WorldWideScience

Sample records for area adapted protocol

  1. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  2. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  3. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  4. Formally Generating Adaptive Security Protocols

    Science.gov (United States)

    2013-03-01

    a proven version of leader election and 2/3 consensus. In 2011 we did the same for a simple version of Paxos. At each stage of the evolution as our... leader election [2] and authentication [4] would suffice for Paxos as well. In preparation for the harder protocols, we had added expressive power to the

  5. Adaptive Baud Protocol For Wireless Communication

    OpenAIRE

    Eskafi, F. H.; Nassiri-toussi, K.; G. Liu

    1998-01-01

    In this paper, the authors propose an algorithm that increases and decreases the transmission speed according to a user-specified function. The design objective is to regulate baud as efficiently as possible and ensure that in each transmission interval, transmitter and receiver bauds are equal for some period of time during data transmission. An equivalent discrete-time version of the protocol is verified by using the COSPAN software. Application for this adaptive baud protocol for wireless ...

  6. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2001-01-01

    Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during...

  7. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  8. Cooperative energy harvesting-adaptive MAC protocol for WBANs.

    Science.gov (United States)

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-05-28

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.

  9. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  10. Adaptive digital access protocol: new features and performance improvements

    Science.gov (United States)

    Doshi, B. T.; Dravida, S.; Kustka, G. J.; Magill, Peter D.; Siller, Curtis A., Jr.; Kotikalapudi, Sriram

    1996-11-01

    This paper reports on a broadband multiple access protocol for bi-directional hybrid fiber-coax (HFC) networks. Referred to here as the enhanced adaptive digital access protocol (ADAPt+TM), it builds upon earlier work to define a medium access control (MAC) protocol amenable to a multiple service environment supporting subscriber access in HFC networks with tree and branch topologies. ADAPt+ efficiently supports different access modes such as synchronous transfer mode (STM), asynchronous transfer mode (ATM), and variable length (VL) native data (e.g., IP, IPX). This enhanced protocol adapts to changing demands for a mix of circuit- and packet-mode applications, and efficiently allocates upstream and downstream bandwidth to isochronous and bursty traffic sources. This paper describes: ADAPt+ for upstream communication and multiplexing/demultiplexing for downstream communication; its applicability to STM, ATM and other native data applications; and performance attributes such as bandwidth efficiency and latency.

  11. Body surface area adapted iopromide 300 mg/ml versus 370 mg/ml contrast medium injection protocol: Influence on quantitative and clinical assessment in combined PET/CT

    Energy Technology Data Exchange (ETDEWEB)

    Verburg, Frederik A., E-mail: fverburg@ukaachen.de [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Apitzsch, Jonas [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Lensing, Carina [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Kuhl, Christiane K. [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Pietsch, Hubertus [Bayer Pharma AG, Müllerstrasse 178, 13353 Berlin (Germany); Mottaghy, Felix M. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Behrendt, Florian F. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany)

    2013-12-01

    Purpose: To investigate the quantitative and qualitative differences between combined positron emission tomography and computed X-ray tomography (PET/CT) enhanced with contrast medium with either an iodine concentration 300 mg/ml or 370 mg/ml. Materials and methods: 120 consecutive patients scheduled for F-18-Fluorodeoxyglucose (FDG) PET/CT were included. The first (second) 60 patients received contrast medium with 300 (370) mg iodine/ml. Intravenous injection protocols were adapted for an identical iodine delivery rate (1.3 mg/s) and body surface area (BSA) adapted iodine dose (22.26 g I/m{sup 2}). Maximum and mean standardized uptake values (SUV{sub max}; SUV{sub mean}) and contrast enhancement (HU) were determined in the ascending aorta, the abdominal aorta, the inferior vena cava, the portal vein, the liver and the right kidney in the venous contrast medium phase. PET data were evaluated visually for the presence of malignancy and image quality. Results: Both media caused significantly higher values for HU, SUV{sub mean} and SUV{sub max} for the enhanced PET/CT than the non-enhanced one (all p < 0.01). There were no significant differences in the degree of increase of HU, SUV{sub mean} and SUV{sub max} between the two contrast media at any anatomic site (all p > 0.05). Visual evaluation of lesions showed no differences between contrast and non-contrast PET/CT or between the two different contrast media (p = 0.77). Conclusion: When using a constant iodine delivery rate and total iodine dose in a BSA adapted injection protocol, there are no quantitative or qualitative differences in either CT or PET between contrast media with an iodine concentration of 300 mg/ml and 370 mg/ml, respectively.

  12. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  13. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    OpenAIRE

    S. Rajeswari; Venkataramani, Y.

    2012-01-01

    In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p) values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping p...

  14. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-12-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  15. Agile Professional Virtual Community Inheritance via Adaptation of Social Protocols

    CERN Document Server

    Picard, Willy

    2011-01-01

    Support for human-to-human interactions over a network is still insufficient, particularly for professional virtual communities (PVC). Among other limitations, adaptation and learning-by-experience capabilities of humans are not taken into account in existing models for collaboration processes in PVC. This paper presents a model for adaptive human collaboration. A key element of this model is the use of negotiation for adaptation of social protocols modelling processes. A second contribution is the proposition of various adaptation propagation strategies as means for continuous management of the PVC inheritance.

  16. Ee-Leach(Low Energy Adaptive Clustering Hierarchy Modified Protocol

    Directory of Open Access Journals (Sweden)

    Nishita Payar,

    2014-05-01

    Full Text Available A wireless sensor network is made by many homogeneous and/or nodes which can sense data and communicate to each other. As energy is a scarce resource in WSN, the main issue is energy efficient routing. Many flat and hierarchical protocols have been projected to enhance the network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH protocol is a basic energy efficient hierarchical routing protocol in WSN. In LEACH, cluster heads are selected and cluster is formed by joining non cluster head nodes. Member nodes transmit the data to respective cluster head and the cluster head is conscientious to transmit the gathered and aggregated data directly to the base station. This paper examines the performance of the conventional LEACH protocol and gives an enhancement to it for energy efficiency. The proposed protocol considers many parameters like residual energy and distance from base station etc. for cluster head selection and energy efficient routing.

  17. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  18. RATE ADAPTIVE PROTOCOL FOR MULTIRATE IEEE 802.11 NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Xi Yong; Huang Qingyan; Wei Jibo; Zhao Haitao

    2007-01-01

    In this paper,a rate adaptive protocol AMARF(Adaptive Multirate Auto Rate Fallback)for multirate IEEE 802.11 networks is proposed.In AMARF,each data rate is assigned a unique success threshold,which is a criterion to judge when to switch a rate to the next higher one,and the success thresholds call be adjusted dynamically in an adaptive manner according to the running conditions,such as packet length and channel parameters.Moreover,the proposed protocol can be implemented by software without any change to the current IEEE 802.11 standards.Simulation result shows that AMARF yields significantly higher throughput than other existing schemes including ARF and its variants,in various running conditions.

  19. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...

  20. A Review of Routing Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Samaneh Movassaghi

    2013-03-01

    Full Text Available Recent technological advancements in wireless communication, integrated circuits and Micro-Electro-Mechanical Systems (MEMs has enabled miniaturized, lowpower, intelligent, invasive/ non-invasive micro and nanotechnology sensor nodes placed in or on the human body for use in monitoring body function and its immediate environment referred to as Body Area Networks (BANs. BANs face many stringent requirements in terms of delay, power, temperature and network lifetime which need to be taken into serious consideration in the design of different protocols. Since routing protocols play an important role in the overall system performance in terms of delay, power consumption, temperature and so on, a thorough study on existing routing protocols in BANs is necessary. Also, the specific challenges of BANs necessitates the design of new routing protocols specifically designed for BANs. This paper provides a survey of existing routing protocols mainly proposed for BANs. These protocols are further classified into five main categories namely, temperature based, crosslayer, cluster based, cost-effective and QoS-based routing, where each protocol is described under its specified category. Also, comparison among routing protocols in each category is given.

  1. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Sun Baolin; Li Layuan

    2006-01-01

    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  2. ADOPEL: ADAPTIVE DATA COLLECTION PROTOCOL USING REINFORCEMENT LEARNING FOR VANETS

    Directory of Open Access Journals (Sweden)

    Ahmed Soua

    2014-01-01

    Full Text Available Efficient propagation of information over a vehicular wireless network has usually remained the focus of the research community. Although, scanty contributions have been made in the field of vehicular data collection and more especially in applying learning techniques to such a very changing networking scheme. These smart learning approaches excel in making the collecting operation more reactive to nodes mobility and topology changes compared to traditional techniques where a simple adaptation of MANETs propositions was carried out. To grasp the efficiency opportunities offered by these learning techniques, an Adaptive Data collection Protocol using reinforcement Learning (ADOPEL is proposed for VANETs. The proposal is based on a distributed learning algorithm on which a reward function is defined. This latter takes into account the delay and the number of aggregatable packets. The Q-learning technique offers to vehicles the opportunity to optimize their interactions with the very dynamic environment through their experience in the network. Compared to non-learning schemes, our proposal confirms its efficiency and achieves a good tradeoff between delay and collection ratio.

  3. A Fatigue Measuring Protocol for Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Akram, Sana; Javaid, Nadeem; Ahmad, Ashfaq; Khan, Zahoor Ali; Imran, Muhammad; Guizani, Mohsen; Hayat, Amir; Ilahi, Manzoor

    2015-12-01

    As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for soccer players and soldiers using in-vivo sensors for Wireless Body Area Sensor Networks (WBASNs). In FAME, we introduce a composite parameter for fatigue measurement by setting a threshold level for each sensor. Whenever, any sensed data exceeds its threshold level, the players or soldiers are declared to be in a state of fatigue. Moreover, we use a vibration pad for the relaxation of fatigued muscles, and then utilize the vibrational energy by means of vibration detection circuit to recharge the in-vivo sensors. The induction circuit achieves about 68 % link efficiency. Simulation results show better performance of the proposed FAME protocol, in the chosen scenarios, as compared to an existing Wireless Soccer Team Monitoring (WSTM) protocol in terms of the selected metrics.

  4. Yoga-teaching protocol adapted for children with visual impairment

    Directory of Open Access Journals (Sweden)

    Soubhagyalaxmi Mohanty

    2016-01-01

    Conclusions: Specially designed protocol may pave the way to impart yoga in an exciting and comfortable way to children with VI. More studies are needed to further investigate the effectiveness of this new yoga protocol in similar settings.

  5. Fault-Tolerant Consensus of Multi-Agent System With Distributed Adaptive Protocol.

    Science.gov (United States)

    Chen, Shun; Ho, Daniel W C; Li, Lulu; Liu, Ming

    2015-10-01

    In this paper, fault-tolerant consensus in multi-agent system using distributed adaptive protocol is investigated. Firstly, distributed adaptive online updating strategies for some parameters are proposed based on local information of the network structure. Then, under the online updating parameters, a distributed adaptive protocol is developed to compensate the fault effects and the uncertainty effects in the leaderless multi-agent system. Based on the local state information of neighboring agents, a distributed updating protocol gain is developed which leads to a fully distributed continuous adaptive fault-tolerant consensus protocol design for the leaderless multi-agent system. Furthermore, a distributed fault-tolerant leader-follower consensus protocol for multi-agent system is constructed by the proposed adaptive method. Finally, a simulation example is given to illustrate the effectiveness of the theoretical analysis.

  6. Helsinki Metropolitan Area Climate Change Adaptation Strategy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    The Helsinki Metropolitan Area Climate Change Adaptation Strategy has been prepared in close cooperation with the four cities of the metropolitan area (Helsinki, Espoo, Vantaa and Kauniainen), the Helsinki Region Environmental Services Authority HSY and other municipal, regional and state level organisations. In the strategy, strategic starting points and policies with which the metropolitan area prepares for the consequences of climate change, are compiled. The Helsinki Metropolitan Area adaptation strategy concentrates on the adaptation of the built and urban environment to the changing climate. The vision of the strategy is climate proof city - the future is built now. The strategy aims to (1) assess the impacts of climate change in the area, (2) prepare for the impacts of climate change and to extreme weather events and (3) to reduce the vulnerabilities of the area to climate variability and change. The target is to secure the well-being of the citizens and the functioning of the cities also in the changing climate conditions. The preparation of the adaptation strategy started in 2009 by producing the background studies. They include the regional climate and sea level scenarios, modelling of river floods in climate change conditions and a survey of climate change impacts in the region. Also, existing programmes, legislation, research and studies concerning adaptation were collected. The background studies are published in a report titled 'The Helsinki metropolitan area climate is changing - Adaptation strategy background studies' (in Finnish) (HSY 2010). HSY coordinated the strategy preparation. The work was carried out is close cooperation with the experts of the metropolitan area cities, regional emergency services, Ministry of the Environment, Helsinki Region Transport Authority and other regional organisations. The strategy work has had a steering group that consists of representatives of the cities and other central cooperation partners. The

  7. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  8. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  9. Adaptive Relay Activation in the Network Coding Protocols

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    State-of-the-art Network coding based routing protocols exploit the link quality information to compute the transmission rate in the intermediate nodes. However, the link quality discovery protocols are usually inaccurate, and introduce overhead in wireless mesh networks. In this paper, we present...

  10. SLEACH: Secure Low- Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    WANG Xiao-yun; YANG Li-zhen; CHEN Ke-fei

    2005-01-01

    LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network

  11. Design of Real-time Communication Adapter for Different Protocol Sensors in Sensor Web

    Directory of Open Access Journals (Sweden)

    Longlong Lu

    2012-09-01

    Full Text Available A real-time communication adapter named SensorAdapter is designed to communicate between different protocols sensors and data service layer in Sensor Web. The adapter is extended and restructured based on SensorBus, an open source project raised by a German company called 52north. By structuring the receiving module and extending the proxies of sensors according to the communication protocols the sensors use, the adapter can receive sensing information detected by different protocols sensors simultaneously. The receiving module identifies a sensor and finds its corresponding proxy in SensorAdapter by sensor ID (SensorID, and then packages the sensing information to XMPP messages and sends them to XMPPServer by invoking the methods in its proxy. At last, an example of SOS is achieved to verify the effect of the adapter.

  12. Microcontroller Protocol for Secure Broadcast in Controller Area Networks

    Directory of Open Access Journals (Sweden)

    B.Vijayalakshmi

    2014-04-01

    Full Text Available Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the application layer of CAN. Here we design, refine and implement a broadcast authentication protocol based on the well known paradigm of using key-chains and time synchronization, a commonly used Mechanism in wireless sensor networks, which allows us to take advantage from the use of symmetric primitives without the need of secret shared keys during broadcast. But, as process control is a time critical operation we make several refinements in order to improve on the authentication delay. For this we study several trade-offs to alleviate shortcomings on computational speed, memory and bandwidth up to the point of using reduced versions of hash functions that can assure ad hoc security. To prove the efficiency of the protocol

  13. The research of a new adaptive on-demand routing protocol in WSN

    Science.gov (United States)

    Zhu, Dongjie; Cui, Gang; Huang, Junheng; Zhang, Zhaoxing

    2013-03-01

    As an important part of the Internet of Things, WSN also has routing strategies which plays a critical role as well as it does in Ad hoc. After the introduction of some distinct traits of WSN, a detailed analysis is performed for a typical ondemand routing protocol in Ad hoc AODV, which then is transplanted into WSN. Furthermore, a transition method of adaptive clustering routing is proposed, based on which, a new adaptive hierarchical routing transition protocol (BCRP) is put forward. Finally, simulations and comparisons of BCRP are performed which lead to a conclusion that BCRP has been greatly improved concerning adaptability and extensibility.

