a jam signal. The others continue to the next slot. Over several slots, we aim to have one station remaining in the contention, which will then transmit its data. We find the optimal parameters of CONSTI and present an analysis on its performance.

  1. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  2. Using the Critical Incident Technique to Research Decision Making regarding Access to Training and Development in Medium-Sized Enterprises

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Employees in small and medium-sized enterprises (SMEs) form part of a "disadvantaged" group within the workforce that receives less access to training and development (T&D) than employees in large firms. Prior research into reasons for the relatively low levels of employee participation in training and development has typically involved surveys of…

  3. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  4. Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems

    C Narendra, Nanjangud

    2003-01-01

    With increasing numbers of organizations automating their business processes by using workflow systems, security aspects of workflow systems has become a heavily researched area. Also, most workflow processes nowadays need to be adaptive, i.e., constantly changing, to meet changing business conditions. However, little attention has been paid to integrating Security and Adaptive Workflow. In this paper, we investigate this important research topic, with emphasis on Role Based Access Control (R...

  5. Adaptation of Mycobacterium smegmatis to an Industrial Scale Medium and Isolation of the Mycobacterial PorinMspA

    Wendel, Sebastian O; Perera, Ayomi S; Pfromm, Peter H; Czermak, Peter; Stefan H. Bossmann

    2013-01-01

    The adaptation of the organism to a simple and cost-effective growth medium is mandatory in developing a process for large scale production of the octamericporinMspA, which is isolated from Mycobacterium smegmatis. A fermentation optimization with the minimal nutrients required for growth has been performed. During the fermentation, the iron- and ammonium chloride concentrations in the medium were varied to determine their impact on the observed growth rates and cell mass yields. Common antib...

  6. Adapting Online Learning Resources for All: Planning for Professionalism in Accessibility

    McAndrew, Patrick; Farrow, Robert; Cooper, Martyn

    2012-01-01

    Online resources for education offer opportunities for those with disabilities but also raise challenges on how to best adjust resources to accommodate accessibility. Automated reconfiguration could in principle remove the need for expensive and time-consuming discussions about adaptation. On the other hand, human-based systems provide much needed…

  7. Corporate Social Responsibility (CSR for Global Market Access: A Malaysian Case Study on Small and Medium Enterprises (SMEs

    Tareq Bin Hossain

    2013-01-01

    Full Text Available The Corporate Social Responsibility (CSR is a powerful tool or channel for ensuring greater market access and enables a better engagement in the global market. The study examines how Corporate Social Responsibility (CSR is contributing to mass access of Small and Medium Enterprises (SMEs in the global market. The study used cross section primary data from the level of executives of the corporations. Towards the achievement of its objectives this study uses descriptive statistical tools. The findings of the study revealed that practicing of CSR is playing pivotal role to pick up the brand image and reputation of the Malaysian SMEs to the customers in the global arena.

  8. Adapting online learning resources for all: planning for professionalism in accessibility

    Patrick McAndrew

    2012-12-01

    Full Text Available Online resources for education offer opportunities for those with disabilities but also raise challenges on how to best adjust resources to accommodate accessibility. Automated reconfiguration could in principle remove the need for expensive and time-consuming discussions about adaptation. On the other hand, human-based systems provide much needed direct support and can help understand options and individual circumstances. A study was carried out within an EU-funded accessibility project at The Open University (OU in parallel with studies at three other European universities. The study combined focus groups, user-testing, management consultation and student survey data to help understand ways forward for accessibility. The results reinforce a holistic view of accessibility, based on three factors: positioning the university as a positive provider to disabled students; developing processes, systems and services to give personal help; and planning online materials which include alternatives. The development of a model that helps organisations incorporate professionalism in accessibility is described, though challenges remain. For example, a recurrent difficulty in providing adequate self-description of accessibility needs implies that a completely automated solution may not be attainable. A more beneficial focus, therefore, may be to develop systems that support the information flow required by the human “in the loop.”

  9. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  10. Adaptive coded spreading OFDM signal for dynamic-λ optical access network

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-12-01

    This paper proposes and experimentally demonstrates a novel adaptive coded spreading (ACS) orthogonal frequency division multiplexing (OFDM) signal for dynamic distributed optical ring-based access network. The wavelength can be assigned to different remote nodes (RNs) according to the traffic demand of optical network unit (ONU). The ACS can provide dynamic spreading gain to different signals according to the split ratio or transmission length, which offers flexible power budget for the network. A 10×13.12 Gb/s OFDM access with ACS is successfully demonstrated over two RNs and 120 km transmission in the experiment. The demonstrated method may be viewed as one promising for future optical metro access network.

  11. Accessing English and Networks at an English-Medium Multicultural Church in East Canada: An Ethnography

    Han, Huamei

    2014-01-01

    Drawing from a larger ethnography of skilled Chinese immigrants' language learning during settlement in Toronto, this article explores the role of informal interactions in facilitating immigrants learning English as a second language and settlement. Examining various activities and networks available at an English-medium multicultural church,…

  12. Adaptive-Reliable Medium Access Control Protocol for Wireless Body Area Networks

    Rahim, A.; Javaid, N.; M Aslam; Qasim, U.; Khan, Z. A.

    2012-01-01

    Extensive energy is consumed by Transceiver communication operation [1]. Existing research on MAC layer focuses to maximize battery-powered sensor node's life. Bottleneck of MAC layer protocol design for WBAN is to achieve high reliability and energy minimization. Majority of MAC protocols designed for WBANs are based upon TDMA approach. However, a new protocol needs to be defined to achieve high energy efficiency, fairness and avoid extra energy consumption due to synchronization.

  13. Adaptive e-Learning: A Conceptual Solution for the analysis of link between Medium of Instruction and Performance

    Damodaran Venkatesan; RM. Chandrasekaran

    2010-01-01

    e-Learning system emphasizes on the available content to all learners irrespective of their knowledge level and relevance. This paper concentrates on the result oriented investigation of the impact of learner’s primary medium of instruction (MI) at school in understanding the content given to them in English and proposes a design for developing an Adaptive e-Learning (AeL) system personalized to the learner. An appropriate statistical model has been developed to analyze the impact and the res...

  14. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-01-01

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks. PMID:26633421

  15. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  16. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  17. The accessing of finance by Small Medium Micro Enterprises in the Mafikeng / Karabo Khiba

    Khiba, Karabo

    2006-01-01

    The research study investigates some of the problems or challenges faced by SMMEs in the Mafikeng and Mmabatho area of the North West province. It strives to find out the extent to which these problems occur and the impact they have on these businesses. The research focuses on a number of major problems considered to be hindering the growth of SMMEs in this area, namely the lack of entrepreneurial management, financial skills, accessing finance and the role played by lack of fi...

  18. Low and medium level radioactive waste repository: the access to information

    The technological option for the nuclear energy and the society welfare must be carried on together. Access to qualified information should be allowed to the ones responsible for the preparation of material related to the project as well as to all the interested parties involved. The aim of this paper is to give some guidelines to be followed during the project implementation to guarantee this access. Complete information should be available to those involved in the project in a common database, a virtual library, where every document might be obtained. Information should be updated continuously, allowing access, through reliable search and storage tools. Every step of the project development should be well documented containing data and any eventual modification. To guarantee an open and participative conduction of the Project, several tools might be employed, according to the development of the project. Some of the suggested strategies refer to: informative and educational materials production; public consulting; interaction groups; meetings with people - mainly residents or inhabitants and specialists and stakeholders. The criteria to identify information to be released should be: novelty, impact and public interest. The rule should be to give information to all interested ones, avoiding hidden intentions. The strategy should be elaborated according to the local inhabitant's profile. Communication should be mainly done in a personal way. The responsibility for providing the information should be under an Informative Committee created specifically for communication of the project, supervised by the General Coordination and the Technical Committees. (author)

  19. Adapt

    Bargatze, L. F.

    2015-12-01

    Active Data Archive Product Tracking (ADAPT) is a collection of software routines that permits one to generate XML metadata files to describe and register data products in support of the NASA Heliophysics Virtual Observatory VxO effort. ADAPT is also a philosophy. The ADAPT concept is to use any and all available metadata associated with scientific data to produce XML metadata descriptions in a consistent, uniform, and organized fashion to provide blanket access to the full complement of data stored on a targeted data server. In this poster, we present an application of ADAPT to describe all of the data products that are stored by using the Common Data File (CDF) format served out by the CDAWEB and SPDF data servers hosted at the NASA Goddard Space Flight Center. These data servers are the primary repositories for NASA Heliophysics data. For this purpose, the ADAPT routines have been used to generate data resource descriptions by using an XML schema named Space Physics Archive, Search, and Extract (SPASE). SPASE is the designated standard for documenting Heliophysics data products, as adopted by the Heliophysics Data and Model Consortium. The set of SPASE XML resource descriptions produced by ADAPT includes high-level descriptions of numerical data products, display data products, or catalogs and also includes low-level "Granule" descriptions. A SPASE Granule is effectively a universal access metadata resource; a Granule associates an individual data file (e.g. a CDF file) with a "parent" high-level data resource description, assigns a resource identifier to the file, and lists the corresponding assess URL(s). The CDAWEB and SPDF file systems were queried to provide the input required by the ADAPT software to create an initial set of SPASE metadata resource descriptions. Then, the CDAWEB and SPDF data repositories were queried subsequently on a nightly basis and the CDF file lists were checked for any changes such as the occurrence of new, modified, or deleted

  20. Multiobjective adaptive feedback control of two-photon absorption coupled with propagation through a dispersive medium

    This work uses shaped femtosecond laser pulses to control the two-photon absorption (TPA) of coumarin 153 in a dispersive toluene medium. The dispersive medium reshapes the pulse along the optical path, and management of this effect is used to achieve spatial localization of TPA. Other control objectives were successfully implemented, including dual localization and high resolution local optimization of TPA. The solutions to these objectives were explored by means of evolutionary single- and multi-objective algorithms within a laboratory feedback loop.

  1. Adaptation of Mycobacterium smegmatis to an Industrial Scale Medium and Isolation of the Mycobacterial PorinMspA.

    Wendel, Sebastian O; Perera, Ayomi S; Pfromm, Peter H; Czermak, Peter; Bossmann, Stefan H

    2013-01-01

    The adaptation of the organism to a simple and cost-effective growth medium is mandatory in developing a process for large scale production of the octamericporinMspA, which is isolated from Mycobacterium smegmatis. A fermentation optimization with the minimal nutrients required for growth has been performed. During the fermentation, the iron- and ammonium chloride concentrations in the medium were varied to determine their impact on the observed growth rates and cell mass yields. Common antibiotics to control contamination were eliminated in favor of copper sulfate to reduce costs. MspA has been successfully isolated from the harvested M. smegmatisusing aqueous nOPOE (n-octyloligooxyethylene) at 65°C. Because of the extraordinary stability of MspA, it is possible to denature and precipitate virtually all other proteins and contaminants by following this approach. To further purify the product, acetone is used for precipitation. Gel electrophoresis confirmed the presence and purity of MspA. A maximum of 840µg (via Bradford assay) of pure MspA per liter of the optimized simple growth medium has been obtained. This is a 40% increase with respect to the previously reported culture medium for MspA. PMID:23802026

  2. Cross-Cultural adaptation of an instrument to computer accessibility evaluation for students with cerebral palsy

    Gerusa Ferreira Lourenço

    2015-03-01

    Full Text Available The specific literature indicates that the successful education of children with cerebral palsy may require the implementation of appropriate assistive technology resources, allowing students to improve their performance and complete everyday tasks more efficiently and independently. To this end, these resources must be selected properly, emphasizing the importance of an appropriate initial assessment of the child and the possibilities of the resources available. The present study aimed to translate and adapt theoretically an American instrument that evaluates computer accessibility for people with cerebral palsy, in order to contextualize it for applicability to Brazilian students with cerebral palsy. The methodology involved the steps of translation and cross-cultural adaptation of this instrument, as well as the construction of a supplementary script for additional use of that instrument in the educational context. Translation procedures, theoretical and technical adaptation of the American instrument and theoretical analysis (content and semantics were carried out with the participation of professional experts of the special education area as adjudicators. The results pointed to the relevance of the proposal of the translated instrument in conjunction with the script built to the reality of professionals involved with the education of children with cerebral palsy, such as occupational therapists and special educators.

  3. Energy-Efficient Medium Access Control Protocols for Wireless Sensor Networks

    Ren Qingchun

    2006-01-01

    Full Text Available A key challenge for wireless sensor networks is how to extend network lifetime with dynamic power management on energy-constraint sensor nodes. In this paper, we propose two energy-efficient MAC protocols: asynchronous MAC (A-MAC protocol and asynchronous schedule-based MAC (ASMAC protocol. A-MAC and ASMAC protocols are attractive due to their suitabilities for multihop networks and capabilities of removing accumulative clock-drifts without any network synchronization. Moreover, we build a traffic-strength- and network-density-based model to adjust essential algorithm parameters adaptively. Simulation results show that our algorithms can successfully acquire the optimum values of power-on/off duration, schedule-broadcast interval, as well as super-time-slot size and order. These algorithm parameters can ensure adequate successful transmission rate, short waiting time, and high energy utilization. Therefore, not only the performance of network is improved but also its lifetime is extended when A-MAC or ASMAC is used.

  4. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  5. The HARNESS Workbench: Unified and Adaptive Access to Diverse HPC Platforms

    Sunderam, Vaidy S.

    2012-03-20

    The primary goal of the Harness WorkBench (HWB) project is to investigate innovative software environments that will help enhance the overall productivity of applications science on diverse HPC platforms. Two complementary frameworks were designed: one, a virtualized command toolkit for application building, deployment, and execution, that provides a common view across diverse HPC systems, in particular the DOE leadership computing platforms (Cray, IBM, SGI, and clusters); and two, a unified runtime environment that consolidates access to runtime services via an adaptive framework for execution-time and post processing activities. A prototype of the first was developed based on the concept of a 'system-call virtual machine' (SCVM), to enhance portability of the HPC application deployment process across heterogeneous high-end machines. The SCVM approach to portable builds is based on the insertion of toolkit-interpretable directives into original application build scripts. Modifications resulting from these directives preserve the semantics of the original build instruction flow. The execution of the build script is controlled by our toolkit that intercepts build script commands in a manner transparent to the end-user. We have applied this approach to a scientific production code (Gamess-US) on the Cray-XT5 machine. The second facet, termed Unibus, aims to facilitate provisioning and aggregation of multifaceted resources from resource providers and end-users perspectives. To achieve that, Unibus proposes a Capability Model and mediators (resource drivers) to virtualize access to diverse resources, and soft and successive conditioning to enable automatic and user-transparent resource provisioning. A proof of concept implementation has demonstrated the viability of this approach on high end machines, grid systems and computing clouds.

  6. Innovation, adaptability, and collaboration: Keys to success for small and medium sized reactors. Cairo, 27 May 2001

    Small and medium sized reactors, within a power output of less than 700 MW(e), are receiving increased consideration in the effort to meet changing market requirements. Smaller plants allow a more incremental investment, which can be used to hedge against demand uncertainty. They are more suitable for standardization and prefabrication, which in turn encourages enhanced quality control and stimulates rapid development of expertise and shorter construction schedules. They provide a better match to grid capacity in developing countries. And they are more easily adapted to a broad range of industrial settings and applications, such as district heating, heavy oil recovery, or the production of hydrogen and other chemical fuels. Sea water desalination is an application for which smaller reactors hold a particular advantage. Nuclear powered desalination is a proven technology. Clearly, we live in an era in which our society faces many difficult economic, environmental and social issues associated with sustainable development and energy demand. Against that backdrop, nuclear power is a mature technology that deserves careful consideration as a contributor to solving some of these issues. The development of innovative small and medium sized reactors will play a key role in helping to match state-of-the-art technology to user needs. An exchange of information and ideas is a step towards further progress

  7. Landscape Influences on Fisher Success: Adaptation Strategies in Closed and Open Access Fisheries in Southern Chile

    Tracy Van Holt

    2012-03-01

    Full Text Available Determinants of fisher success in southern Chile's loco (Concholepas concholepas fishery are examined by comparing fisher success in exclusive access territories that vary in relationship to tree-plantation development, which can affect shellfish quality. The relative importance of fishers' experience and capture technology (traditional measures of fisher success are evaluated against environmental and geospatial characteristics. While knowledge and technology explained variation in catches, this did not translate into higher prices or profit. Fishers succeeded (gained higher prices for locos and had higher monthly incomes from their management areas when they harvested shellfish from closed (exclusive nearshore management areas where the environmental condition produced high quality locos regardless of their fishing experience, technology, and the geospatial features of management areas. Experienced fishers who worked in management areas near tree plantations that fail to produce resources of sufficient quality shifted to offshore fisheries where their experience counted. Offshore fishers working in the congrio (Genypterus chilensis fishery likely exposed themselves to more risk and benefited from their experience and available technology; environmental condition and geospatial factors played little role in their success (price. Closed management areas provided resources to harvest, but may reduce a fisher's ability to adapt to environmental change because success depends on environmental factors outside of a fisher's control. Fishers were not financially rewarded for their experience or their technology in the loco fishery.

  8. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    Christos Verikoukis

    2011-01-01

    Full Text Available The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs. The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions. In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs, which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead.

  9. Medium-Range Predictability of Contrail-Cirrus Demonstrated during Experiments Ml-Cirrus and Access-Ii

    Schumann, U.

    2015-12-01

    The Contrail Cirrus Prediction model CoCiP (doi:10.5194/gmd-5-543-2012) has been applied quasi operationally to predict contrails for flight planning of ML-CIRRUS (C. Voigt, DLR, et al.) in Europe and for ACCESS II in California (B. Anderson, NASA, et al.) in March-May 2014. The model uses NWP data from ECMWF and past airtraffic data (actual traffic data are used for analysis). The forecasts provided a sequence of hourly forecast maps of contrail cirrus optical depth for 3.5 days, every 12 h. CoCiP has been compared to observations before, e.g. within a global climate-aerosol-contrail model (Schumann, Penner et al., ACPD, 2015, doi:10.5194/acpd-15-19553-2015). Good predictions would allow for climate optimal routing (see, e.g., US patent by Mannstein and Schumann, US 2012/0173147 A1). The predictions are tested by: 1) Local eyewitness reports and photos, 2) satellite observed cloudiness, 3) autocorrelation analysis of predictions for various forecast periods, 4) comparisons of computed with observed optical depth from COCS (doi:10.5194/amt-7-3233-2014, 2014) by IR METEOSAT-SEVIRI observations over Europe. The results demonstrate medium-range predictability of contrail cirrus to a useful degree for given traffic, soot emissions, and high-quality NWP data. A growing set of satellite, Lidar, and in-situ data from ML-CIRRUS and ACCENT are becoming available and will be used to further test the forecast quality. The autocorrelation of optical depth predictions is near 70% for 3-d forecasts for Europe (outside times with high Sahara dust loads), and only slightly smaller for continental USA. Contrail cirrus is abundant over Europe and USA. More than 1/3 of all cirrus measured with the research aircraft HALO during ML-CIRRUS was impacted by contrails. The radiative forcing (RF) is strongly daytime and ambience dependent. The net annual mean RF, based on our global studies, may reach up to 0.08 W/m2 globally, and may well exceed 1 W/m2 regionally, with maximum over Europe

  10. Developing Guidelines for Evaluating the Adaptation of Accessible Web-Based Learning Materials

    Radovan, Marko; Perdih, Mojca

    2016-01-01

    E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…

  11. Reduced-complexity adaptive multi-channel assignment for shared access points in over-loaded small-cell networks

    Radaydeh, Redha Mahmoud

    2013-06-01

    This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.

  12. Adaptive MPI Multirail Tuning for Non-Uniform Input/Output Access

    Moreaud, Stéphanie; Goglin, Brice; Namyst, Raymond

    2010-01-01

    Multicore processors have not only reintroduced Non-Uniform Memory Access (NUMA) architectures in nowadays parallel computers, but they are also responsible for non-uniform access times with respect to Input/Output devices (NUIOA). In clusters of multicore machines equipped with several Network Interfaces, performance of communication between processes thus depends on which cores these processes are scheduled on, and on their distance to the Network Interface Cards involved. We propose a tech...

  13. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS for Building Security

    Wahyudi

    2007-01-01

    Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the user’s identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.

  14. Adaptive Technology that Provides Access to Computers. DO-IT Program.

    Washington Univ., Seattle.

    This brochure describes the different types of barriers individuals with mobility impairments, blindness, low vision, hearing impairments, and specific learning disabilities face in providing computer input, interpreting output, and reading documentation. The adaptive hardware and software that has been developed to provide functional alternatives…

  15. Analysis of Educational Web Pattern Using Adaptive Markov Chain For Next Page Access Prediction

    Harish Kumar; Anil Kumar Solanki

    2011-01-01

    The Internet grows at an amazing rate as an information gateway and as a medium for business and education industry. Universities with web education rely on web usage analysis to obtain students behavior for web marketing. Web Usage Mining (WUM) integrates the techniques of two popular research fields – Data Mining and the Internet. Web usage mining attempts to discover useful knowledge from the secondary data (Web logs). These useful data pattern are use to analyze visitors activities in the...

  16. Spectral Efficiency of Multiple Access Fading Channels with Adaptive Interference Cancellation

    Shakya, Indu L

    2012-01-01

    Reliable estimation of users' channels and data in rapidly time varying fading environments is a very challenging task of multiuser detection (MUD) techniques that promise impressive capacity gains for interference limited systems such as non-orthogonal CDMA and spatial multiplexing MIMO based LTE. This paper analyzes relative channel estimation error performances of conventional single user and multiuser receivers for an uplink of DS-CDMA and shows their impact on output signal to interference and noise ratio (SINR) performances. Mean squared error (MSE) of channel estimation and achievable spectral efficiencies of these receivers obtained from the output SINR calculations are then compared with that achieved with new adaptive interference canceling receivers. It is shown that the adaptive receivers using successive (SIC) and parallel interference cancellation (PIC) methods offer much improved channel estimation and SINR performances, and hence significant increase in achievable sum date rates.

  17. Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding

    Shum, Kenneth W

    2009-01-01

    In ALOHA-type packetized network, the transmission times of packets follow a stochastic process. In this paper, we advocate a deterministic approach for channel multiple-access. Each user is statically assigned a periodic protocol signal, which takes value either zero or one, and transmit packets whenever the value of the protocol signal is equal to one. On top of this multiple-access protocol, efficient channel coding and network coding schemes are devised. We illustrate the idea by constructing a transmission scheme for the tandem collision network, for both slot-synchronous and slot-asynchronous systems. This cross-layer approach is able to achieve the capacity region when the network is bi-directional.

  18. Improving Inpatient Surveys: Web-Based Computer Adaptive Testing Accessed via Mobile Phone QR Codes

    Chien, Tsair-Wei; Lin, Weir-Sen

    2016-01-01

    Background The National Health Service (NHS) 70-item inpatient questionnaire surveys inpatients on their perceptions of their hospitalization experience. However, it imposes more burden on the patient than other similar surveys. The literature shows that computerized adaptive testing (CAT) based on item response theory can help shorten the item length of a questionnaire without compromising its precision. Objective Our aim was to investigate whether CAT can be (1) efficient with item reductio...

  19. The design-by-adaptation approach to universal access: learning from videogame technology

    Shepherd, Ifan D. H.; Bleasdale-Shepherd, Iestyn D.

    2010-01-01

    This paper proposes an alternative approach to the design of universally accessible interfaces to that provided by formal design frameworks applied ab initio to the development of new software. This approach, design-byadaptation, involves the transfer of interface technology and/or design principles from one application domain to another, in situations where the recipient domain is similar to the host domain in terms of modelled systems, tasks and users. Using the example of interaction in 3D...

  20. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Chunyang Lei; Hongxia Bie; Gengfa Fang; Xuekun Zhang

    2015-01-01

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel co...

  1. THE ACCESS OF SMALL AND MEDIUM SIZE ENTERPRISES TO BANKING FINANCING AND CURRENT CHALLANGES: THE CASE OF EU COUNTRIES

    Roman Angela; Rusu Valentina Diana

    2012-01-01

    Bank loans are a vital resource for SMEs financing because of the reducedpossibilities of these firms to find alternative sources of financing. In the context of the currentcrisis, the access to loans for SMEs has deteriorated significantly due to lower availability of bankloans, that can hamper the exit from the crisis of these firms and the relaunch of the nationaleconomies. Moreover, the adoption of the new banking regulations by Basel III Accord raisesconcerns about their possible negativ...

  2. Integration of Intercultural Competence in the Processes of Enterprise Internationalization: Possibilities of the Adaptation of the Model in the Operation of Small and Medium Enterprises

    Jolita Vveinhardt

    2015-05-01

    Full Text Available The article briefly presents the problems identified during the studies carried out by the authors previously, i.e. the problems of intercultural competence and its integration in the processes of internationalization are disclosed. On the basis of the researches carried out the model of integration of intercultural competence in the internationalization processes is adapted, preparing the plan of development of intercultural competence in enterprises. At the end of the article the guidelines for the application of the model for development of internationalization of small and medium enterprises is presented.

  3. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC for Long-lived Sensor Networks

    Wen Hu

    2010-06-01

    Full Text Available We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC algorithm for long-lived Wireless Sensor Networks (WSNs. Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  4. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  5. Adaptive interference-aware multichannel assignment for shared overloaded small-cell access points under limited feedback

    Radaydeh, Redha Mahmoud

    2014-02-01

    This paper proposes a reduced-complexity multichannel assignment scheme for short-range cellular systems. It treats the scenario when a number of small-cell (e.g., femtocell) access points (APs) can be shared to serve active scheduled users. The APs employ isotropic antenna arrays and operate using an open-access control strategy. To improve the reuse ratio of physical resources, the APs are assumed to occupy a single physical channel, wherein coordination among them is infeasible. On the other hand, to improve the spatial coverage, a scheduled user can be served by a single transmit channel from an AP at a time. For the case of overloaded APs and when the feedback links are capacity limited, the scheme attempts to identify the suitable transmit channels from the deployed APs in an adaptive manner such that certain performance and/or processing load limits are satisfied. The effects of some system and design parameters on the outcomes of the scheme are thoroughly discussed. Novel results for the statistics of the resulting interference power are presented, from which results for some performance measures and processing loads are obtained. Numerical and simulations results are provided to clarify the achieved gains, as compared with related models under different operating conditions. © 2013 IEEE.

  6. An Adaptive Gateway Discovery Algorithm to support QoS When Providing Internet Access to Mobile Ad Hoc Networks

    Mari Carmen Domingo

    2007-04-01

    Full Text Available When a node in an ad hoc network wants Internet access, it needs to obtain information about the available gateways and it should select the most appropriate of them. In this work we propose a new gateway discovery scheme suitable for real-time applications that adjusts the frequency of gateway advertisements dynamically. This adjustment is related to the percentage of real-time sources that have quality of service problems because of excessive end-to-end delays. The optimal values for the configuration parameters (time interval and threshold of the proposed adaptive gateway discovery mechanism for the selected network conditions have been studied with the aid of simulations. The scalability of the proposed scheme with respect to mobility as well as the impact of best-effort traffic load have been analyzed. Simulation results indicate that the proposed scheme significantly improves the average end-to-end delay, jitter and packet delivery ratio of real-time flows; the routing overhead is also reduced and there is no starvation of best-effort traffic.

  7. Optimal Policy of Cross-Layer Design for Channel Access and Transmission Rate Adaptation in Cognitive Radio Networks

    Jiang Zhu

    2010-01-01

    Full Text Available In this paper, we investigate the cross-layer design of joint channel access and transmission rate adaptation in CR networks with multiple channels for both centralized and decentralized cases. Our target is to maximize the throughput of CR network under transmission power constraint by taking spectrum sensing errors into account. In centralized case, this problem is formulated as a special constrained Markov decision process (CMDP, which can be solved by standard linear programming (LP method. As the complexity of finding the optimal policy by LP increases exponentially with the size of action space and state space, we further apply action set reduction and state aggregation to reduce the complexity without loss of optimality. Meanwhile, for the convenience of implementation, we also consider the pure policy design and analyze the corresponding characteristics. In decentralized case, where only local information is available and there is no coordination among the CR users, we prove the existence of the constrained Nash equilibrium and obtain the optimal decentralized policy. Finally, in the case that the traffic load parameters of the licensed users are unknown for the CR users, we propose two methods to estimate the parameters for two different cases. Numerical results validate the theoretic analysis.

  8. Accessible bioprinting: adaptation of a low-cost 3D-printer for precise cell placement and stem cell differentiation.

    Reid, John A; Mollica, Peter A; Johnson, Garett D; Ogle, Roy C; Bruno, Robert D; Sachs, Patrick C

    2016-01-01

    The precision and repeatability offered by computer-aided design and computer-numerically controlled techniques in biofabrication processes is quickly becoming an industry standard. However, many hurdles still exist before these techniques can be used in research laboratories for cellular and molecular biology applications. Extrusion-based bioprinting systems have been characterized by high development costs, injector clogging, difficulty achieving small cell number deposits, decreased cell viability, and altered cell function post-printing. To circumvent the high-price barrier to entry of conventional bioprinters, we designed and 3D printed components for the adaptation of an inexpensive 'off-the-shelf' commercially available 3D printer. We also demonstrate via goal based computer simulations that the needle geometries of conventional commercially standardized, 'luer-lock' syringe-needle systems cause many of the issues plaguing conventional bioprinters. To address these performance limitations we optimized flow within several microneedle geometries, which revealed a short tapered injector design with minimal cylindrical needle length was ideal to minimize cell strain and accretion. We then experimentally quantified these geometries using pulled glass microcapillary pipettes and our modified, low-cost 3D printer. This systems performance validated our models exhibiting: reduced clogging, single cell print resolution, and maintenance of cell viability without the use of a sacrificial vehicle. Using this system we show the successful printing of human induced pluripotent stem cells (hiPSCs) into Geltrex and note their retention of a pluripotent state 7 d post printing. We also show embryoid body differentiation of hiPSC by injection into differentiation conducive environments, wherein we observed continuous growth, emergence of various evaginations, and post-printing gene expression indicative of the presence of all three germ layers. These data demonstrate an

  9. A methodology for the valuation and selection of adaptable technology portfolios and its application to small and medium airports

    Pinon, Olivia J.