  14. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  15. Protocol and Practice in the Adaptive Management of Waterfowl Harvests

    Directory of Open Access Journals (Sweden)

    Fred Johnson

    1999-06-01

    Full Text Available Waterfowl harvest management in North America, for all its success, historically has had several shortcomings, including a lack of well-defined objectives, a failure to account for uncertain management outcomes, and inefficient use of harvest regulations to understand the effects of management. To address these and other concerns, the U.S. Fish and Wildlife Service began implementation of adaptive harvest management in 1995. Harvest policies are now developed using a Markov decision process in which there is an explicit accounting for uncontrolled environmental variation, partial controllability of harvest, and structural uncertainty in waterfowl population dynamics. Current policies are passively adaptive, in the sense that any reduction in structural uncertainty is an unplanned by-product of the regulatory process. A generalization of the Markov decision process permits the calculation of optimal actively adaptive policies, but it is not yet clear how state-specific harvest actions differ between passive and active approaches. The Markov decision process also provides managers the ability to explore optimal levels of aggregation or "management scale" for regulating harvests in a system that exhibits high temporal, spatial, and organizational variability. Progress in institutionalizing adaptive harvest management has been remarkable, but some managers still perceive the process as a panacea, while failing to appreciate the challenges presented by this more explicit and methodical approach to harvest regulation. Technical hurdles include the need to develop better linkages between population processes and the dynamics of landscapes, and to model the dynamics of structural uncertainty in a more comprehensive fashion. From an institutional perspective, agreement on how to value and allocate harvests continues to be elusive, and there is some evidence that waterfowl managers have overestimated the importance of achievement-oriented factors in

  16. An Energy-Aware Geographical Forwarding Protocol Utilizing Adaptive Sleeping in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a novel energy-aware geographical forwarding protocol utilizing adaptive sleeping, in which each node selects its relay based on a new criterion that is based on its residual energy reserves and its geographical location to guarantee energy efficiency. In addition, this paper presents an adaptive sleep mechanism fully integrated into the new relay criterion, in which each node sleeps for a variable duration based on its residual energy reserves. Simulation results show that the proposed protocol significantly reduces the energy consumption of the network and improves its balance, especially when on heavy traffic load in dense networks. Our protocol is 20 times better in balancing the energy consumption compared with geographical random forwarding protocol.

  17. Adaptive low-power listening MAC protocol based on transmission rates.

    Science.gov (United States)

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  18. AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications

    Directory of Open Access Journals (Sweden)

    Adnan Ismail Al-Sulaifanie

    2017-01-01

    Full Text Available This paper proposes an adaptive hierarchical MAC protocol (AH-MAC with cross-layer optimization for low-rate and large-scale wireless sensor networks. The main goal of the proposed protocol is to combine the strengths of LEACH and IEEE 802.15.4 while offsetting their weaknesses. The predetermined cluster heads are supported with an energy harvesting circuit, while the normal nodes are battery-operated. To prolong the network’s operational lifetime, the proposed protocol transfers most of the network’s activities to the cluster heads while minimizing the node’s activity. Some of the main features of this protocol include energy efficiency, self-configurability, scalability, and self-healing. The simulation results showed great improvement of the AH-MAC over LEACH protocol in terms of energy consumption and throughput. AH-MAC consumes eight times less energy while improving throughput via acknowledgment support.

  19. Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven

    Directory of Open Access Journals (Sweden)

    Xin Hou

    2013-01-01

    Full Text Available Combined with WSN MAC layer protocol characteristics and design requirements, according to the characteristic of WSN monitoring application requirements, this paper puts forward a method based on event driven MAC protocol. The agreement algorithm is to solve the problem of network congestion and node energy unnecessary consumption cause by a large number of redundant monitoring data transceiver. It is a kind of adaptive low power consumption of the MAC layer protocol, which is pointed out based on theoretical foundation of S_MAC protocol, made use of the event driven mechanism system theory, combined with event driven mechanism and the characteristics of the WSN. It has the periodic dormancy mechanism of S_MAC protocol, in the premise of the reliability data, to reduce data redundancy and communication delay time, improve the overall network throughput, to ensure the safety and reliability of the network, which can greatly extends  the node of working time.

  20. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  1. VLA-MAC: A Variable Load Adaptive MAC Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Yao, Guoliang; Liu, Hao; Chen, Hao; Shi, Longxin

    This letter presents VLA-MAC, a novel adaptive MAC protocol for wireless sensor networks that can achieve high energy efficiency and low latency in variable load conditions. In VLA-MAC, traffic load is measured online and utilized for adaptive adjustment. VLA-MAC transmits packets via a burst style to alleviate packets accumulation problem and achieve low latency in high load condition. Furthermore, it also saves obvious energy by removing unnecessary listen period in low load condition. Unlike current approach, VLA-MAC does not need to adjust duty-cycle according to load online. Simulation results based on ns-2 show the performance improvements of our protocol.

  2. Ada-MAC: An Adaptive MAC Protocol for Real-time and Reliable Health Monitoring,

    OpenAIRE

    Xia, Feng; Wang, Linqiang; Zhang, Daqiang; Zhang, Xue(Department of Physics, Liaoning Normal University, Dalian, 116029, China); Gao, Ruixia

    2013-01-01

    IEEE 802.15.4 is regarded as one of the most suitable communication protocols for cyber-physical applications of wireless sensor and actuator networks. This is because this protocol is able to achieve low-power and low-cost transmission in wireless personal area networks. But most cyber-physical systems (CPSs) require a degree of real-time and reliability from the underlying communication protocol. Some of them are stricter than the others. However, IEEE 802.15.4 protocol cannot provide relia...

  3. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    Directory of Open Access Journals (Sweden)

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  4. AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs

    CERN Document Server

    Medjiah, Samir; Krief, Francine

    2012-01-01

    This paper presents an Adaptive Greedy-compass Energy-aware Multipath protocol (AGEM), a novel routing protocol for wireless multimedia sensors networks (WMSNs). AGEM uses sensors node positions to make packet forwarding decisions. These decisions are made online, at each forwarding node, in such a way that there is no need for global network topology knowledge and maintenance. AGEM routing protocol performs load-balancing to minimize energy consumption among nodes using twofold policy: (1) smart greedy forwarding, based on adaptive compass and (2) walking back forwarding to avoid holes. Performance evaluations of AGEM compared to GPSR (Greedy Perimeter Stateless Routing) show that AGEM can: (a) maximize the network lifetime, (b) guarantee quality of service for video stream transmission, and (c) scale better on densely deployed wireless sensors network.

  5. Quantum Adaptive Protocol and its Application in Image Storage and Retrieval

    CERN Document Server

    Venegas-Andraca, S E

    2004-01-01

    We present a quantum state estimation technique coined quantum adaptive protocol (QAP) based on separate measurements on a finite number of identically prepared particles. Our technique is adaptive in the sense that we change the measurement basis according to previous results. We show that QAP performs better than the case when the basis for separate measurements is not adaptively varied. We also present an application of QAP for image storage and retrieval in a multiparticle quantum system. We show that QAP provides advantage to this quantum storage and retrieval over its classical counterpart.

  6. SA-MAC:Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    波澄; 韩君泽; 李向阳; 王昱; 肖波

    2014-01-01

    A common method of prolonging the lifetime of wireless sensor networks is to use low power duty cycling protocol. Existing protocols consist of two categories: sender-initiated and receiver-initiated. In this paper, we present SA-MAC, a self-stabilizing adaptive MAC protocol for wireless sensor networks. SA-MAC dynamically adjusts the transmission time-slot, waking up time-slot, and packet detection pattern according to current network working condition, such as packet length and wake-up patterns of neighboring nodes. In the long run, every sensor node will find its own transmission phase so that the network will enter a stable stage when the network load and qualities are static. We conduct extensive experiments to evaluate the energy consumption, packet reception rate of SA-MAC in real sensor networking systems. Our results indicate that SA-MAC outperforms other existing protocols.

  7. HARVESTED ENERGY-ADAPTIVE MAC PROTOCOL FOR ENERGY HARVESTING IOT NETWORKS

    Directory of Open Access Journals (Sweden)

    Hyeong-Kyu Lee

    2015-12-01

    Full Text Available In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA Medium Access Control (MAC protocol utilizes the fixed frame size, the resource efficiency can be reduced. In this paper, we propose a Harvested Energy-adaptive Medium Access Control (HEMAC protocol where an IoT Access Point (AP allocates slots in accordance with the number of IoT devices that try to transmit data in a frame. The proposed HE-MAC protocol improves the resource efficiency of the F-ALOHA MAC protocol. We show that the resource efficiency of the HE-MAC protocol is superior to those of the F-ALOHA MAC protocol through simulations.

  8. A Semantically Automated Protocol Adapter for Mapping SOAP Web Services to RESTful HTTP Format to Enable the Web Infrastructure, Enhance Web Service Interoperability and Ease Web Service Migration

    OpenAIRE

    Frank Doheny; Paul Jacob; Maria Maleshkova; Owen Molloy; Robert Stewart; Sean Kennedy

    2012-01-01

    Semantic Web Services (SWS) are Web Service (WS) descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly defined constraints, maps SOAP Web Services to RESTful HTTP format. However, in the previous adapter, the configuration element is manual and the latency implications are locally b...

  9. MAC2: A Multi-Hop Adaptive MAC Protocol with Packet Concatenation for Wireless Sensor Networks

    Science.gov (United States)

    Nguyen, Kien; Meis, Ulrich; Ji, Yusheng

    Wireless sensor network MAC protocols switch radios off periodically, employing the so-called duty cycle mechanism, in order to conserve battery power that would otherwise be wasted by energy-costly idle listening. In order to minimize the various negative side-effects of the original scheme, especially on latency and throughput, various improvements have been proposed. In this paper, we introduce a new MAC protocol called MAC2(Multi-hop Adaptive with packet Concatenation-MAC) which combines three promising techniques into one protocol. Firstly, the idea to forward packets over multiple hops within one operational cycle as initially introduced in RMAC. Secondly, an adaptive method that adjusts the listening period according to traffic load minimizing idle listening. Thirdly, a packet concatenation scheme that not only increases throughput but also reduces power consumption that would otherwise be incurred by additional control packets. Furthermore, MAC2 incorporates the idea of scheduling data transmissions with minimum latency, thereby performing packet concatenation together with the multi-hop transmission mechanism in a most efficient way. We evaluated MAC2 using the prominent network simulator ns-2 and the results show that our protocol can outperform DW-MAC — a state of the art protocol both in terms of energy efficiency and throughput.

  10. Traffic-adaptive duty cycle adaptation in TR-MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, Sarwar; Baratchi, Mitra; Heijenk, Geert

    2016-01-01

    The Medium Access Control (MAC) layer can influence the energy consumption of a wireless sensor network (WSN) to a significant level. TR-MAC is an energy-efficient preamble sampling based MAC protocol for low power WSNs suitable for low data rate and low duty cycle scenario. However, low data rate i

  11. Adaptive flood risk management in urban areas

    NARCIS (Netherlands)

    Mees, H.L.P.; Driessen, P.P.J.; Runhaar, H.A.C.

    2012-01-01

    In recent times a shift has occurred from traditional flood management focused on the prevention of flooding (reduction of the probability) only, to more adaptive strategies focused on the reduction of the impacts of floods as a means to improve the resilience of occupied flood plains to increased r

  12. Adaptive Routing Protocol with Energy Efficiency and Event Clustering for Wireless Sensor Networks

    Science.gov (United States)

    Tran Quang, Vinh; Miyoshi, Takumi

    Wireless sensor network (WSN) is a promising approach for a variety of applications. Routing protocol for WSNs is very challenging because it should be simple, scalable, energy-efficient, and robust to deal with a very large number of nodes, and also self-configurable to node failures and changes of the network topology dynamically. Recently, many researchers have focused on developing hierarchical protocols for WSNs. However, most protocols in the literatures cannot scale well to large sensor networks and difficult to apply in the real applications. In this paper, we propose a novel adaptive routing protocol for WSNs called ARPEES. The main design features of the proposed method are: energy efficiency, dynamic event clustering, and multi-hop relay considering the trade-off relationship between the residual energy available of relay nodes and distance from the relay node to the base station. With a distributed and light overhead traffic approach, we spread energy consumption required for aggregating data and relaying them to different sensor nodes to prolong the lifetime of the whole network. In this method, we consider energy and distance as the parameters in the proposed function to select relay nodes and finally select the optimal path among cluster heads, relay nodes and the base station. The simulation results show that our routing protocol achieves better performance than other previous routing protocols.

  13. AREA OPTIMIZED FPGA IMPLEMENTATION OF ADAPTIVE BEAMFORMER

    Directory of Open Access Journals (Sweden)

    Harpreet Kaur

    2012-06-01

    Full Text Available Quadratic Rotation decomposition (QRD based recursive least squares (RLS algorithm can be used in variety of communication applications and its low complexity implementation can be of interest. In this paper we have presented an application of QRD based RLS algorithm using Coordinate Rotation by Digital Computer (CORDIC operator for implementing an adaptive beamformer. FPGA resource estimates along with actual implementation results have been presented and are being compared with its existing implementation.

  14. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Politis, Christos; 10.5121/ijwmn.2010.2205

    2010-01-01

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency workers with intelligent devices such as smart phones and PDAs. This technology allows communication "islets" to be established between the members of the same or different emergency teams (policemen, firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed for the purposes of eMANETs. We evaluate the performance of the protocol by comparing it with other widely used routing protocols for MANETs. We finally show that the overhead introduced due to security considerations is affordable to support secure ad-hoc communications among lightweight devices.

  15. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-05-01

    Full Text Available The nature of Mobile Ad hoc NETworks (MANETs makes them suitable to be utilized in the context of anextreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs inorder to describe next generation IP-based networks, which are deployed in emergency cases such asforest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergencyworkers with intelligent devices such as smart phones and PDAs. This technology allows communication”islets” to be established between the members of the same or different emergency teams (policemen,firemen, paramedics. In this article, we discuss an adaptive and secure routing protocol developed forthe purposes of eMANETs. We evaluate the performance of the protocol by comparing it with otherwidely used routing protocols for MANETs. We finally show that the overhead introduced due to securityconsiderations is affordable to support secure ad-hoc communications among lightweight devices.

  16. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    Science.gov (United States)

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  17. The Traffic Adaptive Data Dissemination (TrAD Protocol for both Urban and Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Bin Tian

    2016-06-01

    Full Text Available The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  18. An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Munam Ali Shah; Sijing Zhang; Carsten Maple

    2013-01-01

    The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased.Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time.The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment,observes the network changes,and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics.In this paper,some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed,and a novel adaptive MAC protocol for CR networks,decentralized non-global MAC (DNG-MAC),has been proposed.The results show the DNG-MAC outperforms other CR-MAC protocols in termsof time and energy efficiency.

  19. APC-MAC/TA: Adaptive Power Controlled MAC Protocol with Traffic Awareness for Wireless Sensor Networks

    Science.gov (United States)

    Woo, Seok; Kim, Kiseon

    In this paper, we propose an adaptive power controlled MAC protocol with a traffic-aware scheme specifically designed to reduce both energy and latency in wireless sensor networks. Typically, existing MAC protocols for sensor networks sacrifice latency performance for node energy efficiency. However, some sensor applications for emergencies require rather fast transmissions of sensed data, where we need to consider both energy and latency together. The proposed MAC protocol includes two novel ideas: one is a transmission power control scheme for improving latency in high traffic loads, and the other is a traffic-aware scheme to save more energy in low traffic loads. The transmission power control scheme increases channel utilization by mitigating interference between nodes, and the traffic-aware scheme allows nodes to sleep to reduce idle energy consumption when there are no traffic loads in a network. Simulation results show that the proposed protocol significantly reduces the latency as well as the energy consumption compared to the S-MAC protocol specifically for a large transmission power of nodes and low network traffic.

  20. Adaptation of mobile ad-hoc network protocols for sensor networks to vehicle control applications

    Science.gov (United States)

    Sato, Kenya; Matsui, Yosuke; Koita, Takahiro

    2005-12-01

    As sensor network applications to monitor and control the physical environment from remote locations, a mobile ad-hoc network (MANET) has been the focus of many recent research and development efforts. A MANET, autonomous system of mobile hosts, is characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Many kinds of routing protocols for ad-hoc network have been proposed and still actively updated, because each application has different characteristics and requirements. Since the current studies show it is almost impossible to design an efficient routing protocol to be adapted for all kinds of applications. We, therefore, have focused a certain application, inter-vehicle communication for ITS (Intelligent Transport Systems), to evaluate the routing protocols. In our experiment, we defined several traffic flow models for inter-vehicle communication applications. By using simulation, we evaluated end-to-end delay and throughput performance of data transmission for inter-vehicle communications with the existing routing protocols. The result confirms the feasibility of using some routing protocols for inter-vehicle communication services.

  1. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  2. Energy adaptive MAC protocol for IEEE 802.15.7 with energy harvesting

    Science.gov (United States)

    Wang, Hong-qiao; Chi, Xue-fen; Zhao, Lin-lin

    2016-09-01

    The medium access control (MAC) protocol for indoor visible light communication (VLC) with energy harvesting is explored in this paper. The unfairness of throughput exists among devices due to the significant difference of their energy harvesting rates which changes with distance, acceptance angle and the obstruction probability. We propose an energy harvesting model, a new obstruction probability model and an energy adaptive contention algorithm to overcome the unfairness problem. This device can adjust its contention window according to the energy harvesting rate. As a result, the device with lower energy harvesting rate can get shorter contention window to improve its transmission opportunity. Simulation results show that our MAC protocol can achieve a higher degree of fairness.

  3. Development of a protocol to quantify local bone adaptation over space and time: Quantification of reproducibility.

    Science.gov (United States)

    Lu, Yongtao; Boudiffa, Maya; Dall'Ara, Enrico; Bellantuono, Ilaria; Viceconti, Marco

    2016-07-01

    In vivo micro-computed tomography (µCT) scanning of small rodents is a powerful method for longitudinal monitoring of bone adaptation. However, the life-time bone growth in small rodents makes it a challenge to quantify local bone adaptation. Therefore, the aim of this study was to develop a protocol, which can take into account large bone growth, to quantify local bone adaptations over space and time. The entire right tibiae of eight 14-week-old C57BL/6J female mice were consecutively scanned four times in an in vivo µCT scanner using a nominal isotropic image voxel size of 10.4µm. The repeated scan image datasets were aligned to the corresponding baseline (first) scan image dataset using rigid registration. 80% of tibia length (starting from the endpoint of the proximal growth plate) was selected as the volume of interest and partitioned into 40 regions along the tibial long axis (10 divisions) and in the cross-section (4 sectors). The bone mineral content (BMC) was used to quantify bone adaptation and was calculated in each region. All local BMCs have precision errors (PE%CV) of less than 3.5% (24 out of 40 regions have PE%CV of less than 2%), least significant changes (LSCs) of less than 3.8%, and 38 out of 40 regions have intraclass correlation coefficients (ICCs) of over 0.8. The proposed protocol allows to quantify local bone adaptations over an entire tibia in longitudinal studies, with a high reproducibility, an essential requirement to reduce the number of animals to achieve the necessary statistical power.

  4. Adapting a rapid river assessment protocols to be used by elementary school children

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2012-12-01

    Full Text Available The present study aimed to adapt a rapid river assessment protocols (RAP to be used by elementary school children. The study was conducted in Ipameri, GO and the RAP was adapted for the evaluation of streams in the Cerrado biome. Based on two protocol models, the developed RAP included: physical parameters that affect the functioning of streams, language adapted to the educational level of elementary school and the presence of drawings that could facilitate the field application of RAP by the students. For consolidation of the adapted instrument, it was offered a monitoring workshop to 95 students from two public education institutions, and developed an analysis and interpretation of the pattern of responses obtained during the practical step of the workshop. The Bartlett and Levene tests revealed no statistical differences between the response patterns of the students, allowing to infer that the developed RAP was understandable by the evaluators. The application of the RAP was fast (20 to 40 minutes and the students reported that the developed instrument helped them to familiarize with environmental issues. In addition, the monitoring workshop helped them to understand the instrument and the available illustrations facilitated the field evaluation. In addition, the students concluded that they have become aware of the issues related to the water resource preservation and also that participation in the environmental monitoring workshop allowed the appropriation of knowledge about the river system functioning. It was concluded that adapted RAP has been proved to be a useful and interesting tool for using in environmental education projects and programs.

  5. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    Science.gov (United States)

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  6. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    Directory of Open Access Journals (Sweden)

    Anitha Vijaya Kumar

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  7. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    Science.gov (United States)

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  8. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-07-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  9. Adaptability of IEEE 802.15.4(Zigbee Protocol for Wireless Sensor network

    Directory of Open Access Journals (Sweden)

    Lalit Saraswat

    2010-05-01

    Full Text Available The IEEE 802.15.4/Zigbee protocol stack has been considered as a promising technology for Wireless Sensor Networks (WSN. IEEE 802.15.4 Low-Rate Wireless Personal Area Network (WPAN standardspecifies the lower protocol layers—the physical layer (PHY, and the media access control (MAC portion of the data link layer (DLL and Network layer(NWK Wireless sensor network provide the low rate, wireless interconnection of ultra low cost sensor/actuator devices to enable the cyber world to sense and affect the real physical environment. The IEEE 802.15.4/Zigbee protocol stack provide selectable levels of security using AES-128 mechanism for privacy, sender authentication, message integrity. It uses fully handshake protocol for transfer reliability. In business applications where WSN are applied, failures in essential parts of the sensor network must beefficiently detected and automatically recovered. ZigBee is targeted at radio-frequency (RF applications that require a low data rate, long battery life, and secure networking.This paper will analyze theadaptability features of IEEE802.15.4[3] at Physical, MAC and Network layer and various mode of operation at MAC layer.

  10. A Semantically Automated Protocol Adapter for Mapping SOAP Web Services to RESTful HTTP Format to Enable the Web Infrastructure, Enhance Web Service Interoperability and Ease Web Service Migration

    Directory of Open Access Journals (Sweden)

    Frank Doheny

    2012-04-01

    Full Text Available Semantic Web Services (SWS are Web Service (WS descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly defined constraints, maps SOAP Web Services to RESTful HTTP format. However, in the previous adapter, the configuration element is manual and the latency implications are locally based. This paper applies SWS technologies to automate the configuration element and the latency tests are conducted in a more realistic Internet based setting.

  11. Evaluation of replacement protocols and modifications to TCP to enhance ASC Wide Area Network performance.

    Energy Technology Data Exchange (ETDEWEB)

    Romero, Randy L. Jr.

    2004-09-01

    Historically, TCP/IP has been the protocol suite used to transfer data throughout the Advanced Simulation and Computing (ASC) community. However, TCP was developed many years ago for an environment very different from the ASC Wide Area Network (WAN) of today. There have been numerous publications that hint of better performance if modifications were made to the TCP algorithms or a different protocol was used to transfer data across a high bandwidth, high delay WAN. Since Sandia National Laboratories wants to maximize the ASC WAN performance to support the Thor's Hammer supercomputer, there is strong interest in evaluating modifications to the TCP protocol and in evaluating alternatives to TCP, such as SCTP, to determine if they provide improved performance. Therefore, the goal of this project is to test, evaluate, compare, and report protocol technologies that enhance the performance of the ASC WAN.

  12. Improving the AODV Protocol to Satisfy the Required Level of Reliability for Home Area Networks

    Directory of Open Access Journals (Sweden)

    Hossein Jafari Pozveh

    2016-06-01

    Full Text Available For decades, the structure of existing power grids has not changed. It is an old structure that depends heavily on fossil fuel as an energy source, and in the future, this is likely to be critical in the field of energy. To solve these problems and to make optimal use of energy resources, a new concept is proposed, called Smart Grid. Smart Grid is an electric power distribution automation system, which can provide a two-way flow of electricity and information between power plants and consumers. The Smart Grid communications infrastructure consists of different network components, such as Home Area Network (HAN, Neighborhood Area Network (NAN and Wide Area Network (WAN. Achieving the required level of reliability in the transmission of information to all sections, including the HAN, is one of the main objectives in the design and implementation of Smart Grid. This study offers a routing protocol by considering the parameters and constraints of HAN, which, by improving AODV routing protocol, achieves the level of required reliability for data transmission in this network. These improvements include: making table-driven AODV routing protocol, extending the routing protocol to compute multiple paths in a route discovery, simplification and providing the effect of HAN parameters. The results of the NS2 simulation indicate that applying this improved routing protocol in the HAN, satisfies the required level of reliability of the network, which is over 98%.

  13. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  14. Indicators and protocols for monitoring impacts of formal and informal trails in protected areas

    Science.gov (United States)

    Marion, Jeffrey L.; Leung, Yu-Fai

    2011-01-01

    Trails are a common recreation infrastructure in protected areas and their conditions affect the quality of natural resources and visitor experiences. Various trail impact indicators and assessment protocols have been developed in support of monitoring programs, which are often used for management decision-making or as part of visitor capacity management frameworks. This paper reviews common indicators and assessment protocols for three types of trails, surfaced formal trails, unsurfaced formal trails, and informal (visitor-created) trails. Monitoring methods and selected data from three U.S. National Park Service units are presented to illustrate some common trail impact indicators and assessment options.

  15. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  16. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  17. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying...... forgetting factor is applied to identify online the reduced-order linearlized model which contains dominant inter-area low frequency oscillations. Based on this linearlized model, the generalized predictive control scheme considering control output constraints is employed to obtain the optimal control signal...... in each sampling interval. Case studies are undertaken on a two-area fourmachine power system and the New England 10-machine 39-bus power system, respectively. Simulation results show that the proposed adaptive WADC not only can damp the inter-area oscillations effectively under a wide range of operation...

  18. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  19. An Adaptive Framework for Selecting Environmental Monitoring Protocols to Support Ocean Renewable Energy Development

    Directory of Open Access Journals (Sweden)

    Emily J. Shumchenia

    2012-01-01

    Full Text Available Offshore renewable energy developments (OREDs are projected to become common in the United States over the next two decades. There are both a need and an opportunity to guide efforts to identify and track impacts to the marine ecosystem resulting from these installations. A monitoring framework and standardized protocols that can be applied to multiple types of ORED would streamline scientific study, management, and permitting at these sites. We propose an adaptive and reactive framework based on indicators of the likely changes to the marine ecosystem due to ORED. We developed decision trees to identify suites of impacts at two scales (demonstration and commercial depending on energy (wind, tidal, and wave, structure (e.g., turbine, and foundation type (e.g., monopile. Impacts were categorized by ecosystem component (benthic habitat and resources, fish and fisheries, avian species, marine mammals, and sea turtles and monitoring objectives were developed for each. We present a case study at a commercial-scale wind farm and develop a monitoring plan for this development that addresses both local and national environmental concerns. In addition, framework has provided a starting point for identifying global research needs and objectives for understanding of the potential effects of ORED on the marine environment.

  20. Occurrence of fastidious Campylobacter spp. in fresh meat and poultry using an adapted cultural protocol.

    Science.gov (United States)

    Lynch, Orla A; Cagney, Claire; McDowell, David A; Duffy, Geraldine

    2011-11-01

    This study used an adapted cultural protocol for the recovery of fastidious species of Campylobacter, to gain a more accurate understanding of the diversity of Campylobacter populations in fresh meats. Chicken (n=185), pork (n=179) and beef (n=186) were collected from supermarkets and butchers throughout the Republic of Ireland. Samples were enriched in Campylobacter enrichment broth for 24h under an atmosphere of 2.5% O(2), 7% H(2), 10% CO(2), and 80.5% N(2). The enriched samples were then filtered onto non-selective Anaerobe Basal Agar supplemented with lysed horse blood using mixed ester filter membranes. Isolates were identified by both genus and species-specific PCR assays and biochemical testing. The incidence of campylobacters on beef (36%) was significantly higher than on pork (22%) or chicken (16%), and far exceeds previously reported prevalence levels. The method was successful in recovering 7 species of Campylobacter, including the fastidious spp. C. concisus and C. mucosalis, from chicken meat, and 10 species, including C. concisus, C. curvus, C. mucosalis, C. sputorum, and C. upsaliensis, from minced beef. The isolation of C. concisus and C. upsaliensis from meat in this study is of particular significance, due to their emerging clinical relevance. The results of this study confirm that the diversity of Campylobacter species on fresh meats is greater than previously reported and highlights the bias of cultural methods towards the recovery of C. jejuni.

  1. An energy efficiency clustering routing protocol for WSNs in confined area

    Institute of Scientific and Technical Information of China (English)

    Sun Yanjing; He Yanjun; Zhang Beibei; Liu Xue

    2011-01-01

    Wireless sensor networks (WSNs) are important application for safety monitoring in underground coal mines,which are difficult to monitor due to natural conditions.Based on the characteristic of limited energy for WSNs in confined underground area such as coal face and laneway,we presents an energy-efficient clustering routing protocol based on weight (ECRPW) to prolong the lifetime of networks.ECRPW takes into consideration the nodes' residual energy during the election process of cluster heads.The constraint of distance threshold is used to optimize cluster scheme.Furthermore,the protocol also sets up a routing tree based on cluster heads' weight.The results show that ECRPW had better performance in energy consumption,death ratio of node and network lifetime.

  2. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  3. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic...

  4. A very low power MAC (VLPM) protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Ullah, Niamat; Khan, Pervez; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient's movements. They are an easy and fast way to diagnose the patient's status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM) based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit) along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator)] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node's ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B-MAC and X-MAC in terms

  5. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B

  6. Design of an Energy Efficient and Delay Tolerant Routing Protocol for Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Ms.Venkateswari.R

    2012-05-01

    Full Text Available The Wireless Body Area Network provide continuous health monitoring and real-time feedback to the medical personnel. The devices used for WBAN have limited energy resources. For most devices it is impossible to recharge or change the batteries. Low power is needed to provide long lifetime to the devices. All devices are equally important and devices are only added when they are needed for an application. The data mostly consists of medical information. Hence, high reliability and low delay is required. Cluster topology and Dynamic Source Routing Protocol provides high packet delivery ratio, low delay and low energy consumption. In this paper, a modification in the DSR routing protocol has been proposed. The modified DSR named as EDSR (Efficient Dynamic Source Routing, reduces the delay by reducing the average end to end delay for the node and reduces the number of packets dropped thereby increasing packet delivery ratio. Energy consumption in EDSR is decreased by 16.73% when compared to DSR. This protocol reduces the energy consumption and delay by reducing the time needed for route discovery process. EDSR achieves high residual battery capacity which eliminates the need for recharging the batteries thereby ensuring long lifetime of the devices.

  7. Development of a Protocol to Test Proprioceptive Utilization as a Predictor for Sensorimotor Adaptability

    Science.gov (United States)

    Goel, R.; De Dios, Y. E.; Gadd, N. E.; Caldwell, E. E.; Peters, B. T.; Bloomberg, J. J.; Oddsson, L. I. E.; Mulavara, A. P.

    2016-01-01

    Astronauts returning from space flight show significant inter-subject variations in their abilities to readapt to a gravitational environment because of their innate sensory weighting. The ability to predict the manner and degree to which each individual astronaut will be affected would improve the effectiveness of countermeasure training programs designed to enhance sensorimotor adaptability. We hypothesize participant's ability to utilize individual sensory information (vision, proprioception and vestibular) influences adaptation in sensorimotor performance after space flight. The goal of this study is to develop a reliable protocol to test proprioceptive utilization in a functional postural control task. Subjects "stand" in a supine position while strapped to a backpack frame holding a friction-free device using air-bearings that allow the subject to move freely in the frontal plane, similar to when in upright standing. The frame is attached to a pneumatic cylinder, which can provide different levels of a gravity-like force that the subject must balance against to remain "upright". The supine posture with eyes closed ensures reduced vestibular and visual contribution to postural control suggesting somatosensory and/or non-otolith vestibular inputs will provide relevant information for maintaining balance control in this task. This setup is called the gravity bed. Fourteen healthy subjects carried out three trials each with eyes open alternated with eyes closed, "standing" on their dominant leg in the gravity bed environment while loaded with 60 percent of their body weight. Subjects were instructed to: "use your sense of sway about the ankle and pressure changes under the foot to maintain balance." Maximum length of a trial was 45 seconds. A force plate underneath the foot recorded forces and moments during the trial and an inertial measurement unit (IMU) attached on the backpack's frame near the center of mass of the subject recorded upper body postural

  8. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João;

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (QoS) proper...

  9. Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-01-01

    The point-inclusion problem is an important secure multi-party computation that it involves two parties, where one has a private point and the other has a private area, and they want to determine whether the point is inside the area without revealing their respective private information. All previously proposed point-inclusion protocols are only suitable for a specific area, such as circle, rectangle and convex polygon. In this paper, we present a novel privacy-preserving point-inclusion quantum protocol for an arbitrary area, which is surrounded by any plane geometric figure. Compared to the classical related protocols, our protocol has the advantages of the higher security and the lower communication complexity.

  10. Walking adaptability therapy after stroke: study protocol for a randomized controlled trial

    NARCIS (Netherlands)

    Timmermans, C.; Roerdink, M.; Ooijen, van M.W.; Meskens, C.G.; Janssen, T.W.J.; Beek, P.J.

    2016-01-01

    Background: Walking in everyday life requires the ability to adapt walking to the environment. This adaptability is often impaired after stroke, and this might contribute to the increased fall risk after stroke. To improve safe community ambulation, walking adaptability training might be beneficial

  11. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  12. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    Science.gov (United States)

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  13. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2012-06-01

    Full Text Available Underwater acoustic wireless sensor networks (UAWSNs have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA-based Media Access Control (MAC protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA-based MAC protocols.

  14. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    Science.gov (United States)

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  15. Developing consistent Landsat data sets for large area applications: the MRLC 2001 protocol

    Science.gov (United States)

    Chander, G.; Huang, C.; Yang, L.; Homer, C.; Larson, C.