    The increase in the types of airspace users (large aircraft, small and regional jets, very light jets, unmanned aerial vehicles, etc.), as well as the very limited number of future new airport development projects are some of the factors that will characterize the next decades in air transportation. These factors, associated with a persistent growth in air traffic will worsen the current gridlock situation experienced at some major airports. As airports are becoming the major capacity bottleneck to continued growth in air traffic, it is therefore primordial to make the most efficient use of the current, and very often, underutilized airport infrastructure. This research thus proposes to address the increase in air traffic demand and resulting capacity issues by considering the implementation of operational concepts and technologies at underutilized airports. However, there are many challenges associated with sustaining the development of this type of airports. First, the need to synchronize evolving technologies with airports’ needs and investment capabilities is paramount. Additionally, it was observed that the evolution of secondary airports, and their needs, is tightly linked to the environment in which they operate. In particular, sensitivity of airports to changes in the dynamics of their environment is important, therefore requiring that the factors that drive the need for technology acquisition be identified and characterized. Finally, the difficulty to evaluate risk and make financially viable decisions, particularly when investing in new technologies, cannot be ignored. This research provides a methodology that addresses these challenges and ensures the sustainability of airport capacity-enhancement investments in a continuously changing environment. In particular, it is articulated around the need to provide decision makers with the capability to valuate and select adaptable technology portfolios to ensure airport financial viability. Hence, the four

  10. A Semantic-Oriented Architecture of a Functional Module for Personalized and Adaptive Access to the Knowledge in a Multimedia Digital Library

    Paneva-Marinova, Desislava

    2008-01-01

    This article presents the principal results of the doctoral thesis “Semantic-oriented Architecture and Models for Personalized and Adaptive Access to the Knowledge in Multimedia Digital Library” by Desislava Ivanova Paneva-Marinova (Institute of Mathematics and Informatics), successfully defended before the Specialised Academic Council for Informatics and Mathematical Modelling on 27 October, 2008. This paper presents dissertation work on semantic-oriented architectures and...

  11. A new PON system for LAN and medium/high-speed Internet access%一种适用于LAN及 中高速Internet接入的PON系统

    冯先成; 韵湘; 胡煌球

    2001-01-01

    一种适用于中高速计算机通信的共享接入的新型PON系统,将使多个ONU公平共享一条高速宽带通道,从而提供经济有效的中高速Internet接入.%A new shared-access system suitable for medium/high-speed Internet access has been developed. This system is based on PON system. By using the new shared-access technologies, where a high-speed path for computer communication is shared equally by multiple OUNs, high-speed path for Internet access can be provided economically.

  12. Study on a compact and adaptable Thomson Spectrometer for laser-initiated 11B(p,α)8Be reactions and low-medium energy particle detection

    Consoli, F.; De Angelis, R.; Bonasera, A.; Sura, J.; Andreoli, P.; Cristofari, G.; Cipriani, M.; Di Giorgio, G.; Ingenito, F.; Barbarino, M.; Labaune, C.; Baccou, C.; Depierreux, S.; Goyon, C.; Yahia, V.

    2016-05-01

    Thomson Spectrometers are of primary importance in the discrimination of particles produced by laser-plasma interaction, according to their energy and charge-mass ratio. We describe here a detailed study on a set of Thomson Spectrometers, adaptable to different experimental situations, with the aim of being placed directly within the experimental chamber, rather than in additional extensions, in order to increase the solid angle of observation. These instruments are suitable for detection of low-medium energy particles and can be effectively employed in laser-plasma experiments of 11B(p,α)8Be fusion. They are provided with permanent magnets, have small dimensions and compact design. In these small configurations electric and magnetic fringing fields play a primary role for particle deflection, and their accurate characterization is required. It was accomplished by means of COMSOL electromagnetic solver coupled to an effective analytical model, very suitable for practical use of the spectrometers. Data from experimental measurements of the magnetic fields have been also used. We describe the application of the spectrometers to an experiment of laser-plasma interaction, coupled to Imaging Plate detectors. Data analysis for spectrum and yield of the detected radiation is discussed in detail.

  13. Catalase activity is stimulated by H2O2 in rich culture medium and is required for H2O2 resistance and adaptation in yeast

    Dorival Martins

    2014-01-01

    Full Text Available Catalases are efficient scavengers of H2O2 and protect cells against H2O2 stress. Examination of the H2O2 stimulon in Saccharomyces cerevisiae revealed that the cytosolic catalase T (Ctt1 protein level increases 15-fold on H2O2 challenge in synthetic complete media although previous work revealed that deletion of the CCT1 or CTA1 genes (encoding peroxisomal/mitochondrial catalase A does not increase the H2O2 sensitivity of yeast challenged in phosphate buffer (pH 7.4. This we attributed to our observation that catalase activity is depressed when yeast are challenged with H2O2 in nutrient-poor media. Hence, we performed a systematic comparison of catalase activity and cell viability of wild-type yeast and of the single catalase knockouts, ctt1∆ and cta1∆, following H2O2 challenge in nutrient-rich medium (YPD and in phosphate buffer (pH 7.4. Ctt1 but not Cta1 activity is strongly induced by H2O2 when cells are challenged in YPD but suppressed when cells are challenged in buffer. Consistent with the activity results, exponentially growing ctt1∆ cells in YPD are more sensitive to H2O2 than wild-type or cta1∆ cells, whereas in buffer all three strains exhibit comparable H2O2 hypersensitivity. Furthermore, catalase activity is increased during adaptation to sublethal H2O2 concentrations in YPD but not in buffer. We conclude that induction of cytosolic Ctt1 activity is vital in protecting yeast against exogenous H2O2 but this activity is inhibited by H2O2 when cells are challenged in nutrient-free media.

  14. The resilience activation framework: a conceptual model of how access to social resources promotes adaptation and rapid recovery in post-disaster settings.

    Abramson, David M; Grattan, Lynn M; Mayer, Brian; Colten, Craig E; Arosemena, Farah A; Bedimo-Rung, Ariane; Lichtveld, Maureen

    2015-01-01

    A number of governmental agencies have called for enhancing citizens' resilience as a means of preparing populations in advance of disasters, and as a counterbalance to social and individual vulnerabilities. This increasing scholarly, policy, and programmatic interest in promoting individual and communal resilience presents a challenge to the research and practice communities: to develop a translational framework that can accommodate multidisciplinary scientific perspectives into a single, applied model. The Resilience Activation Framework provides a basis for testing how access to social resources, such as formal and informal social support and help, promotes positive adaptation or reduced psychopathology among individuals and communities exposed to the acute collective stressors associated with disasters, whether human-made, natural, or technological in origin. Articulating the mechanisms by which access to social resources activate and sustain resilience capacities for optimal mental health outcomes post-disaster can lead to the development of effective preventive and early intervention programs. PMID:24870399

  15. High Speed, Low Cost Telemetry Access from Space Development Update on Programmable Ultra Lightweight System Adaptable Radio (PULSAR)

    Simms, William Herbert, III; Varnavas, Kosta; Eberly, Eric

    2014-01-01

    Software Defined Radio (SDR) technology has been proven in the commercial sector since the early 1990's. Today's rapid advancement in mobile telephone reliability and power management capabilities exemplifies the effectiveness of the SDR technology for the modern communications market. In contrast, the foundations of transponder technology presently qualified for satellite applications were developed during the early space program of the 1960's. Conventional transponders are built to a specific platform and must be redesigned for every new bus while the SDR is adaptive in nature and can fit numerous applications with no hardware modifications. A SDR uses a minimum amount of analog / Radio Frequency (RF) components to up/down-convert the RF signal to/from a digital format. Once the signal is digitized, all processing is performed using hardware or software logic. Typical SDR digital processes include; filtering, modulation, up/down converting and demodulation. NASA Marshall Space Flight Center (MSFC) Programmable Ultra Lightweight System Adaptable Radio (PULSAR) leverages existing MSFC SDR designs and commercial sector enhanced capabilities to provide a path to a radiation tolerant SDR transponder. These innovations (1) reduce the cost of NASA Low Earth Orbit (LEO) and Deep Space standard transponders, (2) decrease power requirements, and (3) commensurately reduce volume. A second pay-off is the increased SDR flexibility by allowing the same hardware to implement multiple transponder types simply by altering hardware logic - no change of hardware is required - all of which will ultimately be accomplished in orbit. Development of SDR technology for space applications will provide a highly capable, low cost transponder to programs of all sizes. The MSFC PULSAR Project results in a Technology Readiness Level (TRL) 7 low-cost telemetry system available to Smallsat and CubeSat missions, as well as other platforms. This paper documents the continued development and

  16. RED for PMTCT: an adaptation of immunization's Reaching Every District approach increases coverage, access, and utilization of PMTCT care in Bondo District, Kenya.

    Kanyuuru, Lynn; Kabue, Mark; Ashengo, Tigistu A; Ruparelia, Chandrakant; Mokaya, Evans; Malonza, Isaac

    2015-06-01

    Gaps exist in coverage, early access, and utilization of prevention of mother-to-child transmission of HIV (PMTCT) services in Kenya. The Maternal and Child Health Integrated Program, led by Jhpiego, piloted an adaptation of immunization's Reaching Every District (RED) approach in Bondo District as a way of improving PMTCT care. Routine district-level monthly summary service delivery pre- and post-implementation data were analyzed. Marked improvements resulted in the proportion of HIV-infected and non-infected pregnant women completing four focused prenatal care visits, from 25% to 41%, and the proportion of HIV-exposed infants (HEIs) tested at six weeks, from 27% to 78% (PHIV infection at 12months was 52%, while 77% of HEIs were issued antiretroviral prophylaxis by the end of the pilot. Implementation of RED for PMTCT demonstrated that PMTCT services can be delivered effectively in the context of the existing community strategy and resulted in increased coverage, access, and utilization of care for HIV-positive pregnant women and their children. PMID:26115861

  17. Programmable Ultra Lightweight System Adaptable Radio (PULSAR) Low Cost Telemetry - Access from Space Advanced Technologies or Down the Middle

    Sims. Herb; Varnavas, Kosta; Eberly, Eric

    2013-01-01

    Software Defined Radio (SDR) technology has been proven in the commercial sector since the early 1990's. Today's rapid advancement in mobile telephone reliability and power management capabilities exemplifies the effectiveness of the SDR technology for the modern communications market. In contrast, presently qualified satellite transponder applications were developed during the early 1960's space program. Programmable Ultra Lightweight System Adaptable Radio (PULSAR, NASA-MSFC SDR) technology revolutionizes satellite transponder technology by increasing data through-put capability by, at least, an order of magnitude. PULSAR leverages existing Marshall Space Flight Center SDR designs and commercially enhanced capabilities to provide a path to a radiation tolerant SDR transponder. These innovations will (1) reduce the cost of NASA Low Earth Orbit (LEO) and Deep Space transponders, (2) decrease power requirements, and (3) a commensurate volume reduction. Also, PULSAR increases flexibility to implement multiple transponder types by utilizing the same hardware with altered logic - no analog hardware change is required - all of which can be accomplished in orbit. This provides high capability, low cost, transponders to programs of all sizes. The final project outcome would be the introduction of a Technology Readiness Level (TRL) 7 low-cost CubeSat to SmallSat telemetry system into the NASA Portfolio.

  18. 面向普适计算的自适应模糊访问控制方法%Adaptive fuzzy access control method for pervasive computing

    张立臣; 王小明; 窦文阳

    2012-01-01

    普适环境中的上下文信息是普适访问控制的关键因素,对主体的授权和对主体使用权限过程的控制具有决定性影响.系统安全强度和安全策略应随上下文的变化而动态改变.传统访问控制模型均未考虑上下文对安全强度和安全策略的动态影响,不适合普适计算环境.提出了普适环境下安全强度和安全策略随上下文动态变化的思想,基于区间值模糊集合理论建立了上下文信息相关的产生式规则,设计了一种简单高效的区间值模糊访问控制方法,以提高普适计算系统中安全强度和安全策略的自适应性,更符合普适环境.%Context information is one of the key factors in pervasive access control systems, and produces the decisive influence on authorization and permission control on the subjects in pervasive computing environments. The security threshold intensity and the security policies should rectify according to the changes of context information, which has not been taken into consideration by traditional access control models, not fitting for the pervasive computing environment. In order to deeply adapt to the pervasive computing environment, the idea of security threshold intensity and security policies adjusted according to the changes of context information is proposed. A context related production rules based on the interval-valued fuzzy theory are produced, and a simple efficient interval value fuzzy access control method is designed to improve the adaptivity of the security threshold intensity and security policies in pervasive computing systems.

  19. Multiuser Medium Access Algorithm Research in Distributed Cognitive Network%分布式认知网络中多用户频谱接入算法研究

    黄丽; 朱光喜; 方红斌; 王德胜

    2012-01-01

    认知频谱接入技术通过感知侦测并伺机接入空闲频带,大大缓解了频谱资源稀缺和利用率低下的矛盾.在未知信道占用信息情况下,认知用户如何快速找到最优空闲信道,并避免相互之间的冲突,是认知接入算法的难点和关键技术.本文中提出一种低复杂度的分布式认知接入算法,通过学习物理层的感知结果和链路层的发送确认信息,同时获取主用户的信道占用概率和从用户之间的冲突概率,能快速选择感知信道,并有效避免了从用户之间的竞争.仿真结果表明,该算法在未知信道占用概率信息的情况下,网络平均吞吐量明显优于贪婪等算法,很好地解决了认知网络中多个从用户频谱共享问题,同时收敛速度较快.%Cognitive medium access, built on sensing and accessing idle frequency bands, greatly releases the confliction between the frequency scarcity and the low utilization of a precious radio resource. How to quickly probe and optimally exploit multiple vacant channels with unknown parameters as well as to avoid the competition among cognitive users, is key to the cognitive access strategy. This paper proposed a low complexity and efficient distributed access strategy based on joint design of sensing results in physical layer and acknowledgment information in medium access layer, which not only learned from primary time-varying traffic information but also considered spectrum-sharing among competitive cognitive users. Finally, numerical results show that the algorithm can gain higher average throughout compared with greedy strategy etc. without a prior transition probability of each channel and has faster convergence.

  20. Body surface area adapted iopromide 300 mg/ml versus 370 mg/ml contrast medium injection protocol: Influence on quantitative and clinical assessment in combined PET/CT

    Purpose: To investigate the quantitative and qualitative differences between combined positron emission tomography and computed X-ray tomography (PET/CT) enhanced with contrast medium with either an iodine concentration 300 mg/ml or 370 mg/ml. Materials and methods: 120 consecutive patients scheduled for F-18-Fluorodeoxyglucose (FDG) PET/CT were included. The first (second) 60 patients received contrast medium with 300 (370) mg iodine/ml. Intravenous injection protocols were adapted for an identical iodine delivery rate (1.3 mg/s) and body surface area (BSA) adapted iodine dose (22.26 g I/m2). Maximum and mean standardized uptake values (SUVmax; SUVmean) and contrast enhancement (HU) were determined in the ascending aorta, the abdominal aorta, the inferior vena cava, the portal vein, the liver and the right kidney in the venous contrast medium phase. PET data were evaluated visually for the presence of malignancy and image quality. Results: Both media caused significantly higher values for HU, SUVmean and SUVmax for the enhanced PET/CT than the non-enhanced one (all p < 0.01). There were no significant differences in the degree of increase of HU, SUVmean and SUVmax between the two contrast media at any anatomic site (all p > 0.05). Visual evaluation of lesions showed no differences between contrast and non-contrast PET/CT or between the two different contrast media (p = 0.77). Conclusion: When using a constant iodine delivery rate and total iodine dose in a BSA adapted injection protocol, there are no quantitative or qualitative differences in either CT or PET between contrast media with an iodine concentration of 300 mg/ml and 370 mg/ml, respectively

  1. Body surface area adapted iopromide 300 mg/ml versus 370 mg/ml contrast medium injection protocol: Influence on quantitative and clinical assessment in combined PET/CT

    Verburg, Frederik A., E-mail: fverburg@ukaachen.de [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Apitzsch, Jonas [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Lensing, Carina [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Kuhl, Christiane K. [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Pietsch, Hubertus [Bayer Pharma AG, Müllerstrasse 178, 13353 Berlin (Germany); Mottaghy, Felix M. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Behrendt, Florian F. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany)

    2013-12-01

    Purpose: To investigate the quantitative and qualitative differences between combined positron emission tomography and computed X-ray tomography (PET/CT) enhanced with contrast medium with either an iodine concentration 300 mg/ml or 370 mg/ml. Materials and methods: 120 consecutive patients scheduled for F-18-Fluorodeoxyglucose (FDG) PET/CT were included. The first (second) 60 patients received contrast medium with 300 (370) mg iodine/ml. Intravenous injection protocols were adapted for an identical iodine delivery rate (1.3 mg/s) and body surface area (BSA) adapted iodine dose (22.26 g I/m{sup 2}). Maximum and mean standardized uptake values (SUV{sub max}; SUV{sub mean}) and contrast enhancement (HU) were determined in the ascending aorta, the abdominal aorta, the inferior vena cava, the portal vein, the liver and the right kidney in the venous contrast medium phase. PET data were evaluated visually for the presence of malignancy and image quality. Results: Both media caused significantly higher values for HU, SUV{sub mean} and SUV{sub max} for the enhanced PET/CT than the non-enhanced one (all p < 0.01). There were no significant differences in the degree of increase of HU, SUV{sub mean} and SUV{sub max} between the two contrast media at any anatomic site (all p > 0.05). Visual evaluation of lesions showed no differences between contrast and non-contrast PET/CT or between the two different contrast media (p = 0.77). Conclusion: When using a constant iodine delivery rate and total iodine dose in a BSA adapted injection protocol, there are no quantitative or qualitative differences in either CT or PET between contrast media with an iodine concentration of 300 mg/ml and 370 mg/ml, respectively.

  2. Effects of feed access after hatch and inclusion of fish oil and medium chain fatty acids in a pre-starter diet on broiler chicken growth performance and humoral immunity.

    Lamot, D M; van der Klein, S A S; van de Linde, I B; Wijtten, P J A; Kemp, B; van den Brand, H; Lammers, A

    2016-09-01

    Delayed feed and water access is known to impair growth performance of day old broiler chickens. Although effects of feed access on growth performance and immune function of broilers have been examined before, effects of dietary composition and its potential interaction with feed access are hardly investigated. This experiment aimed to determine whether moment of first feed and water access after hatch and pre-starter composition (0 to 7 days) affect growth rate and humoral immune function in broiler chickens. Direct fed chickens received feed and water directly after placement in the grow-out facility, whilst delayed fed chickens only after 48 h. Direct and delayed fed chickens received a control pre-starter diet, or a diet containing medium chain fatty acids (MCFA) or fish oil. At 21 days, chickens were immunized by injection of sheep red blood cells. The mortality rate depended on an interaction between feed access and pre-starter composition (P=0.014). Chickens with direct feed access fed the control pre-starter diet had a higher risk for mortality than chickens with delayed feed access fed the control pre-starter diet (16.4% v. 4.2%) whereas the other treatment groups were in-between. BW gain and feed intake till 25 days in direct fed chickens were higher compared with delayed fed chickens, whilst gain to feed ratio was lower. Within the direct fed chickens, the control pre-starter diet resulted in the highest BW at 28 days and the MCFA pre-starter diet the lowest (Δ=2.4%), whereas this was opposite for delayed fed chickens (Δ=3.0%; P=0.033). Provision of MCFA resulted in a 4.6% higher BW gain and a higher gain to feed ratio compared with other pre-starter diets, but only during the period it was provided (2 to 7 days). Minor treatment effects were found for humoral immune response by measuring immunoglobulins, agglutination titers, interferon gamma (IFN- γ ), and complement activity. Concluding, current inclusion levels of fish oil (5 g/kg) and MCFA (30 g

  3. Medium Access Control of Non Uniformly Distributed Multi Hop Network Communication Node%非均匀分布多跳网络通信节点介质访问控制

    杨志忠

    2015-01-01

    在非均匀分布多跳网络中,需要对通信节点进行介质访问控制设计,提高网络通信节点的吞吐性和安全性.传统方法采用多路复用器输出端口信号检测方法进行非均匀分布多跳网络通信节点的介质访问控制,产生强烈的信道畸变,节点的通信控制性能不好.提出一种基于协同调度的混合协议激振算法的非均匀分布多跳网络通信节点介质访问控制方法.将非均匀分布多跳网络通信节点分簇模型的服务器网络接收端和发送端数据的信息熵作为信道传递向量函数,构建协同调度混合协议服务器模型,求得非均匀分布多跳网络时延扩展与信道特性测量均衡后的频谱,可以有效提高信息传输的保真度.仿真结果表明,采用该算法可以有效提高对多跳网络的通信节点介质访问控制性能,提高了通信节点的吞吐性能,降低重复传输次数,保证非均匀分布多跳网络通信的安全性和保真性.%In the non uniform distribution in multi hop networks, the need for access control design of node communication medium, to increase the throughput and security of network communication node. The traditional method is using the detec-tion method of the multiplexer output port signals are non uniformly distributed multi hop network communication node me-dium access control, produce the channel distortion strongly, node communication control performance is not good. This pa-per proposes a hybrid protocol excitation algorithm based on collaborative scheduling non-uniform distribution of multi hop network communication node medium access control method. Non uniform distribution of multi hop network communication node clustering model information entropy server network receiver and transmitter data as the channel transfer vector func-tion, construction of the collaborative scheduling hybrid protocol server model, obtain the non uniformly distributed multi hop network delay spread and

  4. 计算机辅助器具适配方法与挑战%Computer Access Assessment and Adaptation:Methods and Challenges (review)

    魏晨婧; 孙利宁; 赖卿; 李高峰

    2015-01-01

    The computer access, such as special mouse keyboard, software of the voice input and the magnified or reading screen, etc., can facilitate the people with disabilities to use the computer more efficiently. The computer access adaption should be evaluated to meet the users' needs, their function and the circumstances in which they live. The products should be easily designed, remade, and used for the cus-tomers and the prices should be available. For China, it is important to form professional teams, establish the good service process, achieve more supports, especially financial support, to research and develop more varieties of products.%计算机辅具,如特制的鼠标键盘、语音输入、读屏放大软件等,可以帮助功能障碍者更有效率地使用计算机,是他们获得全面康复的重要手段.计算机辅具适配需要根据使用者的需求、所处环境、身体功能等进行评估,遵循由简到繁原则,购买、改造或设计安全易用、经济易得的产品.我国计算机辅具适配服务刚刚起步,急需建立专业评估团队,设立科学的服务流程,研发多样的产品,引发各界关注,寻求更多的经费支持.

  5. Use of Adaptive Laboratory Evolution To Discover Key Mutations Enabling Rapid Growth of Escherichia coli K-12 MG1655 on Glucose Minimal Medium

    LaCroix, Ryan A.; Sandberg, Troy E.; O'Brien, Edward J.;

    2015-01-01

    Adaptive laboratory evolution (ALE) has emerged as an effective tool for scientific discovery and addressing biotechnological needs. Much of ALE's utility is derived from reproducibly obtained fitness increases. Identifying causal genetic changes and their combinatorial effects is challenging and...... exponential growth, fitness increases up to 1.6-fold were obtained compared to the wild type. These increases are comparable to previously reported maximum growth rates in similar conditions but were obtained over a shorter time frame. Across the eight replicate ALE experiments performed, causal mutations...... were identified using three approaches: identifying mutations in the same gene/region across replicate experiments, sequencing strains before and after computationally determined fitness jumps, and allelic replacement coupled with targeted ALE of reconstructed strains. Three genetic regions were most...

  6. Metabolic and proteomic adaptation of Lactobacillus rhamnosus strains during growth under cheese-like environmental conditions compared to de Man, Rogosa, and Sharpe medium.

    Bove, Claudio Giorgio; De Angelis, Maria; Gatti, Monica; Calasso, Maria; Neviani, Erasmo; Gobbetti, Marco

    2012-11-01

    The aim of this study was to demonstrate the metabolic and proteomic adaptation of Lactobacillus rhamnosus strains, which were isolated at different stages of Parmigiano Reggiano cheese ripening. Compared to de Man, Rogosa, and Sharpe (MRS) broth, cultivation under cheese-like conditions (cheese broth, CB) increased the number of free amino acids used as carbon sources. Compared with growth on MRS or pasteurized and microfiltrated milk, all strains cultivated in CB showed a low synthesis of d,l-lactic acid and elevated levels of acetic acid. The proteomic maps of the five representative strains, showing different metabolic traits, were comparatively determined after growth on MRS and CB media. The amount of intracellular and cell-associated proteins was affected by culture conditions and diversity between strains, depending on their time of isolation. Protein spots showing decreased (62 spots) or increased (59 spot) amounts during growth on CB were identified using MALDI-TOF-MS/MS or LC-nano-ESI-MS/MS. Compared with cultivation on MRS broth, the L. rhamnosus strains cultivated under cheese-like conditions had modified amounts of some proteins responsible for protein biosynthesis, nucleotide, and carbohydrate metabolisms, the glycolysis pathway, proteolytic activity, cell wall, and exopolysaccharide biosynthesis, cell regulation, amino acid, and citrate metabolism, oxidation/reduction processes, and stress responses. PMID:22965658

  7. Pre-stack reverse-time migration based on the time–space domain adaptive high-order finite-difference method in acoustic VTI medium

    With the increment of seismic exploration precision requirement, it is significant to develop the anisotropic migration methods. Pre-stack reverse-time migration (RTM) is performed based on acoustic vertical transversely isotropic (VTI) wave equations, and the accuracy and efficiency of RTM strongly depend on the algorithms used for wave equation numerical solution. Finite-difference (FD) methods have been widely used in numerical solution of wave equations. The conventional FD method derives spatial FD coefficients from the space domain dispersion relation, and it is difficult to satisfy the time–space domain dispersion relation of the wave equation exactly. In this paper, we adopt a time–space domain FD method to solve acoustic VTI wave equations. Dispersion analysis and numerical modelling results demonstrate that the time–space domain FD method has greater accuracy than the conventional FD method under the same discretizations. The time–space domain high-order FD method is also applied in the wavefield extrapolation of acoustic VTI pre-stack RTM. The model tests demonstrate that the acoustic VTI pre-stack RTM based on the time–space domain FD method can obtain better images than that based on the conventional FD method, and the processing results show that the imaging quality of the acoustic VTI RTM is clearer and more correct than that of acoustic isotropic RTM. Meanwhile, in the process of wavefield forward and backward extrapolation, we employ adaptive variable-length spatial operators to compute spatial derivatives to improve the computational efficiency effectively almost without reducing the imaging accuracy. (paper)

  8. Cross-layer combining of power control and adaptive modulation with truncated ARQ for cognitive radios

    CHENG Shi-lun; YANG Zhen

    2008-01-01

    To maximize throughput and to satisfy users' requirements in cognitive radios, a cross-layer optimization problem combining adaptive modulation and power control at the physical layer and truncated automatic repeat request at the medium access control layer is proposed. Simulation results show the combination of power control, adaptive modulation, and truncated automatic repeat request can regulate transmitter powers and increase the total throughput effectively.

  9. CORELA: A cooperative relaying enhanced link adaptation algorithm for IEEE 802.11 WLANs

    Li, L.; Kaleshi, D; Zhong, Fan

    2011-01-01

    One of the key challenges for cooperative relaying multi-rate wireless networks is the integration and interaction of relaying with link adaptation algorithms, in particular under incomplete and/or imprecise channel state information conditions. In this paper we propose a practical cooperative relaying link adaptation medium access protocol that considers the historical link quality to enable the relay terminal to adjust its transmission relaying rate by estimating the error probability based...

  10. Decentralised Learning MACs for Collision-free Access in WLANs

    Fang, Minyu; Duffy, Ken R; Leith, Douglas J

    2010-01-01

    By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two scheme that are practically realisable, decentralised approximations of this optimal scheme and operate with different amounts of sensing information. We achieve this by (1) introducing learning algorithms that can substantially speed up convergence to collision free operation; (2) developing a decentralised schedule length adaptation scheme that provides long-run fair (uniform) access to the medium while maintaining collision-free access for arbitrary numbers of stations.

  11. Adapting an evidence-based intervention for HIV to avail access to testing and risk-reduction counseling for female victims of sexual violence in post-earthquake Haiti.

    Rahill, Guitele J; Joshi, Manisha; Hernandez, Anthony

    2016-01-01

    Haiti has the highest prevalence of HIV/AIDS in the Caribbean. Before the 2010 earthquake, Haitian women bore a disproportionate burden of HIV/AIDS, had lower HIV knowledge, less capacity to negotiate for safer sex, and limited access to HIV testing and risk-reduction (RR) counseling. Since 2010, there has been an increase in sexual violence against women, characterized by deliberate vaginal injuries by non-intimate partners, increasing victims' risk of sexually transmitted infections including HIV/AIDS. Needed is an adaptation of evidence-based interventions for HIV that include HIV testing and counseling for this stigmatized population. We reviewed several features of Centers for Disease Control and Prevention's 103 evidence-based interventions for HIV (e.g., measures used, participant risk characteristics, theoretical framework, outcome variables, and evidence tier) in an attempt to seek a feasibly adaptable evidence-based intervention for HIV that could be used for victims of sexual violence (VOSV). RESPECT, one of the reviewed evidence-based HIV interventions, comprises of one-on-one, client-focused HIV prevention/RR counseling, and RAPID HIV testing. Adapting RESPECT can enhance access to testing for Haitian VOSV and can influence their perceptions of HIV risk, and establishment of RR goals for future consensual intimate relations. Adapting and implementing RESPECT can increase uptake of evidence-based HIV interventions among Haitians and positively affect a region with high HIV prevalence and increased rates of sexual violence. PMID:26278002

  12. Is the adapted Household Food Insecurity Access Scale (HFIAS) developed internationally to measure food insecurity valid in urban and rural households of Ethiopia?

    Gebreyesus, Seifu H; Lunde, Torleif; Mariam, Damen H.; Woldehanna, Tassew; Lindtjørn, Bernt

    2015-01-01

    Background The concept of food insecurity encompasses three dimensions. One of these dimensions, the access component of household food insecurity is measured through the use of the Household Food Insecurity Access Scale (HFIAS). Despite its application in Ethiopia and other similar developing countries, its performance is still poorly explored. Our study aims to evaluate the validity of the HFIAS in Ethiopia. Methods We conducted repeated cross-sectional studies in urban and rural villages o...

  13. Expressing Adaptation Strategies Using Adaptation Patterns

    Zemirline, N.; Bourda, Y.; Reynaud, C.

    2012-01-01

    Today, there is a real challenge to enable personalized access to information. Several systems have been proposed to address this challenge including Adaptive Hypermedia Systems (AHSs). However, the specification of adaptation strategies remains a difficult task for creators of such systems. In this paper, we consider the problem of the definition…

  14. The Medium is the Message

    Ørum, Tania

    2016-01-01

    Danish avant-garde artists did not have the access to professional sound studios and public radio open to their colleagues in Swede, but they were equally interested in working with sound as a medium and in gaining acces to the electronic mass media. This essay examines one of the few experimental...