    2009-01-01

    One of the major efforts in large area land cover mapping over the last two decades was the completion of two U.S. National Land Cover Data sets (NLCD), developed with nominal 1992 and 2001 Landsat imagery under the auspices of the MultiResolution Land Characteristics (MRLC) Consortium. Following the successful generation of NLCD 1992, a second generation MRLC initiative was launched with two primary goals: (1) to develop a consistent Landsat imagery data set for the U.S. and (2) to develop a second generation National Land Cover Database (NLCD 2001). One of the key enhancements was the formulation of an image preprocessing protocol and implementation of a consistent image processing method. The core data set of the NLCD 2001 database consists of Landsat 7 Enhanced Thematic Mapper Plus (ETM+) images. This letter details the procedures for processing the original ETM+ images and more recent scenes added to the database. NLCD 2001 products include Anderson Level II land cover classes, percent tree canopy, and percent urban imperviousness at 30-m resolution derived from Landsat imagery. The products are freely available for download to the general public from the MRLC Consortium Web site at http://www.mrlc.gov.

  16. Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip

    CERN Document Server

    Soliman, Ahmed H M; El-Bably, M; Keshk, Hesham M A M

    2012-01-01

    The Scaling of microchip technologies, from micron to submicron and now to deep sub-micron (DSM) range, has enabled large scale systems-on-chip (SoC). In future deep submicron (DSM) designs, the interconnect effect will definitely dominate performance. Network-on-Chip (NoC) has become a promising solution to bus-based communication infrastructure limitations. NoC designs usually targets Application Specific Integrated Circuits (ASICs), however, the fabrication process costs a lot. Implementing a NoC on an FPGA does not only reduce the cost but also decreases programming and verification cycles. In this paper, an Asynchronous NoC has been implemented on a SPARTAN-3E\\textregistered device. The NoC supports basic transactions of both widely used on-chip interconnection standards, the Open Core Protocol (OCP) and the WISHBONE Protocol. Although, FPGA devices are synchronous in nature, it has been shown that they can be used to prototype a Global Asynchronous Local Synchronous (GALS) systems, comprising an Asynchr...

  17. Adaptive governance of disaster: Drought and flood in rural areas

    NARCIS (Netherlands)

    Hurlbert, M.

    2016-01-01

    There is considerable research on the vulnerability of agricultural producers to climate change; we know that the institutional governance system is an important component of adaptive capacity impacting on the agricultural producers’ livelihood capitals that determine their livelihood success; and w

  18. Adaptation to climate change: Legal challenges for protected areas

    NARCIS (Netherlands)

    Cliquet, An; Backes, Chris; Harris, Jim; Howsam, Peter

    2009-01-01

    Climate change will cause further loss of biodiversity. As negative effects are already taking place, adaptive measures are required to protect biodiversity from the effects of climate change. The EU policy on climate change and biodiversity aims at improving a coherent ecological network in order t

  19. Energy-Aware Adaptive Cooperative FEC Protocol in MIMO Channel for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2013-01-01

    Full Text Available We propose an adaptive cooperative forward error correction (ACFEC based on energy efficiency combining Reed-Solomon (RS coder algorithm and multiple input multiple output (MIMO channel technology with monitoring signal-to-noise ratio (SNR in wireless sensor networks. First, we propose a new Markov chain model for FEC based on RS codes and derive the expressions for QoS on the basis of this model, which comprise four metrics: throughput, packet error rate, delay, and energy efficiency. Then, we apply RS codes with the MIMO channel technology to the cross-layer design. Numerical and simulation results show that the joint design of MIMO and adaptive cooperative FEC based on RS codes can achieve considerable spectral efficiency gain, real-time performance, reliability, and energy utility.

  20. Prophylactic aortic root surgery in patients with Marfan syndrome : 10 years' experience with a protocol based on body surface area

    NARCIS (Netherlands)

    Aalberts, Jan J. J.; van Tintelen, J. Peter; Hillege, Hans L.; Boonstra, Piet W.; van den Berg, Maarten P.; Waterbolk, T

    2008-01-01

    Background: Current guidelines recommending prophylactic aortic root replacement in Marfan syndrome are based on absolute diameters of the aortic root. However, aortic root diameter is a function of body surface area (BSA). Here, we report our experience with a protocol for prophylactic aortic root

  1. An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless Sensor Networks (WSNs) are highly distributed networks consisting of a large number of tiny, low-cost, light-weight wireless nodes deployed to monitor an environment or a system. Each node in a WSN consists of three subsystems: the sensor subsystem which senses the environment, the processing subsystem which performs local computations on the sensed data, and the communication subsystem which is responsible for message exchange with neighboring sensor nodes. While an individual sensor node has limited sensing region, processing power, and energy, networking a large number of sensor nodes give rise to a robust, reliable, and accurate sensor network covering a wide region. Thus, routing in WSNs is a very important issue. This paper presents a query-based routing protocol for a WSN that provides different levels of Quality of Service (QoS): energy-efficiency, reliability, low latency and fault-tolerance-under different application scenarios. The algorithm has low computational complexity but can dynamic...

  2. Acute symptoms related to air pollution in urban areas: a study protocol

    Directory of Open Access Journals (Sweden)

    Forouzanfar Mohammad

    2006-08-01

    Full Text Available Abstract Background The harmful effects of urban air pollution on general population in terms of annoying symptoms are not adequately evaluated. This is in contrast to the hospital admissions and short term mortality. The present study protocol is designed to assess the association between the level of exposure to certain ambient air pollutants and a wide range of relevant symptoms. Awareness of the impact of pollution on the population at large will make our estimates of the pertinent covert burden imposed on the society more accurate. Methods/design A cross sectional study with spatial analysis for the addresses of the participants was conducted. Data were collected via telephone interviews administered to a representative sample of civilians over age four in the city. Households were selected using random digit dialling procedures and randomization within each household was also performed to select the person to be interviewed. Levels of exposure are quantified by extrapolating the addresses of the study population over the air pollution matrix of the city at the time of the interview and also for different lag times. This information system uses the data from multiple air pollution monitoring stations in conjunction with meteorological data. General linear models are applied for statistical analysis. Discussion The important limitations of cross-sectional studies on acute effects of air pollution are personal confounders and measurement error for exposure. A wide range of confounders in this study are controlled for in the statistical analysis. Exposure error may be minimised by employing a validated geographical information system that provides accurate estimates and getting detailed information on locations of individual participants during the day. The widespread operation of open air conditioning systems in the target urban area which brings about excellent mixing of the outdoor and indoor air increases the validity of outdoor pollutants

  3. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  4. Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network

    Indian Academy of Sciences (India)

    NONITA SHARMA; AJAY K SHARMA

    2016-03-01

    This study aims to explore the impact of heterogeneity on a hybrid algorithm called Multi Adaptive Filter Algorithm by constructing series of experiments. Here, the simulations were made between ‘Total Energy Spent’ and ‘Number of Sources’ considering temporal correlation. The results were drawn from the trace information generated using ‘Monte Carlo’ simulation methods. After keen analysis, the results show that different levels of heterogeneity are best suited for correlated event detections. Moreover, based on the conclusions drawn,it can be safely inferred that n-level heterogeneity reduces the total energy spent close to 60%. Further, cost analysis recommends that adding progressive nodes preserves the cost factor in the bracket of 230–280$/Joule. Thenovel approach can immensely help the future solution providers to overcome the battery limitations of wireless sensor networks. This study provides insights into designing heterogeneous wireless sensor networks and aims atproviding the cost-benefit analysis that can be used in selecting the critical parameters of the network.

  5. Sports-related testing protocols are required to reveal trunk stability adaptations in high-level athletes.

    Science.gov (United States)

    Barbado, David; Barbado, Luis C; Elvira, Jose L L; Dieën, Jaap H van; Vera-Garcia, Francisco J

    2016-09-01

    Trunk/core stability is considered a key component of training programs, because it could contribute to prevention of low-back and lower-limb injuries and to sports performance. Based on the specificity principle, sports-related trunk stability tests would be required in elite sports performance. However, there may be some generic qualities underlying trunk stability that can be assessed with nonspecific protocols, which are broadly used in sport and rehabilitation. To assess whether specific tests are needed in a high-performance context, we analyzed the influence of specialization in sports with large but qualitatively different balance control demands (judo and kayaking) on trunk stability and compared high-performance athletes with recreational athletes without a specific training history. Twenty-five judokas, sixteen kayakers and thirty-seven recreational athletes performed two trunk stability protocols: sudden loading, to assess trunk responses to external and unexpected perturbations; stable and unstable sitting, to assess the participant's ability to control trunk while sitting. Within-session test-retest reliability analyses were performed to support the between-groups comparison. Judokas showed lower angular displacement (0.199rad) against posterior loading than kayakers (0.221rad) probably because they are frequently challenged by higher sudden loads while they are pushed or pulled. Kayakers showed lower error (7.33mm), probably because they train and compete seated on unstable surfaces. Importantly, judokas and kayakers obtained better results than recreational athletes only in those tests designed according to the specific demands of each sport (psport training induces specific trunk stability adaptations, which are not revealed through nonspecific tests.

  6. Leaf Area Adjustment As an Optimal Drought-Adaptation Strategy

    Science.gov (United States)

    Manzoni, S.; Beyer, F.; Thompson, S. E.; Vico, G.; Weih, M.

    2014-12-01

    Leaf phenology plays a major role in land-atmosphere mass and energy exchanges. Much work has focused on phenological responses to light and temperature, but less to leaf area changes during dry periods. Because the duration of droughts is expected to increase under future climates in seasonally-dry as well as mesic environments, it is crucial to (i) predict drought-related phenological changes and (ii) to develop physiologically-sound models of leaf area dynamics during dry periods. Several optimization criteria have been proposed to model leaf area adjustment as soil moisture decreases. Some theories are based on the plant carbon (C) balance, hypothesizing that leaf area will decline when instantaneous net photosynthetic rates become negative (equivalent to maximization of cumulative C gain). Other theories draw on hydraulic principles, suggesting that leaf area should adjust to either maintain a constant leaf water potential (isohydric behavior) or to avoid leaf water potentials with negative impacts on photosynthesis (i.e., minimization of water stress). Evergreen leaf phenology is considered as a control case. Merging these theories into a unified framework, we quantify the effect of phenological strategy and climate forcing on the net C gain over the entire growing season. By accounting for the C costs of leaf flushing and the gains stemming from leaf photosynthesis, this metric assesses the effectiveness of different phenological strategies, under different climatic scenarios. Evergreen species are favored only when the dry period is relatively short, as they can exploit most of the growing season, and only incur leaf maintenance costs during the short dry period. In contrast, deciduous species that lower maintenance costs by losing leaves are advantaged under drier climates. Moreover, among drought-deciduous species, isohydric behavior leads to lowest C gains. Losing leaves gradually so as to maintain a net C uptake equal to zero during the driest period in

  7. Connecting climate social adaptation and land use change in internationally adjoining protected areas

    Directory of Open Access Journals (Sweden)

    Claudia Rodríguez Solórzano

    2016-01-01

    Full Text Available The development of climate adaptation strategies to address social problems derived from climate change is pressing. Yet, in addition to providing means to minimise the impact of climate variability and change on livelihoods, climate adaptation strategies might exacerbate environmental change and cause negative social impacts. Systematic research has not addressed the impacts of adaptation on environmental change. In this paper, I focus on land use change as a specific type of environmental change and on three adaptation strategies: diversification, pooling and out-migration. I analyse the influence of adaptation strategies on land use change by drawing on interviews with the managers of 56 internationally adjoining protected areas in 18 countries in the Americas. The findings indicate that the impact of adaptation depends on the adaptation strategy people choose. When people out-migrate, land use change increases. Community elite control for decision-making, shorter distances between communities and markets and more communities in and around the protected areas also increase land use change. These findings show that adaptation can be a driver of further environmental change, and thus further study is needed to understand the likely impacts of adaptation on conservation.

  8. Wireless Local Area Network Adaptive Modulation and Coding Technology Research

    Institute of Scientific and Technical Information of China (English)

    SUN Zeng-you; SUN Xiao-fan

    2012-01-01

      Expound the existing modulation mode of the present wireless local area network. Directing at the problem that when single modulation method conveys data with high speed in the frequency selective fading channel, the system throughput will be declined and the efficiency of the spectrum will be lowered . Put forward the scheme that the OFDM sub-carrier will use differ⁃ent modulation modes after dynamic groups by amplitude frequency response. Simulation results show that the scheme will lower the complexity of the system achievement, and can get a higher spectrum efficiency.

  9. An Adaptive Allocation Algorithm using Directional CSMA/CA over mmWave Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Hyunhee Park

    2012-04-01

    Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni‐antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention‐based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP\tcontrol procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.

  10. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC for Long-lived Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wen Hu

    2010-06-01

    Full Text Available We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC algorithm for long-lived Wireless Sensor Networks (WSNs. Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  11. Multiagents-based wide area protection with best-effort adaptive strategy

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Yongli; Wang, Dewen [North China Electric Power University, Baoding (China); Song, Shaoqun [Fuzhou Electric Power Industry Bureau, Fujian Province (China)

    2009-02-15

    Abstract - Multi-trips of circuit breakers often occur within a short period in a severe blackout, and the tripping usually relates to relays' mal-operations. In fact, when two ore more electric primary devices are isolated by circuit breakers, the settings of most relays to protect their power system are getting infeasible and uncoordinated. Adaptive settings are needed to prevent them from wrong operation. This paper presents an adaptive protection scheme based on wide area information with best-effort protection strategy, and the outline of multiagents and WAN Based Adaptive Protection System (MAWAPS). In the scheme, the best-effort adaptive strategy is used to guarantee the adaptive settings to operate safely and effectively in most situations. The IP/SDH-based wide area network (WAN) is used to realize real-time wide area information exchange in the proposed protection scheme. Adaptive setting algorithms for the second stage zero-sequence current and phase overcurrent relays are proposed, which can provide larger line coverage than traditional relays. Moreover, multiagent techniques and IEC 61850 are employed to realize the fast communication between different agents, and MMS plays a prominent role in real-time remote communication. A simulating system has been developed according to the above ideas and approaches, and the experimental results show that the proposed adaptive protection scheme is feasible from the view of protective performance including the executing time. (author)

  12. Sustainability: Its adaptation and relevance in remote area housing

    Directory of Open Access Journals (Sweden)

    Rosemarie Rusch

    2014-03-01

    Full Text Available Little consideration has been given to the context of housing in remote areas.  It is important for the economic survival of many remote communities that appropriate and sustainable housing solutions are decided and implemented.This report examines housing at St Pauls, Moa Island in the Torres Strait, using site information, historical research and a review of cultural and geo-political factors to compare the current model with similar studies in self-build housing undertaken in the region between 1986 and 1992. It not only demonstrates tangible economic benefits, but also evaluates the environmental and social improvements which can be achieved with a re-examination of the existing model.  It is important to consider the value of investing in policies and practices of sustainable development that can play a pivotal role in potential capacity building within such communities.Current land tenure policy means that families wishing to own their own homes must leave St Pauls, or build illegally.  Economically they cannot establish businesses so must leave the island or remain on welfare.  The result of this is an exponential increase in the cost of providing community housing and the associated increase in social and health stresses.  Acknowledgement at a policy level of the links between social and emotional well-being, and ‘Closing the Gap’ initiatives, have the potential to offer a wide range of funding opportunities and innovative approaches to solving the housing crisis in remote Australia, if they can be implemented in an open and effective manner.

  13. Sustainability: Its adaptation and relevance in remote area housing

    Directory of Open Access Journals (Sweden)

    Rosemarie Rusch

    2014-03-01

    Full Text Available Little consideration has been given to the context of housing in remote areas.  It is important for the economic survival of many remote communities that appropriate and sustainable housing solutions are decided and implemented. This report examines housing at St Pauls, Moa Island in the Torres Strait, using site information, historical research and a review of cultural and geo-political factors to compare the current model with similar studies in self-build housing undertaken in the region between 1986 and 1992.  It not only demonstrates tangible economic benefits, but also evaluates the environmental and social improvements which can be achieved with a re-examination of the existing model.  It is important to consider the value of investing in policies and practices of sustainable development that can play a pivotal role in potential capacity building within such communities. Current land tenure policy means that families wishing to own their own homes must leave St Pauls, or build illegally.  Economically they cannot establish businesses so must leave the island or remain on welfare.  The result of this is an exponential increase in the cost of providing community housing and the associated increase in social and health stresses.  Acknowledgement at a policy level of the links between social and emotional well-being, and ‘Closing the Gap’ initiatives, have the potential to offer a wide range of funding opportunities and innovative approaches to solving the housing crisis in remote Australia, if they can be implemented in an open and effective manner.

  14. Preston and Park-Sanders protocols adapted for semi-quantitative isolation of thermotolerant Campylobacter from chicken rinse

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann; Lübeck, Peter Stephensen; Aalbaek, B.