  15. Distributed and adaptive access mechanism supporting multiple-priority levels of throughput%支持优先等级的分布式自适应接入方案

    石春; 何书前; 邓正杰; 张洁

    2015-01-01

    By studying the adjustment rules and ranges of access parameters ,a distributed and adaptive access mechanism was proposed based on channel status information .By sensing and counting channel busy status ,a node adjusting contention window linearly according to different access categories was designed ,which separated the adjustment rules of parameters from the status of data transmissions and alleviated the effect of fixed ranges of contention window on performance .The simulation results demonstrate the validity and scalability of the proposed access mechanism .%对接入参数调整策略和参数范围进行研究,基于信道状态信息,提出支持不同优先等级业务类型的分布式自适应接入方案。通过感知并统计信道状态数据,设计适合不同业务类型的线性调整竞争窗口的方法,解决接入参数调整对于数据传输状态的依赖和固定竞争窗口范围对性能的影响。仿真结果验证了该算法的有效性和良好的可扩展性能。

  16. Adaptive ethnography

    Berth, Mette

    2005-01-01

    This paper focuses on the use of an adaptive ethnography when studying such phenomena as young people's use of mobile media in a learning perspective. Mobile media such as PDAs and mobile phones have a number of affordances which make them potential tools for learning. However, before we begin to...... design and develop educational materials for mobile media platforms we must first understand everyday use and behaviour with a medium such as a mobile phone. The paper outlines the research design for a PhD project on mobile learning which focuses on mobile phones as a way to bridge the gap between...... formal and informal learning contexts. The paper also proposes several adaptive methodological techniques for studying young people's interaction with mobiles....

  17. 接入技术与基础网络设施之适应性研究%The Research on Adaptabilities of Access Technologies to the Network Infrastructure

    周强; 张文生

    2015-01-01

    在中国国内各地的有线电视网络上,充斥着多种接入网技术,太多技术难免造成“选择性困惑”。本文作者构建了“周氏平面”,并利用该平面形象地描述了各种接入技术与基础网络设施之间的适应性关系,从而对运营商的技术选择和未来的技术演进提供了有益的帮助。%Variety of access technologies already existed in those cable networks around China. So many technol-ogies often make operators dropped in the"selectivity confusion”. This article will start from the most basic hierarchy of cable television network&applications, discusses the intrinsic connections between those various layers. Especially, the author created a kind of "Zhou Chart" to describe the relations between access technologies layer and network infrastructure layer. With this chart, the adaptability of various access technologies to the different network infrastruc-tures (i.e. matching) can be understood very easily and graphically, thus such a chart can be helps for operators how to select technology correctly and future network evolution path.

  18. Adipose tissue partitioning of limit-fed beef cattle and beef cattle with ad libitum access to feed differing in adaptation to heat.

    Sprinkle, J E; Ferrell, C L; Holloway, J W; Warrington, B G; Greene, L W; Wu, G; Stuth, J W

    1998-03-01

    We compared fat distribution and lipoprotein lipase (LPL) activity in steers differing in adaptability to the subtropics. Steers were fed a grain diet (3.13 Mcal ME/kg DM) at limited (150 kcal ME x kg[-.75] x d[-1]; .23 kg ADG) or ad libitum levels for 140 d, then slaughtered. Sixteen British- (8 Angus, 8 Hereford; S), 16 Boran- (R), 16 Brahman- (B), and 16 Tuli- (T) cross steers from MARC III composite cows were used. Adipose tissue samples from perirenal, omental, and subcutaneous depots were analyzed for LPL activity. Carcass measurements including omental, external, and seam fat trim from 1/ 2 of the carcass were measured. Subcutaneous fat had greater (P .05) in fat distribution for steers fed at limited levels. Means for ADG, slaughter weights, carcass weights, yield grades, and carcass lipid weights for S and B fed for ad libitum intake were greater (P .05) for the other breeds with ad libitum intake. Factor analysis of fat depots for animals with ad libitum intake indicated that Bos taurus cattle differing in adaptation to heat deposited fat differently; S deposited greater (P < .05) proportions of carcass fat and T deposited greater (P < .05) proportions of internal fat. It seems that accumulation of internal fat is detrimental for ADG for Bos taurus cattle. PMID:9535321

  19. Genotipagem de polimorfismos associados com sistemas de macho-esterilidade em acessos de cebola adaptados ao Brasil Genotyping of polymorphisms associated with male-sterility systems in onion accessions adapted for cultivation in Brazil

    Carlos Francisco Ragassi

    2012-09-01

    Full Text Available A produção em escala comercial de sementes híbridas de cebola (Allium cepa tem sido conduzida com o emprego de dois sistemas de macho-esterilidade do tipo genética-citoplasmática (CMS-S e CMS-T em associação ao citoplasma normal (macho-fértil. No entanto, a análise molecular desses diferentes tipos citoplasmáticos ainda não está disponível para um grande número de acessos de cebola adaptados para cultivo em regiões tropicais. Além de adaptação às condições edafoclimáticas do Brasil, muitos desses acessos apresentam tolerância a doenças, sendo de potencial valor como genitores de híbridos. O presente trabalho visou identificar os tipos citoplasmáticos de acessos de cebola de diferentes grupos morfoagronômicos de interesse para o melhoramento genético no Brasil, usando a reação da polimerase em cadeia (PCR com 'primers' específicos para regiões polimórficas do genoma mitocondrial de cebola. Foi observada, nos 66 acessos amostrados, a presença dos três principais tipos de citoplasma descritos para cebola (S, N e T. Foi constatada maior frequência do citoplasma S (56% seguido do citoplasma T (25,8%. Em 18,2% das amostras, foi encontrado exclusivamente o citoplasma N. Essa caracterização pode ser útil para guiar a escolha de materiais genéticos dentro dos programas de melhoramento com objetivo de desenvolver cultivares híbridas adaptadas às condições tropicais.The synthesis of onion (Allium cepa hybrids relies upon the use of two genetic-cytoplasmic male-sterility systems, CMS-S and CMS-T, in association to the normal male-fertile (N cytoplasm. However, the molecular phenotyping of male-sterility-inducing and normal cytoplasms of many onion accessions adapted for cultivation under tropical conditions is not available. Some of these accessions were reported as presenting tolerance to diseases and adaptation to tropical and subtropical regions. Therefore, these accessions are potential sources of parental

  20. MAC Protocols for Optimal Information Retrieval Pattern in Sensor Networks with Mobile Access

    Yang Zhiyu

    2005-01-01

    Full Text Available In signal field reconstruction applications of sensor network, the locations where the measurements are retrieved from affect the reconstruction performance. In this paper, we consider the design of medium access control (MAC protocols in sensor networks with mobile access for the desirable information retrieval pattern to minimize the reconstruction distortion. Taking both performance and implementation complexity into consideration, besides the optimal centralized scheduler, we propose three decentralized MAC protocols, namely, decentralized scheduling through carrier sensing, Aloha scheduling, and adaptive Aloha scheduling. Design parameters for the proposed protocols are optimized. Finally, performance comparison among these protocols is provided via simulations.

  1. Knowledge unbound selected writings on Open Access, 2002-2011

    Suber, Peter

    2016-01-01

    Peter Suber has been a leading advocate for open access since 2001 and has worked full time on issues of open access since 2003. As a professor of philosophy during the early days of the internet, he realized its power and potential as a medium for scholarship. As he writes now, "it was like an asteroid crash, fundamentally changing the environment, challenging dinosaurs to adapt, and challenging all of us to figure out whether we were dinosaurs." When Suber began putting his writings and course materials online for anyone to use for any purpose, he soon experienced the benefits of that wider exposure. In 2001, he started a newsletter -- the Free Online Scholarship Newsletter, which later became the SPARC Open Access Newsletter -- in which he explored the implications of open access for research and scholarship. This book offers a selection of some of Suber's most significant and influential writings on open access from 2002 to 2010. In these texts, Suber makes the case for open access to research; answers c...

  2. An Environment-Adaptive Role-Based Access Control Model%一个环境适应的基于角色的访问控制模型

    吴新松; 贺也平; 周洲仪; 梁洪亮

    2011-01-01

    大型网络应用如疫情报告系统需要访问控制系统根据环境变化调整访问控制策略,而现有的访问控制模型缺乏灵活性,难以适应环境动态变化的需要.通过对RBAC模型进行扩展,提出了一个环境适应的基于角色的访问控制模型EA-RBAC.该模型相对于传统RBAC模型,增加了事件触发、基于事件的状态等价类迁移、环境角色和虚拟域等机制.通过事件触发机制和状态等价类迁移实现了系统对环境变化的感知和随环境变化的状态迁移.通过环境角色和虚拟域的概念,实现了环境角色的动态调整和用户授权的按状态调整.该模型能够根据环境变化,在不失安全性的前提下为大型网络应用灵活实施访问控制策略.作为示例,给出了模型在疫情报告系统中的适用性分析.%Large scale network-based applications, such as infectious diseases reporting system,require that access control policy can be changed according to environment alternation. However,existing access control models are inflexible and can not be adapted to environment alternation because they are lack of mechanisms to capture environment alternation and to change access control policy. In this paper, we analyze the access control requirements of infectious diseases reporting system. Based on the analysis, we extract the general access control requirements of large scale network-based applications. Through extending RBAC model, we design the components of the environmentadaptive role-based access control model called EA-RBAC and give the formal definition of the model.Compared with traditional RBAC models, EA-RBAC model adds event-trigger, event-based equivalent states transition, environment role and virtual domain mechanisms. Through event-trigger and equivalent states transition, the system can perceive environment alternation and transit state based on environment alternation. Through environment role and virtual domains, the system can

  3. Technology transfer for adaptation

    Biagini, Bonizella; Kuhl, Laura; Gallagher, Kelly Sims; Ortiz, Claudia

    2014-09-01

    Technology alone will not be able to solve adaptation challenges, but it is likely to play an important role. As a result of the role of technology in adaptation and the importance of international collaboration for climate change, technology transfer for adaptation is a critical but understudied issue. Through an analysis of Global Environment Facility-managed adaptation projects, we find there is significantly more technology transfer occurring in adaptation projects than might be expected given the pessimistic rhetoric surrounding technology transfer for adaptation. Most projects focused on demonstration and early deployment/niche formation for existing technologies rather than earlier stages of innovation, which is understandable considering the pilot nature of the projects. Key challenges for the transfer process, including technology selection and appropriateness under climate change, markets and access to technology, and diffusion strategies are discussed in more detail.

  4. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  5. 自适应商品属性变化的商品库设计与访问研究%Adaptive changes in product attribute database design and access of goods

    孙仁鹏

    2011-01-01

    为了使系统能够适应因商品种类的变化而带来的商品属性的变化,提出了动态生成自适应的商品表和动态生成数据访问SQL语句的设计思路.在深入研究江苏苏泽电子商务业务需求的基础上,将不同种类商品表的具体设计交给用户完成,系统只需提供统一的商品表结构设计的客户端界面,而商品数据录入界面将根据对应表结构动态生成,软件与具体的商品表结构相分离,不会因为商品属性的变化而需要进行系统的维护,相对通用.对商品表的访问采用动态SQL语句,所需的主要参数从界面和用户数据字典中提取.该研究在实践中得到良好的应用,节省了大量后期维护成本.%In order to make system adapt the change for commodity characteristic caused by the type, design ideas about dynamically generated commodity list and dynamic adaptive data access SQL statement are presented. A depth study is made in accordance with the e-commerce business requirements for Jiangsu Suze Co., Ltd. Detailed design about different commodity can be finished by user, and client interface shall be provided by the system, yet inputting data interface for commodity property can be dynamically generated in accordance with corresponding database structure, thus software and detailed database structure are divided, and system needn' t be maintained if there is any change for commodity property because of its relatively general function. The dynamic SQL statement is used for database access, and the required parameters can be got from user' s data dictionary. This research has been successfully put into service, and lots of post-maintenance costs are reduced.

  6. 一种基于子载波侦听的宽带无线网络接入控制策略%A Subcarrier-Sensing-Based Medium Access Control Scheme in Wireless Broadband Networks

    尹杰晨; 毛玉明; 冷鹏

    2014-01-01

    In the orthogonal frequency division multiple access (OFDMA)wireless broadband networks ,the efficiency of ran-dom access can be improved by distributing contention onto multiple channels .However ,due to the multichannel property ,the tradi-tional systems based on request-to-send (RTS )control frame have to encounter the idleness of subchannel ,the extension of RTS transmission time and the complex synchronization of uplink communication .To solve these problems ,in our scheme ,the users send signals on random subcarrier to request transmission opportunity .The access point senses these request signals ,and determines which user is permitted to access channel according to the busy state of the subcarriers .The theoretical analysis and simulation results both show that our scheme outperforms the traditional RTS-based schemes in term of the throughput .%在基于正交频分多址技术的宽带网络中,通过把竞争分散到多个子信道能有效改善随机接入的性能。然而多信道特性也会使传统基于Request-To-Send (RTS )控制帧的随机接入协议面临子信道空闲、RTS传输时间延长、上行复杂的问题。针对这些问题,在本文所提出的接入方法中,用户在没有被分配到资源时通过在随机子载波上发送信号来请求传输机会,与此同时,接入点对这些信号侦听,并根据子载波忙闲状态确定哪些用户可以接入。理论分析及仿真结果表明,相比传统依靠RTS的接入方法,采用子载波侦听,系统将获得更高的吞吐量。

  7. Chemically defined medium and Caenorhabditis elegans

    Szewczyk, Nathaniel J.; Kozak, Elena; Conley, Catharine A.

    2003-01-01

    BACKGROUND: C. elegans has been established as a powerful genetic system. Use of a chemically defined medium (C. elegans Maintenance Medium (CeMM)) now allows standardization and systematic manipulation of the nutrients that animals receive. Liquid cultivation allows automated culturing and experimentation and should be of use in large-scale growth and screening of animals. RESULTS: We find that CeMM is versatile and culturing is simple. CeMM can be used in a solid or liquid state, it can be stored unused for at least a year, unattended actively growing cultures may be maintained longer than with standard techniques, and standard C. elegans protocols work well with animals grown in defined medium. We also find that there are caveats to using defined medium. Animals in defined medium grow more slowly than on standard medium, appear to display adaptation to the defined medium, and display altered growth rates as they change the composition of the defined medium. CONCLUSIONS: As was suggested with the introduction of C. elegans as a potential genetic system, use of defined medium with C. elegans should prove a powerful tool.

  8. Adaptation of Lactobacillus plantarum IMDO 130201, a Wheat Sourdough Isolate, to Growth in Wheat Sourdough Simulation Medium at Different pH Values through Differential Gene Expression ▿ †

    Vrancken, Gino; De Vuyst, Luc; Rimaux, Tom; Allemeersch, Joke; Weckx, Stefan

    2011-01-01

    Sourdough is a very competitive and challenging environment for microorganisms. Usually, a stable microbiota composed of lactic acid bacteria (LAB) and yeasts dominates this ecosystem. Although sourdough is rich in carbohydrates, thus providing an ideal environment for microorganisms to grow, its low pH presents a particular challenge. The nature of the adaptation to this low pH was investigated for Lactobacillus plantarum IMDO 130201, an isolate from a laboratory wheat sourdough fermentation...

  9. Open access

    Dorch, Bertil Fabricius; Demaio, Alessandro; Hersch, Fred

    2012-01-01

    This week, we celebrate open access week – an event aimed at bringing attention to this rapidly emerging form of scientific publication and its ethical imperatives. Traditionally, knowledge breakthroughs and scientific discoveries are shared through publication in academic journals. Peer...... ideas, break down barriers to science and make knowledge accessible to the masses – but this is not actually the case....

  10. Open Access

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  11. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). Method: The usability of two versions of a website (a non-adapted site and a site that was adapted on the basis of easy-to-read guidelines)…

  12. Media Access Control for Wireless Sensor and Actuator Networks

    Nabi, Muaz Un

    2012-01-01

    In a wireless network, the medium is a shared resource. The nodes in the network negotiate access of the shared resource using the Medium Access Control (MAC) protocol. The design of a MAC protocol for a sensor node is not the same as that for a wireless transceiver. Due to the transceiver characteristics, the MAC protocol design is limited in terms of medium access methods. However, in most cases, the protocols rely on simple access methods i.e. Time Division Multiple Access (TDMA) or Carrie...

  13. Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements

    Shakya, Rajeev K; Verma, Nishchal K

    2012-01-01

    We study the problem of medium access control in domain of event-driven wireless sensor networks (WSN). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSN encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (MAC) for this type of traffic characteristics. For WSN, many existing MAC protocols utilize the basic CSMA strategies like 802.11 that uses Binary Exponential Backoff (BEB) algorithm to handle the collisions among packets when more than one node want to access the channel. We show that this BEB algorithm does not work well without incurring access delay or performance degradation due to increased number of collisions and retransmissions when nodes encounter correlated traffic. In this paper, we investigate on how to minimize the access delay and improve throughput by setting contention window (CW) size adaptively accord...

  14. Hadrons in medium

    U Mosel

    2006-04-01

    In these lectures I first give the motivation for investigations of in-medium properties of hadrons. I discuss the relevant symmetries of QCD and how they might affect the observed hadron properties. I then discuss at length the observable consequences of in-medium changes of hadronic properties in reactions with elementary probes, and in particular photons, on nuclei. Here I put an emphasis on new experiments on changes of the - and -mesons in medium.

  15. Adaptive Lighting

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive LightingAdaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled i...

  16. Accessible Knowledge - Knowledge on Accessibility

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  17. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  18. Open access

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  19. Access French

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  20. Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks

    Mehta, Neil; Wang, Wenye

    2011-01-01

    Mobile ad hoc networks (MANETs) are self-configuring wireless networks that lack permanent infrastructure and are formed among mobile nodes on demand. Rapid node mobility results in dramatic channel variation, or fading, that degrades MANET performance. Employing channel state information (CSI) at the transmitter can improve the throughput of routing and medium access control (MAC) protocols for mobile ad hoc networks. Several routing algorithms in the literature explicitly incorporate the fading signal strength into the routing metric, thus selecting the routes with strong channel conditions. While these studies show that adaptation to the time-variant channel gain is beneficial in MANETs, they do not address the effect of the outdated fading CSI at the transmitter. For realistic mobile node speeds, the channel gain is rapidly varying, and becomes quickly outdated due the feedback delay. We analyze the link throughput of joint rate adaptation and adaptive relay selection in the presence of imperfect CSI. Mor...

  1. Adaptive skills

    Staša Stropnik; Jana Kodrič

    2013-01-01

    Adaptive skills are defined as a collection of conceptual, social and practical skills that are learned by people in order to function in their everyday lives. They include an individual's ability to adapt to and manage her or his surroundings to effectively function and meet social or community expectations. Good adaptive skills promote individual's independence in different environments, whereas poorly developed adaptive skills are connected to individual's dependency and with g...

  2. Organophilic clay suspension medium

    Dixon, G.G.; Parlman, R.M.; Stewart, W.

    1989-10-24

    This patent describes an improved liquid suspension medium for particulate solids. The suspension medium having been formed by admixing an organophilic clay wherein the clay is selected from the group consisting of bentonite, attapulgite, sepiolite and hectorite and admixtures thereof present in the quantity of about 0.5-8 weight percent with a liquid hydrocarbon present in the quantity of about 99-70 weight percent and at least one activator selected from the group consisting of phenyl hydroxyalkyl ethers.

  3. Concept medium programme

    Bjerrum, Peter

    The present essay is an attempt to determine the architectural project of the 21st century in relation to a modern conception of space as the medium of architecture, and of sociality as its program......The present essay is an attempt to determine the architectural project of the 21st century in relation to a modern conception of space as the medium of architecture, and of sociality as its program...

  4. Fundamentals of Medium Access Control Design for Millimeter Wave Networks

    Shokri, Hossein

    2015-01-01

    In current wireless communication systems, demands for extremely high data rates, along with spectrum scarcity at the microwave bands, make the millimeter wave (mmWave) band very appealing to provide these extremely high data rates even for a massive number of wireless devices. MmWave communications exhibit severe attenuation, vulnerability to obstacles (called blockage), and sparse-scattering environments. Moreover, mmWave signals have small wavelengths that allow the incorporation of many a...

  5. Sustainable medium access control: Implementation and evaluation of ODMAC

    Fafoutis, Xenofon; Di Mauro, Alessio; Dragoni, Nicola

    vital to guarantee the sustainability of the system; whereas, in the opposite case, the system should use the energy surplus to increase the application performance. In this paper, we implement and evaluate On-Demand MAC (ODMAC), the first receiver-initiated MAC protocol specifically designed for energy...... harvesting applications. In particular, we provide a basic yet fully operational implementation of ODMAC for the Texas Instruments' MSP430 microprocessor family. Furthermore, we verify the theoretical results of our previous work by achieving sustainable operation of an energy harvesting node in various...

  6. Development of comprehensive medium for micropropagation of cultivated Cassava accessions

    Cassava is one of the most important foods in the human diet in the tropics, where it ranks fifth as a source of energy, after rice, sugar cane, and maize. Since it is a vegetative propagated crop, the use of in vitro propagation is very important to preserve germplasm free of pest and diseases. M...

  7. Características do acesso e utilização de serviços odontológicos em municípios de médio porte Characteristics of the access and utilization of public dental services in medium-sized cities

    Sônia Cristina Lima Chaves

    2012-11-01

    Full Text Available Este estudo de corte transversal descreve as principais características de acesso e utilização de serviços odontológicos básicos e especializados em dois municípios de médio porte da Bahia com 100% de cobertura da Estratégia de Saúde da Família. Realizou-se um inquérito com 2.539 indivíduos de idade acima de 15 anos em 952 domicílios. As principais variáveis analisadas foram a necessidade de saúde bucal percebida, a procura pelo serviço, a barreira de acesso organizacional e o tipo de serviço e o procedimento utilizado. A utilização de serviços públicos odontológicos especializados foi de 11,7% e básicos de 26%. No município com maior utilização de serviços públicos odontológicos, foi menor o uso de serviços privados. A principal barreira de acesso situou-se na AP (Atenção Primária, entre 5,0% e 15,2%. Observou-se pouca interface da atenção secundária com a AP já que apenas 16,6% dos usuários retornaram a esse nível de atenção. Pode-se concluir que a principal barreira de acesso, em municípios com realidades organizacionais e geográficas específicas parece se situar na AP. Ações preventivas individuais foram pouco relatadas. Recomenda-se a redução de barreiras de acesso na AP, bem como a instituição de um protocolo que estimule a longitudinalidade do cuidado nesse nível.This cross-sectional study sought to describe the main characteristics of access and utilization of primary and specialized public dental services in two medium-sized cities in Bahia with 100% coverage of the Family Health Program. A survey of 952 households and 2.539 individuals aged over 15 years was conducted. The main variables analyzed were: perceived oral health needs, demand for the service, barriers of organizational access and the type of service and procedure utilized. The use of specialized public dental services was of 11.7% and primary care was 26%. In the city where there was greater use of public dental services

  8. Adaptive Lighting

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... distributed differently into an architectural body. We also examine what might occur when light is dynamic and able to change colour, intensity and direction, and when it is adaptive and can be brought into interaction with its surroundings. In short, what happens to an architectural space when artificial...

  9. Engineering Adaptive Web Applications

    Dolog, Peter

    2007-01-01

    Information and services on the web are accessible for everyone. Users of the web differ in their background, culture, political and social environment, interests and so on. Ambient intelligence was envisioned as a concept for systems which are able to adapt to user actions and needs....... With the growing amount of information and services, the web applications become natural candidates to adopt the concepts of ambient intelligence. Such applications can deal with divers user intentions and actions based on the user profile and can suggest the combination of information content and services which...... suit the user profile the most. This paper summarizes the domain engineering framework for such adaptive web applications. The framework provides guidelines to develop adaptive web applications as members of a family. It suggests how to utilize the design artifacts as knowledge which can be used...

  10. Code division controlled-MAC in wireless sensor network by adaptive binary signature design

    Wei, Lili; Batalama, Stella N.; Pados, Dimitris A.; Suter, Bruce

    2007-04-01

    We consider the problem of signature waveform design for code division medium-access-control (MAC) of wireless sensor networks (WSN). In contract to conventional randomly chosen orthogonal codes, an adaptive signature design strategy is developed under the maximum pre-detection SINR (signal to interference plus noise ratio) criterion. The proposed algorithm utilizes slowest descent cords of the optimization surface to move toward the optimum solution and exhibits, upon eigenvector decomposition, linear computational complexity with respect to signature length. Numerical and simulation studies demonstrate the performance of the proposed method and offer comparisons with conventional signature code sets.

  11. The Interstellar Medium

    Lequeux, James

    2005-01-01

    Describing interstellar matter in our galaxy in all of its various forms, this book also considers the physical and chemical processes that are occurring within this matter. The first seven chapters present the various components making up the interstellar matter and detail the ways that we are able to study them. The following seven chapters are devoted to the physical, chemical and dynamical processes that control the behaviour of interstellar matter. These include the instabilities and cloud collapse processes that lead to the formation of stars. The last chapter summarizes the transformations that can occur between the different phases of the interstellar medium. Emphasizing methods over results, "The Interstellar Medium" is written for graduate students, for young astronomers, and also for any researchers who have developed an interest in the interstellar medium.

  12. An Access Control Framework for Reflective Middleware

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  13. Adaptive Lighting

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... the investigations of lighting scenarios carried out in two test installations: White Cube and White Box. The test installations are discussed as large-scale experiential instruments. In these test installations we examine what could potentially occur when light using LED technology is integrated and...

  14. Adaptive skills

    Staša Stropnik

    2013-02-01

    Full Text Available Adaptive skills are defined as a collection of conceptual, social and practical skills that are learned by people in order to function in their everyday lives. They include an individual's ability to adapt to and manage her or his surroundings to effectively function and meet social or community expectations. Good adaptive skills promote individual's independence in different environments, whereas poorly developed adaptive skills are connected to individual's dependency and with greater need for control and help with everyday tasks. Assessment of adaptive skills is often connected to assessment of intellectual disability, due to the reason that the diagnosis of intellectual disability includes lower levels of achievements on standardized tests of intellectual abilities as well as important deficits in adaptive skills. Assessment of adaptive behavior is a part of standard assessment battery with children and adults with different problems, disorders or disabilities that affect their everyday functioning. This contribution also presents psychometric tools most regularly used for assessment of adaptive skills and characteristics of adaptive skills with individual clinical groups.

  15. ADAPT Dataset

    National Aeronautics and Space Administration — Advanced Diagnostics and Prognostics Testbed (ADAPT) Project Lead: Scott Poll Subject Fault diagnosis in electrical power systems Description The Advanced...

  16. Adapting to changing user expectations

    Poland, Jean

    2004-01-01

    Results of user surveys indicate that science and technology library user needs differ from those of humanists and social scientists and are changing rapidly. Science and technology libraries are taking the lead in adapting the public services model accordingly. Science and technology library users are most interested in easy-to-use access tools and library Web sites that enable them to find information on their own as well as easy access to materials from home and office. Their expectations ...

  17. Radon in geological medium

    The paper presented deals with behavior of the radon in geological medium and with some results of the radon survey in Bratislava and Kosice regions. 1) The av has been detected in the holes 0.80 m deep. The density of observations - 3 reference areas (one represents 20 stations) per 1 km2. The radon risk maps in 1:25000 and 1:50000 scales have been compiled. The 56.8% of the project area lies in low radon risk, 37.6% in medium radon risk and 5.6% in high radon risk. Follow-up monitoring of the equivalent volume radon activity (EVRA) at the flats, located in the areas with high radon risk of the surface layer, has showed values several times higher than Slovak limits (Marianka, Raca, Vajnory). The evidence that neotectonic is excellent medium for rising up emanation to the subsurface layer, is shown on the map. The tectonic zone of Liscie udolie in Bratislava-Karlova Ves area has been clearly detected by profile radon survey (av > 50 kBq/m3). 2) At present, northern half of the area of Kosice in question was covered by radon survey. The low and medium radon risks have been observed here, while localities with high radon risk are small in extent. The part of radon risk and soil permeability map from northern Kosice area is shown. (J.K.) 3 figs., 2 refs

  18. Overview of medium heterogeneity and transport processes

    Medium heterogeneity can have significant impact on the behavior of solute transport. Tracer breakthrough curves from transport in a heterogeneous medium are distinctly different from that in a homogeneous porous medium. Usually the shape of the breakthrough curves are highly non-symmetrical with a fast rise at early times and very long tail at late times, and often, they consist of multiple peaks. Moreover, unlike transport in a homogeneous medium where the same transport parameters describe the entire medium, transport through heterogeneous media gives rise to breakthrough curves which have strong spatial dependence. These inherent characteristics of transport in heterogeneous medium present special challenge to the performance assessment of a potential high level nuclear waste repository with respect to the possible release of radio nuclides to the accessible environment. Since an inherently desirable site characteristic for a waste repository is that flow and transport should be slow, then transport measurements in site characterization efforts will necessarily be spatially small and temporally short compare to the scales which are of relevance to performance assessment predictions. In this paper we discuss the role of medium heterogeneity in site characterization and performance assessment. Our discussion will be based on a specific example of a 3D heterogeneous stochastic model of a site generally similar to, the Aespoe Island, the site of the Hard Rock Laboratory in Southern Sweden. For our study, alternative 3D stochastic fields of hydraulic conductivities conditioned on ''point'' measurements shall be generated. Results of stochastic flow and transport simulations would be used to address the issues of (1) the relationship of tracer breakthrough with the structure of heterogeneity, and (2) the inference from small scale testing results to large scale and long term predictions

  19. When Is Open Access Not Open Access?

    MacCallum, Catriona J.

    2007-01-01

    As open access grows in prominence, so too has confusion about what open access means; such confusion arises from a genuine misunderstanding of open access by funders, authors, editors, and publishers alike.

  20. The Local Interstellar Medium

    Redfield, S

    2006-01-01

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood, I will discuss the influence that the LISM can have on stellar and planetary systems, including LISM dust deposition onto planetary atmospheres and the modulation of galactic cosmic rays through the astrosphere - the balancing interface between the outward pressure of the magnetized stellar wind and the inward pressure of the surrounding interstellar medium. On Earth, galactic cosmic rays may play a role as contributors to ozone layer chemistry, planetary electrical discharge frequency, biological mutation rates, and cl...

  1. Medium of Blood

    Eddie Glenn

    2012-06-01

    Full Text Available Blood quantum, the measurement of American Indian ancestry possessed by members of America’s Indigenous nations, is most often considered a rubric utilized by the federal government in an oppressive form, or by tribal nations themselves as standards of tribal citizenship requirements. In this essay, the authors recontextualize blood as a medium of national identity within the context of the Cherokee Nation of Oklahoma. Such decentering, as presented here, illuminates Cherokee nationhood in ways that have significant political import.

  2. The Local Interstellar Medium

    Ferlet, R.

    2006-01-01

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood...

  3. Concept medium program

    Bjerrum, Peter

    The present essays is an attempt to dertermine the architecural project of the 21st century in realation to a modern conception of space as the medium of architecture, and of society as its program. This attempt adopts the internal point of view of an architect in describing a modern architectural...... project within the framework: concept - program, these notions being concieved as spatial representations primarily and immediately "given" to architecture....

  4. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    Karreman, Joyce; Geest, van der Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that wa

  5. SMES' SECTOR ACCESS TO FINANCE: AN OVERVIEW

    Roman Angela

    2011-01-01

    Through their contribution to the creation of added value and new jobs, the small and medium enterprises (SMEs) have a significant role in the economic and social development of a country. However, these enterprises are facing numerous obstacles that limit their performance, growth and development. Among the difficulties faced by SMEs, the access to finance is often reported as a major obstacle to the deployment and expansion of their activity. The access to finance is crucial for efficient a...