    2003-01-01

    detection methods. Thus, semi-quantitative detection of thermophilic Campylobacter spp. in 20 naturally contaminated chicken rinse samples was carried out using the two most common standard protocols: Preston and Park-Sanders, as proposed by Nordic Committee on Food Analysis (NMKL) and International...... Standard Organization (ISO), respectively. For both protocols, the chicken rinse samples were prepared in 500 ml buffered peptone water, as recommended in the ISO protocol no. 6887-2. The results indicated that the Preston protocol was superior to the Park-Sanders protocol in supporting growth...

  15. Different protocols of treadmill exercise induce distinct neuroplastic effects in rat brain motor areas.

    Science.gov (United States)

    Real, Caroline C; Garcia, Priscila C; Britto, Luiz R G; Pires, Raquel S

    2015-10-22

    A variety of exercise protocols have been used to promote experimental neuroplasticity. However, the plastic brain responses generated by several aspects of training (types, frequency, regimens, duration) remain undetermined. The aim of this study was to compare the plastic changes in the glutamatergic system and synaptic proteins in motor cortex, striatum and cerebellum promoted by two different treadmill exercise regimens. The present study analyzed by immunohistochemistry and Western blotting the expression of the subunits of AMPA receptors (GluA1 and GluA2/3) and synaptic proteins (synapsin I and synaptophysin) in adult male Wistar rat brains. The animals were divided into animals subjected to two different frequencies of aerobic exercise groups and sedentary animals. The exercise groups were: intermittent treadmill exercise (ITE) - animals that exercised 3 times a week (every other day) during four weeks, and continuous treadmill exercise (CTE) - animals that exercised every day during four weeks. Our results reveal that different protocols of treadmill exercise were able to promote distinct synaptic reorganization processes among the exercised groups. In general, the intermittent exercise regimen induced a higher expression of presynaptic proteins, whereas the continuous exercise regimen increased postsynaptic GluA1 and GluA2/3 receptors.

  16. A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas

    Science.gov (United States)

    Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Igartua, Mónica Aguilar; Rebollo-Monedero, David; de la Cruz Llopis, Luis J.; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso

    2014-01-01

    In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery. PMID:24476683

  17. A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Chuang Ma

    2016-01-01

    Full Text Available In wireless sensor networks (WSNs, the presence of congestion increases the ratio of packet loss and energy consumption and reduces the network throughput. Particularly, this situation will be more complex in Internet of Things (IoT environment, which is composed of thousands of heterogeneous nodes. RPL is an IPv6 routing protocol in low power and lossy networks standardized by IETF. However, the RPL can induce problems under network congestion, such as frequently parent changing and throughput degradation. In this paper, we address the congestion problem between parent nodes and child nodes in RPL-enabled networks, which typically consist of low power and resource constraint devices. To mitigate the effect of network congestion, we design a parent-change procedure by game theory strategy, by which the child nodes can change next hop neighbors toward the sink. Comparing to the ContikiRPL implementation, the simulation results show that our protocol can achieve more than two times improvement in throughput and reduce packet loss rate with less increasing of average hop count.

  18. A multimetric, map-aware routing protocol for VANETs in urban areas.

    Science.gov (United States)

    Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Aguilar Igartua, Mónica; Rebollo-Monedero, David; de la Cruz Llopis, Luis J; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso

    2014-01-28

    In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.

  19. Structural adaptation of Salsola soda L. (Chenopodiaceae from inland and maritime saline area

    Directory of Open Access Journals (Sweden)

    Milić Dubravka M.

    2013-01-01

    Full Text Available The microscopic analysis of leaf and stem in two populations of Salsola soda was carried out in order to examine mechanism of anatomical adaptations to environmental condition on saline habitats and to determine if there exists a morpho-anatomical differentiation between populations from maritime and inland saline area. Analysis included 26 quantitative characters of leaf and stem. The results showed that both populations exhibited halomorphic and xeromorphic adaptations, which refered to ecological plasticity and adaptations of plants to their habitats. Our research also showed that S. soda had quite a stable morphoanatomical structure, since only quantitative changes were recorded. [Projekat Ministarstva nauke Republike Srbije, br. 173002

  20. International and European Law on Protected Areas and Climate Change: Need for Adaptation or Implementation?

    Science.gov (United States)

    Cliquet, A.

    2014-10-01

    The protection and management of protected areas must be adapted to the effects of climate change. An important question is if the law on protected areas is capable of dealing with the required changes. In general, both international nature conventions and European Union nature conservation law do not contain any specific provisions on climate change and protected areas. Attention has been paid to this link in non-binding decisions and policy documents. In order to adapt the law to increased dynamics from climate change, more flexibility is needed. This flexibility should not be understood as "legal" flexibility, in the sense of the weakening nature conservation provisions. Scientific uncertainties on the effects of climate change might conflict with the need for legal certainties. In order to adapt to the effects of climate change, the two crucial elements are the strengthening of core protected areas and connectivity between the core areas. At the international level, both elements can be found in non-binding documents. International law enables the required adaptation; however, it often lacks concrete obligations. A stronger legal framework can be found at the level of the European Union. The Birds and Habitats Directives contain sufficient tools to deal with the effects of climate change. The Directives have been insufficiently implemented so far. Especially the central goals of reaching a favorable conservation status and connectivity measures need to be addressed much more in the future.

  1. International and European law on protected areas and climate change: need for adaptation or implementation?

    Science.gov (United States)

    Cliquet, A

    2014-10-01

    The protection and management of protected areas must be adapted to the effects of climate change. An important question is if the law on protected areas is capable of dealing with the required changes. In general, both international nature conventions and European Union nature conservation law do not contain any specific provisions on climate change and protected areas. Attention has been paid to this link in non-binding decisions and policy documents. In order to adapt the law to increased dynamics from climate change, more flexibility is needed. This flexibility should not be understood as "legal" flexibility, in the sense of the weakening nature conservation provisions. Scientific uncertainties on the effects of climate change might conflict with the need for legal certainties. In order to adapt to the effects of climate change, the two crucial elements are the strengthening of core protected areas and connectivity between the core areas. At the international level, both elements can be found in non-binding documents. International law enables the required adaptation; however, it often lacks concrete obligations. A stronger legal framework can be found at the level of the European Union. The Birds and Habitats Directives contain sufficient tools to deal with the effects of climate change. The Directives have been insufficiently implemented so far. Especially the central goals of reaching a favorable conservation status and connectivity measures need to be addressed much more in the future.

  2. KC2A2P : A Knowledge-driven Content and Context-Awareness Adaptive Protocol for Intelligent Communication

    Directory of Open Access Journals (Sweden)

    Li Wang

    2011-10-01

    Full Text Available Advanced network communication technology decreases data transmission error and make heterogeneous protocols interaction possible, but there still exits misunderstanding for transferred content in computer communication. Inspired by human's communication way, a kind of content and context awareness protocol base on knowledge (abbr. KC2A2P is proposed in this paper. A common shared protocol ontology is built that includes content, context and act in order to not only guide the different protocol terms mapping but also provide an intelligent protocol encoding framework. To avoid unnecessary communication load, event calculus is used to build the axiom of communication cognition and  three basic encoding  rules are made that can adjust the message entity  base on the application context .Furthermore, some experiments are given to show KC2A2P would improve the meaning delivery and even help to build trust relationship.

  3. Coordination of Teachers in New Undergraduate Degrees Adapted to European Higher Education Area

    Science.gov (United States)

    Mondéjar-Jiménez, Juan-Antonio; Cordente-Rodríguez, María; Meseguer-Santamaría, María-Leticia; Vargas-Vargas, Manuel; Mondéjar-Jiménez, José

    2010-01-01

    The introduction of new undergraduate degrees adapted to the European Higher Education Area (EHEA) requires a coordinated effort by teachers, because the different subjects are based on a new methodology of teaching and learning. The Social Sciences School of Cuenca offers degrees in Business Administration, Law and Labor Sciences. The progressive…

  4. Simulation of Old Urban Residential Area Evolution Based on Complex Adaptive System

    Institute of Scientific and Technical Information of China (English)

    YANG Fan; WANG Xiao-ming; HUA Hong

    2009-01-01

    On the basis of complex adaptive system theory,this paper proposed an agent-based model of old urban residential area,in which,residents and providers are the two adaptive agents.The behaviors of residents and providers in this model are trained with back propagation and simulated with Swarm software based on environment-rules-agents interaction.This model simulates the evolution of old urban residential area and analyzes the relations between the evolution and urban management with the background of Chaozhou city.As a result,the following are obtained:(1) Simulation without government intervention indicates the trend of housing ageing,environmental deterioration,economic depression,and social filtering-down in old urban residential area.If the development of old urban residential area is under control of developers in market,whose desire is profit maximization,and factors such as social justice,historic and culture value will be ignored.(2) If the government carries out some policies and measures which will perfectly serve their original aims,simulation reveals that old urban residential area could be adapted to environment and keep sustainable development.This conclusion emphasizes that government must act as initiator and program maker for guiding residents and other providers directly in the development of old urban residential area.

  5. Gossip-based adaptive membership management protocol%基于Gossip的自适应成员关系管理协议

    Institute of Scientific and Technical Information of China (English)

    张治斌; 冯文峰; 黄永峰

    2009-01-01

    A gossip-based adaptive membership protocol which is oriented to dynamic heterogeneous P2P was put forward. This protocol could dynamically adjust node degree according to node capability, and thus the node degree could be matched with the node capability, and then increasing the resource utilization and load balance. The basic operations of the protocol include: node joining, node exit, node failure restore, and node capability aggregation. The experimental results show that the proposed protocol which adapted to the node capability has higher resource utilization than the not-adapted.%提出了面向动态异质环境的P2P成员关系管理协议.该协议能根据节点能力度大小动态调整节点连接个数,从而使得节点连接数分布和节点能力度分布相匹配,有利于提高P2P网络的资源利用率和负载均衡.协议基本操作包括:节点加入、节点退出、节点失效恢复、节点能力度汇聚和节点关系更新.实验结果表明,和不考虑节点能力度的相关协议相比,与节点能力度动态适应的节点成员关系管理协议具有更高的资源利用率.

  6. DETERMINANTS OF ADAPTATION TO DEFORESTATION AMONG FARMERS IN MADAGALI LOCAL GOVERNMENT AREA OF ADAMAWA STATE, NIGERIA

    Directory of Open Access Journals (Sweden)

    S.B. Mustapha

    2012-08-01

    Full Text Available The study examined the determinants of adaptation to deforestation among farmers in Madagali Local Government Area of Adamawa state, Nigeria. Structured interview schedule were used to obtain information from 200 respondents selected through simple random sampling techniques. The data collected were analyzed using descriptive (frequencies and percentages and inferential (chi-square test statistics. The result indicated that majority (84% of the respondents were male with 21-40 years of age representing 58.50%. The study also showed that most (45% of the respondents had attained post primary education with majority (80% having 6 and above years of farming experience. The respondents perceived fuel wood extraction as the major (42% cause of deforestation in the study area. The result showed that the most (30.50% frequently employed adaptation strategy against deforestation was reducing quantity of fire wood consumption. The study further showed that the factors which significantly influenced adaptation to deforestation among the respondents were age, farming experience and educational status with X2=9.216, 8.697 and 11.238 at P<0.05 respectively. While those factors which did not influence adaptation to deforestation among the respondents were gender, access to agricultural credit and access to extension services with X2=1.286, 7.923 and 5.862 at P<0.05 respectively. The major constraints faced by respondents in adaptation to deforestation were lack of capital and lack of accessible alternative energy. The study recommends that awareness campaign should be mounted to increase the level of knowledge of respondents on the significance of adaptation to deforestation. Respondents should also be encouraged towards establishment of adaptation cooperative societies in order to take advantage of some government policies and programmes.

  7. Towards a New Policy for Climate Adaptive Water Management in Flanders: The Concept of Signal Areas

    Directory of Open Access Journals (Sweden)

    Peter De Smedt

    2014-05-01

    Full Text Available In Flanders, the Government has recently established an innovative policy framework to preserve the water storage capacity in flood-prone areas. In this context, the concept of ‘Signal Areas’ (signaalgebieden has been created. These areas are still undeveloped areas with a hard planning destination (residential and industrial areas located in flood-prone areas. The framework outlines in what way one needs to deal with the flood risk in these areas. The intention is to work with tailor-made solutions for each separate area. For this purpose, a comprehensive tool-box is available, such as land reparcelling, spatial destination or zoning swapping (bestemmingsruil, regulations regarding appropriate construction methods and land use in urban planning regulations or in public utility servitudes, and the application of a sharpened Water Test. The final objective is to create an efficacious, area-oriented adaptation strategy for climate-proof spatial planning. In this contribution, the author will provide an insight into the legal design of the above-mentioned concepts and instruments, how they can contribute to a stronger linkage between water management and spatial planning and therefore to a solid climate change adaptation strategy, as well as the factors of success and failure of this new policy framework.

  8. Understanding and Using the Controller Area Network Communication Protocol Theory and Practice

    CERN Document Server

    Di Natale, Marco; Giusto, Paolo; Ghosal, Arkadeb

    2012-01-01

    This is the first book to offer a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus.  Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance.   This book offers a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers.    Offers the first comprehensive guide to bridging the gap between theory and implementation of the widely accepted Controller Area Network (CAN) bus; Provides examples and best practices for design of communication systems, as w...

  9. Analysis of neighbour and isolated node of intersection area based geocasting protocol (IBGP) in VANET

    CERN Document Server

    Das, Sanjoy

    2012-01-01

    Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined geographical location i.e., known as geocast region. The applications of geocasting in VANET are to disseminate information like, collision warning, advertising, alerts message, etc. In this paper, we have proposed a model for highway scenario where the highway is divided into number of cells. The intersection area between two successive cells is computed to find the number of common nodes. Therefore, probabilistic analysis of the nodes present and void occurrence in the intersection area is carried out. Further, we have defined different forwarding zones to restrict the number of participated nodes for data delivery. Number of nodes present and void occurrence in the different forwarding zones have also been analysed based on various node density in the network to determine the successful delivery of data. Our analytical results show that in a densely populated network, data can be transmitted with lo...

  10. ADAPTIVE RECONSTRUCTION TECHNIQUE FOR THE LOST INFORMATION OF THE RECTANGULAR IMAGE AREA

    Institute of Scientific and Technical Information of China (English)

    Shi Rong; Li Xiaofeng; Li Zaiming

    2004-01-01

    The adaptive reconstruction for the lost information of the rectangular image area is very important for the robust transmission and restoration of the image. In this paper, a new reconstruction method based on the Discrete Cosine Transform (DCT) domain has been put forward. According to the low pass character of the human visual system and the energy distribution of the DCT coefficients on the rectangular boundary, the DCT coefficients of the rectangular image area are adaptively selected and recovered. After the Inverse Discrete Cosine Transform (IDCT), the lost information of the rectangular image area can be reconstructed. The experiments have demonstrated that the subjective and objective qualities of the reconstructed images are enhanced greatly than before.

  11. Development of a Protocol and a Screening Tool for Selection of DNAPL Source Area Remediation

    Science.gov (United States)

    2012-02-01

    and Sale T. ZVI-clay soil mixing treats DNAPL source 13 2.2 Newsletter area at 35-foot depth Technology News and Trends, February 2006. http://www...Type Hood D and Tmvnsend G. ERH pilot project removes 48 tons of PCA 27 2.2 Newsletter DNAPL within six months. Technology News and Trends...Dupin, H. J., and McCarty, P. L. 2000, Impact of Colony Morphologies and Disinfection on Biological Clogging in Porous Media, Environmental Science

  12. Protocol for the E-Area Low Level Waste Facility Disposal Limits Database

    Energy Technology Data Exchange (ETDEWEB)

    Swingle, R

    2006-01-31

    A database has been developed to contain the disposal limits for the E-Area Low Level Waste Facility (ELLWF). This database originates in the form of an EXCEL{copyright} workbook. The pertinent sheets are translated to PDF format using Adobe ACROBAT{copyright}. The PDF version of the database is accessible from the Solid Waste Division web page on SHRINE. In addition to containing the various disposal unit limits, the database also contains hyperlinks to the original references for all limits. It is anticipated that database will be revised each time there is an addition, deletion or revision of any of the ELLWF radionuclide disposal limits.

  13. rosettR: protocol and software for seedling area and growth analysis

    DEFF Research Database (Denmark)

    Tomé, Filipa; Jansseune, Karel; Saey, Bernadette

    2017-01-01

    differences among different genotypes and in response to light regimes and osmotic stress. rosettR is implemented as a package for the statistical computing software R and provides easy to use functions to design an experiment, analyze the images, and generate reports on quality control as well as a final......Growth is an important parameter to consider when studying the impact of treatments or mutations on plant physiology. Leaf area and growth rates can be estimated efficiently from images of plants, but the experiment setup, image analysis, and statistical evaluation can be laborious, often requiring...

  14. Validation and cross-cultural adaptation of the 'Fibromyalgia Participation Questionnaire' to the Spanish population: study protocol.

    Science.gov (United States)

    Gomez-Calvente, M; Medina-Porqueres, I; Fontalba-Navas, A; Pena-Andreu, J M; de Vos-Martin, C

    2015-09-01

    There are few high-quality instruments to evaluate the participation and social functioning of fibromyalgia patients. The Fibromyalgia Participation Questionnaire (FPQ) is a questionnaire that evaluates these aspects with high reliability and validity in its German original version. The aim of this work was to describe the translation and cross-cultural adaptation process of the FPQ into Spanish and its validation to ensure the equivalence against the original version. The questionnaire will be translated according to the FACIT methodology, and it will be tested in the Clinical Management Unit of North Almeria Health Area. This methodology includes several stages: double forward translation, reconciled version, back-translation, review of the previous versions and development of the prefinal version for the pretest. Once the pretest ends, the final version of the questionnaire will be developed, which will be subjected to a validation process to study its psychometric properties. Reliability will be studied by internal consistency and test-retest reliability through Cronbach's alpha and Pearson's correlation coefficient, respectively. External and construct validity will be analysed using correlation coefficients, content validity with an empirical analysis, and a differential item functioning analysis will be employed to measure discriminative validity. The presence of ceiling and floor effects will be calculated too. The validation of the FPQ into different languages will allow better evaluation and treatment based on the observed limitations fibromyalgia patients suffer from, as well as bringing the possibility to compare between other countries and generalize its use in the scientific community.

  15. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  16. Assessing the effectiveness and cost effectiveness of adaptive e-Learning to improve dietary behaviour: protocol for a systematic review

    Directory of Open Access Journals (Sweden)

    Michie Susan

    2010-04-01

    Full Text Available Abstract Background The composition of habitual diets is associated with adverse or protective effects on aspects of health. Consequently, UK public health policy strongly advocates dietary change for the improvement of population health and emphasises the importance of individual empowerment to improve health. A new and evolving area in the promotion of dietary behavioural change is e-Learning, the use of interactive electronic media to facilitate teaching and learning on a range of issues, including diet and health. The aims of this systematic review are to determine the effectiveness and cost-effectiveness of adaptive e-Learning for improving dietary behaviours. Methods/Design The research will consist of a systematic review and a cost-effectiveness analysis. Studies will be considered for the review if they are randomised controlled trials, involving participants aged 13 or over, which evaluate the effectiveness or efficacy of interactive software programmes for improving dietary behaviour. Primary outcome measures will be those related to dietary behaviours, including estimated intakes of energy, nutrients and dietary fibre, or the estimated number of servings per day of foods or food groups. Secondary outcome measures will be objective clinical measures that are likely to respond to changes in dietary behaviours, such as anthropometry or blood biochemistry. Knowledge, self-efficacy, intention and emotion will be examined as mediators of dietary behaviour change in order to explore potential mechanisms of action. Databases will be searched using a comprehensive four-part search strategy, and the results exported to a bibliographic database. Two review authors will independently screen results to identify potentially eligible studies, and will independently extract data from included studies, with any discrepancies at each stage settled by a third author. Standardised forms and criteria will be used. A descriptive analysis of included

  17. Parks, people, and change: the importance of multistakeholder engagement in adaptation planning for conserved areas

    Directory of Open Access Journals (Sweden)

    Corrine N. Knapp

    2014-12-01

    Full Text Available Climate change challenges the traditional goals and conservation strategies of protected areas, necessitating adaptation to changing conditions. Denali National Park and Preserve (Denali in south central Alaska, USA, is a vast landscape that is responding to climate change in ways that will impact both ecological resources and local communities. Local observations help to inform understanding of climate change and adaptation planning, but whose knowledge is most important to consider? For this project we interviewed long-term Denali staff, scientists, subsistence community members, bus drivers, and business owners to assess what types of observations each can contribute, how climate change is impacting each, and what they think the National Park Service should do to adapt. The project shows that each type of long-term observer has different types of observations, but that those who depend more directly on natural resources for their livelihoods have more and different observations than those who do not. These findings suggest that engaging multiple groups of stakeholders who interact with the park in distinct ways adds substantially to the information provided by Denali staff and scientists and offers a broader foundation for adaptation planning. It also suggests that traditional protected area paradigms that fail to learn from and foster appropriate engagement of people may be maladaptive in the context of climate change.

  18. Neural adaptation to thin and fat bodies in the fusiform body area and middle occipital gyrus: an fMRI adaptation study.

    Science.gov (United States)

    Hummel, Dennis; Rudolf, Anne K; Brandi, Marie-Luise; Untch, Karl-Heinz; Grabhorn, Ralph; Hampel, Harald; Mohr, Harald M

    2013-12-01

    Visual perception can be strongly biased due to exposure to specific stimuli in the environment, often causing neural adaptation and visual aftereffects. In this study, we investigated whether adaptation to certain body shapes biases the perception of the own body shape. Furthermore, we aimed to evoke neural adaptation to certain body shapes. Participants completed a behavioral experiment (n = 14) to rate manipulated pictures of their own bodies after adaptation to demonstratively thin or fat pictures of their own bodies. The same stimuli were used in a second experiment (n = 16) using functional magnetic resonance imaging (fMRI) adaptation. In the behavioral experiment, after adapting to a thin picture of the own body participants also judged a thinner than actual body picture to be the most realistic and vice versa, resembling a typical aftereffect. The fusiform body area (FBA) and the right middle occipital gyrus (rMOG) show neural adaptation to specific body shapes while the extrastriate body area (EBA) bilaterally does not. The rMOG cluster is highly selective for bodies and perhaps body parts. The findings of the behavioral experiment support the existence of a perceptual body shape aftereffect, resulting from a specific adaptation to thin and fat pictures of one's own body. The fMRI results imply that body shape adaptation occurs in the FBA and the rMOG. The role of the EBA in body shape processing remains unclear. The results are also discussed in the light of clinical body image disturbances.

  19. Landscape mapping at sub-Antarctic South Georgia provides a protocol for underpinning large-scale marine protected areas

    Science.gov (United States)

    Hogg, Oliver T.; Huvenne, Veerle A. I.; Griffiths, Huw J.; Dorschel, Boris; Linse, Katrin

    2016-10-01

    Global biodiversity is in decline, with the marine environment experiencing significant and increasing anthropogenic pressures. In response marine protected areas (MPAs) have increasingly been adopted as the flagship approach to marine conservation, many covering enormous areas. At present, however, the lack of biological sampling makes prioritising which regions of the ocean to protect, especially over large spatial scales, particularly problematic. Here we present an interdisciplinary approach to marine landscape mapping at the sub-Antarctic island of South Georgia as an effective protocol for underpinning large-scale (105–106  km2) MPA designations. We have developed a new high-resolution (100 m) digital elevation model (DEM) of the region and integrated this DEM with bathymetry-derived parameters, modelled oceanographic data, and satellite primary productivity data. These interdisciplinary datasets were used to apply an objective statistical approach to hierarchically partition and map the benthic environment into physical habitats types. We assess the potential application of physical habitat classifications as proxies for biological structuring and the application of the landscape mapping for informing on marine spatial planning.

  20. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup

    2016-05-09

    Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes.

  1. Campus sustainability and natural area stewardship: student involvement in adaptive comanagement

    Directory of Open Access Journals (Sweden)

    Marianne E. Krasny

    2014-09-01

    Full Text Available University campus sustainability initiatives have proliferated over the last decade. We contend that such initiatives benefit from applying conceptual frameworks to help understand and guide their activities and from a focus on campus open space and natural areas management. Informed by an adaptive comanagement framework encompassing social learning, social capital, and shared action, we used semistructured interviews to examine student participation in the immediate response and longer-term policy formulation following a crisis that occurred in a campus natural area. Students exhibited social learning as demonstrated by reflection and the integration of new ideas through discussions with administrators and peers, as well as social capital through increased social trust, which led to a shift in perspective regarding norms of student-administrator interactions. Further, students participated in shared action, such as posting warning signs in dangerous areas, and importantly, through their contributions to longer-term campus natural area safety and recreational access policy. Three conditions explain student engagement in the adaptive comanagement process: the presence of a pre-existing student organization that had built bonding social capital and was committed to campus natural area stewardship, openness to multiple stakeholder viewpoints and commitment to action on the part of the university administration, and the presence of a crisis that spurred emotions and action. Based on these findings, we assert that student organizations can contribute to an adaptive comanagement process and that such a process is consistent with university and campus sustainability values related to the importance of student engagement, mental health, and learning.

  2. Identification of national priority areas for adaptation to climate change in China

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The problem of global warming has been identified as the first in the list of the top ten environmental problems in the world.As climate change will seriously affect the social and natural world that people live in,so it may lay serious repercussions on economic progress,social improvement,and sustainable development,Internationalbodies everywhere and many of the countries' governments are responding urgently to this call.In recent years,climate change has affected different regions in China in different ways.In its national agenda,the Chinese government should address the problem of climate change and its negative impact on socio-economic development.In this endeavor the nation should introduce policies which will help its people and economy to adapt to these effectts and changes.Priority-fields of adaptation to climate change are the sensitive areas or departments which are more vulnerable to the negative influences of climate change.The negative impacts of climate change in some parts of China are considered to be very serious indeed as they affect the whole economy and community.As a result,priority should be given to these more affected regions for the limited state financing.This paper defines adaptation and discusses the basic principles and programs in the identification of national priority areas where adaptation ,should be exercised.Based on the past studies,four priority areas in China are identified,namely,disaster prevention and mitigation,water resources,agriculture,and ecosystem.An analysis on the identification procedures,and the reasons and tasks involved are given for each.

  3. Leveraging modern climatology to increase adaptive capacity across protected area networks

    Science.gov (United States)

    Davison, J.E.; Graumlich, L.J.; Rowland, E.L.; Pederson, G.T.; Breshears, D.D.

    2012-01-01

    Human-driven changes in the global environment pose an increasingly urgent challenge for the management of ecosystems that is made all the more difficult by the uncertain future of both environmental conditions and ecological responses. Land managers need strategies to increase regional adaptive capacity, but relevant and rapid assessment approaches are lacking. To address this need, we developed a method to assess regional protected area networks across biophysically important climatic gradients often linked to biodiversity and ecosystem function. We plot the land of the southwestern United States across axes of historical climate space, and identify landscapes that may serve as strategic additions to current protected area portfolios. Considering climate space is straightforward, and it can be applied using a variety of relevant climate parameters across differing levels of land protection status. The resulting maps identify lands that are climatically distinct from existing protected areas, and may be utilized in combination with other ecological and socio-economic information essential to collaborative landscape-scale decision-making. Alongside other strategies intended to protect species of special concern, natural resources, and other ecosystem services, the methods presented herein provide another important hedging strategy intended to increase the adaptive capacity of protected area networks. ?? 2011 Elsevier Ltd.

  4. Application of Induced Containment Therapy with adapted protocol for home care and its contributions to the motor condition and patient rehabilitation after encephalic vascular accident

    Directory of Open Access Journals (Sweden)

    Daniela Tonús

    2015-09-01

    Full Text Available Introduction: Encephalic Vascular Accident (EVA is among the most important diseases that cause physical and functional limitations. Hemiplegia is the most common physical changes post-EVA, as compromises the upper and lower limbs at the same side of the body, characterized by a rigid pattern of the flexor muscles of the upper limb and the extensor muscles of the lower limb. The Induced Containment Therapy has been a major rehabilitation technique recently aiming to promote functional improvement of the hemiplegic limb of those who suffered EVA and enable performance and quality of life of the individual. Objective: This study aimed to identify the possible contributions of Induced Containment Therapy using a protocol adapted to technique application to the hemiplegic limb. Moreover, this research points out the influence of the environment interventions, which on the present study, occurred in the participant’s home. Method: this is a case study with exploratory feature. Results and Conclusion: The results indicated improvements in functional ability at the time of execution of the tasks and increased use of hemiplegic limb, increasing motor performance after applying the Induced Containment Therapy adapted protocol compared to the start of treatment

  5. Climate adaptation in NVE's areas of responsibility - Strategy 2010 - 2014; Klimatilpasning innen NVEs ansvarsomraader - Strategi 2010 - 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hamarsland, Arne T. (ed.)

    2010-09-15

    NVE has developed a comprehensive climate change strategies within their areas of responsibility. There is a systematic review of how a future climate change will affect NVE management areas; how to meet challenges, vulnerabilities, opportunities and proposals for adaptation measures. Climate adaptation is a dynamic process. It is therefore necessary to follow up the work continuously and correct direction at regular intervals. Climate change adaptation strategy of adaptation measures is a foundation and a direction sensor in NVE's business planning. (AG)

  6. Muscular strength adaptations and hormonal responses after two different multiple-set protocols of resistance training in postmenopausal women.

    Science.gov (United States)

    Nunes, Paulo Ricardo P; Barcelos, Larissa C; Oliveira, Anselmo A; Júnior, Roberto Furlanetto; Martins, Fernanda M; Resende, Elizabete Ap M R; Orsatti, Fábio L

    2017-01-20

    We studied the effects of two different resistance training (RT) multiple-set protocols (three and six sets) on muscle strength and basal hormones concentrations in postmenopausal women (PW). Thirty-four PW were randomly allocated into three groups: control (CT, n=12), low RT volume (LV = three sets for each exercise, n=10) and high RT volume (HV = six sets for each exercise, n=12). The LV and HV groups performed eight exercises of a total body RT protocol three times a week, at 70 % of one repetition maximum (1RM) for 16 weeks. The muscle strength and basal hormones concentration were measured before and after the RT. Our findings show that three sets or six sets at 70% of 1RM protocol increased muscular strength similarly after 16 weeks (sum of all exercises, LV: 37.7% and HV: 34.1% vs. CT: 2.1%, p < 0.001). Moreover, the RT volume does not affect basal levels of testosterone (TT) (LV: 0.02%, HV: -0.12% and CT: 0.006%, p = 0.233), cortisol (C) (LV: 72.4%, HV: 36.8% and CT: 16.8%, p = 0.892), insulin-like growth factor-1 (LV: 6.7%, HV: 7.3% and CT: 4.1%, p = 0.802), dehydroepiandrosterone sulfate (LV: 0.1%, HV: -4.5% and CT: -6.7%, p = 0.885) and TT:C ratio (LV: -0.9%, HV: -1.6% and CT: -0.4%, p = 0.429). Our results suggest that three sets and six sets at 70% of 1RM seem to promote similar muscle strength gain. Thus, three set RT is a time efficient protocol for strength gain after 16 weeks in PW.

  7. Adapted strategic plannig model applied to small business: a case study in the fitness area

    Directory of Open Access Journals (Sweden)

    Eduarda Tirelli Hennig

    2012-06-01

    Full Text Available The strategic planning is an important management tool in the corporate scenario and shall not be restricted to big Companies. However, this kind of planning process in small business may need special adaptations due to their own characteristics. This paper aims to identify and adapt the existent models of strategic planning to the scenario of a small business in the fitness area. Initially, it is accomplished a comparative study among models of different authors to identify theirs phases and activities. Then, it is defined which of these phases and activities should be present in a model that will be utilized in a small business. That model was applied to a Pilates studio; it involves the establishment of an organizational identity, an environmental analysis as well as the definition of strategic goals, strategies and actions to reach them. Finally, benefits to the organization could be identified, as well as hurdles in the implementation of the tool.

  8. TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs

    Directory of Open Access Journals (Sweden)

    Helen Bakhsh

    2015-08-01

    Full Text Available Mobile ad hoc networks (MANETs have a number of features that make the provisioning of Quality of Services (QoS particularly challenging. One of the most challenging issues is how to discover more reliable paths for high priority traffic delivery in a highly mobile network and do so with minimum overhead costs. This paper attempts to address this issue by designing and evaluating a multi-path discovery protocol. This protocol, named as Trust-Aware Dynamic Location-based protocol version 2 (TADL-V2, is an improved version of our earlier published protocol, TADL. TADL-V2 has improved TADL in two aspects: (1 it uses a hybrid approach to node-disjoint path discovery based on the network mobility level and (2 it uses a mobility based approach to search area resizing. These measures enable TADL-V2 to discover more paths with reduced number of control packets injected into the network. Our simulation study shows that TADL-V2 outperforms TADL in terms of reducing control overheads when the network is highly mobile. This overhead reduction can have a positive effect on QoS provisioning.