  6. Ambiguous Adaptation

    Møller Larsen, Marcus; Lyngsie, Jacob

    We investigate why some exchange relationships terminate prematurely. We argue that investments in informal governance structures induce premature termination in relationships already governed by formal contracts. The formalized adaptive behavior of formal governance structures and the flexible and...... reciprocal adaptation of informal governance structure create ambiguity in situations of contingencies, which, subsequently, increases the likelihood of premature relationship termination. Using a large sample of exchange relationships in the global service provider industry, we find support for a hypothesis...

  7. Strategic Adaptation

    Andersen, Torben Juul

    2015-01-01

    This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation...

  8. Supernova Feedback in an Inhomogeneous Interstellar Medium

    Martizzi, Davide; Quataert, Eliot

    2014-01-01

    Supernova (SN) feedback is one of the key processes shaping the interstellar medium (ISM) of galaxies. SNe contribute to (and in some cases may dominate) driving turbulence in the ISM and accelerating galactic winds. Modern cosmological simulations have sufficient resolution to capture the main structures in the ISM of galaxies, but are typically still not capable of explicitly resolving all of the small-scale stellar feedback processes, including the expansion of supernova remnants (SNRs). We perform a series of controlled three-dimensional hydrodynamic (adaptive mesh refinement, AMR) simulations of single SNRs expanding in an inhomogeneous density field with statistics motivated by those of the turbulent ISM. We use these to quantify the momentum and thermal energy injection from SNe as a function of spatial scale and the density, metallicity, and structure of the ambient medium. Using these results, we develop an analytic sub-resolution model for SN feedback for use in galaxy formation simulations. We then...

  9. Engineering Adaptive Applications

    Dolog, Peter

    Applications on the Web are accessible for users with different background, technical environment used, political, social environment where they reside, interests, goals and so on. The different user types have slightly different requirements for features which such Web applications should have....... The different requirements might be satisfied by different variants of features maintained and provided by Web applications. An adaptive Web application can be seen as a family of Web applications where application instances are those generated for particular user based on his characteristics relevant...... for a domain.In this book, we propose a new domain engineering framework which extends a development process of Web applications with techniques required when designing such adaptive customizable Web applications. The framework is provided with design abstractions which deal separately with...

  10. Chemically Defined Medium and Caenorhabditis elegans: A Powerful Approach

    Szewczyk, N. J.; Kozak, E.; Conley, C. A.

    2003-01-01

    C. elegans has been established as a powerful genetic system. Growth in a chemically defined medium (C. elegans Maintenance Medium (CeMM)) now allows standardization and systematic manipulation of the nutrients that animals receive. Liquid cultivation allows automated culturing and experimentation and should be of me in large-scale growth and screening of animals. Here we present our initial results from developing culture systems with CeMM. We find that CeMM is versatile and culturing is simple. CeMM can be used in a solid or liquid state, it can be stored unused for at least a year, unattended actively growing cultures may be maintained longer than with standard techniques, and standard C. elegans protocols work well with animals grown in defined medium. We also find that there are caveats of using defined medium. Animals in defined medium grow more slowly than on standard medium, appear to display adaptation to the defined medium, and display altered growth rates as they change defined medium composition. As was suggested with the introduction of C. elegans as a potential genetic system, use of defined medium with C. elegans should prove a powerful tool.

  11. On adaptation to the effect of ionizing radiation

    Determination of the notion adaptation and its application in biology and medicine where this notion is understood as accomodation which does not result from pathological consequences (physiological adaptation) is considered. Reactions to influence of those medium factors. Which have no receptors in the organims and those which are destructive at any structural level of the organism should not be called adaptation reactions. 18 refs

  12. Communal farming, climate change adaptation and the media in Zimbabwe

    Mthokozisi P. Ndhlovu

    2016-03-01

    Full Text Available Climate change is destroying Zimbabwean communal farmers’ agricultural activities – a source of living for most people. As communal farmers struggle to adapt, the media is expected to assume a fundamental theoretical role of educating and informing them about the appropriate adaptation techniques. Located in Umguza District in Matabeleland North Province, the study explored how communal farmers created meaning out of climate change media content and its influence on their agricultural practices from October 2014 to April 2015. In doing so, the study used the Two-Step Flow theory and Hall’s Encoding and Decoding Model. Entrenched in pragmatism, the study embedded quantitative techniques at different stages. Multistage sampling combining Simple Random Sampling (SRS, purposive and systematic sampling techniques was used to identify the 263 households for semi structured questionnaires, direct observations and in-depth interviews. The findings were analysed using Statistical Package for the Social Sciences (SPSS, thematic analysis and pattern matching. The results show that personal observations; print, broadcast and online media; and opinion leaders were the main sources of climate change information. The radio was the most used medium in communicating climate change adaptation though it was the second most accessed after mobile phones. Conservation Agriculture and planting of drought-resistant crops were some of the adaptation techniques communicated in the media. When interacting with media content, communal farmers create their own meaning influenced by their cultural values, resulting in some adopting, rejecting or modifying certain adaptation techniques. The study concludes that opinion leaders are fundamental in communal farmers’ interaction with media but their influence must not be overestimated.

  13. Nuclear medium effects in $\

    Haider, H; Athar, M Sajjad; Vacas, M J Vicente

    2011-01-01

    We study the nuclear medium effects in the weak structure functions $F_2(x,Q^2)$ and $F_3(x,Q^2)$ in the deep inelastic neutrino/antineutrino reactions in nuclei. We use a theoretical model for the nuclear spectral functions which incorporates the conventional nuclear effects, such as Fermi motion, binding and nucleon correlations. We also consider the pion and rho meson cloud contributions calculated from a microscopic model for meson-nucleus self-energies. The calculations have been performed using relativistic nuclear spectral functions which include nucleon correlations. Our results are compared with the experimental data of NuTeV and CDHSW.

  14. Is adaptation. Truly an adaptation? Is adaptation. Truly an adaptation?

    Thais Flores Nogueira Diniz

    2008-04-01

    Full Text Available The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition, joined with the study of recycling, remaking, and every form of retelling. The film deals with the attempt by the scriptwriter Charles Kaufman, cast by Nicholas Cage, to adapt/translate a non-fictional book to the cinema, but ends up with a kind of film which is by no means what it intended to be: a film of action in the model of Hollywood productions. During the process of creation, Charles and his twin brother, Donald, undergo a series of adventures involving some real persons from the world of film, the author and the protagonist of the book, all of them turning into fictional characters in the film. In the film, adaptation then signifies something different from itstraditional meaning. The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition

  15. Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

    Yen, Chih-Ming; Chang, Chung-Ju; Chen, Yih-Shen; Huang, Ching Yao

    The paper proposes and analyzes an adaptive p-persistent-based (APP) medium access control (MAC) scheme for IEEE 802.11 WLAN. The APP MAC scheme intends to support delay fairness for every station in each access, denoting small delay variance. It differentiates permission probabilities of transmission for stations which are incurred with various packet delays. This permission probability is designed as a function of the numbers of retransmissions and re-backoffs so that stations with larger packet delay are endowed with higher permission probability. Also, the scheme is analyzed by a Markov-chain analysis, where the collision probability, the system throughput, and the average delay are successfully obtained. Numerical results show that the proposed APP MAC scheme can attain lower mean delay and higher mean throughput. In the mean time, simulation results are given to justify the validity of the analysis, and also show that the APP MAC scheme can achieve more delay fairness than conventional algorithms.

  16. Leadership in Romanian Small to Medium Enterprises

    Liliana Crăciun

    2015-04-01

    Full Text Available We have conducted a broad statistical research on Romanian small to medium enterprises (SMEs, with the goal of better understanding: (1 the incipient organizational culture of a recently-opened East European market; and (2 the role of leadership in increasing the competitiveness of SMEs. The paper studies the perceived characteristics of a leader and their influence on the organization’s results (as seen by employees, and it tries to reveal the subliminal inter-correlations among these characteristics. The method is factor analysis (implemented in SPSS, for a questionnaire with 23 items, answered by 930 subjects on a five-point Likert scale. The six factors identified by our analysis were: adaptability; cooperation; authority; charisma; confidence; motivation. By highlighting these basic components, our study aims both at increasing competitiveness in Romanian enterprises and at designing better training programs for managers and entrepreneurs acting on East European markets, adapted to the real characteristics of these young economic environments.

  17. Route to nonlocality and observation of accessible solitons

    Conti, Claudio; Peccianti, Marco; Assanto, Gaetano

    2003-01-01

    We develop a general theory of spatial solitons in a liquid crystalline medium exhibiting a nonlinearity with an arbitrary degree of effective nonlocality. The model accounts the observability of "accessible solitons" and establishes an important link with parametric solitons.

  18. Hot interstellar medium

    In view of that the diffuse component of soft X-rays is emitted mainly by extended supernova remnants and the hot interstellar medium produced thereby, the following three points are discussed. (1.) In the early stage of supernova remnants expanding in low density media, neither the equipartition of energy between electrons and ions nor the ionization equilibrium holds. The shock structure is modified by the pressure of hot plasma. X-ray features of the North Polar Spur are interpreted by taking these points into account. (2.) Several compilations of X-ray line emission are compared. Those by Kato and by Raymond and Smith are different in the equilibrium ion abundances and the collisional excitation rates for some important lines. The origins of differences are shown for some examples. It is demonstrated how the difference affects astrophysical interpretations. (3.) The solar system is surrounded by a hot, tenuous interstellar medium extended in the direction of 1 -- 1500 in the northern hemisphere. In other directions X-rays emitted farther than absorbing clouds are appreciable. (author)

  19. The Local Interstellar Medium

    Redfield, S.

    2006-09-01

    The Local Interstellar Medium (LISM) is a unique environment that presents an opportunity to study general interstellar phenomena in great detail and in three dimensions. In particular, high resolution optical and ultraviolet spectroscopy have proven to be powerful tools for addressing fundamental questions concerning the physical conditions and three-dimensional (3D) morphology of this local material. After reviewing our current understanding of the structure of gas in the solar neighborhood, I will discuss the influence that the LISM can have on stellar and planetary systems, including LISM dust deposition onto planetary atmospheres and the modulation of galactic cosmic rays through the astrosphere --- the balancing interface between the outward pressure of the magnetized stellar wind and the inward pressure of the surrounding interstellar medium. On Earth, galactic cosmic rays may play a role as contributors to ozone layer chemistry, planetary electrical discharge frequency, biological mutation rates, and climate. Since the LISM shares the same volume as practically all known extrasolar planets, the prototypical debris disks systems, and nearby low-mass star-formation sites, it will be important to understand the structures of the LISM and how they may influence planetary atmospheres.

  20. DENSE MEDIUM CYCLONE OPTIMIZATON

    Gerald H. Luttrell; Chris J. Barbee; Peter J. Bethell; Chris J. Wood

    2005-06-30

    Dense medium cyclones (DMCs) are known to be efficient, high-tonnage devices suitable for upgrading particles in the 50 to 0.5 mm size range. This versatile separator, which uses centrifugal forces to enhance the separation of fine particles that cannot be upgraded in static dense medium separators, can be found in most modern coal plants and in a variety of mineral plants treating iron ore, dolomite, diamonds, potash and lead-zinc ores. Due to the high tonnage, a small increase in DMC efficiency can have a large impact on plant profitability. Unfortunately, the knowledge base required to properly design and operate DMCs has been seriously eroded during the past several decades. In an attempt to correct this problem, a set of engineering tools have been developed to allow producers to improve the efficiency of their DMC circuits. These tools include (1) low-cost density tracers that can be used by plant operators to rapidly assess DMC performance, (2) mathematical process models that can be used to predict the influence of changes in operating and design variables on DMC performance, and (3) an expert advisor system that provides plant operators with a user-friendly interface for evaluating, optimizing and trouble-shooting DMC circuits. The field data required to develop these tools was collected by conducting detailed sampling and evaluation programs at several industrial plant sites. These data were used to demonstrate the technical, economic and environmental benefits that can be realized through the application of these engineering tools.

  1. What drives individuals to access the internet mostly using a cell phone?

    Yook, Seungyun; Jung, Yumi

    2012-01-01

    Mobile Internet users can access content, applications, and services using their cell phones. Recent PEW Internet research shows that more than half of U.S. cell phone owners have smartphones. Among them, some people have adopted a mobile phone and use it as a major Internet access medium; they may use other devices such as a desktop computer, notebook, netbook, or tablet PC, but those are not included in their Internet access medium repertoire. This paper examines who accesses the Internet m...

  2. Open Access and its effect on scholarly publication, academic community and library

    R. Vohra; Kumar, S.

    2008-01-01

    Open access is a rising phenomenon that seeks to make scholarly research findings freely accessible to public. This paper discusses the effect of open access on publishers, libraries, users, scholarly societies, indexing services, and resource sharing. There are many supporters for open access throughout the world. Open access is becoming a strong medium for scholarly information exchange among the academicians. Users and libraries benefit in numerous ways and are advocating open access revol...

  3. Implementation considerations of IPsec VPN for small and medium-sized companies

    Hossain, A.S.M. MIR

    2015-01-01

    Security threats threaten online networks. The threats are targeting enterprise networks, personal networks or other networks by accessing or altering important data. Secure-less networks give authorization of access to data in a network. Network administrators need strong network security for preventing unauthorized access, misuse or modification, of the network’s accessible resources. Mostly small or medium-sized enterprises use a firewall, antivirus and anti-spam software for network ...

  4. Adaptive test

    Kjeldsen, Lars Peter; Eriksen, Mette Rose

    2010-01-01

    Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale.......Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale....

  5. Small- and Medium-Size Enterprise Financing in Eastern Europe

    Leora F. Klapper; Sarria-Allende, Virginia; Sulla, Victor

    2002-01-01

    There is currently a large interest in understanding firms' access to finance, particularly in the financing of small- and medium-size enterprises (SMEs). But the financing patterns of SMEs across countries is not well understood. For example, little is known about the relative importance of equity, debt, and inter-firm financing for SMEs across countries. The authors use the Amadeus datab...

  6. Perfect Dispersive Medium

    Gupta, Shulabh

    2015-01-01

    Dispersion is at the heart of all ultrafast real-time signal processing systems across the entire electromagnetic spectrum ranging from radio-frequencies to optics. However, following Kramer-Kronig relations, these signal processing systems have been plagued with the parasitic amplitude distortions due to frequency dependent, and non-flat amplitude transmission of naturally dispersive media. This issue puts a serious limitation on the applicability and performance of these signal processing systems. To solve the above mentioned issue, a perfect dispersive medium is proposed in this work, which artificially violates the Kramer-Kronig relations, while satisfying all causality requirements. The proposed dispersive metamaterial is based on loss-gain metasurface pairs and exhibit a perfectly flat transmission response along with arbitrary dispersion in a broad bandwidth, thereby solving a seemingly unavoidable issue in all ultrafast signal processing systems. Such a metamaterial is further shown using sub-waveleng...

  7. Spiegel. Medium. Kunst

    Kacunko, Slavko

    to human talent, came the millennia of untiring labours and the play of art and science and thought. The human love-affair with reflection (to cite Mark Pendergast’s subtitle - Mirror/Mirror: A History of the Human Love Affair with Reflection [New York 2003]) has always been a platonic one and I hold...... that this is what has assured its multifarious prolongation in art, the humanities, the sciences. This affair was definitely also a narcissistic one, but notwithstanding, that aspect does not constitute the major subject of this book for various reasons. Investigation of the mirror phenomenon in humanities research...... has hitherto focussed on the generation of the sense of self and of ‘consciousness’ – explicitly and primarily so. As a medium of self-knowledge, the mirror’s self-reference set the limit to its scholarly apprehension – self-reference as the great subject of all psycho-analytically informed approaches...

  8. Nuclear medium effects in $\

    Haider, H; Athar, M Sajjad; Vacas, M J Vicente

    2011-01-01

    Nuclear medium effects in the weak structure functions $F_2(x,Q^2)$ and $F_3(x,Q^2)$ have been studied for deep inelastic neutrino/antineutrino reactions in iron nucleus by taking into account Fermi motion, binding, pion and rho meson cloud contributions, target mass correction, shadowing and anti-shadowing corrections. The calculations have been performed in a local density approximation using relativistic nuclear spectral functions which include nucleon correlations. Using these structure functions we have obtained the ratio $R_{F2,F3}^A(x,Q^2)= \\frac{2F_{2,3}^A(x,Q^2)}{AF_{2,3}^D(x,Q^2)}$, the differential scattering cross section $\\frac{1}{E}\\frac{d^2\\sigma}{dxdy}$ and the total scattering cross section $\\sigma$. The results of our numerical calculations in $^{56}Fe$ are compared with the experimental results of NuTeV and CDHSW collaborations.

  9. HARVESTED ENERGY-ADAPTIVE MAC PROTOCOL FOR ENERGY HARVESTING IOT NETWORKS

    Hyeong-Kyu Lee

    2015-12-01

    Full Text Available In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA Medium Access Control (MAC protocol utilizes the fixed frame size, the resource efficiency can be reduced. In this paper, we propose a Harvested Energy-adaptive Medium Access Control (HEMAC protocol where an IoT Access Point (AP allocates slots in accordance with the number of IoT devices that try to transmit data in a frame. The proposed HE-MAC protocol improves the resource efficiency of the F-ALOHA MAC protocol. We show that the resource efficiency of the HE-MAC protocol is superior to those of the F-ALOHA MAC protocol through simulations.

  10. Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN

    PARK Sanghoon; YOON Hayoung; KIM Jongwon

    2006-01-01

    In this paper, we propose a practical design and implementation of network-adaptive high definition (HD) MPEG-2video streaming combined with cross-layered channel monitoring (CLM) over the IEEE 802.1 la wireless local area network (WLAN). For wireless channel monitoring, we adopt a cross-layered approach, where an access point (AP) periodically measures lower layers such as medium access control (MAC) and physical (PHY) transmission information (e.g., MAC layer loss rate) and then sends the monitored information to the streaming server application. The adaptive streaming server with the CLM scheme reacts more quickly and efficiently to the fluctuating wireless channel than the end-to-end application-layer monitoring (E2EM)scheme. The streaming server dynamically performs priority-based frame dropping to adjust the sending rate according to the measured wireless channel condition. For this purpose, the proposed streaming system nicely provides frame-based prioritized packetization by using a real-time stream parsing module. Various evaluation results over an IEEE 802.1 la WLAN testbed are provided to verify the intended Quality of Service (QoS) adaptation capability. Experimental results showed that the proposed system can mitigate the quality degradation of video streaming due to the fluctuations of time-varying channel.

  11. The Intergalactic Medium

    Madau, P

    2000-01-01

    About half a million years after the Big Bang, the ever-fading cosmic blackbody radiation cooled below 3000 K and shifted first into the infrared and then into the radio, and the smooth baryonic plasma that filled the Universe became neutral. The Universe then entered a ``dark age'' which persisted until the first cosmic structures collapsed into gravitationally-bound systems, and evolved into stars, galaxies, and black holes that lit up the Universe again. Some time between redshift of 7 and 15, stars within protogalaxies created the first heavy elements; these systems, together perhaps with an early population of quasars, generated the ultraviolet radiation that reheated and reionized the cosmos. The history of the Universe during and soon after these crucial formative stages is recorded in the all-pervading intergalactic medium (IGM), which is believed to contain most of the ordinary baryonic material left over from the Big Bang. Throughout the epoch of structure formation, the IGM becomes clumpy and acqui...

  12. Adaptation Laboratory

    Huq, Saleemul

    2011-11-15

    Efforts to help the world's poor will face crises in coming decades as climate change radically alters conditions. Action Research for Community Adapation in Bangladesh (ARCAB) is an action-research programme on responding to climate change impacts through community-based adaptation. Set in Bangladesh at 20 sites that are vulnerable to floods, droughts, cyclones and sea level rise, ARCAB will follow impacts and adaptation as they evolve over half a century or more. National and international 'research partners', collaborating with ten NGO 'action partners' with global reach, seek knowledge and solutions applicable worldwide. After a year setting up ARCAB, we share lessons on the programme's design and move into our first research cycle.

  13. Hedonic "adaptation"

    Paul Rozin

    2008-02-01

    Full Text Available People live in a world in which they are surrounded by potential disgust elicitors such as ``used'' chairs, air, silverware, and money as well as excretory activities. People function in this world by ignoring most of these, by active avoidance, reframing, or adaptation. The issue is particularly striking for professions, such as morticians, surgeons, or sanitation workers, in which there is frequent contact with major disgust elicitors. In this study, we study the ``adaptation'' process to dead bodies as disgust elicitors, by measuring specific types of disgust sensitivity in medical students before and after they have spent a few months dissecting a cadaver. Using the Disgust Scale, we find a significant reduction in disgust responses to death and body envelope violation elicitors, but no significant change in any other specific type of disgust. There is a clear reduction in discomfort at touching a cold dead body, but not in touching a human body which is still warm after death.

  14. Adaptable positioner

    This paper describes the circuits and programs in assembly language, developed to control the two DC motors that give mobility to a mechanical arm with two degrees of freedom. As a whole, the system is based in a adaptable regulator designed around a 8 bit microprocessor that, starting from a mode of regulation based in the successive approximation method, evolve to another mode through which, only one approximation is sufficient to get the right position of each motor. (Author) 22 fig. 6 ref

  15. Adaptive positioner

    This paper describes the circuits and programs in assembly language, developed to control the two DC motors that give mobility to a mechanical arm with two degrees of freedom. As a whole, the system is based in a adaptable regulator designed around a 8 bit microprocessor that, starting from a mode of regulation based in the successive approximation method, evolve to another mode through which, only one approximation is sufficient to get the right position of each motor. (Author) 6 refs

  16. Adaptive noise

    Viney, Mark; Reece, Sarah E.

    2013-01-01

    In biology, noise implies error and disorder and is therefore something which organisms may seek to minimize and mitigate against. We argue that such noise can be adaptive. Recent studies have shown that gene expression can be noisy, noise can be genetically controlled, genes and gene networks vary in how noisy they are and noise generates phenotypic differences among genetically identical cells. Such phenotypic differences can have fitness benefits, suggesting that evolution can shape noise ...

  17. Adaptation funding and development assistance: some FAQs

    Ayers, Jessica; Huq, Saleemul

    2008-11-15

    It's becoming ever clearer that development and climate change are intertwined issues. Unsustainable development drives climate change; sustainable development can reduce vulnerability to it. Development issues can constrain capacity to adapt to climate change; climate impacts can be a barrier to development. So adaptation to climate impacts is increasingly seen as part of good development practice – and development to improve the lives and resource access of people facing climate challenges is viewed as a prerequisite for successful adaptation. But when it comes to adaptation funding, confusion and contention remain over the role development institutions play.

  18. JISC Open Access Briefing Paper

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  19. IMPLEMENTING SMALL AND MEDIUM IT PROJECTS IN SMALL AND MEDIUM ENERPRISES

    Felix DUMITRESCU

    2014-06-01

    Full Text Available Information technology is essential nowadays for all companies. Small enterprises are an important part of the economy and this article aims at providing some useful insight in implementing modern IT projects to their benefit. Due to the limited funding available for the IT infrastructure in most start-ups and small businesses, the projects should be adapted to fulfill the needs of the company for the lowest cost. The paper will start by defining small and medium project management theory and outlining the target of the study, small and medium sized companies. Next it will show a number of case studies of IT projects implemented in different types of small companies in Romania. Based on these implementations the article will draw some conclusions relevant to most small companies which need to design or improve their IT infrastructure.

  20. Impact of EU Enlargement on Business Environment of Small and Medium-Sized Enterprises in Slovakia

    Ján Vravec; Marián Gál; Tomás Sabol

    2005-01-01

    The paper discusses the impact of EU enlargement on business environment in the Slovak Republic. Integration of Slovakia into EU has significantly influenced operating conditions for small and medium enterprises. Prosperity of small and medium enterprises depends mainly on their ability to adapt themselves to these new conditions.

  1. A multimodal end-2-end approach to accessible computing

    Biswas, Pradipta; Langdon, Patrick; Almeida, Luis; Jung, Christoph

    2013-01-01

    This book surveys the phases of delivering accessible products and services through design, development, deployment and maintenance. Examines user models for inclusive design, adaptable multimodal system development for digital TV and ubiquitous devices.

  2. Electron density measurements for plasma adaptive optics

    Neiswander, Brian; Matlis, Eric; Corke, Thomas

    2014-01-01

    This study investigates the feasibility of using plasma as an adaptive optical medium for applications such as beam steering, wavefront control, and adaptive filtering. The optical path length of light propagating through plasma depends on the plasma electron density, which may be controlled via the prescribed voltage, frequency, pressure, gas, and electrode geometry. Accurate control of the optical path length requires characterization of the electron density over all operating conditions. E...

  3. Accessing OSI Managed Objects from ANSAware

    Genilloud, Guy; Gay, David

    1995-01-01

    This paper presents a mechanism allowing an ODP compliant distributed system, ANSA, to access OSI network management objects as if they were ANSA objects. It defines a mapping from the OSI object model to the ANSA object model, and it specifies how an adapter implements this mapping.

  4. A Selective Medium for Quantitative Reisolation of Trichoderma harzianum from Agaricus bisporus Compost

    Williams, Josie; Clarkson, John M.; Mills, Peter R.; Cooper, Richard M

    2003-01-01

    We adapted a selective medium, previously developed for reisolation of Trichoderma spp. from soil, for quantitative determination of growth of T. harzianum from commercial Agaricus bisporus composts. This medium enables comparisons of aggressive (sensu inhibition of A. bisporus yield) with nonaggressive T. harzianum groups. The resulting medium contains the antimicrobials chloramphenicol, streptomycin, quintozene, and propamocarb and was highly selective, allowing the recovery of T. harzianum...

  5. Accessibility in the elementary schools of a municipality west of São Paulo

    José Médice

    2015-09-01

    Full Text Available This study aimed to identify and describe the architectural barriers in elementary schools, before and after the Law of Guidelines and Bases (LDB. It is a cross-sectional, descriptive research to map the architectural conditions of access in fourteen elementary schools in the municipal schools network in a medium-sized city in the western region of the state of São Paulo. The environments were visited and data collection was performed using a standardized protocol. Data was compared to those established by ABNT-9050 and categorized into appropriate and inappropriate. It was observed that 100% of schools before and after LDB, had no anti-slip flooring, tactile warning and directional; accesses, ramps and stairs had no guides and guideposts; dimensions, grip and slip handrails were inadequate, the toilets had no transition area, mirrors and sinks were not adapted; there was no outside furniture such as drinkers and tailored service counters and adapted libraries. Therefore, this study also has shown that schools installed, pre and post LDB presented several inappropriate items to the ABNT (Brazilian Association of Technical Standards standards.

  6. High Speed Downlink Packet Access in UMTS Network

    Vladimir Psenak

    2005-01-01

    Full Text Available High speed downlink packet access added to UMTS network provides to users data speed up to 10 Mbit/s. The achievement of high data speed is possible due to new link management and link control, and also due to change from power adaptation to modulation and coding adaptation. The most important benefit is an accessing of data services, which request big downlink data flow.

  7. Accessible Interface for Multimedia Presentation in Inclusive Education

    Moreno, Lourdes; Martínez, Paloma; Ruiz-Mezcua, Belén; Iglesias, Ana

    2007-01-01

    Among the technological solutions to achieve an inclusive education, the educative electronic accessible resources providing content adaptability is an alternative which reduces discrimination. It also favors the inclusion with right equalities which can be used by students regardless of their specific need and use contexts. Following this line of adaptability of contents on the web, a practical case [1] has been launched: an accessible interface of a multimedia resource with caption and audi...

  8. Upper medium segment cooling down

    2008-01-01

    <正>The sluggish growth of the passenger car market in top provinces was also reflected in a depression of the upper medium segment. In Jan-Apr, 2008, the top 3 upper medium models accounting for nearly 40% of this segment performed poorly, with the Passat-Lingyu and the Accord decreasing. The Camry also saw a decrease in three top provinces: Guangdong,

  9. Mesons in the nuclear Medium

    Kotulla, Martin

    2006-01-01

    We discuss recent experimental results on the modification of hadron properties in a nuclear medium. Particular emphasis is placed on an $\\omega$ production experiment performed by the CBELSA/TAPS collaboration at the ELSA accelerator. The data shows a smaller $\\omega$ meson mass together with a significant increase of its width in the nuclear medium.

  10. CERN Access Cards and Access Authorisations

    2003-01-01

    From the 01/05/2003, all problems relating to access cards and refusal of access to any zone, building or experiment within CERN must be addressed to the Centrale de Surveillance des Accès (CSA building 120) on 78877 or send an e-mail to Access.Surveillance@cern.ch. The responsibles for CERN access control have put into place a procedure with the CSA, Service Enregistrement and the Technical Control Room, to make sure that all problems get resolved in a proper and timely manner.

  11. An improved adaptive ACO meta heuristic for scheduling multimedia traffic across the 802.11e EDCA

    Ditze, Michael; Becker, Markus

    2008-01-01

    This paper presents an adaptive near-optimal scheduler for multimedia traffic for the 802.11e Enhanced Distributed Channel Access (EDCA) medium access control scheme. The scheduler exploits the ant colony optimization (ACO) meta heuristic to tackle the challenge of packet scheduling. ACO is a biologically inspired algorithm that is known to find near-optimal solutions for combinatorial optimization problems. Thus, we expect that ACO scheduling produces more efficient schedules than comparable deterministic scheduling approaches at the expenses of a computational overhead it introduces. We compare ACO scheduling relevant deterministic scheduling approaches, and in particular the MLLF scheduler that is specifically designed for the needs of compressed multimedia applications. The purpose of the evaluation is twofold. It allows to draw conclusions on the feasibility of ACO scheduling for multimedia traffic while it serves as a benchmark to determine to what extent deterministic schedulers fall short of a near-optimal solution.

  12. Open Access Publishing

    Morrison, Heather

    2007-01-01

    An overview of open access publishing, for college faculty. Presents a definition of open access, the two roads to open access (OA publishing and self-archiving), overview of business models for open access, and examples of open access journals, with a focus on journals developed in British Columbia, including one (Topics in Scholarly Communication) developed by graduate students as a class assignment, and another developed by high school students (The Pink Voice). Includes a handout of res...

  13. Advocacy for Open Access

    Das, Anup-Kumar

    2015-01-01

    In the scholarly communications world, the concept of open access publishing has proliferated at faster pace since the global open access declarations such as the Budapest Open Access Initiative (BOAI) in February 2002 and the Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities in October 2003. After one decade of these two epoch-making declarations, we see growing instances of open access resources due to collective efforts put by the advocacy organizations, advocac...

  14. Open Access Policy Update

    Morrison, Heather

    2007-01-01

    This presentation explores the status of open access policy developments internationally, and particularly in Canada, as of April 2007. While open access resources are substantial, and growing rapidly, the primary issue for open access archives (institutional repositories) is content acquisition, and few researchers fully understand open access, illustrating an ongoing need for policy. Open access policy initiatives are happening around the world. Sherpa Juliet lists more than 20 funding a...

  15. Open accessibility data interlinking

    Ding, Chaohai; Wald, Mike; Wills, Gary

    2014-01-01

    This paper presents the research of using Linked Open Data to enhance accessibility data for accessible travelling. Open accessibility data is the data related to the accessibility issues associated with geographical data, which could benefit people with disabilities and their special needs. With the aim of addressing the gap between users’ special needs and data, this paper presents the results of a survey of open accessibility data retrieved from four different sources in the UK. An ontolog...

  16. Adaptive Rate DS-CDMA Systems using Variable Spreading Factors

    Yang, L-L.; Hanzo, L.

    2004-01-01

    Abstract—In this contribution, adaptive rate transmissions are investigated in the context of direct-sequence code-division multiple-access (DS-CDMA) systems using variable spreading factors (VSFs). In the context of the recently established family of adaptive rate-transmission schemes, the transmission rate is typically adapted in response to the channel’s fading-induced quality fluctuation. By contrast, in this contribution the transmission rate is adapted in response to the multiuser inter...

  17. Accessibility and sensory experiences

    Ryhl, Camilla

    2010-01-01

    This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses and...... accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  18. Calculated medium energy fission cross sections

    An analysis has been made of medium-energy nucleon induced fission of 238U and 237Np using detailed models of fission, based upon the Bohr-Wheeler formalism. Two principal motivations were associated with these calculations. The first was determination of barrier parameters for proton-rich uranium and neptunium isotopes normally not accessible in lower energy reactions. The second was examination of the consistency between (p,f) experimental data versus new (n,f) data that has recently become available. Additionally, preliminary investigations were also made concerning the effect of fission dynamics on calculated fission cross sections at higher energies where neutron emission times may be significantly less than those associated with fission

  19. Adaptive management

    Rist, Lucy; Campbell, Bruce Morgan; Frost, Peter

    2013-01-01

    in scientific articles, policy documents and management plans, but both understanding and application of the concept is mixed. This paper reviews recent literature from conservation and natural resource management journals to assess diversity in how the term is used, highlight ambiguities and consider how......Adaptive management (AM) emerged in the literature in the mid-1970s in response both to a realization of the extent of uncertainty involved in management, and a frustration with attempts to use modelling to integrate knowledge and make predictions. The term has since become increasingly widely used...... the concept might be further assessed. AM is currently being used to describe many different management contexts, scales and locations. Few authors define the term explicitly or describe how it offers a means to improve management outcomes in their specific management context. Many do not adhere to the idea...

  20. Quantum internet using code division multiple access

    Zhang, Jing; Liu, Yu-Xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-07-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  1. Professional Access 2013 programming

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  2. Access 2010 Programmer's Reference

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  3. Completing and adapting models of biological processes

    Margaria, Tiziana; Hinchey, Michael G.; Raffelt, Harald; Rash, James L.; Rouff, Christopher A.; Steffen, Bernhard

    2006-01-01

    We present a learning-based method for model completion and adaptation, which is based on the combination of two approaches: 1) R2D2C, a technique for mechanically transforming system requirements via provably equivalent models to running code, and 2) automata learning-based model extrapolation. The intended impact of this new combination is to make model completion and adaptation accessible to experts of the field, like biologists or engineers. The principle is briefly illustrated by gene...

  4. Plutonium Management in the Medium Term

    For many years various countries with access to commercial reprocessing services have been routinely recycling plutonium as UO2/PuO2 mixed oxide (MOX) fuel in light water reactors (LWRs). This LWR MOX recycle strategy is still widely regarded as an interim step leading to the eventual establishment of sustainable fast reactor fuel cycles. The OECD/NEA Working Party on the Physics of Plutonium Fuels and Innovative Fuel Cycles (WPPR) has recently completed a review of the technical options for plutonium management in what it refers to as the 'medium term'. For the purpose of the review, the WPPR considers the medium term to cover the period from now up to the point at which fast reactor fuel cycles are established on a commercial scale. The review identified a number of different designs of innovative plutonium fuel assemblies intended to be used in current LWR cores, in LWRs with significantly different moderation properties, as well as in high-temperature gas reactors. The full review report describes these various options and highlights their respective advantages and disadvantages. This paper briefly summarizes the main findings of the review

  5. Quantum tunneling in thermal medium

    Matsumoto, Sh.; Yoshimura, M.

    2000-01-01

    Time evolution of tunneling phenomena in medium is studied using a standard model of environment interaction. A semiclassical formula valid at low, but finite temperatures is derived in the form of integral transform for the reduced Wigner function, and the tunneling probability in thermal medium is calculated for a general tunneling potential of one dimensional system. Effect of dissipation, its time evolution in particular, depends on the behavior of the potential far beyond the barrier.

  6. Properties of the nuclear medium

    M. BaldoINFN sezione di Catania, Italy; Burgio, G.F.

    2011-01-01

    We review our knowledge on the properties of the nuclear medium that have been studied, along many years, on the basis of many-body theory, laboratory experiments and astrophysical observations. First we consider the realm of phenomenological laboratory data and astrophysical observations, and the hints they can give on the characteristics that the nuclear medium should possess. The analysis is based on phenomenological models, that however have a strong basis on physical in...

  7. Adaptive changes in cardiolipin content of Staphylococcus aureus grown in different salt concentrations

    Takatsu,Tieko

    1975-12-01

    Full Text Available Adaptive changes in cardiolipin content were examined in Staphylococcus aureus 209P using the 32P pulse-labelling method. Cardiolipin synthesis showed increased adaptation when cells grown in normal medium were transferred into high NaCl containing medium. When S. aureus cultured in 10% NaCl medium was transferred back to normal medium, cardiolipin concentration decreased to the normal level within 3 hours. The catabolic rate of cardiolipin in the cells was much slower in the 5% NaCl medium than in normal medium. The cardiolipin synthetase activity was examined by isolated membrane fraction from S. aureus grown both in normal and 10% NaCl medium. The activity was higher by two-fold in membrane fractions from cells cultured in 10% NaCl-containing medium than in membranes from cells cultured in normal medium.

  8. Physical Access Control Database

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  9. Hemodialysis access - self care

    ... an infection. To prevent infection: Avoid bumping or cutting your access. DO NOT lift anything heavy with ... Check the pulse in your access arm. You should feel blood rushing through that feels like a vibration. This vibration is ...

  10. Design for Accessibility

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  11. STUDY ON THE MEDIUM AND EFFICIENCY OF COMMUNICATION IN MANAGEMENT

    Xu, Xiude

    2006-01-01

    To enhance the communicating efficiency of an organization can not only reduce the cost of communication, but also stimulate the aspiration of communicating between the members, which will enhance the cooperation in the organization, improve the capability of adapting to the external changing environment and competition ability. According to the different needs, selecting the communicating medium rightly can improve the efficiency of communication. This article adopts the method of determinin...

  12. Green's Function Retrieval and Marchenko Imaging in a Dissipative Acoustic Medium

    Slob, Evert

    2016-04-01

    Single-sided Marchenko equations for Green's function construction and imaging relate the measured reflection response of a lossless heterogeneous medium to an acoustic wave field inside this medium. I derive two sets of single-sided Marchenko equations for the same purpose, each in a heterogeneous medium, with one medium being dissipative and the other a corresponding medium with negative dissipation. Double-sided scattering data of the dissipative medium are required as input to compute the surface reflection response in the corresponding medium with negative dissipation. I show that each set of single-sided Marchenko equations leads to Green's functions with a virtual receiver inside the medium: one exists inside the dissipative medium and one in the medium with negative dissipation. This forms the basis of imaging inside a dissipative heterogeneous medium. I relate the Green's functions to the reflection response inside each medium, from which the image can be constructed. I illustrate the method with a one-dimensional example that shows the image quality. The method has a potentially wide range of imaging applications where the material under test is accessible from two sides.

  13. Performance indicators for SMEs accessing EU funds

    Popa Adina-Simona

    2013-01-01

    Being the best supporters of national economies Small and Medium Sized Enterprises are actively searching alternative sources of finance for sustaining their goals and their performances. European Union is sustaining the SMEs access to finance by direct funding: grants from the European Commission and indirect funding: financial intermediaries in the SMEs origin country. Considering the importance of SMEs for national and European economy we will analyze the relationship between the EU fundin...

  14. Access Customized Forms

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  15. Open Access : Three Perspectives

    Owen, G.W. Brian; Waller, Andrew; Perkins, Lesley

    2006-01-01

    Open Access has the potential to transform scholarly communications and access to academic research, especially for libraries in smaller institutions or in economically disadvantaged areas around the world. This important and timely panel discussion will focus on three aspects of open access: 1) the library as publisher, 2) the librarian as archivist, and 3) the role of open access in the careers of upcoming professionals.

  16. Focusing coherent light through a nonlinear scattering medium

    Frostig, Hadas; Derevyanko, Stanislav; Silberberg, Yaron

    2016-01-01

    Wavefront shaping is a powerful technique that can be used to focus light through scattering media, with the limitation that the obtained focus contains a small fraction of the total power. The method is based on the assumption that the field at the output is a linear superposition of the modes traveling through different paths in the medium. However, when the scattering medium also exhibits nonlinearity, as may occur in multiphoton microscopy, this assumption is violated and the applicability of wavefront shaping becomes unclear. Here we show that using adaptive optimization of the wavefront light can still be controlled and focused through a nonlinear scattering medium, and that the focused fraction of power can be significantly enhanced in the presence of moderate positive nonlinearity. Our results suggest that the use of short pulses for focusing through scattering media with a mild self-focusing response might be favorable to the use of continuous-wave light.

  17. Open Access Alternatives

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  18. INVERSE MEDIUM SCATTERING PROBLEMS IN NEAR-FIELD OPTICS

    Gang Bao; Peijun Li

    2007-01-01

    A regularized recursive linearization method is developed for a two-dimensional inverse medium scattering problem that arises in near-field optics, which reconstructs the scatterer of an inhomogeneous medium deposited on a homogeneous substrate from data accessible through photon scanning tunneling microscopy experiments. In addition to the ill-posedness of the inverse scattering problems, two difficulties arise from the layered background medium and limited aperture data. Based on multiple frequency scattering data, the method starts from the Born approximation corresponding to the weak scattering at a low frequency, each update is obtained via recursive linearization with respect to the wavenumber by solving one forward problem and one adjoint problem of the Helmholtz equation. Numerical experiments are included to illustrate the feasibility of the proposed method.

  19. Efficiency optimized control of medium-size induction motor drives

    Abrahamsen, F.; Blaabjerg, Frede; Pedersen, John Kim;

    2000-01-01

    The efficiency of a variable speed induction motor drive can be optimized by adaption of the motor flux level to the load torque. In small drives (<10 kW) this can be done without considering the relatively small converter losses, but for medium-size drives (10-1000 kW) the losses can not be disr...... robustness towards load disturbances may unnecessarily be reduced. Both displacement power factor and model-based efficiency optimizing control methods perform well in medium-size drives. The last strategy is also tested on a 22 kW drive with good results.......The efficiency of a variable speed induction motor drive can be optimized by adaption of the motor flux level to the load torque. In small drives (<10 kW) this can be done without considering the relatively small converter losses, but for medium-size drives (10-1000 kW) the losses can not be...... disregarded without further analysis. The importance of the converter losses on efficiency optimization in medium-size drives is analyzed in this paper. Based on the experiments with a 90 kW drive it is found that it is not critical if the converter losses are neglected in the control, except that the...

  20. iBook – a New Medium?

    Benjamin Štular

    2013-09-01

    Full Text Available EXTENDED ABSTRACT:On January 19th 2012 Apple launched iBooks®2 for iPad® - a new application for downloading digital content to the iPad - and the new software (iBooks Author® which allows creating and publishing digital content using the .iba digital format and all-new iTunes® application offering access to a variety of digitised educational content. Our aim was to test the attractiveness of the new Apple releases and the effect of a relatively easy access to the world market of digital content on the promotion of Slovenian cultural heritage. We added three books to the iTunes digital collection which might be of interest to the general public: a re-edition of a scientific monograph by Andrej Pleterski: Mythical Reality of the Carintian Dukes' Stones (Mitska stvarnost knežjega kamna in Slovenian and German version and a non-fiction iBook by Benjamin Štular: Ljubljana in the Middle Ages. Archaeological Research (Srednjeveška Ljubljana. Arheološke raziskave. The digital version of the Andrej Pleterski's book was chosen for the actuality of the topic in Slovenia and Austria. People and politicians in Carinthia were annoyed by the book contents as it was published by the Regional Museum in Klagenfurt in December 2011. While the science in this book is sound it has been abused to meet the current needs of some of the Carinthian politicians. The incident was polemically reflected in the main Slovenian newspapers, too. The non-fiction iBook was selected because of the attractiveness of the theme, besides a lot of multimedia content had already been created and could be easily published to Apple's iBookstore. All three iBooks were posted to iTunes® less than three weeks after the release of the iBooks Author application to create digital content. We wish to present our experience with the applicability of the new medium, users' feedback and access statistics. Guidelines for Apple licenses are presented. The applicability of the new medium and

  1. Pro Access 2010 Development

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  2. Android Access Control Extension

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  3. Access 2013 for dummies

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  4. Open Access @ DTU

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics such...... as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  5. Urban Railway Accessibility

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  6. Medium-assisted vacuum force

    Tomas, M S

    2005-01-01

    We discuss some implications of a very recently obtained result for the force on a slab in a planar cavity based on the calculation of the vacuum Lorentz force [C. Raabe and D.-G. Welsch, Phys. Rev. A 71, 013814 (2005)]. We demonstrate that, according to this formula, the total force on the slab consists of a medium-screened Casimir force and, in addition to it, a medium-assisted force. The sign of of the medium-assisted force is determined solely by the properties of the cavity mirrors. In the Lifshitz configuration, this force is proportional to 1/d at small distances and is very small compared with the corresponding van der Waals force. At large distances, however, it is proportional to 1/d^4 and is comparable with the Casimir force, especially for denser media. The exponents in these power laws decrease by 1 in the case of a thin slab. The formula for the medium-assisted force also describes the force on a layer of the cavity medium, which has similar properties. For dilute media, it implies an atom-mirro...

  7. Use Case Design for AdaptIVe

    Wolter, Stefan; Kelsch, Johann

    2014-01-01

    AdaptIVe is a large scale European project on vehicle automation and the pertaining human-machine interaction. The use case design process is a crucial part of the system design process and a part of the human-vehicle integration subproject. This paper explains the methodology for describing use cases in AdaptIVe. They are primarily based on sequence diagrams with main and alternative flows.

  8. Adaptation AC to Improve Wireless Access Network Dependability

    Olfa BEN AHMED

    2012-01-01

    Full Text Available According to estimation of increasing mobile application‘s consumers. We are interested in Long TermEvaluation (LTE network. LTE dependability depends on availability and reliability of his evolved NodesBases stations (eNB. One eNB is available when it is able yet to admit a new media and to supportconnection. And it is reliable when it is able to support handover connection. However we consider adependable telecommunication service when the available and reliable system can provide an acceptablequality of service (QoS. There are works that given a higher QoS with lower dependability (availabilityand reliability and works that given higher dependability with lowest QoS. We propose a new AdmissionControl scheme using preemption bandwidth from already connected application. Our preemptionproceeds in a relative utility. Results of this work give improvement of dependability with acceptable QoS.

  9. Scalable Lunar Surface Networks and Adaptive Orbit Access Project

    National Aeronautics and Space Administration — Based on our proposed innovations and accomplished work in Phase I, we will focus on developing the new MAC protocol and hybrid routing protocol for lunar surface...

  10. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...... specific WSN considering its resource constraints, neglecting the return-of-investment and usefulness of the system. In this paper, we bring out the WSN scenario which supports multiple applications and study the challenges that would pose in implementation as each specific application has its own specific...

  11. Properties of the nuclear medium

    We review our knowledge on the properties of the nuclear medium that have been studied, over many years, on the basis of many-body theory, laboratory experiments and astrophysical observations. Throughout the presentation particular emphasis is placed on the possible relationship and links between the nuclear medium and the structure of nuclei, including the limitations of such an approach. First we consider the realm of phenomenological laboratory data and astrophysical observations and the hints they can give on the characteristics that the nuclear medium should possess. The analysis is based on phenomenological models, that however have a strong basis on physical intuition and an impressive success. More microscopic models are also considered, and it is shown that they are able to give invaluable information on the nuclear medium, in particular on its equation of state. The interplay between laboratory experiments and astrophysical observations is particularly stressed, and it is shown how their complementarity enormously enriches our insights into the structure of the nuclear medium. We then introduce the nucleon–nucleon interaction and the microscopic many-body theory of nuclear matter, with a critical discussion about the different approaches and their results. The Landau–Fermi liquid theory is introduced and briefly discussed, and it is shown how fruitful it can be in discussing the macroscopic and low-energy properties of the nuclear medium. As an illustrative example, we discuss neutron matter at very low density, and it is shown how it can be treated within the many-body theory. The general bulk properties of the nuclear medium are reviewed to indicate at which stage of our knowledge we stand, taking into account the most recent developments both in theory and experiments. A section is dedicated to the pairing problem. The connection with nuclear structure is then discussed, on the basis of the energy density functional method. The possibility of

  12. Pions in the nuclear medium

    de Melo, J P B C; El-Bennich, Bruno; Rojas, E; Frederico, T

    2014-01-01

    Using the light-front pion wave function based on a Bethe-Salpeter amplitude model, we study the properties of the pion in symmetric nuclear matter. The pion model we adopt is well constrained by previous studies to explain the pion properties in vacuum. In order to consistently incorporate the constituent up and down quarks of the pion immersed in symmetric nuclear matter, we use the quark-meson coupling model, which has been widely applied to various hadronic and nuclear phenomena in a nuclear medium with success. We predict the in-medium modifications of the pion lectromagnetic form factor, charge radius and weak decay constant in symmetric nuclear matter.

  13. Adaptively robust filtering with classified adaptive factors

    CUI Xianqiang; YANG Yuanxi

    2006-01-01

    The key problems in applying the adaptively robust filtering to navigation are to establish an equivalent weight matrix for the measurements and a suitable adaptive factor for balancing the contributions of the measurements and the predicted state information to the state parameter estimates. In this paper, an adaptively robust filtering with classified adaptive factors was proposed, based on the principles of the adaptively robust filtering and bi-factor robust estimation for correlated observations. According to the constant velocity model of Kalman filtering, the state parameter vector was divided into two groups, namely position and velocity. The estimator of the adaptively robust filtering with classified adaptive factors was derived, and the calculation expressions of the classified adaptive factors were presented. Test results show that the adaptively robust filtering with classified adaptive factors is not only robust in controlling the measurement outliers and the kinematic state disturbing but also reasonable in balancing the contributions of the predicted position and velocity, respectively, and its filtering accuracy is superior to the adaptively robust filter with single adaptive factor based on the discrepancy of the predicted position or the predicted velocity.

  14. An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks

    Munam Ali Shah; Sijing Zhang; Carsten Maple

    2013-01-01

    The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased.Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time.The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment,observes the network changes,and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics.In this paper,some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed,and a novel adaptive MAC protocol for CR networks,decentralized non-global MAC (DNG-MAC),has been proposed.The results show the DNG-MAC outperforms other CR-MAC protocols in termsof time and energy efficiency.

  15. Broadband Wireless Access in Disaster Emergency Response

    Bai, Xin

    2006-01-01

    The “WLAN in Disaster Emergency Response” (WIDER) project has developed and implemented an emergency communication system. It provides network and communication services to relief organizations. In order to guarantee the stable and efficient connectivity with a high quality of service (QoS) for the end user, and to make the WIDER system more adaptive to the disaster area, the IEEE 802.16 specification based broadband wireless access solution is adopted. This thesis work aims at evaluating and...

  16. Distributed Access Control Policies for Spectrum Sharing

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  17. Review of hadrons in medium

    I review the present status in the theoretical and phenomenological understanding of hadron properties in strongly interacting matter. The topics covered are the EMC effect, nucleon structure functions in cold nuclear matter, spectral properties of light vector mesons in hot and cold nuclear matter, and in-medium properties of heavy flavored hadrons

  18. Glasma Evolution in Partonic Medium

    Nazarenko, A V

    2010-01-01

    We examine a scenario of the abelianized Glasma evolution with accounting for back-reaction of partonic medium in ultrarelativistic heavy-ion collisions. We announce that such a generalization leads to the instabilities and the presence of negative color conductivity in the system.

  19. Hadron photoproduction at medium energy

    Results from measurements of multibody photoproduction at medium incident photon energy (2.8 to 4.8 GeV) are presented and discussed. Particular emphasis is placed on topics which are not well understood and which therefore motivate experiments with the upgraded electron accelerator and storage ring ELSA at the University of Bonn, FR Germany. (author)

  20. Adaptive Behavior for Mobile Robots

    Huntsberger, Terrance

    2009-01-01

    The term "System for Mobility and Access to Rough Terrain" (SMART) denotes a theoretical framework, a control architecture, and an algorithm that implements the framework and architecture, for enabling a land-mobile robot to adapt to changing conditions. SMART is intended to enable the robot to recognize adverse terrain conditions beyond its optimal operational envelope, and, in response, to intelligently reconfigure itself (e.g., adjust suspension heights or baseline distances between suspension points) or adapt its driving techniques (e.g., engage in a crabbing motion as a switchback technique for ascending steep terrain). Conceived for original application aboard Mars rovers and similar autonomous or semi-autonomous mobile robots used in exploration of remote planets, SMART could also be applied to autonomous terrestrial vehicles to be used for search, rescue, and/or exploration on rough terrain.

  1. Android Access Control Extension

    Anton Baláž; Branislav Madoš; Michal Ambróz

    2015-01-01

    The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by pr...

  2. Usability and accessibility curricula

    Luján Mora, Sergio; Cachero Castro, Cristina

    2012-01-01

    Presentation of existing curricula connected with usability and accessibility at the University of Alicante for the Leonardo da Vinci project "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, France, 27 November 2012). Presentación del currículo actual relacionado con la usabilidad y la accesibilidad en la Universidad de Alicante para el proyecto Leonardo da Vinci "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, Francia, 27...

  3. Open Access and SSHRC

    Sylvain, Christian

    2007-01-01

    The presenter, Christian Sylvain, is the Director, Policy, Planning, and International Affairs of Canada's Social Sciences and Humanities Research Council (SSHRC), the primary funding agency for social sciences and humanities research in Canada. This session presents an overview of open access at SSHRC, beginning with the endorsement of the concept of open access by SSHRC Council in 2004. The objective is to remove barriers to access to publicly funded research, so as to increase circulatio...

  4. Accessibility to dental services

    Evenden, Craig Andrew

    2007-01-01

    Background: Access to dental care has become a key focus for Government officials in Scotland. Newton et al. (2004) note that the White Paper ‘Towards a healthier Scotland’ (The Scottish Office Department of Health, 1999), identifies dental health as a key area for action, with large numbers of the population unable to gain access to dental care. Various methodologies have been developed in an attempt to explore the inequalities in dental health care access; however a number of studies have ...

  5. Open Access in Practice

    Machovec, George; Morrison, Heather; Whitehead, Heather

    2006-01-01

    This session addressed some of the practical issues arising from open access. The Colorado Alliance of Research Libraries (CARL) links members with open access resources through the Gold Rush service, which includes 80 open access title lists. Librarians at the Colorado School of Mines have collaborated to develop a subject specialized list of titles - for their own library, and to share with all CARL members through Gold Rush. E-LIS, the Open Archive for Library and Information Studies...

  6. Providing Service-Based Personalization in an Adaptive Hypermedia System

    Yudelson, Michael V.

    2010-01-01

    Adaptive hypermedia is one of the most popular approaches of personalized information access. When the field started to emerge, the expectation was that soon nearly all published hypermedia content could be adapted to the needs, preferences, and abilities of its users. However, after a decade and a half, the gap between the amount of total…

  7. Adaptive Image Denoising by Mixture Adaptation.

    Luo, Enming; Chan, Stanley H; Nguyen, Truong Q

    2016-10-01

    We propose an adaptive learning procedure to learn patch-based image priors for image denoising. The new algorithm, called the expectation-maximization (EM) adaptation, takes a generic prior learned from a generic external database and adapts it to the noisy image to generate a specific prior. Different from existing methods that combine internal and external statistics in ad hoc ways, the proposed algorithm is rigorously derived from a Bayesian hyper-prior perspective. There are two contributions of this paper. First, we provide full derivation of the EM adaptation algorithm and demonstrate methods to improve the computational complexity. Second, in the absence of the latent clean image, we show how EM adaptation can be modified based on pre-filtering. The experimental results show that the proposed adaptation algorithm yields consistently better denoising results than the one without adaptation and is superior to several state-of-the-art algorithms. PMID:27416593

  8. Impacts and adaptive capacity as drivers for prioritizing agricultural adaptation to climate change in Europe

    Schlickenrieder, Jeremy; Quiroga Gomez, Sonia; Diz, Agustin; Iglesias Picazo, Ana

    2011-01-01

    In the face of likely climate change impacts policy makers at different spatial scales need access to assessment tools that enable informed policy instruments to be designed. Recent scientific advances have facilitated the development of improved climate projections, but it remains to be seen whether these are translated into effective adaptation strategies. This paper uses existing databases on climate impacts on European agriculture and combines them with an assessment of adaptive capacity ...

  9. Financial planning and access to financing in small and mediumsized companies in the Venezuelan manufacturing sector

    Mary A. Vera-Colina

    2011-12-01

    Full Text Available The relationship between the presence of financial planning and difficulties regarding access to financing in small and medium-sized companies (SMEs in the Venezuelan manufacturing sector is studied. This is an explicative type research work, designed as non-experimental, crosssectional and correlational field work, applied to a sample of 67 SMEs. A questionnaire was applied and a review was made of the relevant literature, to establish the characteristics of the selected variables, according to the high-medium-low measurement for each of the selected indicators. The preliminary results make it possible to affirm that the financial planning variable demonstrates a medium presence in the companies, with medium and low levels of coordination among their components. Average access to financing is classified as low, marked by a medium-high access to credit from suppliers, medium access in reinvestment of profits and medium-low access to bank credit lines. There is also evidence of financing patterns compatible with the Pecking Order Theory. The conclusion is that there is a weak relationship between the characteristics of financial planning and the levels of access to financing, with the inference that the behavior of these variables is determined by a multiplicity of factors.

  10. Access 2013 bible

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  11. Demystifying Open Access

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  12. OGIS Access System

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  13. Can open access repositories and peer-reviewed journals coexist?

    Pinfield, Stephen

    2007-01-01

    It is often assumed that open access repositories and peer-reviewed journals are in competition with each other and therefore will in the long term be unable to coexist. This paper takes a critical look at that assumption. It draws on the available evidence of actual practice which indicates that coexistence is possible at least in the medium term. It discusses possible future models of publication and dissemination which include open access, repositories, peer review and journals. The paper ...

  14. Mathematics & database (open) access

    Guillopé, Laurent

    2003-01-01

    The textual version of this presentation at the Conference "Open Access to Scientific and Technical Information: State of the Art and Future Trends" was published with the title 'Mathematics and databases: Open Access' in "Information Services and Use", vol. 23 (2003), issue 2-3, p. 127-131.

  15. Market Access and Welfare

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  16. Adaptive Modular Playware

    Lund, Henrik Hautop; Þorsteinsson, Arnar Tumi

    2011-01-01

    In this paper, we describe the concept of adaptive modular playware, where the playware adapts to the interaction of the individual user. We hypothesize that there are individual differences in user interaction capabilities and styles, and that adaptive playware may adapt to the individual user’s...

  17. Study on the Particular Accounting Practices of Small and Medium Companies

    Cristina Nicolaescu

    2011-01-01

    This article aims to analyse the particularities of small and medium companies in Romania in order to propose a set of practices in accounting terms for these economic entities. To this end has started from the best practice recommendation adopted by the European Commission in November 2008 and guidelines developed by the Small and Medium Practices Committee of the International Federation of Accountants, trying to adapt them to a concrete situation, to the particular situation of small and m...

  18. Using Information Systems to Enable Managerial Accounting at Small and Medium Sized Manufacturing Firms in Germany

    Lohr, Matthias

    2013-01-01

    Small and medium sized companies can utillise information systems (IS) to overcome restrictions imposed by their often limited resources. This dissertation investigates which factors contribute to an IS’s success in enabling managerial accounting at small and medium sized manufacturing firms in Germany. An adaptation of the IS Success Model is used as the research model for a quantitative empirical survey among 5,831 companies. Structural equation modelling confirms the model and reveals ...

  19. Coded Random Access

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  20. The Open Access Divide

    Jingfeng Xia

    2013-10-01

    Full Text Available This paper is an attempt to review various aspects of the open access divide regarding the difference between those academics who support free sharing of data and scholarly output and those academics who do not. It provides a structured description by adopting the Ws doctrines emphasizing such questions as who, what, when, where and why for information-gathering. Using measurable variables to define a common expression of the open access divide, this study collects aggregated data from existing open access as well as non-open access publications including journal articles and extensive reports. The definition of the open access divide is integrated into the discussion of scholarship on a larger scale.

  1. Holographic Renormalization in Dense Medium

    The holographic renormalization of a charged black brane with or without a dilaton field, whose dual field theory describes a dense medium at finite temperature, is investigated in this paper. In a dense medium, two different thermodynamic descriptions are possible due to an additional conserved charge. These two different thermodynamic ensembles are classified by the asymptotic boundary condition of the bulk gauge field. It is also shown that in the holographic renormalization regularity of all bulk fields can reproduce consistent thermodynamic quantities and that the Bekenstein-Hawking entropy is nothing but the renormalized thermal entropy of the dual field theory. Furthermore, we find that the Reissner-Nordström AdS black brane is dual to a theory with conformal matter as expected, whereas a charged black brane with a nontrivial dilaton profile is mapped to a theory with nonconformal matter although its leading asymptotic geometry still remains as AdS space

  2. Medium modifications with recoil polarization

    Brand, J.F.J. van den [Nationaal Instituut voor Kernfysica en Hoge Energiefysica, Amsterdam (Netherlands); Ent, R. [CEBAF, Newport News, VA (United States)

    1994-04-01

    The authors show that the virtual Compton scattering process allows for a precise study of the off-shell electron-nucleon vertex. In a separable model, they show the sensitivity to new unconstrained structure functions of the nucleon, beyond the usual Dirac and Pauli form factors. In addition, they show the sensitivity to bound nucleon form factors using the reaction 4He({rvec e},e{prime},{rvec p}){sup 3}H. A nucleon embedded in a nucleus represents a complex system. Firstly, the bound nucleon is necessarily off-shell and in principle a complete understanding of the dynamical structure of the nucleon is required in order to calculate its off-shell electromagnetic interaction. Secondly, one faces the possibility of genuine medium effects, such as for example quark-exchange contributions. Furthermore, the electromagnetic coupling to the bound nucleon is dependent on the nuclear dynamics through the self-energy of the nucleon in the nuclear medium.