  9. Adaptive Critic Neural Network-Based Terminal Area Energy Management and Approach and Landing Guidance

    Science.gov (United States)

    Grantham, Katie

    2003-01-01

    Reusable Launch Vehicles (RLVs) have different mission requirements than the Space Shuttle, which is used for benchmark guidance design. Therefore, alternative Terminal Area Energy Management (TAEM) and Approach and Landing (A/L) Guidance schemes can be examined in the interest of cost reduction. A neural network based solution for a finite horizon trajectory optimization problem is presented in this paper. In this approach the optimal trajectory of the vehicle is produced by adaptive critic based neural networks, which were trained off-line to maintain a gradual glideslope.

  10. Assessment of protocols in cone-beam CT with symmetric and asymmetric beams usingeffective dose and air kerma-area product.

    Science.gov (United States)

    Batista, Wilson Otto; Soares, Maria Rosangela; de Oliveira, Marcus V L; Maia, Ana F; Caldas, Linda V E

    2015-06-01

    This study aims to evaluate and compare protocols with similar purposes in a cone beam CT scanner using thermoluminescent dosimeter (TLD) and the air kerma-area product (PKA) as the kerma index. The measurements were performed on two protocols used to obtain an image of the maxilla-mandible using the equipment GENDEX GXCB 500: Protocol [GX1] extended diameter and asymmetric beam (14cm×8.5cm-maxilla/mandible) and protocol [GX2] symmetrical beam (8.5cm×8.5cm-maxillary/mandible). LiF dosimeters inserted into a female anthropomorphic phantom were used. For both protocols, the value of PKA was evaluated using a PTW Diamentor E2 meter and the multimeter Radcal Rapidose system. The results obtained for the effective dose/PKA were separated by protocol image. [GX1]: 44.5µSv/478mGycm(2); [GX2]: 54.8µSv/507mGycm(2). Although the ratio of the diameters (14cm/8.5cm)=1.65, the ratio of effective dose values (44.5µSv/54.8µSv)=0.81, that is, the effective dose of the protocol with extended diameter is 19% smaller. The PKA values reveal very similar results between the two protocols. For the cases where the scanner uses an asymmetric beam to obtain images with large diameters that cover the entire face, there are advantages from the point of view of reducing the exposure of patients when compared to the use of symmetrical beam and/or to FOV images with a smaller diameter.

  11. Fast protocol for extraction of DNA from Prosopis spp leaves (plant adapted to arid environment) without liquid nitrogen.

    Science.gov (United States)

    Michel-López, C Y; González-Mendoza, D; Grimaldo-Juarez, O

    2013-09-27

    The extraction of high-quality genomic DNA from Prosopis spp for polymerase chain reaction (PCR) amplification is complicated, owing to the presence of a high percentage of secondary metabolites that bind to or co-precipitate with nucleic acids. In the present study, we report a modified sodium dodecyl sulfate/phenol protocol that eliminates the use of liquid nitrogen in the maceration process, β-mercaptoethanol in the buffer extraction, and the ethanol precipitation step. The A₂₆₀/A₂₈₀ absorbance ratios of the isolated DNA were approximately 2.0 to 1.9, suggesting that the DNA fraction was pure and can be used for further PCR analysis. The DNA isolated by this protocol is of sufficient quality for molecular applications; this technique could be applied to other organisms that have similar substances that hinder DNA extraction. Finally, this proposal represents an alternative fast, cheap, and effective method for the isolation of genomic DNA from fresh leaves of Prosopis spp, even in low-technology laboratories.

  12. Adaptability of Paulownia tomentosa (thumb. Sieb. et Zucc. on green areas in Belgrade

    Directory of Open Access Journals (Sweden)

    Stojičić Đurđa

    2010-01-01

    Full Text Available The taxa with the improved esthetical characteristics, increased or decreased productivity, higher resistance to diseases, insect attacks, air pollution, as well as with optimal adaptability in urban coenoses are of great importance to land­scape architecture, horticulture and forestry. The criteria for the selection of individual plants out of the number of many individuals depend on their future usage, but also on their esthetical features, morphology and physiology. One of the species that fulfils the above criteria is Paulownia tomentosa (Thumb. Sieb. et Zucc. Different morphophysiological features of royal paulownia cultivated on green areas in Banovo Brdo, Dorćol, Tašmajdan, Novi Beograd and Zemun are analyzed. The study results prove the adaptability of royal paulownia on green areas in Belgrade, but also the need to select the parent trees with the best combining features prior to production, aiming at the improvement and production of planting material for urban coenoses and specific-purpose plantations of this species.

  13. Building the framework for climate change adaptation in the urban areas using participatory approach: the Czech Republic experience

    Science.gov (United States)

    Emmer, Adam; Hubatová, Marie; Lupač, Miroslav; Pondělíček, Michael; Šafařík, Miroslav; Šilhánková, Vladimíra; Vačkář, David

    2016-04-01

    The Czech Republic has experienced numerous extreme hydrometeorological / climatological events such as floods (significant ones in 1997, 2002, 2010, 2013), droughts (2013, 2015), heat waves (2015) and windstorms (2007) during past decades. These events are generally attributed to the ongoing climate change and caused loss of lives and significant material damages (up to several % of GDP in some years), especially in urban areas. To initiate the adaptation process of urban areas, the main objective was to prepare a framework for creating climate change adaptation strategies of individual cities reflecting physical-geographical and socioeconomical conditions of the Czech Republic. Three pilot cities (Hradec Králové, Žďár nad Sázavou, Dobru\\vska) were used to optimize entire procedure. Two sets of participatory seminars were organised in order to involve all key stakeholders (the city council, department of the environment, department of the crisis management, hydrometeorological institute, local experts, ...) into the process of creation of the adaptation strategy from its early stage. Lesson learned for the framework were related especially to its applicability on a local level, which is largely a matter of the understandability of the concept. Finally, this illustrative and widely applicable framework (so called 'road map to adaptation strategy') includes five steps: (i) analysis of existing strategies and plans on national, regional and local levels; (ii) analysing climate-change related hazards and key vulnerabilities; (iii) identification of adaptation needs, evaluation of existing adaptation capacity and formulation of future adaptation priorities; (iv) identification of limits and barriers for the adaptation (economical, environmental, ...); and (v) selection of specific types of adaptation measures reflecting identified adaptation needs and formulated adaptation priorities. Keywords: climate change adaptation (CCA); urban areas; participatory approach

  14. Adapter Design Based on Wireless HART Protocol%基于无线HART协议的适配器设计

    Institute of Scientific and Technical Information of China (English)

    薛定国; 牛斗

    2011-01-01

    基于无线HART协议的适配器,以MSP430F系列单片机为核心,结合CC2520数据收发模块和信号分离/合成模块,实现了上位机对HART仪表中数字信息的管理.适配器通过微处理器控制数据收/发模块与上位机通信,解析上位机指令,控制信号分离/合成模块实现对HART仪表数字信息的读取和写入.基于无线HART协议的适配器在HART仪表的维护和监控过程中有较高的应用价值.%The adapter based on wireless HART uses the microcontroller MSP430F MCUs as the core, combined with CC2520 data transceiver modules and signal separation/synthesis modules,realizing the management of digital information from the host computer to the HART instrument. The adapter communicates with the host computer by controlling the data transceiver modules through the microcontroller and analyzes its commands. It implements read and write of the digital information from the HART instruments by controlling the signal separation/synthesis modules. The adapter based on wireless HART has a high application value in HART instrument maintenance and monitoring.

  15. Effects of Global Change on U.S. Urban Areas: Vulnerabilities, Impacts, and Adaptation

    Science.gov (United States)

    Quattrochi, Dale A.; Wilbanks, Thomas J.; Kirshen, Paul; Romero-Lankao, Patricia; Rosenzweig, Cynthia; Ruth, Mattias; Solecki, William; Tarr, Joel

    2008-01-01

    This slide presentation reviews some of the effects that global change has on urban areas in the United States and how the growth of urban areas will affect the environment. It presents the elements of our Synthesis and Assessment Report (SAP) report that relate to what vulnerabilities and impacts will occur, what adaptation responses may take place, and what possible effects on settlement patterns and characteristics will potentially arise, on human settlements in the U.S. as a result of climate change and climate variability. We will also present some recommendations about what should be done to further research on how climate change and variability will impact human settlements in the U.S., as well as how to engage government officials, policy and decision makers, and the general public in understanding the implications of climate change and variability on the local and regional levels. Additionally, we wish to explore how technology such as remote sensing data coupled with modeling, can be employed as synthesis tools for deriving insight across a spectrum of impacts (e.g. public health, urban planning for mitigation strategies) on how cities can cope and adapt to climate change and variability. This latter point parallels the concepts and ideas presented in the U.S. National Academy of Sciences, Decadal Survey report on "Earth Science Applications from Space: National Imperatives for the Next Decade and Beyond" wherein the analysis of the impacts of climate change and variability, human health, and land use change are listed as key areas for development of future Earth observing remote sensing systems.

  16. PM10 modeling in the Oviedo urban area (Northern Spain) by using multivariate adaptive regression splines

    Science.gov (United States)

    Nieto, Paulino José García; Antón, Juan Carlos Álvarez; Vilán, José Antonio Vilán; García-Gonzalo, Esperanza

    2014-10-01

    The aim of this research work is to build a regression model of the particulate matter up to 10 micrometers in size (PM10) by using the multivariate adaptive regression splines (MARS) technique in the Oviedo urban area (Northern Spain) at local scale. This research work explores the use of a nonparametric regression algorithm known as multivariate adaptive regression splines (MARS) which has the ability to approximate the relationship between the inputs and outputs, and express the relationship mathematically. In this sense, hazardous air pollutants or toxic air contaminants refer to any substance that may cause or contribute to an increase in mortality or serious illness, or that may pose a present or potential hazard to human health. To accomplish the objective of this study, the experimental dataset of nitrogen oxides (NOx), carbon monoxide (CO), sulfur dioxide (SO2), ozone (O3) and dust (PM10) were collected over 3 years (2006-2008) and they are used to create a highly nonlinear model of the PM10 in the Oviedo urban nucleus (Northern Spain) based on the MARS technique. One main objective of this model is to obtain a preliminary estimate of the dependence between PM10 pollutant in the Oviedo urban area at local scale. A second aim is to determine the factors with the greatest bearing on air quality with a view to proposing health and lifestyle improvements. The United States National Ambient Air Quality Standards (NAAQS) establishes the limit values of the main pollutants in the atmosphere in order to ensure the health of healthy people. Firstly, this MARS regression model captures the main perception of statistical learning theory in order to obtain a good prediction of the dependence among the main pollutants in the Oviedo urban area. Secondly, the main advantages of MARS are its capacity to produce simple, easy-to-interpret models, its ability to estimate the contributions of the input variables, and its computational efficiency. Finally, on the basis of

  17. The network structure of adaptive governance - A single case study of a fish management area

    Directory of Open Access Journals (Sweden)

    Annica Charlotte Sandström

    2009-09-01

    Full Text Available The challenge of establishing adaptive management systems is a widely discussed topic in the literature on natural resource management. Adaptive management essentially focuses on achieving a governance process that is both sensitive to and has the capacity to continuously react to changes within the ecosystem being managed. The adoption of a network approach that perceives governance structures as social networks, searching for the kind of network features promoting this important feature, has been requested by researchers in the field. In particular, the possibilities associated with the application of a formal network approach, using the tools and concepts of social network analysis (SNA, have been identified as having significant potential for advancing this branch of research. This paper aims to address the relation between network structure and adaptability using an empirical approach. With the point of departure in a previously generated theoretical framework as well as related hypotheses, this paper presents a case study of a governance process within a fish management area in Sweden. The hypotheses state that, although higher levels of network density and centralisation promote the rule-forming process, the level of network heterogeneity is important for the existence and spread of ecological knowledge among the actors involved. According to the empirical results, restricted by the single-case study design, this assumption is still a well-working hypothesis. However, in order to advance our knowledge concerning these issues and test the validity of the hypotheses, more empirical work using a similar approach in multiple case study designs is needed.

  18. An integrated method for assessing climate-related risks and adaptation alternatives in urban areas

    Directory of Open Access Journals (Sweden)

    Yvonne Andersson-Sköld

    2015-01-01

    Full Text Available The urban environment is a complex structure with interlinked social, ecological and technical structures. Global warming is expected to have a broad variety of impacts, which will add to the complexity. Climate changes will force adaptation, to reduce climate-related risks. Adaptation measures can address one aspect at the time, or aim for a holistic approach to avoid maladaptation. This paper presents a systematic, integrated approach for assessing alternatives for reducing the risks of heat waves, flooding and air pollution in urban settings, with the aim of reducing the risk of maladaptation. The study includes strategies covering different spatial scales, and both the current climate situation and the climate predicted under climate change scenarios. The adaptation strategies investigated included increasing vegetation; selecting density, height and colour of buildings; and retreat or resist (defend against sea-level rise. Their effectiveness was assessed with regard to not only flooding, heat stress and air quality but also with regard to resource use, emissions to air (incl. GHG, soil and water, and people’s perceptions and vulnerability. The effectiveness of the strategies were ranked on a common scale (from −3 to 3 in an integrated assessment. Integrated assessments are recommended, as they help identify the most sustainable solutions, but to reduce the risk of maladaptation they require experts from a variety of disciplines. The most generally applicable recommendation, derived from the integrated assessment here, taking into account both expertise from different municipal departments, literature surveys, life cycle assessments and publics perceptions, is to increase the urban greenery, as it contributes to several positive aspects such as heat stress mitigation, air quality improvement, effective storm-water and flood-risk management, and it has several positive social impacts. The most favourable alternative was compact, mid

  19. Priority-based adaptive transmission algorithm for medical devices in wireless body area networks (WBANs)

    Institute of Scientific and Technical Information of China (English)

    KIM Jinhyuk; SONG Inseong; CHOI Sangbang

    2015-01-01

    A wireless body area network offers cost-effective solutions for healthcare infrastructure. An adaptive transmission algorithm is designed to handle channel efficiency, which adjusts packet size according to the difference in feature-point values that indicate biomedical signal characteristics. Furthermore, we propose a priority-adjustment method that enhances quality of service while guaranteeing signal integrity. A large number of simulations were carried out for performance evaluation. We use electrocardiogram and electromyogram signals as reference biomedical signals for performance verification. From the simulation results, we find that the average packet latency of proposed scheme is enhanced by 30% compared to conventional method. The simulation results also demonstrate that the proposed algorithm achieves significant performance improvement in terms of drop rates of high-priority packets around 0.3%-0.9 %.

  20. Adaptive management of the Great Barrier Reef and the Grand Canyon world heritage areas.

    Science.gov (United States)

    Hughes, Terence P; Gunderson, Lance H; Folke, Carl; Baird, Andrew H; Bellwood, David; Berkes, Fikret; Crona, Beatrice; Helfgott, Ariella; Leslie, Heather; Norberg, Jon; Nyström, Magnus; Olsson, Per; Osterblom, Henrik; Scheffer, Marten; Schuttenberg, Heidi; Steneck, Robert S; Tengö, Maria; Troell, Max; Walker, Brian; Wilson, James; Worm, Boris

    2007-11-01

    Conventional perceptions of the interactions between people and their environment are rapidly transforming. Old paradigms that view humans as separate from nature, natural resources as inexhaustible or endlessly substitutable, and the world as stable, predictable, and in balance are no longer tenable. New conceptual frameworks are rapidly emerging based on an adaptive approach that focuses on learning and flexible management in a dynamic social-ecological landscape. Using two iconic World Heritage Areas as case studies (the Great Barrier Reef and the Grand Canyon) we outline how an improved integration of the scientific and social aspects of natural resource management can guide the evolution of multiscale systems of governance that confront and cope with uncertainty, risk, and change in an increasingly human-dominated world.

  1. Evaluation of a Chest Circumference-Adapted Protocol for Low-Dose 128-Slice Coronary CT Angiography with Prospective Electrocardiogram Triggering

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Chenying; Wang, Zufei; Ji, Jiansong; Wang, Hailin; Hu, Xianghua; Chen, Chunmiao [Department of Radiology, Lishui Central Hospital, The Fifth Affiliated Hospital of Wenzhou Medical College, Lishui, Zhejiang 323000 (China)

    2015-11-01

    To assess the effect of chest circumference-adapted scanning protocol on radiation exposure and image quality in patients undergoing prospective electrocardiogram (ECG)-triggered coronary CT angiography (CCTA). One hundred-eighty-five consecutive patients, who had undergone prospective ECG triggering CCTA with a 128-slice CT, were included in the present study. Nipple-level chest circumference, body weight and height were measured before CT examinations. Patients were divided into four groups based on kV/ref·mAs = 100/200, 100/250, 120/200, and 120/250, when patient's chest circumference was ≤ 85.0 (n = 56), 85.0-90.0 (n = 53), 90.0-95.0 (n = 44), and > 95.0 (n = 32), respectively. Image quality per-segment was independently assessed by two experienced observers. Image noise and attenuation were also measured. Signal-to-noise ratio (SNR) and contrast-to-noise ratio (CNR) were calculated. The effective radiation dose was calculated using CT dose volume index and the dose-length product. A significant correlation was observed between patients' chest circumference and body mass index (r = 0.762, p < 0.001). Chest circumference ranged from 74 to 105 cm, and the mean effective radiation dose was 1.9-3.8 mSv. Diagnostic image quality was obtained in 98.5% (2440/2478) of all evaluated coronary segments without any significant differences among the four groups (p = 0.650). No significant difference in image noise was observed among the four groups (p = 0.439), thus supporting the validity of the chest circumference-adapted scanning protocol. However, vessel attenuation, SNR and CNR were significantly higher in the 100 kV groups than in the 120 kV groups (p < 0.05). A measure of chest circumference can be used to adapt tube voltage and current for individualized radiation dose control, with resultant similar image noise and sustained diagnostic image quality.