  3. Medium modifications with recoil polarization

    The authors show that the virtual Compton scattering process allows for a precise study of the off-shell electron-nucleon vertex. In a separable model, they show the sensitivity to new unconstrained structure functions of the nucleon, beyond the usual Dirac and Pauli form factors. In addition, they show the sensitivity to bound nucleon form factors using the reaction 4He(rvec e,e',rvec p)3H. A nucleon embedded in a nucleus represents a complex system. Firstly, the bound nucleon is necessarily off-shell and in principle a complete understanding of the dynamical structure of the nucleon is required in order to calculate its off-shell electromagnetic interaction. Secondly, one faces the possibility of genuine medium effects, such as for example quark-exchange contributions. Furthermore, the electromagnetic coupling to the bound nucleon is dependent on the nuclear dynamics through the self-energy of the nucleon in the nuclear medium

  4. Passive advection in nonlinear medium

    Chertkov, M

    1998-01-01

    Forced advection of passive tracer, $\\theta $, in nonlinear relaxational medium by large scale (Batchelor problem) incompressible velocity field at scales less than the correlation length of the flow and larger than the diffusion scale is considered. Effective theory explaining small scale scalar fluctuations is proven to be linear, asymptotic free (downscales from the scale of the pumping) and universal. Only three parameters are required to decribe exhaustively the small scale statistics of scalar difference: two velocity-dependent ones, average and dispersion ($\\bar{\\lambda}$ and $\\Delta $ respectively) of the exponential stretching rate of a trial line element, and fluctuations. $\\alpha $ is an explicit functional of potential chracterized medium nonlinearity and amplitude of $\\theta ^{2}$ flux pumped into the system. Structure functions show an extremely anomalous, intermittent behavior: $ \\sim r^{\\xi_{q}}, \\xi_{q} = \\min {q,\\sqrt{[

  5. Heavy meson in nuclear medium

    Tolos, L; Garcia-Recio, C; Molina, R; Nieves, J; Oset, E; Ramos, A

    2010-01-01

    The properties of charmed mesons in dense matter are studied using a unitary coupled-channel approach in the nuclear medium which takes into account Pauli-blocking effects and meson self-energies in a self-consistent manner. We obtain the open-charm meson spectral functions in this dense nuclear environment, and discuss their implications on hidden charm and charm scalar resonances and on the formation of $D$-mesic nuclei at FAIR.

  6. Adaptive Sticky Generalized Metropolis

    Fabrizio Leisen; Roberto Casarin; David Luengo; Luca Martino

    2013-01-01

    We introduce a new class of adaptive Metropolis algorithms called adaptive sticky algorithms for efficient general-purpose simulation from a target probability distribution. The transition of the Metropolis chain is based on a multiple-try scheme and the different proposals are generated by adaptive nonparametric distributions. Our adaptation strategy uses the interpolation of support points from the past history of the chain as in the adaptive rejection Metropolis. The algorithm efficiency i...

  7. Developing Adaptive Elearning: An Authoring Tool Design

    Said Talhi

    2011-09-01

    Full Text Available Adaptive hypermedia is the answer to the lost in hyperspace syndrome, where the user has normally too many links to choose from, and little knowledge about how to proceed and select the most appropriate ones to him/her. Adaptive hypermedia thus offers a selection of links or content most appropriate to the user. Until very recently, little attention has been given to the complex task of authoring materials for Adaptive Educational Hypermedia. An author faces a multitude of problems when creating a personalized, rich learning experience for each user. The purpose of this paper is to present an authoring tool for adaptive hypermedia based courses. Designed to satisfy guidelines of accessibility of the W3C recommendation for authors and learners that present disabilities, the authoring tool allows several authors geographically dispersed to produce such courses together. It consists of a shared workspace gathering all tools necessary to the cooperative development task.

  8. Pediatric vascular access

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  9. Pediatric vascular access

    Donaldson, James S. [Northwestern University, Feinberg School of Medicine, Department of Medical Imaging, Children' s Memorial Hospital, Chicago, IL (United States)

    2006-05-15

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  10. Optical ballast and adaptive dynamic stable resonator

    Zhang Guang-Yin; Jiao Zhi-Yong; Guo Shu-Guang; Zhang Xiao-Hua; Gu Xue-Wen; Yan Cai-Fan; Wu Ding-Er; Song Feng

    2004-01-01

    In this paper a new concept of ‘optical ballast' is put forward. Optical ballast is a kind of device that can be used to decrease the variation and fluctuation of the propagation characteristics of light beams caused by the disturbance of refractive index of the medium. To illustrate the idea clearly and concretely, a fully adaptive dynamic stable solid-state laser resonator is presented as application example of optical ballast.

  11. Corporate Remote Access

    Eronen, Erpo

    2009-01-01

    The objective of this thesis was to find a suitable, cost efficient and easy-to-use secure remote access solution for the Andritz Group. Currently these secure re-mote connections are provided using Check Point IPsec VPN connections. How-ever, there is a need for more precise access restriction and a cut in management costs. Because of these reasons Andritz Group piloted products of the Juniper Networks Secure Access series. Secondary reasons for choosing Juniper SSL VPN were the market leadi...

  12. Open Access Italia 2010

    De Robbio, Antonella

    2010-01-01

    The presentation is an update of the state of the art of Open Access in Italy which was illustrated during the 2009 Open Access Week. It covers the milestones of Open Access in Italy and the recommendations of the CRUI national Working Group that has recently reached the number of 60 members. It illustrates the CRUI WG agenda for the next three years which focuses on the following three issues: open courseware, open archive metadata, and a survey of the attitudes of Italian publishers toward...

  13. Access 2010 for dummies

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  14. Article Details Copyright Statement: This is an open access article distributed under the Creative Commons Attribution Non Commercial (CC BY-NC 4.0 license, which permits unrestricted non-commerical use, distribution, and reproduction in any medium, provided the original work is properly cited. Realistic Rescue Simulation Method with Consideration of Road Network Restrictions

    Kohei Arai

    2015-07-01

    Full Text Available A realistic rescue simulation method with consideration of road network restrictions is proposed. Decision making and emergency communication system play important roles in rescue process when emergency situations happen. The rescue process will be more effective if we have appropriate decision making method and accessible emergency communication system. In this paper, we propose centralized rescue model for people with disabilities. The decision making method to decide which volunteers should help which disabled persons is proposed by utilizing the auction mechanism. The GIS data are used to present the objects in a large-scale disaster simulation environment such as roads, buildings, and humans. The Gama simulation platform is used to test our proposed rescue simulation model. There are road network restrictions, road disconnections, one way traffic, roads which do not allow U-Turn, etc. These road network restrictions are taken into account in the proposed rescue simulation model. The experimental results show around 10% of additional time is required for evacuation of victims.

  15. Reinforcement Learning Technique in Multiple Motorway Access Control Strategy Design

    Veljanovska, Kostandina; M. Bombol, Kristi; Maher, Tomaž

    2010-01-01

    An appropriately designed motorway access control can decrease the total travel time spent in the system up to 30% and consequently increase the merging operations safety. To date, implemented traffic responsive motorway access control systems have been of local or regulatory type and not truly adaptive in the real sense of the meaning. Hence, traffic flow can be influenced positively by numerous intelligent transportation system (ITS) techniques. In this paper a contemporary approach is pres...

  16. Financing the small and medium enterprises in Albania

    Blerina Kurti

    2013-11-01

    Full Text Available The importance of small and medium enterprises in economy is indisputable. They are the main contributor in employment, innovation and economic growth of a country. European Commission is fully supporting the development and growth of small and medium enterprises through changes in legislation, creating a friendly business environment, facilitation in obtaining funds in the last two decades. The share of SME in total enterprises in Albania is 99.6% and their contribution in the GDP is 73%. Their growth is closely linked with their ability to finance their activity, which is one of the most important issues they are faced with due to their size and creditworthiness. This paper aims to analyze the difficulties and obstacles that SME in Albania encounter in obtaining financing due to lack of source of financing within country, limited opportunities of accessing international capital markets as well as high interest rate.

  17. Airport Surface Access and Mobile Apps

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  18. Market Access and Welfare

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market......According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary and...

  19. Random access photonic metamaterials

    Cencillo-Abad, P.; Ou, J.Y.; Valente, J.; Plum, E.; Zheludev, N.I.

    2015-01-01

    We demonstrate the first addressable reconfigurable photonic metamaterials thus enabling control over optical material properties with simultaneous spatial and temporal resolution. Potential applications of random access metadevices include active focusing, beam steering, dynamic transformation optics and video holography.

  20. Access/AML

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  1. UK Open Access Policy Landscape

    Picarra, Mafalda

    2014-01-01

    Two distinct paths for open access are being promoted in UK open access policies: open access publishing (gold open access) by RCUK (Gold OA) and self-archiving (green open access) by HEFCE. This requires continuous and coordinated efforts to support universities, academic libraries and researchers in achieving compliance.

  2. Dynamic Spectrum Access

    2011-01-01

    Software Defined Radio (SDR) and Cognitive Radio (CR) could be in all radio transmitters sometime in the future. This thesis gives information about both SDR and CR and how we could use these technologies to utilize the scarce resources of frequencies. The use of CR in Dynamic Spectrum Access Networks could be a possible solution, and this thesis will try to give as much information as possible to this challenge. Information about Dynamic Spectrum Access and different challenges with this tec...

  3. CERN access cards

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  4. The universal access handbook

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  5. Access to physiotherapy services

    Partridge, C. J.

    1982-01-01

    A survey of community physiotherapy services operating within the National Health Service throughout England and Wales in 1980 showed a considerable increase in the availability of physiotherapy outside hospital, with 159 health districts (75 per cent) having some form of community physiotherapy. Additional information obtained about access by general practitioners to hospital physiotherapy departments showed that in 140 districts (66 per cent), some direct access was available.

  6. IMPROVING ACCESS TO DRUGS

    Max Joseph Herman

    2012-01-01

    Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effec...

  7. Children's access to medicines

    Alkahtani, Saad Ahmed

    2013-01-01

    Access to health care for children is important. It is dependent on access to health professionals and also parental attitudes towards illness. Children have the right to receive medicines that are scientifically evaluated for both efficacy and safety. Counterfeit and substandard medicines unfortunately result in the death of many children worldwide. There have been particular problems with diethylene glycol which has been used as a solvent in counterfeit medicines. It has also been foun...

  8. Information Access Surveys (IAS)

    2004-01-01

    What is an Information Access Survey? An Information Access Survey is a tool that: • Identifies key issues about people and what information needs they have • Identifies what media sources are available, what strategies people use to get information and finds out how cost-effective these are • Recommends methods of communication that are useful for poor rural communities who use aquatic resources to improve their livelihoods (Pdf contains 4 pages).

  9. Open Access Research Impacts

    Das, Anup-Kumar

    2015-01-01

    In an open access (OA) world, much importance has been given to using open source tools, open access resources and open solutions to engage authors and researchers in collaborative research, peer-to-peer sharing of scholarly information and collaborative evaluation of scholars’ works. On the other hand, exponential growth of scientific literature also has led to rapid disappearance of nascent literature before it actually gets noticed by the scientific communities. No single database can capt...

  10. GEOLOGICAL MEDIUM AND UNDERGROUND HYDROSPHERE

    S. V. Alekseev

    2015-09-01

    Full Text Available  The article informs about the history, the staff, researches and scientific activities of the Laboratory of Hydrogeo­logy and the Laboratory of Engineering Geology and Geoecology of the Institute of the Earth’s Crust, SB RAS. It reviews the major results of scientific research projects implemented from 2009 to 2013, which provided for determination of characteristics of the geological medium and hydrosphere of East Siberia and Mongolia in natural and technogenic conditions and mo­deling of the evolution of natural, natural-technogenic hydrogeological and engineering geological systems in regions with contrasting climate conditions and specific geological settings.  

  11. Charmed hadrons in nuclear medium

    Tolos, L; Garcia-Recio, C; Molina, R; Nieves, J; Oset, E; Ramos, A

    2009-01-01

    We study the properties of charmed hadrons in dense matter within a coupled-channel approach which accounts for Pauli blocking effects and meson self-energies in a self-consistent manner. We analyze the behaviour in this dense environment of dynamically-generated baryonic resonances as well as the open-charm meson spectral functions. We discuss the implications of the in-medium properties of open-charm mesons on the $D_{s0}(2317)$ and the predicted X(3700) scalar resonances.

  12. Medium Theory and Social Systems

    Tække, Jesper

    The  paper  first  gives  a  tentative  theoretical  explanation  of  the  concept  of media,  based  on  the  dichotomies  of  actual/potential  (meaning),  form/medium  (appearance),  and  substratum/material  content  (extension  in  time  and  space).  This  theoretical  explanation  presents...

  13. Migration from atolls as climate change adaptation

    Birk, Thomas Ladegaard Kümmel; Rasmussen, Kjeld

    2014-01-01

    that migration currently improves access to financial and social capital, reduces pressure on natural resources and makes island communities less vulnerable to extreme weather events and other shocks — all factors that contribute positively to adaptive capacity. It also shows that there are major barriers...... in the two atoll communities, Reef Islands and Ontong Java, which are located in the periphery of Solomon Islands. The paper will outline current migration patterns in the two island groups and discuss how some of this migration may contribute to adaptation to climate change and other stresses. It shows...

  14. Accessibility assessment in municipal schools of Uberaba, Minas Gerais state

    Victor Ruan Carvalho Soares

    2015-03-01

    Full Text Available Introduction: Architectural barriers generate difficulties, significantly impair people’s access to different environments, and limit accessibility. In the Brazilian public school system, these questions become more relevant when the process of school inclusion of students with special needs for mobility is analyzed. The process of school inclusion is intrinsically associated with the accessibility condition of schools. Through the ‘Accessible School Program‘, schools have received financial incentive to adapt their physical spaces according to accessibility. Objective: To describe the accessibility of the schools that have taken part in the ‘Accessible School Program’ in the municipality of Uberaba, Minas Gerais state. The study also aimed to identify the materials purchased and the adjustments and repairs implemented, evaluating whether the changes attend the technical standard of accessibility and agree with the recommended proposals. Methodology: This is an exploratory-descriptive study of quantitative nature; it was conducted in two phases through documental research and field study. Eleven municipal schools that participated in the ‘Accessible School Program’ were identified. Results: Most of the schools presented problems in almost all the items evaluated: sidewalks, common inside area, door squares, restrooms, locker rooms, swimming pools, parking, cinemas or theatres, auditoriums, stadiums, gymnasiums, concert halls, conference rooms and school furniture. Conclusion: The public schools evaluated present limitations regarding accessibility; the physical barriers erected in the past have not been eliminated and they still represent obstacles to be overcome by students with special needs.

  15. NEW RSW & Wall Medium Fully Tetrahedral Grid

    National Aeronautics and Space Administration — New Medium Fully Tetrahedral RSW Grid with viscous wind tunnel wall at the root. This grid is for a node-based unstructured solver. Medium Tet: Quad Surface Faces=...

  16. Anomalous energy losses in fractal medium

    Panyukov, Sergey; Leonidov, Andrei

    2010-01-01

    We derive equation describing distribution of energy losses of the particle propagating in fractal medium with quenched and dynamic heterogeneities. We show that in the case of the medium with fractal dimension $2

  17. Gravitational lensing in plasmic medium

    The influence of plasma on different effects of gravitational lensing is reviewed. Using the Hamiltonian approach for geometrical optics in a medium in the presence of gravity, an exact formula for the photon deflection angle by a black hole (or another body with a Schwarzschild metric) embedded in plasma with a spherically symmetric density distribution is derived. The deflection angle in this case is determined by the mutual combination of different factors: gravity, dispersion, and refraction. While the effects of deflection by the gravity in vacuum and the refractive deflection in a nonhomogeneous medium are well known, the new effect is that, in the case of a homogeneous plasma, in the absence of refractive deflection, the gravitational deflection differs from the vacuum deflection and depends on the photon frequency. In the presence of a plasma nonhomogeneity, the chromatic refractive deflection also occurs, so the presence of plasma always makes gravitational lensing chromatic. In particular, the presence of plasma leads to different angular positions of the same image if it is observed at different wavelengths. It is discussed in detail how to apply the presented formulas for the calculation of the deflection angle in different situations. Gravitational lensing in plasma beyond the weak deflection approximation is also considered

  18. Unsaturated medium hydrocarbons pollution evaluation

    When the so called porous unsaturated medium, that's the vertical subsoil section between both the ground and water-table level, is interested by a hydrocarbons spill, the problem to evaluate the pollution becomes difficult: considering, essentially, the natural coexistence in it of two fluids, air and water, and the interactions between them. This paper reports that the problems tend to increase when a third fluid, the pollutant, immiscible with water, is introduced into the medium: a three-phases flow, which presents several analogies with the flow conditions present in an oil-reservoir, will be established. In such a situation, it would be very useful to handle the matter by the commonly used parameters in the oil reservoirs studies such as: residual saturation, relative permeability, phases mobility, to derive a first semiquantitative estimation of the pollution. The subsoil pollution form hydrocarbons agents is one of the worldwide more diffused causes of contamination: such events are generally referable to two main effects: accidental (oil pipeline breakdowns, e.g.), and continuous (underground tanks breaks, industrial plants leakages, e.g.)

  19. Research on Threshold Adjustment Algorithm in Adaptive Modulation and Coding

    FAN Chen; CHEN Mei-ya; SU Li-jun; YANG Da-cheng

    2006-01-01

    Adaptive Modulation and Coding (AMC) has gained a lot of attentions in the research of High Speed Downlink Packet Access (HSDPA). The idea is to adapt the transmission to the fast changing channel conditions by the use of different Modulation and Coding Schemes (MCS). This paper presents an adaptive AMC algorithm and introduces a theoretical analysis model in order to to investigate its throughput and Frame Error Rate (FER). Subject to the given FER target, our numerical and link level simulation results both show that our algorithm outperforms other existing adaptive algorithms.

  20. Uncertainty in adaptive capacity

    The capacity to adapt is a critical element of the process of adaptation: it is the vector of resources that represent the asset base from which adaptation actions can be made. Adaptive capacity can in theory be identified and measured at various scales, from the individual to the nation. The assessment of uncertainty within such measures comes from the contested knowledge domain and theories surrounding the nature of the determinants of adaptive capacity and the human action of adaptation. While generic adaptive capacity at the national level, for example, is often postulated as being dependent on health, governance and political rights, and literacy, and economic well-being, the determinants of these variables at national levels are not widely understood. We outline the nature of this uncertainty for the major elements of adaptive capacity and illustrate these issues with the example of a social vulnerability index for countries in Africa. (authors)

  1. Adaptive Rationality, Adaptive Behavior and Institutions

    Volchik Vyacheslav, V.

    2015-12-01

    Full Text Available The economic literature focused on understanding decision-making and choice processes reveals a vast collection of approaches to human rationality. Theorists’ attention has moved from absolutely rational, utility-maximizing individuals to boundedly rational and adaptive ones. A number of economists have criticized the concepts of adaptive rationality and adaptive behavior. One of the recent trends in the economic literature is to consider humans irrational. This paper offers an approach which examines adaptive behavior in the context of existing institutions and constantly changing institutional environment. It is assumed that adaptive behavior is a process of evolutionary adjustment to fundamental uncertainty. We emphasize the importance of actors’ engagement in trial and error learning, since if they are involved in this process, they obtain experience and are able to adapt to existing and new institutions. The paper aims at identifying relevant institutions, adaptive mechanisms, informal working rules and practices that influence actors’ behavior in the field of Higher Education in Russia (Rostov Region education services market has been taken as an example. The paper emphasizes the application of qualitative interpretative methods (interviews and discourse analysis in examining actors’ behavior.

  2. Mapping of moveout in a TTI medium

    Stovas, A.

    2012-01-01

    To compute moveout in a transversely isotropic medium with tilted symmetry axis is a very complicated problem. We propose to split this problem into two parts. First, to compute the moveout in a corresponding VTI medium. Second, to map the computed moveout to a TTI medium.

  3. 27 CFR 19.914 - Medium plants.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Medium plants. 19.914... OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Distilled Spirits For Fuel Use Permits § 19.914 Medium plants. Any person wishing to establish a medium plant shall make application for and obtain...

  4. Adaptive Coordinate Descent

    Loshchilov, Ilya; Schoenauer, Marc; Sebag, Michèle

    2011-01-01

    Independence from the coordinate system is one source of efficiency and robustness for the Covariance Matrix Adaptation Evolution Strategy (CMA-ES). The recently proposed Adaptive Encoding (AE) procedure generalizes CMA-ES adaptive mechanism, and can be used together with any optimization algorithm. Adaptive Encoding gradually builds a transformation of the coordinate system such that the new coordinates are as decorrelated as possible with respect to the objective function. But any optimizat...

  5. Open Access in the Sciences

    Morrison, Heather

    2009-01-01

    Open Access in the Sciences is an overview presentation designed for a library science class at McGill University, with a focus on open access in the Canadian context. There are more than 3,900 fully open access journals listed in the Directory of Open Access Journals; more than a hundred are published in Canada. Selected examples of open access journals from across the country are presented, published by universities / libraries, societies, and government. Open access archives (disciplina...

  6. A Study on Web Accessibility Improvement Using QR-Code

    Dae-Jea Cho

    2016-07-01

    Full Text Available Web accessibility makes it possible for the disabled to get equal access to information provided in web like the normal. Therefore, to enable the disabled to use web, there is a need for construction of web page abide by accessibility. The text on the web site is output by sound using screen reader, so that the visually impaired can recognize the meaning of text. However, screen reader cannot recognize image. This paper studies a method for explaining images included in web pages using QR-Code. When producing web page adapting the method provided in this paper, it will help the visually impaired to understand the contents of webpage.

  7. Adaptation to climate change

    J. Carmin; K. Tierney; E. Chu; L.M. Hunter; J.T. Roberts; L. Shi

    2015-01-01

    Climate change adaptation involves major global and societal challenges such as finding adequate and equitable adaptation funding and integrating adaptation and development programs. Current funding is insufficient. Debates between the Global North and South center on how best to allocate the financ

  8. Metallothioneins 2 and 3 contribute to the metal-adapted phenotype but are not directly linked to Zn accumulation in the metal hyperaccumulator, Thlaspi caerulescens

    Hassinen, V. H.; Tuomainen, M.; Peräniemi, S.; Schat, H.; Kärenlampi, S. O.; Tervahauta, A. I.

    2009-01-01

    To study the role of metallothioneins (MTs) in Zn accumulation, the expression of TcMT2a, TcMT2b, and TcMT3 was analysed in three accessions and 15 F3 families of two inter-accession crosses of the Cd/Zn hyperaccumulator Thlaspi caerulescens, with different degrees of Zn accumulation. The highest expression levels were found in the shoots of a superior metal-accumulating calamine accession from St Laurent le Minier, with >10-fold TcMT3 expression compared with another calamine accession and a non-metallicolous accession. Moreover, F3 sibling lines from the inter-accession crosses that harboured the MT2a or MT3 allele from St Laurent le Minier had higher expression levels. However, there was no co-segregation of TcMT2a or TcMT3 expression and Zn accumulation. To examine the functions of TcMTs in plants, TcMT2a and TcMT3 were ectopically expressed in Arabidopsis. The transformant lines had reduced root length in control medium but not at high metal concentrations, suggesting that the ectopically expressed proteins interfered with the physiological availability of essential metals under limited supply. The Arabidopsis transformant lines did not show increased tolerance to Cd, Cu, or Zn, nor increased Cd or Zn accumulation. Immunohistochemical analysis indicated that in roots, MT2 protein is localized in the epidermis and root hairs of both T. caerulescens and Arabidopsis thaliana. The results suggest that TcMT2a, TcMT2b, and TcMT3 are not primarily involved in Zn accumulation as such. However, the elevated expression levels in the metallicolous accessions suggests that they do contribute to the metal-adapted phenotype, possibly through improving Cu homeostasis at high Zn and Cd body burdens. Alternatively, they might function as hypostatic enhancers of Zn or Cd tolerance. PMID:19033549

  9. EasiARS:Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks%EasiARS:多模通信传感网的动态WiFi链路接入及自适应组网方法

    彭康; 赵泽; 陈海明; 李栋; 石海龙; 崔莉

    2015-01-01

    在使用WiFi接入上层服务的无线传感器网络应用中,由于WiFi链路的不稳定性,使用固定位置的网关难以适应长期稳定可靠接入的要求.提出一种基于ZigBee和WiFi双模通信节点的,适用于不稳定WiFi链路下的网络设备自适应接入及组网方法EasiARS(adaptive roles switching),该方法包括实时低开销的WiFi覆盖环境探测和更新方法、节点自适应角色分配方法、网关和节点均为能量受限设备情况下的WiFi覆盖区内分簇和数据传输方法.EasiA RS可以在外部WiFi网络环境动态变化的情况下进行传感网设备的快速部署,并根据WiFi 链路的状态自适应地调整节点角色和传输策略,使数据稳定传输并均衡WiFi 覆盖区内节点的能量消耗.实验验证表明,在WiFi 链路状态变化下,使用EasiARS 的传感网能够自适应地切换节点的工作角色,形成合适的网络拓扑结构,保证数据的稳定上传,与采用单个固定位置网关的方法比较,随着WiFi 链路不同程度的变化,EasiARS 的网络丢包率最多可降低90%;与采用多个备选网关的方法比较,使用EasiARS 的网络生存期提高了67%,并减少了部署前期对 WiFi 链路质量测试和评估的工作负担.%In some wireless sensor networks (WSNs) applications ,gateway nodes use WiFi to access upper layer network .However ,due to the instability of wireless link quality ,it has a lot of work to find a stable and reliable gateway disposition by using fixed gateways in traditional WSNs structure . In this paper ,we propose a novel method for dynamic WiFi link access and adaptive networking called EasiARS ,which is applicable to the scenarios where WiFi link quality is instable and all devices including gateways and nodes are energy constrained .EasiARS is based on WiFi and ZigBee multi‐mode communication .It contains a low‐overhead real‐time WiFi coverage detection method ,a roles

  10. IVOA Simple Image Access

    Dowler, Patrick; Bonnarel, François

    2016-01-01

    The Simple Image Access protocol (SIA) provides capabilities for the discovery, description, access, and retrieval of multi-dimensional image datasets, including 2-D images as well as datacubes of three or more dimensions. SIA data discovery is based on the ObsCore Data Model (ObsCoreDM), which primarily describes data products by the physical axes (spatial, spectral, time, and polarization). Image datasets with dimension greater than 2 are often referred to as datacubes, cube or image cube datasets and may be considered examples of hypercube or n-cube data. In this document the term "image" refers to general multi-dimensional datasets and is synonymous with these other terms unless the image dimensionality is otherwise specified. SIA provides capabilities for image discovery and access. Data discovery and metadata access (using ObsCoreDM) are defined here. The capabilities for drilling down to data files (and related resources) and services for remote access are defined elsewhere, but SIA also allows for dir...

  11. Processing of low- and medium-level radioactive waste. Chapter 3

    In a Dutch government policy formulated in 1984, it has been stated that in the Netherlands one location has to be adapted for, among other things, processing of low- and medium-level radioactive waste. This chapter deals with the radioactive waste to be processed and the processing facility to be realized. (author). 3 figs

  12. Conductivities in an anisotropic medium

    Khimphun, Sunly; Park, Chanyong

    2016-01-01

    In order to imitate anisotropic medium of a condensed matter system, we take into account an Einstein-Maxwell-dilaton-axion model as a dual gravity theory where the anisotropy is caused by different momentum relaxations. This gravity model allows an anisotropic charged black hole solution. On this background, we investigate how the linear responses of vector modes like electric, thermoelectric, and thermal conductivities rely on the anisotropy. We find that the electric conductivity in low frequency limit shows a Drude peak and that in the intermediate frequency regime it reveals the power law behavior. Especially, when the anisotropy increases the exponent of the power law becomes smaller. In addition, we find that there exist a critical value for the anisotropy at which the DC conductivity reaches to its maximum value.

  13. Zirconium behaviour in nitric medium

    Zirconium in nitric solutions exhibits an excellent corrosion resistance in the passive state, and a mediocre corrosion resistance in the unpassive state with risk of stress corrosion cracking. Results of the influence of some parameters (medium, potential, temperature, stress, friction, metallurgical structure and surface state) on zirconium passivation are presented. Zirconium remains passive in a large range of HNO3 concentration (at least up to 14.4N), in the presence of oxidizing ions (Cr4, Ce4), in a spent fuel dissolution solution. Zirconium is depassived by friction at high speed and pressure, by platinum coupling in boiling 14.4N HNO3 with or without stress, or by imposed deformation speed under high potential. (A.B.). 8 figs., 2 tabs

  14. An Adaptive Strategy for an Optimized Collision-Free Slot Assignment in Multichannel Wireless Sensor Networks

    Pascale Minet

    2013-07-01

    Full Text Available Convergecast is the transmission paradigm used by data gathering applications in wireless sensor networks (WSNs. For efficiency reasons, a collision-free slotted medium access is typically used: time slots are assigned to non-conflicting transmitters. Furthermore, in any slot, only the transmitters and the corresponding receivers are awake, the other nodes sleeping in order to save energy. Since a multichannel network increases the throughput available to the application and reduces interference, multichannel slot assignment is an emerging research domain in WSNs. First, we focus on a multichannel time slot assignment that minimizes the data gathering delays. We compute the optimal time needed for a raw data convergecast in various multichannel topologies. Then, we focus on how to adapt such an assignment to dynamic demands of transmissions (e.g., alarms, temporary additional application needs and retransmissions. We formalize the problem using linear programming, and we propose an incremental technique that operates on an optimized primary schedule to provide bonus slots to meet new transmission needs. We propose AMSA, an Adaptive Multichannel Slot Assignment algorithm, which takes advantage of bandwidth spatial reuse, and we evaluate its performances in terms of the number of slots required, slot reuse, throughput and the number of radio state switches.

  15. Migrants' access to healthcare

    Norredam, Marie

    2011-01-01

    access were used to explore differences: 1) cancer stage at diagnosis as a clinical outcome and 2) emergency room (ER) contacts as a utilisation measure. Both informal and formal barriers to access were studied to explore why possible differences existed including: 1) motivation for using ER; and 2......) asylum seekers' healthcare entitlements. Different definitions of migration and ethnicity were investigated including: country of birth and residence status. Substudy I showed a tendency towards more advanced stage at diagnosis or unknown stage among most subgroups of migrant women with a history of...... informal barriers to access and screening. According to the law asylum seekers are entitled to emergency care only in 10 out of 24 countries. Medical screening was carried out in all but one of the 24 EU countries; however, the content and extent of screening programmes vary. The thesis aimed to explore if...

  16. Nuclear information access system

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  17. Complication with intraosseous access

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    INTRODUCTION: Intraosseous access (IO) is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real......-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users' experiences of complications. METHODS: An online questionnaire was sent to Scandinavian emergency...... physicians, anesthesiologists and pediatricians. RESULTS: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%), difficulties with penetration of periosteum with IO needle (10.3%), difficulties with...

  18. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  19. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  20. INTERFERENCE REJECTION OF SIGNALS BY ADAPTIVE MINIMUM MEAN SQUARE ERROR CRITERION OVER RAYLEIGH FADING CHANNELS

    AMITA SONI

    2009-03-01

    Full Text Available Channel time-variation (or fading is the major source of impairment in digital wireless communications. This occurs due to mobility of the user or of the objects in the propagation environment. The limited spectral bandwidth necessitates the use of resource sharing schemes between multiple users. As the transmission medium is shared between the users, this leads to interference between the users. Sharing of resource results in interference such as multiple access interference. This paper deals with methods to study and mitigate such interference considering Rayleigh fading channels. There are various classes of fading conditions. The use of CDMA is under active research as a viable alternative to TDMA and FDMA. Performance in this system is limited by narrowband and multiple access interference. Various methods are used to mitigate them. But here, linear MMSE detector is considered. MMSE technique results in interference rejection. Its adaptive form is applied to Rayleigh fading channels, which are reflective and nondispersive. It results into better results than before.

  1. Cushioning medium for discarding radioactive waste

    A cushioning medium for discarding radioactive wastes is disposed in a discarding hole formed underground. The cushioning medium is formed by drying and solidifying a mixture of clays and sands. A lower cushioning medium has a cylindrical containing hole at the central portion of a cylindrical bottomed cushioning medium main body. A cylindrical metal overpack containing radioactive wastes such as glass solidification materials is contained in the containing hole. An upper cushioning medium situated above the lower cushioning medium has an communication hole having a circular cross section at the central portion of the cylindrical buffer main body. A protection member formed of a metal plate is disposed on the inner surface of the containing hole of the lower cushioning medium and the communication hole of the upper cushioning medium. A plug cushioning medium situated in the upper cushioning medium is formed of a solid cylindrical body, and fitted into the communication hole of the upper cushioning medium to close the communication hole, being situated above the overpack. (I.N.)

  2. Medium-Based Design: Extending a Medium to Create an Exploratory Learning Environment

    Rick, Jochen; Lamberty, K. K.

    2005-01-01

    This article introduces "medium-based" design -- an approach to creating "exploratory learning environments" using the method of "extending a medium". First, the characteristics of exploratory learning environments and medium-based design are described and grounded in related work. Particular attention is given to "extending a medium" --…

  3. Disruption - Access cards service

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  4. Open-Access-Suchmaschinen

    Nicolai, Thomas

    2009-01-01

    Open Access ist eine von Wissenschaftlern für Wissenschaftler gegründete Bewegung mit dem Interesse, einen kostenlosen und uneingeschränkten Zugang zu wissenschaftli-chen Forschungsbeiträgen über das Internet zu ermöglichen. Im Zuge dieser Entwicklung stellen Forschungsinstitutionen ihren Wissenschaftlern kostenlos Open-Access-Archive zur freien Veröffentlichung ihrer Forschungsbeiträge zur Verfügung. Dies hat in den vergangenen Jahren zu mehreren Millionen frei verfügbaren wissenschaftlichen...

  5. Sprawl and Accessibility

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  6. Accessibility | Smokefree.gov

    Smokefree.gov is committed to providing access to all individuals—disabled or not—who are seeking information on its Web sites. To provide this information, the smokefree.gov Web site has been designed to comply with Section 508 of the Rehabilitation Act (as amended). Section 508 requires that all individuals with disabilities (whether they are federal government employees or members of the general public) have access to and use of information and data comparable to that provided to individuals without disabilities, unless an undue burden would be imposed.

  7. Kinds of Access

    Overgaard, Morten; Sandberg, Kristian

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the...... there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  8. Computer Access. Tech Use Guide: Using Computer Technology.

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…

  9. A Review of Packet Reservation Multiple Access

    Varsha Sharma

    2011-05-01

    Full Text Available The rapid technological advances and innovations of the past few decades have pushed wireless communication from concept to reality. The popularity of wireless communication systems can be seen almost everywhere in the form of cellular networks, WLANs, and WPANs. Packet-switched technology has been demonstrated as effective in cellular radio systems with short propagation delay, not only for data, but also for voice transmission. In fact, packet voice can efficiently exploit speech on-off activity to improve bandwidth utilization over time division multiple access (TDMA. Such an approach has been first suggested in the packet reservation multiple-access (PRMA technique, an adaptation of the reservation ALOHA protocol to the cellular environment. PRMA can be viewed as a combination of TDMA and slotted ALOHA protocols. Recently modified versions of the PRMA protocol have been the subject of extensive research. This paper reviews a number of variations of PRMA protocol in literature.

  10. Sense or Sensibility? : a comparative study of Austen's novel and two adaptations

    2004-01-01

    This thesis examines the difference between Jane Austen s first published novel, Sense and Sensibility (1811), and two filmic adaptations by Ang Lee (1995) and Rodney Bennet (1985). The main emphasis is on narrative techniques and how these are employed differently in the two media. Naturally, an adaptation from one medium to another causes alterations in the original storyline. A visual medium can never duplicate a written text completely. An author s choice of narrative techniques is i...

  11. Migrants' access to healthcare.

    Norredam, Marie

    2011-10-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were used to explore differences: 1) cancer stage at diagnosis as a clinical outcome and 2) emergency room (ER) contacts as a utilisation measure. Both informal and formal barriers to access were studied to explore why possible differences existed including: 1) motivation for using ER; and 2) asylum seekers' healthcare entitlements. Different definitions of migration and ethnicity were investigated including: country of birth and residence status. Substudy I showed a tendency towards more advanced stage at diagnosis or unknown stage among most subgroups of migrant women with a history of cancer compared to non-migrant women. Sub-study II found that some migrants (those born in Somalia, Turkey and Ex-Yugoslavia) use ER services more frequently than do non-migrants whereas others have the same or lower utilisation levels. As a consequence, substudy III was undertaken, which documented that more migrant within all subgroups had considered contacting a primary caregiver before visiting the ER compared to non-migrants, but that migrants experienced communication problems herein

  12. Policy-based Self-Adaptive Media Service Architecture for Reliable Multimedia Service Provisioning

    G. Maria kalavathy; N. Edison Rathinam; P. Seethalakshmi

    2010-01-01

    The main objective of this paper is to design and develop the Self-Adaptive Media Service Architecture (SAMSA) for providing reliable multimedia services through policy-based actions. The distributed multimedia services deployed using SOA can be accessed in heterogeneous environments that are prone to changes during run-time. To provide reliable multimedia services, a powerful self-adaptable architecture is necessary to adapt at run time and react to the environment. The adaptability in this ...

  13. Digital Scholarship and Open Access

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  14. Analysis of Open Access Landscape

    Helen Doyle; Andy Gass; Debra Lappin; Rebecca Kennison

    2005-01-01

    This paper is created by bounding 5 editorials of Public Library of Science (PLoS ) which have written on various aspects of open access. It covers wide range topics of important open access issues, such as from paying for open access to copyright to open access as a public issue, which may be more or less of interest of our audience.

  15. The Cost of Mitigating Power Law Delay in Random Access Networks

    Bi, Suzhi

    2012-01-01

    Exponential backoff (EB) is a widely adopted collision resolution mechanism in many popular random-access networks including Ethernet and WLAN. The prominence of EB is primarily attributed to its asymptotic throughput stability, which ensures a non-zero throughput even when the number of users in the network goes to infinity. Recent studies, however, show that EB is fundamentally unsuitable for applications that are sensitive to large delay and delay jitters, as it induces divergent second- and higher-order moments of medium access delay. Essentially, the medium access delay follows a power law distribution, a subclass of heavy-tailed distribution. To understand and alleviate the issue, this paper systematically analyzes the tail delay distribution of general backoff functions, with EB being a special case. In particular, we establish a tradeoff between the tail decaying rate of medium access delay distribution and the stability of throughput. To be more specific, convergent delay moments are attainable only ...

  16. Access to effective healthcare

    Høy, Bente

    2015-01-01

    Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in...

  17. Accessing vs Sourcing Knowledge

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for...

  18. Access to telecommunications networks

    Canoy, M.F.M.; de Bijl, P.W.J.; Kemp, R.

    2003-01-01

    Contributing to a convergence of legal and economic approaches, The Economics of Antitrust and Regulation in Telecommunications integrates economic theory into current EU antitrust policy within the sector. The book addresses the role of competition and regulatory policies on a number of key issues in telecommunications, such as market definition, collective dominance, access to networks, and allocation of scarce resources.

  19. Greater needs, limited access

    2009-01-01

    With the recent ratification of the United Nations Convention on the Rights of Persons with Disabilities by the United Kingdom, Kathryn Senior reports that access to health care for people with mental health disorders is one area that leaves room for improvement.

  20. Open Access: Soziologische Aspekte

    Herb, Ulrich

    2007-01-01

    Die Forderung nach Open Access wird wissenschaftslogisch (Beschleunigung der wissenschaftlichen Kommunikation), finanziell (Linderung der Zeitschriftenkrise), sozial (Verringerung des Digital Divide), demokratietheoretisch (Zugang zu Informationen ermöglicht Partizipation) und sozialpolitisch (freier Zugang zu Informationen nivelliert Ungleichheiten) begründet. Dieser Beitrag untersucht einige dieser Annahmen mittels sozialwissenschaftlicher Modelle. Von Befunden aus der Bildungssoziologie un...

  1. Funding scientific open access

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  2. Kinds of access

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, t...

  3. College Access Marketing

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  4. Access as justice

    FITZPATRICK, Peter

    2005-01-01

    With the considerable help of Derrida, aptly aided by Mandela, this paper advances an idea of justice as integral to law. Thence, by way of an homology with such justice, access also is shown to be integral to law. What impels the overall argument is the primacy accorded to law in the constitution of the social bond.

  5. Strategies for Improving Access.

    Hore, Terry; Barwood, Bryan

    1989-01-01

    The development of the varied strategies that have been introduced in order to improve access for disadvantaged groups at Monash University is discussed. The Junior University Programme, the Monash Orientation Scheme for Aborigines, the Mature Age Special Admission Scheme, Special Entry Scheme, and the Schools Link Programme are described. (MLW)

  6. ACCESS Project: Final Report

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  7. Access2innovation

    Ravn, Jacob

    eksplicit haft fokus på at understøtte samarbejde mellem virksomhedere, forskere og NGOer som afsæt for at reducere fattigdomsproblematikkerne i udviklingslandene gennem en markedsdreven tilgang. Nærværende afhandling tager med udgangspunkt i studiet af access2innovation netværket (www.access2innovation.......com) fat i en flig af denne diskussion. Access2innovation har igennem et målrettet samarbejde mellem Folkekirkens Nødhjælp, virksomheder og forskere leveret en række konkrete kommercielle løsninger målrettet behovene i nødhjælps-­ og udviklingsbistanden. Netværket repræsenterer derved i praksis et...... succesfuldt eksempel på innovation i netværk ved at have lagt grunden for etablering af Sky Watch og ViewWorld og søsat yderligere to partnerskaber omkring Den Grønne Generator og WorldBarrow. Erfaringen fra access2innovation er dog samtidigt, at udvikling og implementering af samarbejdet har været...

  8. Access and Fishing Activities

    Høst, Jeppe Engset

    In this chapter, I look at the implications of transferable quotas on the organization of production; that is, how fishing activities are structured around access to the individual and transferable quotas and how, in turn, the quotas structure the production. Therefore, this chapter will give a d...

  9. Public Access Defibrillation

    Agerskov, Marianne; Nielsen, Anne Møller; Hansen, Carolina Malta;

    2015-01-01

    OHCA-cases where an accessible AED was located within 100 m. In addition, we assessed 30-day survival. METHODS: Using data from the Mobile Emergency Care Unit and the Danish Cardiac Arrest Registry, we identified 521 patients with OHCA between October 1, 2011 and September 31, 2013 in Copenhagen...

  10. Fundamentals of adaptive signal processing

    Uncini, Aurelio

    2015-01-01

    This book is an accessible guide to adaptive signal processing methods that equips the reader with advanced theoretical and practical tools for the study and development of circuit structures and provides robust algorithms relevant to a wide variety of application scenarios. Examples include multimodal and multimedia communications, the biological and biomedical fields, economic models, environmental sciences, acoustics, telecommunications, remote sensing, monitoring, and, in general, the modeling and prediction of complex physical phenomena. The reader will learn not only how to design and implement the algorithms but also how to evaluate their performance for specific applications utilizing the tools provided. While using a simple mathematical language, the employed approach is very rigorous. The text will be of value both for research purposes and for courses of study.

  11. Chemistry of nitrile anions in the interstellar medium

    Despite the extreme conditions of temperature (down to 10K) and density (down to 100 molecules/cm3), the giant molecular clouds and the circumstellar envelopes present a rich and complex chemistry. To date, more than 180 molecules have been detected in the InterStellar Medium (ISM) with a large abundance of nitriles (RC≡N). In addition, several anions have been recently observed in this medium: C4H¯, C6H¯, C8H¯, CN¯, C3N¯ and C5N¯. These last species should play a key role in the molecular growth towards complexity. To explore this hypothesis, their reactivity must be studied in the laboratory. The FALP-MS and the CRESU experimental apparatuses of the Rennes University are able to measure absolute rate coefficient of various chemical reactions, including the ion – molecule reactions, in gas phase at low temperature (from 300K for the FALP-MS down to 15K for the CRESU). Therefore, these experimental tools are particularly adapted to the kinetic studies of reactions potentially involved in the Interstellar Medium. One of the difficulties encountered in experiments with anions is their generation. We describe here the formation of the CN¯ and C3N¯ anions by dissociative electron attachment on the molecular precursors BrCN and BrC3N

  12. Dreams of a New Medium

    Aden Evens

    2009-01-01

    Full Text Available Problematic at best, the desire for a transparent interface nevertheless drives much of digital culture and technology. But not the Web; or at least, not Web 1.0. Thoroughly commercialized, comfortably parsed into genres, serving billions of pages of predigested content to passive consumers, the World Wide Web as developed in the '90s unabashedly embraces its role as medium. While so many digital technologies work to hide their mediacy--drawing in the user with a total simulated sensorium, dematerializing the resistances of size and weight, untangling the knots of cables tying user to machine and machine to cubicle, minimizing the interface--Web 1.0 proudly clings to the browser as a glaring reminder of its medial character. While Web 2.0 has not forsaken the browser altogether, it nevertheless seems to offer a different sort of mediation. Arising alongside the atomization of browser functions, the ubiquitization of connectivity, and the coincidence of producer and user, Web 2.0 retains the form of a medium while reaching for the experiential logic of immediacy. This is not the immediacy of the transparent interface; rather, Web 2.0 effects an immediate relationship between the individual and culture. The interface does not disappear, but its mediacy is subsumed under the general form of cultural participation. Focusing on the "version upgrade" from Web 1.0 to 2.0, this essay will explore the implications for mediacy of this transition, noting that the fantasy of immediacy which drives Web 2.0 is layered and complex. The typical account of immediacy proposes to eliminate the interface and so construct a virtual reality (VR. But Web 2.0 mostly sidesteps the virtual, propelled instead by a fantasy of intuition in which the Web already knows what you want because it is you. Crucially, fantasies about the digital are effective: the computer's futurity inhabits our world, finding its expression in politics, advertising, budgeting, strategic planning

  13. Acid adaptation promotes survival of Salmonella spp. in cheese.

    Leyer, G J; Johnson, E A

    1992-01-01

    Salmonella typhimurium was adapted to acid by exposure to hydrochloric acid at pH 5.8 for one to two doublings. Acid-adapted cells had increased resistance to inactivation by organic acids commonly present in cheese, including lactic, propionic, and acetic acids. Recovery of cells during the treatment with organic acids was increased 1,000-fold by inclusion of 0.1% sodium pyruvate in the recovery medium. Acid-adapted S. typhimurium cells survived better than nonadapted cells during a milk fer...

  14. Bridging the Gap: Adaptive Games and Student-Centered VLEs

    Del Blanco, Ángel; Torrente, Javier; Moreno-Ger, Pablo; Fernández-Manjón, Baltasar

    The widely used e-learning technology is facing new challenges such as how to produce student-centered systems that can be adapted to the needs of each student. Those objectives should be met in a standard compliant way to simplify general adoption. In this context, educational videogames are proposed as an ideal medium to facilitate adaptation and tracking of the students’ performance for assessment purposes. However, there are still barriers between the gaming and e-learning worlds preventing their mutual interaction. In this paper we propose a middleware to bridge this gap, integrating adaptive educational videogames in e-learning environments with a special focus on the ongoing standardization efforts.

  15. Fixed Access Network Sharing

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  16. Medium factors on anaerobic production of rhamnolipids by Pseudomonas aeruginosa SG and a simplifying medium for in situ microbial enhanced oil recovery applications.

    Zhao, Feng; Zhou, Jidong; Han, Siqin; Ma, Fang; Zhang, Ying; Zhang, Jie

    2016-04-01

    Aerobic production of rhamnolipid by Pseudomonas aeruginosa was extensively studied. But effect of medium composition on anaerobic production of rhamnolipid by P. aeruginosa was unknown. A simplifying medium facilitating anaerobic production of rhamnolipid is urgently needed for in situ microbial enhanced oil recovery (MEOR). Medium factors affecting anaerobic production of rhamnolipid were investigated using P. aeruginosa SG (Genbank accession number KJ995745). Medium composition for anaerobic production of rhamnolipid by P. aeruginosa is different from that for aerobic production of rhamnolipid. Both hydrophobic substrate and organic nitrogen inhibited rhamnolipid production under anaerobic conditions. Glycerol and nitrate were the best carbon and nitrogen source. The commonly used N limitation under aerobic conditions was not conducive to rhamnolipid production under anaerobic conditions because the initial cell growth demanded enough nitrate for anaerobic respiration. But rhamnolipid was also fast accumulated under nitrogen starvation conditions. Sufficient phosphate was needed for anaerobic production of rhamnolipid. SO4(2-) and Mg(2+) are required for anaerobic production of rhamnolipid. Results will contribute to isolation bacteria strains which can anaerobically produce rhamnolipid and medium optimization for anaerobic production of rhamnolipid. Based on medium optimization by response surface methodology and ions composition of reservoir formation water, a simplifying medium containing 70.3 g/l glycerol, 5.25 g/l NaNO3, 5.49 g/l KH2PO4, 6.9 g/l K2HPO4·3H2O and 0.40 g/l MgSO4 was designed. Using the simplifying medium, 630 mg/l of rhamnolipid was produced by SG, and the anaerobic culture emulsified crude oil to EI24 = 82.5 %. The simplifying medium was promising for in situ MEOR applications. PMID:26925616

  17. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  18. National strategy for climate change adaptation

    This book expresses the French State's view on the way to deal with the issue of climate change adaptation. After having recalled the ineluctability of some observed changes, the actors involved in this adaptation, and some guideline principles to implement adaptation, a first chapter describes the context: international mobilization, climate data evolution, definition of new criteria and critical thresholds, relationship between adaptation, alleviation and sustainable development, tensions between long and short terms. It discusses the objectives: public security and health, alleviation of inequalities with respect to risks, cost reduction, natural heritage preservation. Nine strategic axes are then identified: to develop knowledge, to strengthen the survey system, to inform, to educate and to make all actors aware, to promote a territory-based approach, to finance adaptation actions, to use regulatory and law instruments, to support voluntary approaches and the dialogue with private actors, to take the overseas peculiarity into account, and to contribute to international exchanges. The next chapters are respectively dealing with transverse approaches (water, risk prevention, health, and biodiversity), sector-based insights (agriculture, energy and industry, transports, building and housing, tourism, banks and insurance companies), medium-based approach (cities, littoral and seas, mountain, forest). The last part deals with the implementation issue

  19. Hopping control channel MAC protocol for opportunistic spectrum access networks

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  20. Studies in medium energy physics

    This document constitutes the (1991--1992) technical progress report and continuation proposal for the ongoing medium energy nuclear physics research program supported by the US Department of Energy through special Research Grant DE-FG05-88ER40444. The experiments discussed are conducted at the Los Alamos National Laboratory's (LANL) Clinton P. Anderson Meson Physics Facility (LAMPF) and the Alternating Gradient Synchrotron (AGS) facility of the Brookhaven National Laboratory (BNL). The overall motivation for the work discussed in this document is driven by three main objectives: (1) provide hadron-nucleon and hadron-nucleus scattering data which serve to facilitate the study of effective two-body interactions, test (and possibly determine) nuclear structure, and help study reaction mechanisms and dynamics; (2) provide unique, first-of-a-kind ''exploratory'' hadron-nucleus scattering data in the hope that such data will lead to discovery of new phenomena and new physics; and (3) perform precision tests of fundamental interactions, such as rare decay searches, whose observation would imply fundamental new physics

  1. The interstellar medium in galaxies

    1997-01-01

    It has been more than five decades ago that Henk van de Hulst predicted the observability of the 21-cm line of neutral hydrogen (HI ). Since then use of the 21-cm line has greatly improved our knowledge in many fields and has been used for galactic structure studies, studies of the interstellar medium (ISM) in the Milky Way and other galaxies, studies of the mass distribution of the Milky Way and other galaxies, studies of spiral struc­ ture, studies of high velocity gas in the Milky Way and other galaxies, for measuring distances using the Tully-Fisher relation etc. Regarding studies of the ISM, there have been a number of instrumen­ tal developments over the past decade: large CCD's became available on optical telescopes, radio synthesis offered sensitive imaging capabilities, not only in the classical 21-cm HI line but also in the mm-transitions of CO and other molecules, and X-ray imaging capabilities became available to measure the hot component of the ISM. These developments meant that Milky Way was n...

  2. Enriching the hot circumgalactic medium

    Crain, Robert A; Schaye, Joop; Frenk, Carlos S; Theuns, Tom

    2013-01-01

    Models of galaxy formation in a CDM universe predict that massive galaxies are surrounded by a hot, quasi-hydrostatic circumgalactic corona of slowly cooling gas, predominantly accreted from the IGM. This prediction is borne out by the cosmological hydrodynamical simulations of Crain et al., which reproduce scaling relations between the X-ray and optical properties of nearby disc galaxies. Such coronae are metal poor, but observations of the X-ray emitting circumgalactic medium (CGM) of local galaxies typically indicate enrichment to near-solar iron abundance, potentially signalling a shortcoming in galaxy formation models. We show here that, while the hot CGM of galaxies formed in the simulations is metal poor in a mass-weighted sense, its X-ray luminosity-weighted metallicity is often close to solar. This bias arises because the soft X-ray emissivity of a typical 0.1 keV corona is dominated by collisionally-excited metal ions that are synthesised in stars and recycled into the hot CGM. We find that these me...

  3. Turbulence in the Intergalactic Medium

    Evoli, Carmelo

    2011-01-01

    We study supernova-driven galactic outflows as a mechanism for injecting turbulence in the intergalactic medium (IGM) far from galaxies. To this aim we follow the evolution of a 10^13 Msun galaxy along its merger tree, with carefully calibrated prescriptions for star formation and wind efficiencies. At z~3 the majority of the bubbles around galaxies are old (ages >1Gyr), i.e. they contain metals expelled by their progenitors at earlier times; their filling factor increases with time reaching about 10% at z<2. The energy deposited by these expanding shocks in the IGM is predominantly in kinetic form (mean energy density of 1 \\mu eV cm^-3, about 2-3 x the thermal one), which is rapidly converted in disordered motions by instabilities, finally resulting in a fully developed turbulent spectrum whose evolution is followed through a spectral transfer function approach. The derived mean IGM turbulent Doppler parameter, b_t, peaks at z~1 at about 1.5 km/s with maximum b_t = 25 km/s. The shape of the b_t distributi...

  4. Connection of input adapter for alarm signal analysis at liquid metal steam generator

    Based on the experimental finding that the sensor indicating leakage of the medium changes its resistance and capacitance in dependence on the speed and amount of penetrating medium a connection is designed of the input adapter for the analysis of accident alarm signals. The penetrating medium is easy to distinguish because water and steam pressure differ considerably from the pressure of liquid metal. (J.P.)

  5. Data-Driven Optimal Control for Adaptive Optics

    Hinnen, K.J.G.

    2007-01-01

    Adaptive optics (AO) is a technique to actively correct the wavefront distortions introduced in a light beam as it propagates through a turbulent medium. Nowadays, it is commonly applied in ground-based telescopes to counteract the devastating effect of atmospheric turbulence. This thesis focuses on

  6. Origins of adaptive immunity.

    Liongue, Clifford; John, Liza B; Ward, Alister

    2011-01-01

    Adaptive immunity, involving distinctive antibody- and cell-mediated responses to specific antigens based on "memory" of previous exposure, is a hallmark of higher vertebrates. It has been argued that adaptive immunity arose rapidly, as articulated in the "big bang theory" surrounding its origins, which stresses the importance of coincident whole-genome duplications. Through a close examination of the key molecules and molecular processes underpinning adaptive immunity, this review suggests a less-extreme model, in which adaptive immunity emerged as part of longer evolutionary journey. Clearly, whole-genome duplications provided additional raw genetic materials that were vital to the emergence of adaptive immunity, but a variety of other genetic events were also required to generate some of the key molecules, whereas others were preexisting and simply co-opted into adaptive immunity. PMID:21395512

  7. Diffusion Adaptation over Networks

    Sayed, Ali H

    2012-01-01

    Adaptive networks are well-suited to perform decentralized information processing and optimization tasks and to model various types of self organized and complex behavior encountered in nature. Adaptive networks consist of a collection of agents with processing and learning abilities. The agents are linked together through a connection topology, and they cooperate with each other through local interactions to solve distributed inference problems in real-time. The continuous diffusion of information across the network enables agents to adapt their performance in relation to changing data and network conditions; it also results in improved adaptation and learning performance relative to non-cooperative networks. This article provides an overview of diffusion strategies for adaptation and learning over networks. The article is divided into several sections: 1. Motivation; 2. Mean-Square-Error Estimation; 3. Distributed Optimization via Diffusion Strategies; 4. Adaptive Diffusion Strategies; 5. Performance of Ste...

  8. STUDY ON MEASURE OF TECHNICAL INNOVATION ABILITY IN MEDIUM AND SMALL MANUFACTURING ENTERPRISES

    Bi Kexin; Ding Xiaohui; Zhang Tiezhu; Feng Yingjun

    2004-01-01

    Measure index system of technical innovation in medium and small manufacturing enterprises is established according to principles of exploration, adaptability, standardization, generalization, feasibility, comparability and combination of economic benefit and continual development.It includes index of technical innovation capacity, informational administration on technical innovation, and investment of technical innovation, economic benefit, green technical level, social contribution and other influential indexes.Approach to measure of technical innovation in medium and small manufacturing enterprises is presented based on combination of grey relation and fuzzy hiberarchy analysis, and conclusions are drawn based on practical analysis of 20 medium and small enterprises, which provides the basis for the medium and small enterprises to select technical innovation policies and the government to constitute relative policies.

  9. Consciousness And Adaptive Behavior

    Sieb, Richard/A.

    2005-01-01

    Consciousness has resisted scientific explanation for centuries. The main problem in explaining consciousness is its subjectivity. Subjective systems may be adaptive. Humans can produce voluntary new or novel intentional (adaptive) action and such action is always accompanied by consciousness. Action normally arises from perception. Perception must be rerepresented in order to produce new or novel adaptive action. The internal explicit states produced by a widespread nonlinear emergen...

  10. Human Adaptations: Free divers

    Tournat, Troy Z.

    2014-01-01

    Freediving has been around for thousands of years and was only way to dive until the inventionof oxygen tanks in the 19th century. Around the world, people dove for goods such as pearls, andtoday people freedive for sport. Divers stretch the limit of their body and mind’s capabilitiesthrough psychological adaptations from thermal, respiratory, and cardiovascular responses.Findings conclude that thermal adaptations are a similar process to cold adaptive response. Withthe implementation of wets...

  11. Client Device Based Content Adaptation Using Rule Base

    Velammal

    2011-01-01

    Full Text Available Problem statement: Content adaptation have been playing an important role in mobile devices, wherein the content display differs from desktop computers in many aspects, such as display screens, processing power, network connection bandwidth. In order to display web contents appropriately on mobile devices and on other types of devices such as hand computers, PDAs, Smart phones, it is important to adapt or transcode them to fit the characteristics of these devices. Approach: Existing content adaptation systems deploy various techniques which have been developed for specific purposes and goals. By exploiting various possible combinations of available resources, appropriate adaptation process can be carried over on the actual data, so that the information can be assimilated in a different end system other than the intended system. In this study, we present a content adaptation system based on rules created for mobile devices. Rules are invoked based on the individual client device information. Results: The adaptation has been performed according to the delivery device which was formalized through the profiler system. A profile holds information about the hardware and software specifications of the device thereby enabling the adaption of web content based on their characteristics which enables the user to access the web easily on various devices. Conclusion/Recommendation: This study enhances the viability of the information being presented to user, which will be independent of the end system being used for accessing the information. With the help of configurable rules, effective content adaptation can be achieved to provide optimal result.

  12. Medium-induced multi-photon radiation

    MA, Hao; Salgado, Carlos A.; Tywoniuk, Konrad

    2011-01-01

    We study the spectrum of multi-photon radiation off a fast quark in medium in the BDMPS/ASW approach. We reproduce the medium-induced one-photon radiation spectrum in dipole approximation, and go on to calculate the two-photon radiation in the Moli\\`{e}re limit. We find that in this limit the LPM effect holds for medium-induced two-photon ladder emission.

  13. Medium-induced multi-photon radiation

    Ma Hao; Salgado, Carlos A [Departamento de Fisica de PartIculas, Universidade de Santiago de Compostela, E-15782 Santiago de Compostela (Spain); Tywoniuk, Konrad [Lund University (Sweden)

    2011-01-01

    We study the spectrum of multi-photon radiation off a fast quark in medium in the BDMPS/ASW approach. We reproduce the medium-induced one-photon radiation spectrum in dipole approximation, and go on to calculate the two-photon radiation in the Moliere limit. We find that in this limit the LPM effect holds for medium-induced two-photon ladder emission.

  14. Selective medium for isolation of Actinobacillus actinomycetemcomitans.

    Slots, J

    1982-01-01

    A selective medium, TSBV (tryptic soy-serum-bacitracin-vancomycin) agar, was developed for the isolation of Actinobacillus actinomycetemcomitans, TSBV agar contained (per liter) 40 g of tryptic soy agar, 1 g of yeast extract, 100 ml of horse serum. 75 mg of bacitracin, and 5 mg of vancomycin. The TSBV medium suppressed most oral species and permitted significantly higher recovery of A. actinomycetemcomitans than nonselective blood agar medium. The distinct colonial morphology and positive cat...

  15. Molecular collisions in the interstellar medium.

    Flower, D

    2007-01-01

    In the interstellar medium - the space between the stars in galaxies - new stars are born from material that is replenished by the debris ejected by stars when they die. This book is a comprehensive manual for studying the collisional and radiative processes observed in the interstellar medium. This second edition has been thoroughly updated and extended to cover related topics in radiation theory. It considers the chemistry of the interstellar medium both at the present epoch and in the earl...

  16. Pion structure function in nuclear medium

    Suzuki, Katsuhiko

    1995-01-01

    We study the pion structure function in nuclear medium using the Nambu and Jona-Lasinio model, and its implication for the nuclear pion enhancement of the sea quark distribution in nuclei. By using the operator product expansion, medium effect of the nuclear matter is incorporated in calculations of the twist-2 operators. We find density dependence of the pion structure function is rather weak around the nuclear matter density. We also discuss how the medium modification of the pion structure...

  17. Adaptive Multimedia Retrieval: Semantics, Context, and Adaptation

    This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Adaptive Multimedia Retrieval, AMR 2012, held in Copenhagen, Denmark, in October 2012. The 17 revised full papers presented were carefully reviewed and selected from numerous submissi......This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Adaptive Multimedia Retrieval, AMR 2012, held in Copenhagen, Denmark, in October 2012. The 17 revised full papers presented were carefully reviewed and selected from numerous...

  18. Decentralized adaptive control

    Oh, B. J.; Jamshidi, M.; Seraji, H.

    1988-01-01

    A decentralized adaptive control is proposed to stabilize and track the nonlinear, interconnected subsystems with unknown parameters. The adaptation of the controller gain is derived by using model reference adaptive control theory based on Lyapunov's direct method. The adaptive gains consist of sigma, proportional, and integral combination of the measured and reference values of the corresponding subsystem. The proposed control is applied to the joint control of a two-link robot manipulator, and the performance in computer simulation corresponds with what is expected in theoretical development.

  19. Adaptive Wireless Transceiver Project

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  20. Adaptive Modulation for a Downlink Multicast Channel in OFDMA Systems

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2007-01-01

    In this paper we focus on adaptive modulation strategies for multicast service in orthogonal frequency division multiple access systems. A reward function has been defined as the optimization target, which includes both the average user throughput and bit error rate. We also developed an adaptive...... modulation strategy, namely local best reward strategy, to maximize this reward function. The performance of different modulation strategies are compared in different SNR distribution scenarios, and the optimum strategy in each scenario is suggested....

  1. Adaptive modulation for a downlink multicast channel in OFDMA systems

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2007-01-01

    In this paper we focus on adaptive modulation strategies for Multicast service in orthogonal frequency division multiple access systems. A Reward function has been defined as the optimization target, which includes both the average user throughput and bit error rate. We also developed an adaptive...... modulation strategy, namely Local Best Reward strategy, to maximize this Reward function. The performance of different modulation strategies are compared in different SNR distribution scenarios, and the optimum strategy in each scenario is suggested....

  2. Time Optimized Algorithm for Web Document Presentation Adaptation

    Pan, Rong; Dolog, Peter

    2010-01-01

    Currently information on the web is accessed through different devices. Each device has its own properties such as resolution, size, and capabilities to display information in different format and so on. This calls for adaptation of information presentation for such platforms. This paper proposes...... content-optimized and time-optimized algorithms for information presentation adaptation for different devices based on its hierarchical model. The model is formalized in order to experiment with different algorithms....

  3. On the Performance of Adaptive Modulation in Cognitive Radio Networks

    Foukalas, F.; Karetsos, G. T.

    2013-01-01

    We study the performance of cognitive radio networks (CRNs) when incorporating adaptive modulation at the physical layer. Three types of CRNs are considered, namely opportunistic spectrum access (OSA), spectrum sharing (SS) and sensing-based SS. We obtain closed-form expressions for the average spectral efficiency achieved at the secondary network and the optimal power allocation for both continuous and discrete rate types of adaptive modulation assuming perfect channel state information. The...

  4. Accessing International Climate Change Related Finance in Latin America and the Caribbean

    World Bank

    2013-01-01

    Financing projects and programs to mitigate impacts of, and adapt to, the climate change is a matter of necessity not choice. This green expenditure policy note looks at factors facilitating the access to international financial instruments for Latin America and the Caribbean (LAC) countries that support mitigation of and adaptation to climate change. This policy note explores two question...

  5. Study level of physical fitness and adaptability of foreign students

    Оlga Yushkovskaya

    2014-10-01

    Full Text Available Purpose: to study the problems of adaptation of foreign students. Materials and Methods: the study involved 33 students from Israel, 25 students from India. All surveyed foreign students men, studying at the Odessa national medical university. Survey was conducted using a multi-level personality questionnaire "Adaptability" (MLQ-AM, developed by A. G. Maklakov and S. V. Chermyanin, and testing physical fitness. Results: found that majority students from Israel and India had a medium and low level of physical fitness and adaptability. Conclusions: in connection with violations of adaptability and physical preparedness of foreign students, particularly acute issue is the organization of physical culture and sports-mass work, as a means of improving adaptation to conditions of life and learning.

  6. Accessing offshoring advantages

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum;

    2015-01-01

    Purpose – The purpose of this paper is to advance the understanding of factors that affect offshoring performance results. To do so, this paper focuses on the access to location-specific advantages, rather than solely on the properties of the offshoring company, its strategy or environment....... Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages...... (getting or not getting access to them) is a more reliable predictor of offshoring success. Design/methodology/approach – Aset of hypotheses derived from the extant literature is tested on the data from a quantitative survey of 1,143 Scandinavian firms. Findings – The paper demonstrates that different...

  7. Support open access publishing

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...

  8. Access to Research Inputs

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  9. Access to Research Inputs

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  10. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  11. Internet Access to Spacecraft

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Sa...

  12. RFID access control

    Luzar, Boštjan

    2012-01-01

    The goal of the thesis was to learn about the procedure of developing applications based on microcontrollers using the Arduino development platform and the IDE environment. Through practical development in the Arduino environment we realized a logic which is capable to authorize access to specific locations and areas based on 125 kHz RFID tags. Although many solutions exist, most of them require a lot of hardware and software because of their modular design and communication types, the so...

  13. Accessibility and Economic Opportunity

    O'Regan, Katherine M.; Quigley, John M.

    1997-01-01

    Over thirty years ago, researchers raised the possibility of an important link between transportation, jobs and prospects for the poor. Decentralized employment, centralized minorities and poor, and inadequate transportation links in between were the context of the urban riots of the 1960's and posited as a causal factor by researchers. Given federal mandates for large-scale movement of welfare recipients into jobs, whether--and to what extent--access affects employment is still of national i...

  14. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  15. Remote access thyroid surgery.

    Bhatia, Parisha; Mohamed, Hossam Eldin; Kadi, Abida; Kandil, Emad; Walvekar, Rohan R

    2015-10-01

    Robot assisted thyroid surgery has been the latest advance in the evolution of thyroid surgery after endoscopy assisted procedures. The advantage of a superior field vision and technical advancements of robotic technology have permitted novel remote access (trans-axillary and retro-auricular) surgical approaches. Interestingly, several remote access surgical ports using robot surgical system and endoscopic technique have been customized to avoid the social stigma of a visible scar. Current literature has displayed their various advantages in terms of post-operative outcomes; however, the associated financial burden and also additional training and expertise necessary hinder its widespread adoption into endocrine surgery practices. These approaches offer excellent cosmesis, with a shorter learning curve and reduce discomfort to surgeons operating ergonomically through a robotic console. This review aims to provide details of various remote access techniques that are being offered for thyroid resection. Though these have been reported to be safe and feasible approaches for thyroid surgery, further evaluation for their efficacy still remains. PMID:26425450

  16. Intelligent card access keys

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers

  17. Direct access to INIS

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  18. ADOPT Open Access

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  19. Open-Access Publishing

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  20. Access to finance for innovative SMEs since the financial crisis

    Lee, Neil; Sameen, Hiba; Cowling, Marc

    2015-01-01

    In the wake of the 2008 financial crisis, there has been increased focus on access to finance for small and medium sized firms. Some evidence from before the crisis suggested that it was harder for innovative firms to access finance. Yet no research has considered the differential effect of the crisis on innovative firms. This paper addresses this gap using a dataset of over 10,000 UK SME employers. We find that innovative firms are more likely to be turned down for finance than other firms, ...

  1. Farmers Perception and Adaptation to Climate Change: An Estimation of Willingness to Pay

    H. de-Graft Acquah

    2011-12-01

    Full Text Available This paper assesses farmers’ perception and adaptation to climate change to enhance policy towards tackling the challenges climate change poses to the farmers in Ghana. With regards to farmers’ perception and methods of adaptation, majority of the farmers perceived increase in temperature and decrease in rainfall pattern. Farmers’ level of adaptation was found to be relatively high with majority of the farmers using changing planting dates, different crop varieties, soil conservation and water harvesting as the major adaptation measures to climate change impacts. However, access to water, high cost of adaptation, lack of information, lack of knowledge on adaptation, insecure property rights, insufficient access to inputs and lack of credits were identified as the major barriers to adaptation. The probit regression estimation results indicated that the probability of willingness to pay for climate change mitigation policies increases with age, years of education and ownership of farm land

  2. Electro-molecular Assembly: Electrical Writing of Information into an Erasable Polysaccharide Medium.

    Yan, Kun; Xiong, Yuan; Wu, Si; Bentley, William E; Deng, Hongbing; Du, Yumin; Payne, Gregory F; Shi, Xiao-Wen

    2016-08-01

    We report that information can be written into an erasable hydrogel medium by precisely imposing controlled electrical signals that trigger supramolecular self-assembly. We prepare the medium from a blend of two stimuli-responsive self-assembling polysaccharides agarose (thermally responsive) and chitosan (pH-responsive). Upon cooling the blend, agarose forms the hydrogel medium while the embedded chitosan chains can be induced to self-assemble in response to imposed pH cues. Importantly, these triggering pH-cues can be imposed electrically (by inserted electrodes) enabling complex messages (e.g., self-assembled multilayers) to be written within the hydrogel medium. The reversibility of these self-assembly mechanisms allow the written information, and the medium itself, to be erased. These physicochemical properties enable this dual responsive medium to encrypt information, while the responsiveness of this structural information and the biocompatibility of the medium suggest uses for accessing/reporting information in diverse life science applications, such as foods, cosmetics, medicine, and the environment. PMID:27420779

  3. Acid stress adaptation protects saccharomyces cerevisiae from acetic acid-induced programme cell death

    Giannattasio, Sergio; Guaragnella, Nicoletta; Côrte-Real, Manuela; Passarella, Salvatore; Marra, Ersilia

    2005-01-01

    In this work evidence is presented that acid stress adaptation protects Saccharomyces cerevisiae from acetic acid-mediated programmed cell death. Exponential-phase yeast cells, non-adapted or adapted to acid stress by 30 min incubation in rich medium set at pH 3.0 with HCl, have been exposed to increasing concentrations of acetic acid and time course changes of cell viability have been assessed. Adapted cells, in contrast to non-adapted cells, when exposed to 80 mM acetic acid for 200 min ...

  4. Database Access through Java Technologies

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  5. Behavioral Adaptation and Acceptance

    Martens, M.H.; Jenssen, G.D.

    2012-01-01

    One purpose of Intelligent Vehicles is to improve road safety, throughput, and emissions. However, the predicted effects are not always as large as aimed for. Part of this is due to indirect behavioral changes of drivers, also called behavioral adaptation. Behavioral adaptation (BA) refers to uninte

  6. Behavioural adaptation and acceptance

    Martens, M.H.; Jenssen, G.D.; Eskandarian, A.

    2012-01-01

    One purpose of Intelligent Vehicles is to improve road safety, throughput, and emissions. However, the predicted effects are not always as large as aimed for. Part of this is due to indirect behavioral changes of drivers, also called behavioral adaptation. Behavioral adaptation (BA) refers to uninte

  7. Adaptive Capacity and Traps

    William A. Brock

    2008-12-01

    Full Text Available Adaptive capacity is the ability of a living system, such as a social–ecological system, to adjust responses to changing internal demands and external drivers. Although adaptive capacity is a frequent topic of study in the resilience literature, there are few formal models. This paper introduces such a model and uses it to explore adaptive capacity by contrast with the opposite condition, or traps. In a social–ecological rigidity trap, strong self-reinforcing controls prevent the flexibility needed for adaptation. In the model, too much control erodes adaptive capacity and thereby increases the risk of catastrophic breakdown. In a social–ecological poverty trap, loose connections prevent the mobilization of ideas and resources to solve problems. In the model, too little control impedes the focus needed for adaptation. Fluctuations of internal demand or external shocks generate pulses of adaptive capacity, which may gain traction and pull the system out of the poverty trap. The model suggests some general properties of traps in social–ecological systems. It is general and flexible, so it can be used as a building block in more specific and detailed models of adaptive capacity for a particular region.

  8. A Community Organizing Informed Approach to Open Access : Embedded Librarianship Supporting Research Transition to an Open Era

    Greyson, Devon

    2009-01-01

    Objective: Health researchers today must understand and respond to open access issues and requirements. This program description of a research centre's open access activities considers the question of whether lessons from community organizing models can be adapted by librarians embedded within a research environment to effectively help transition research groups and organizations to a more open access model of functioning. Methods: Case study of the program of Open Access activities within a ...

  9. After Access: Underrepresented Students' Postmatriculation Perceptions of College Access Capital

    Means, Darris R.; Pyne, Kimberly B.

    2016-01-01

    This qualitative study explores the perceived impact of college-going capital gained during participation in a college access program. In three, semistructured interviews spanning the first-year college experience, 10 first-year college students who participated in a college access program articulate the value of access programming and also raise…

  10. Adapt or Become Extinct!

    Goumas, Georgios; McKee, Sally A.; Själander, Magnus;

    2011-01-01

    boundaries (walls) for applications which limit software development (parallel programming wall), performance (memory wall, communication wall) and viability (power wall). The only way to survive in such a demanding environment is by adaptation. In this paper we discuss how dynamic information collected...... during the execution of an application can be utilized to adapt the execution context and may lead to performance gains beyond those provided by static information and compile-time adaptation. We consider specialization based on dynamic information like user input, architectural characteristics such as...... from static analysis (either during ahead-of-time or just-in-time) compilation. We extend the notion of information-driven adaptation and outline the architecture of an infrastructure designed to enable information ow and adaptation throughout the life-cycle of an application....

  11. Appraising Adaptive Management

    Kai N. Lee

    1999-12-01

    Full Text Available Adaptive management is appraised as a policy implementation approach by examining its conceptual, technical, equity, and practical strengths and limitations. Three conclusions are drawn: (1 Adaptive management has been more influential, so far, as an idea than as a practical means of gaining insight into the behavior of ecosystems utilized and inhabited by humans. (2 Adaptive management should be used only after disputing parties have agreed to an agenda of questions to be answered using the adaptive approach; this is not how the approach has been used. (3 Efficient, effective social learning, of the kind facilitated by adaptive management, is likely to be of strategic importance in governing ecosystems as humanity searches for a sustainable economy.

  12. Adaptive noise cancellation

    In this report we describe the concept of adaptive noise canceling, an alternative method of estimating signals corrupted by additive noise of interference. The method uses 'primary' input containing the corrupted signal and a 'reference' input containing noise correlated in some unknown way with the primary noise, the reference input is adaptively filtered and subtracted from the primary input to obtain the signal estimate. Adaptive filtering before subtraction allows the treatment of inputs that are deterministic or stochastic, stationary or time variable. When the reference input is free of signal and certain other conditions are met then noise in the primary input can be essentially eliminated without signal distortion. It is further shown that the adaptive filter also acts as notch filter. Simulated results illustrate the usefulness of the adaptive noise canceling technique. (author)

  13. Adaptive signal processor

    An experimental, general purpose adaptive signal processor system has been developed, utilizing a quantized (clipped) version of the Widrow-Hoff least-mean-square adaptive algorithm developed by Moschner. The system accommodates 64 adaptive weight channels with 8-bit resolution for each weight. Internal weight update arithmetic is performed with 16-bit resolution, and the system error signal is measured with 12-bit resolution. An adapt cycle of adjusting all 64 weight channels is accomplished in 8 μsec. Hardware of the signal processor utilizes primarily Schottky-TTL type integrated circuits. A prototype system with 24 weight channels has been constructed and tested. This report presents details of the system design and describes basic experiments performed with the prototype signal processor. Finally some system configurations and applications for this adaptive signal processor are discussed

  14. Electromagnetic Sources in a Moving Conducting Medium

    Johannsen, Günther

    1971-01-01

    The problem of an arbitrary source distribution in a uniformly moving, homogeneous, isotropic, nondispersive, conducting medium is solved. The technique used is to solve the problem in the rest system of the medium and then write the result in an appropriate four-dimensional, covariant form which...

  15. 49 CFR 236.811 - Speed, medium.

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Speed, medium. 236.811 Section 236.811 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... Speed, medium. A speed not exceeding 40 miles per hour....

  16. Effective medium theory for anisotropic metamaterials

    Zhang, Xiujuan

    2015-01-20

    Materials with anisotropic material parameters can be utilized to fabricate many fascinating devices, such as hyperlenses, metasolids, and one-way waveguides. In this study, we analyze the effects of geometric anisotropy on a two-dimensional metamaterial composed of a rectangular array of elliptic cylinders and derive an effective medium theory for such a metamaterial. We find that it is possible to obtain a closed-form analytical solution for the anisotropic effective medium parameters, provided the aspect ratio of the lattice and the eccentricity of the elliptic cylinder satisfy certain conditions. The derived effective medium theory not only recovers the well-known Maxwell-Garnett results in the quasi-static regime, but is also valid beyond the long-wavelength limit, where the wavelength in the host medium is comparable to the size of the lattice so that previous anisotropic effective medium theories fail. Such an advance greatly broadens the applicable realm of the effective medium theory and introduces many possibilities in the design of structures with desired anisotropic material characteristics. A real sample of a recently theoretically proposed anisotropic medium, with a near-zero index to control the flux, is achieved using the derived effective medium theory, and control of the electromagnetic waves in the sample is clearly demonstrated.

  17. Medium energy nuclear data for applications

    The types of medium energy nuclear data required for applications are discussed. Features of analysis tools, consisting of both detailed nuclear model codes and simple formulas based on nuclear systematics are presented. The activities of the Medium Energy Nuclear Data Working Group (MENDWG) are described including the recent benchmark comparison of nuclear model codes. 40 refs., 7 figs

  18. Generalized electromagnetic fields in a chiral medium

    Bisht, P S [Department of Physics, Kumaun University, Soban Singh Jeena Campus, Almora-263601 (Uttarakhand) (India); Singh, Jivan [Department of Physics, Govt. Post Graduate College, Pithoragarh (Uttarakhand) (India); Negi, O P S [Department of Physics, Kumaun University, Soban Singh Jeena Campus, Almora-263601 (Uttarakhand) (India)

    2007-09-14

    The time-dependent Dirac-Maxwell's equations in the presence of electric and magnetic sources are reformulated in a chiral medium, and the solutions for the classical problem are obtained in a unique, simple and consistent manner. The quaternion reformulation of generalized electromagnetic fields in the chiral medium has also been discussed in a compact, simple and consistent manner.

  19. Design of a Heavy Medium Separator

    OKPALA; ALEXANDER NWACHUKWU

    2012-01-01

    The design of a laboratory size heavy medium separator was carried out. This was done sequel to the need for a locally available and affordable laboratory heavy medium separator for metallurgy students in developingeconomies. The separator was successfully designed and proper material selection achieved. The separator has since been fabricated and put to effective use.

  20. Assessment of Challenges facing Small and Medium Enterprises towards International Marketing Standards: a Case Study of Arusha Region Tanzania

    Paluku Kazimoto

    2014-01-01

    Small and Medium Enterprises (SMEs) new or existing, often face challenges when approach products providers for both enterprise fixed capital investment and market standards. The insufficient supply of microloans is a major issue, particularly where business creators are unemployed persons. This study aims to assess challenges facing Small Medium Enterprises (SMEs) towards international marketing standards. Study findings show that SME’s face challenges to access international marketing unawa...

  1. A Tentative Study of Cultural Translation from the Perspective of Memetic-adaptation

    ZHAO De-jin

    2013-01-01

    Memetics is the study about cultural evolution, meme is the basic unit of culture, with language as its main medium, when meme was transmitted across language and culture obstacles, the adaptation theory from pragmatics provides the mechanism and selection criteria for the successfully transmitted meme via the means of translation, thus a memetic-adaptation paradigm for translation studies will be proposed based on memetics and adaptation theory.

  2. Strong shock in the uniformly expanding medium

    Bisnovatyi-Kogan, G S

    2014-01-01

    Propagation of the strong shock in the flat expanding Friedman universe is investigated using methods of dimension and similarity. Exact analytic solution of self-similar equations is obtained, determining dependences of the radius and velocity of the shock wave on time and radius. It is obtained, that in the expanding medium the velocity of shock decreases as $\\sim t^{-1/5}$, what is slower than the shock velocity in the static uniform medium $\\sim t^{-3/5}$. The radius of the shock wave in the expanding self-gravitating medium increases $\\sim t^{4/5}$, more rapidly than the shock wave radius in the uniform non-gravitating medium $\\sim t^{2/5}$. So, the shock propagates in the direction of decreasing density with larger speed, that in the static medium, due to accelerating action of the decreasing density, even in the presence of a self-gravitation.

  3. Wave propagation in thermoelastic saturated porous medium

    M D Sharma

    2008-12-01

    Biot ’s theory for wave propagation in saturated porous solid is modified to study the propagation of thermoelastic waves in poroelastic medium. Propagation of plane harmonic waves is considered in isotropic poroelastic medium. Relations are derived among the wave-induced temperature in the medium and the displacements of fluid and solid particles. Christoffel equations obtained are modified with the thermal as well as thermoelastic coupling parameters. These equations explain the existence and propagation of four waves in the medium. Three of the waves are attenuating longitudinal waves and one is a non-attenuating transverse wave. Thermal properties of the medium have no effect on the transverse wave. The velocities and attenuation of the longitudinal waves are computed for a numerical model of liquid-saturated sandstone. Their variations with thermal as well as poroelastic parameters are exhibited through numerical examples.

  4. A Review on Medium Access Control Protocols for Wireless Sensor Networks

    Rakesh Bisht

    2013-03-01

    Full Text Available Wireless sensor networks (WSNs have become an active research area for the researchers due to their widely used range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. Usually, after the deployment of sensor nodes in the hazardous, hostile or remote areas, these sensor nodes work on their own. These sensor nodes will have to work with their limited and none replenish able energy resources. Although energy conservation in communication can be performed in different layers of the TCP/IP protocol suit, energy conservation at MAC layer is found to be the most effective one due to its ability to control the radio directly. Therefore, to ensure a long-lived network of wireless communicating sensors, we are in need of a MAC protocol that is able to improve energy efficiency by maximizing sleep duration, minimizing idle listening and overhearing, and eliminating collision of packets. This paper presents a review of the most recent works regarding with MAC protocols for applications of wireless sensor networks. First we present discussions on radio energy model, energy consumption measuring and the sensor network properties that are crucial for the design of MAC layer protocols. Second we describe the several available energy-efficient MAC protocols for sensor networks emphasizing their energy saving methods. These energyefficient MAC protocols are mainly divided into two groups, i.e. synchronous and asynchronous MAC protocols. Finally, we discuss some future research issues in the design of MAC protocol for WSNs.

  5. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process. PMID:23853128

  6. Energy Efficient Medium Access with Interference Mitigation in LTE Femtocell Networks

    Wang, Ying; Dai, Xiangming; Wang, Jason Min; Bensaou, Brahim

    2015-01-01

    With the rapidly increasing number of deployed LTE femtocell base stations (FBS), energy consumption of femtocell networks has become a serious environmental issue. Therefore, energy-efficient protocols are needed to balance the trade-off between energy saving and bandwidth utilization. The key component of the desired protocol to prevent both energy and bandwidth waste is interference mitigation, which, nevertheless, most previous work has failed to properly consider. To this end, in this pa...

  7. Design and analysis of medium access control protocols for ad hoc and cooperative wireless networks

    Alonso Zárate, Jesús

    2009-01-01

    La presente tesis doctoral contribuye a la incesante evolución de las comunicaciones inalámbricas. Se centra en el diseño de protocolos de acceso al medio (MAC) para redes ad hoc y redes inalámbricas cooperativas. En una primera parte introductoria se presenta un minucioso estado del arte y se establecen las bases teóricas de las contribuciones presentadas en la tesis. En esta primera parte introductoria se definen las principales motivaciones de la tesis y se plantean los objetivos. Despu...

  8. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well...

  9. Receiver-initiated medium access control protocols for wireless sensor networks

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.;

    2015-01-01

    is to provide a comprehensive and self-contained introduction to the fundamentals of the receiver-initiated paradigm, providing newcomers with a quick-start guide on the state of the art of this field and a palette of options, essential for implementing applications or designing new protocols....

  10. A User Profile Based Access Control Model and Architecture

    Meriem Zerkouk

    2013-02-01

    Full Text Available Personalization and adaptation to the user profile capability are the hottest issues to ensure ambientassisted living and context awareness in nowadays environments. With the growing healthcare andwellbeing context aware applications, modeling security policies becomes an important issue in thedesign of future access control models. This requires rich semantics using ontology modeling for themanagement of services provided to dependant people. However, current access control models remainunsuitable due to lack of personalization, adaptability and smartness to the handicap situation.In this paper, we propose a novel adaptable access control model and its related architecture in whichthe security policy is based on the handicap situation analyzed from the monitoring of user’s behavior inorder to grant a service using any assistive device within intelligent environment. The design of ourmodel is an ontology-learning and evolving security policy for predicting the future actions of dependentpeople. This is reached by reasoning about historical data, contextual data and user behavior accordingto the access rules that are used in the inference engine to provide the right service according to theuser’s needs.

  11. Why Full Open Access Matters

    2011-01-01

    This perspective explains the mechanics of copyright and scholarly publishing and warns authors who support open-access publishing about a new pseudo open-access publishing model in which authors pay but publishers still retain commercial reuse rights.

  12. SMALL AND MEDIUM-SIZED ENTERPRISES’ SATISFACTION WITH BANKS’ BUSINESS-ORIENTED SERVICES

    Viktorija Skvarciany

    2014-08-01

    Full Text Available Purpose – the purpose of this paper is to investigate the impact of quality, variety, accessibility and price of banking services on small and medium-sized companies’ satisfaction with banks’ business-oriented services. This paper presents a regression equation of SMEs satisfaction with banks’ services, indicating the weight of each statistically significant factor in the overall SMEs satisfaction with the commercial banks’ services for business. Design/methodology/approach – an empirical study, investigating the influence of quality, variety, accessibility and price of banking services on SMEs’ satisfaction with business-oriented services, was conducted. A sample of 405 small and medium-sized companies’ employees was used for the survey. Findings – the results of the research show that price, accessibility and quality of banking services have a direct positive influence on the satisfaction of SMEs with commercial banks’ business-oriented services. However, the variety of banking services is not a statistically significant element and did not have an impact on the SMEs’ satisfaction with banks’ services for business. Moreover, it was found that the price and accessibility of banking services have a positive relationship with the quality of banking services. Research limitations/implications – this research was conducted in small and medium-sized companies’ sector and the results of the survey cannot be used to interpret the satisfaction of other business sectors with banking services. Practical implications – the findings suggest that banks can create SMEs’ satisfaction with business-oriented services through improving accessibility, quality and price of banking services in the way that best meets customers’ needs. Originality/Value – satisfaction with the banking services concerning SMEs is an important factor influencing the success of commercial banking activities. The present study provides useful

  13. TAR Channel Access Mechanism For VANET Safety-Critical Situations

    KHOUFI, Ines; WEHBI, Bachar; Laouiti, Anis

    2012-01-01

    Vehicular Ad-hoc Network (VANET) is among the most relevant forms of mobile ad-hoc networks. VANET helps improving traffic safety and efficiency. By exchanging information between each others, vehicles can warn drivers or even prepare for dangerous situation. These warnings can be about critical situations like vehicles merging in a highway. Detecting and warning about such situations require a reliable communication between vehicles increasing thus the need for an efficient medium access con...

  14. Cache Replacement Policy Using Map-based Adaptive Insertion

    Ishii,Yasuo; Inaba, Mary; Hiraki, Kei

    2010-01-01

    International audience In this paper, we propose a map-based adaptive insertion policy (MAIP) for a novel cache replacement. The MAIP estimates the data reuse possibility on the basis of data reuse history. To track data reuse history, the MAIP employs a bitmap data structure, which we call memory access map. The memory access map holds all memory accessed locations in a fixed sized memory area to detect the data reuse. It can cover a large memory area that is compared to the size of a lar...

  15. Chemists, Access, Statistics

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  16. Analysing Access Control Specifications

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  17. Non-financial constraints to scaling-up small and medium-sized energy enterprises: Findings from field research in Ghana, Senegal, Tanzania and Zambia

    Haselip, James Arthur; Desgain, Denis DR; Mackenzie, Gordon A.

    2015-01-01

    small and medium-sized energy enterprises, implemented in five countries by United Nations Environmental Programme between 2002 and 2012, as a means to expand access to sustainable energy products and services in sub-Saharan Africa. While access to affordable finance was found to be the primary...

  18. Mechanisms that improve referential access*

    Gernsbacher, Morton Ann

    1989-01-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts’ accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made wi...

  19. Online Information Source & Access Method

    Sthapit, Dilip Man

    2009-01-01

    Online resources play important role in research and development of the country. So, LIS professional are interested in accessing and guiding users and readers to all available information sources. This article highlighted and described the availability of online information sources, open access e-journals and its access method.

  20. SMES' SECTOR ACCESS TO FINANCE: AN OVERVIEW

    Roman Angela

    2011-07-01

    Full Text Available Through their contribution to the creation of added value and new jobs, the small and medium enterprises (SMEs have a significant role in the economic and social development of a country. However, these enterprises are facing numerous obstacles that limit their performance, growth and development. Among the difficulties faced by SMEs, the access to finance is often reported as a major obstacle to the deployment and expansion of their activity. The access to finance is crucial for efficient allocation of financial resources and entrepreneurial development, which explains the major interest given to this subject both by the academic literature and the policy makers. The paper aims to highlight the difficulties faced by SMEs in securing financing resources, emphasizing the differences between countries and also between SMEs and large enterprises. Knowing the difficulties in SMEs financing is essential for policy makers in order to design and implement appropriate measures, which will help to improve the access to financing for these enterprises. Thus, another issue addressed, synthetically, in this paper aims the measures taken by public authorities in order to support the access to financing for SMEs. The research methodology used in this paper starts with a literature review in order to highlight the importance of the subject addressed in our research. The analysis conducted in this paper is based on data and statistics provided mainly by the World Bank surveys, by certain empirical studies and by the National Council of Small and Medium Sized Private Enterprises in Romania. Based on the methodology used, the paper indicates the difficulties in SMEs financing and the crucial importance of enhancing the public authorities concerns regarding their alleviation, especially by adopting measures focused on increasing financial development, which would ensure greater availability of financing for businesses and thus economic growth. The limited