  2. Integrating Collaboration, Adaptive Management, and Scenario-Planning: Experiences at Las Cienegas National Conservation Area

    Directory of Open Access Journals (Sweden)

    Jeremy K. Caves

    2013-09-01

    Full Text Available There is growing recognition that public lands cannot be managed as islands; rather, land management must address the ecological, social, and temporal complexity that often spans jurisdictions and traditional planning horizons. Collaborative decision making and adaptive management (CAM have been promoted as methods to reconcile competing societal demands and respond to complex ecosystem dynamics. We detail the experiences of land managers and stakeholders in using CAM at Las Cienegas National Conservation Area (LCNCA, a highly valued site under the jurisdiction of the Bureau of Land Management (BLM. The CAM process at Las Cienegas is marked by strong stakeholder engagement, with four core elements: (1 shared watershed goals with measurable resource objectives; (2 relevant and reliable scientific information; (3 mechanisms to incorporate new information into decision making; and (4 shared learning to improve both the process and management actions. The combination of stakeholder engagement and adaptive management has led to agreement on contentious issues, more innovative solutions, and more effective land management. However, the region is now experiencing rapid changes outside managers' control, including climate change, human population growth, and reduced federal budgets, with large but unpredictable impacts on natural resources. Although the CAM experience provides a strong foundation for making the difficult and contentious management decisions that such changes are likely to require, neither collaboration nor adaptive management provides a sufficient structure for addressing the externalities that drive uncontrollable and unpredictable change. As a result, LCNCA is exploring two specific modifications to CAM that may better address emerging challenges, including: (1 creating nested resource objectives to distinguish between those objectives that may be crucial to maintaining ecological resilience from those that may hinder a flexible

  3. Air quality modeling in the Oviedo urban area (NW Spain) by using multivariate adaptive regression splines.

    Science.gov (United States)

    Nieto, P J García; Antón, J C Álvarez; Vilán, J A Vilán; García-Gonzalo, E

    2015-05-01

    The aim of this research work is to build a regression model of air quality by using the multivariate adaptive regression splines (MARS) technique in the Oviedo urban area (northern Spain) at a local scale. To accomplish the objective of this study, the experimental data set made up of nitrogen oxides (NO x ), carbon monoxide (CO), sulfur dioxide (SO2), ozone (O3), and dust (PM10) was collected over 3 years (2006-2008). The US National Ambient Air Quality Standards (NAAQS) establishes the limit values of the main pollutants in the atmosphere in order to ensure the health of healthy people. Firstly, this MARS regression model captures the main perception of statistical learning theory in order to obtain a good prediction of the dependence among the main pollutants in the Oviedo urban area. Secondly, the main advantages of MARS are its capacity to produce simple, easy-to-interpret models, its ability to estimate the contributions of the input variables, and its computational efficiency. Finally, on the basis of these numerical calculations, using the MARS technique, conclusions of this research work are exposed.

  4. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  5. SU-E-J-249: Characterization of Gynecological Tumor Heterogeneity Using Texture Analysis in the Context of An 18F-FDG PET Adaptive Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Nawrocki, J [Duke University Medical Physics Graduate Program, Durham, NC (United States); Chino, J; Craciunescu, O [Duke University Medical Center Department of Radiation Oncology, Durham, NC (United States); Das, S [University of North Carolina School of Medicine, Chapel Hill, NC (United States)

    2015-06-15

    Purpose: We propose a method to examine gynecological tumor heterogeneity using texture analysis in the context of an adaptive PET protocol in order to establish if texture metrics from baseline PET-CT predict tumor response better than SUV metrics alone as well as determine texture features correlating with tumor response during radiation therapy. Methods: This IRB approved protocol included 29 women with node positive gynecological cancers visible on FDG-PET treated with EBRT to the PET positive nodes. A baseline and intra-treatment PET-CT was obtained. Tumor outcome was determined based on RECIST on posttreatment PET-CT. Primary GTVs were segmented using 40% threshold and a semi-automatic gradient-based contouring tool, PET Edge (MIM Software Inc., Cleveland, OH). SUV histogram features, Metabolic Volume (MV), and Total Lesion Glycolysis (TLG) were calculated. Four 3D texture matrices describing local and regional relationships between voxel intensities in the GTV were generated: co-occurrence, run length, size zone, and neighborhood difference. From these, 39 texture features were calculated. Prognostic power of baseline features derived from gradientbased and threshold GTVs were determined using the Wilcoxon rank-sum test. Receiver Operating Characteristics and logistic regression was performed using JMP (SAS Institute Inc., Cary, NC) to find probabilities of predicting response. Changes in features during treatment were determined using the Wilcoxon signed-rank test. Results: Of the 29 patients, there were 16 complete responders, 7 partial responders, and 6 non-responders. Comparing CR/PR vs. NR for gradient-based GTVs, 7 texture values, TLG, and SUV kurtosis had a p < 0.05. Threshold GTVs yielded 4 texture features and TLG with p < 0.05. From baseline to intra-treatment, 14 texture features, SUVmean, SUVmax, MV, and TLG changed with p < 0.05. Conclusion: Texture analysis of PET imaged gynecological tumors is an effective method for early prognosis and should

  6. Herbaceous plant species invading natural areas tend to have stronger adaptive root foraging than other naturalized species.

    Science.gov (United States)

    Keser, Lidewij H; Visser, Eric J W; Dawson, Wayne; Song, Yao-Bin; Yu, Fei-Hai; Fischer, Markus; Dong, Ming; van Kleunen, Mark

    2015-01-01

    Although plastic root-foraging responses are thought to be adaptive, as they may optimize nutrient capture of plants, this has rarely been tested. We investigated whether nutrient-foraging responses are adaptive, and whether they pre-adapt alien species to become natural-area invaders. We grew 12 pairs of congeneric species (i.e., 24 species) native to Europe in heterogeneous and homogeneous nutrient environments, and compared their foraging responses and performance. One species in each pair is a USA natural-area invader, and the other one is not. Within species, individuals with strong foraging responses, measured as plasticity in root diameter and specific root length, had a higher biomass. Among species, the ones with strong foraging responses, measured as plasticity in root length and root biomass, had a higher biomass. Our results therefore suggest that root foraging is an adaptive trait. Invasive species showed significantly stronger root-foraging responses than non-invasive species when measured as root diameter. Biomass accumulation was decreased in the heterogeneous vs. the homogeneous environment. In aboveground, but not belowground and total biomass, this decrease was smaller in invasive than in non-invasive species. Our results show that strong plastic root-foraging responses are adaptive, and suggest that it might aid in pre-adapting species to becoming natural-area invaders.

  7. Clinical Implementation of an Online Adaptive Plan-of-the-Day Protocol for Nonrigid Motion Management in Locally Advanced Cervical Cancer IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Heijkoop, Sabrina T., E-mail: s.heijkoop@erasmusmc.nl; Langerak, Thomas R.; Quint, Sandra; Bondar, Luiza; Mens, Jan Willem M.; Heijmen, Ben J.M.; Hoogeman, Mischa S.

    2014-11-01

    Purpose: To evaluate the clinical implementation of an online adaptive plan-of-the-day protocol for nonrigid target motion management in locally advanced cervical cancer intensity modulated radiation therapy (IMRT). Methods and Materials: Each of the 64 patients had four markers implanted in the vaginal fornix to verify the position of the cervix during treatment. Full and empty bladder computed tomography (CT) scans were acquired prior to treatment to build a bladder volume-dependent cervix-uterus motion model for establishment of the plan library. In the first phase of clinical implementation, the library consisted of one IMRT plan based on a single model-predicted internal target volume (mpITV), covering the target for the whole pretreatment observed bladder volume range, and a 3D conformal radiation therapy (3DCRT) motion-robust backup plan based on the same mpITV. The planning target volume (PTV) combined the ITV and nodal clinical target volume (CTV), expanded with a 1-cm margin. In the second phase, for patients showing >2.5-cm bladder-induced cervix-uterus motion during planning, two IMRT plans were constructed, based on mpITVs for empty-to-half-full and half-full-to-full bladder. In both phases, a daily cone beam CT (CBCT) scan was acquired to first position the patient based on bony anatomy and nodal targets and then select the appropriate plan. Daily post-treatment CBCT was used to verify plan selection. Results: Twenty-four and 40 patients were included in the first and second phase, respectively. In the second phase, 11 patients had two IMRT plans. Overall, an IMRT plan was used in 82.4% of fractions. The main reasons for selecting the motion-robust backup plan were uterus outside the PTV (27.5%) and markers outside their margin (21.3%). In patients with two IMRT plans, the half-full-to-full bladder plan was selected on average in 45% of the first 12 fractions, which was reduced to 35% in the last treatment fractions. Conclusions: The implemented

  8. SU-E-J-124: FDG PET Metrics Analysis in the Context of An Adaptive PET Protocol for Node Positive Gynecologic Cancer Patients

    Energy Technology Data Exchange (ETDEWEB)

    Nawrocki, J; Chino, J; Light, K; Vergalasova, I; Craciunescu, O [Duke University Medical Center, Durham, NC (United States)

    2014-06-01

    Purpose: To compare PET extracted metrics and investigate the role of a gradient-based PET segmentation tool, PET Edge (MIM Software Inc., Cleveland, OH), in the context of an adaptive PET protocol for node positive gynecologic cancer patients. Methods: An IRB approved protocol enrolled women with gynecological, PET visible malignancies. A PET-CT was obtained for treatment planning prescribed to 45–50.4Gy with a 55– 70Gy boost to the PET positive nodes. An intra-treatment PET-CT was obtained between 30–36Gy, and all volumes re-contoured. Standard uptake values (SUVmax, SUVmean, SUVmedian) and GTV volumes were extracted from the clinician contoured GTVs on the pre- and intra-treament PET-CT for primaries and nodes and compared with a two tailed Wilcoxon signed-rank test. The differences between primary and node GTV volumes contoured in the treatment planning system and those volumes generated using PET Edge were also investigated. Bland-Altman plots were used to describe significant differences between the two contouring methods. Results: Thirteen women were enrolled in this study. The median baseline/intra-treatment primary (SUVmax, mean, median) were (30.5, 9.09, 7.83)/( 16.6, 4.35, 3.74), and nodes were (20.1, 4.64, 3.93)/( 6.78, 3.13, 3.26). The p values were all < 0.001. The clinical contours were all larger than the PET Edge generated ones, with mean difference of +20.6 ml for primary, and +23.5 ml for nodes. The Bland-Altman revealed changes between clinician/PET Edge contours to be mostly within the margins of the coefficient of variability. However, there was a proportional trend, i.e. the larger the GTV, the larger the clinical contours as compared to PET Edge contours. Conclusion: Primary and node SUV values taken from the intratreament PET-CT can be used to assess the disease response and to design an adaptive plan. The PET Edge tool can streamline the contouring process and lead to smaller, less user-dependent contours.

  9. Recurrent glomerular disease after kidney transplantation: an update of selected areas and the impact of protocol biopsy.

    Science.gov (United States)

    Morozumi, Kunio; Takeda, Asami; Otsuka, Yasuhiro; Horike, Keiji; Gotoh, Norihiko; Watarai, Yoshihiko

    2014-06-01

    Recurrence of native kidney disease following kidney transplantation affects between 10% and 20% of patients, and accounts for up to 8% of graft failures. In a considerable number of recipients with transplant glomerulopathy, it is impossible to distinguish between recurrent and de novo types. An accurate estimate of the incidence of recurrence is difficult due to limitations in the diagnosis of recurrent glomerulonephritis. De novo glomerular lesions may be misclassified if histological confirmation of the patient's native kidney disease is lacking. Asymptomatic histological recurrence in renal allografts may be missed if protocol biopsies are not available. Studies based on protocol biopsy are pivotal to accurately estimate the incidence of recurrence. Many factors are known to influence recurrence of kidney disease after transplantation, including the type and severity of the original disease, age at onset, interval from onset to end-stage renal disease, and clinical course of the previous transplantation. Early recognition of recurrence is possible in several glomerular diseases. Factors such as the existence of circulating permeability factors, circulating urokinase receptor and anti-phospholipase A2 receptor antibody, as well as disorders of complement regulatory proteins like factor I mutation and factor H mutation factors are expected to be useful predictors of recurrence. Peculiar clinical course of atypical haemolytic uremic syndrome after kidney transplantation is an informative sign of recurrent glomerular disease. These factors play pivotal roles in the development of recurrence of certain types of glomerulopathies. Understanding the pathogenesis of recurrent glomerulonephritis is critical to optimize prevention as well as treat individual cases of recurrent glomerulonephritis. Subclinical recurrence of IgA nephropathy after kidney transplantation is well recognized. Only protocol biopsies of clinically silent recipient can provide the accurate

  10. Erosion and Land Degradation in Mediterranean areas as a adaptive response to Mediterranean agriiculture

    Science.gov (United States)

    Imeson, Anton

    2014-05-01

    The motivation for this session is the statement or claim that Mediterranean areas are sensitive to erosion and desertification. One result of the LEDDRA Approach, which is applying the Complex Adaptive (CAS)paradigm at study sites in Mediterranean Spain, Greece and Italy is that there is just a single socio-environmental system in which land degradation is being caused by the actions of people and the Mediterranean soils have co-eveolved with people under the influence of fire and grazing. They are therefore resilient, and this was demonstrated by Naveh and Thornes. Also the Medalus field sites showed very low rates of erosion. With examples from different Mediterranean landscapes, it is considered that Mediterranean landscapes went through an initial phase of being sensitive to erosion which ended up with the original soils before ploughing or deforestation, being eroded from most of the areas, In some places these are found. LEDDRA The Leddra approach is to consider different states which are separated by transitions. The first state is that of the deforestaion and destruction of the forest that took place 6000 10000 years ago, in the Eastern and Northern Mediterranean, and 2000 to 4,000 years ago in large areas of the Western Mediterranean, and 100 to 400 years ago in California. Australia, New Zealand and Chile. The second state involves appropriating and settling the land from indigenous people and introducing cattle and sheep and Mediterranean crops. The current state of desertification is one in which erosion occurs because of the use of specific cultivation methods and subsidies for irrigating and producing crops outside of their range. In the Mediterranean landscape State, such as found near Santiago in Chile and in Crete, society gains many cultural benefits from grazing. However, the consequences of this are that the whole ecosystem is maintained in an arid state, so that areas in Crete receiving 800-1100 mm rainfall have a semi arid vegetation, instead

  11. Modelling a quantitative ensilability index adapted to forages from wet temperate areas

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Fernandez, A.; Soldado, A.; Roza-Delgado, B. de la; Vicente, F.; Gonzalez-Arrojo, M. A.; Argamenteria, A.

    2013-06-01

    Forage ensilability mainly depends on dry matter (DM), water soluble carbohydrates (WSC) and buffer capacity (BC) values at harvest time. According to these parameters, and based on a collection of 208 forages of known ensilability characteristics including short and long term meadows for grazing, italian ryegrass, maize, triticale, soybean, faba bean crops, and samples coming from cereal-legume associations, the objective of this study has been to define a quantitative ensilability index (EI) based on a relationship between DM, WSC and BC contents at harvest date, adapted to the characteristics of fodder from wet temperate areas. For this purpose, a discriminant procedure was used to define this EI based on a linear combination of DM, WSC and BC of forages at harvest time. The quantitative calculated indexes distinguish five successive ranges of ensilability: high ensilability (EI > +28), medium high ensilability (+9 < EI . +28), medium ensilability (.28 < EI . +9), medium low ensilability (-47 {<=} EI {<=}-28) and low ensilability (EI < .47). This quantitative index was externally evaluated and 100% of samples were successfully classified. (Author) 28 refs.

  12. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  13. Prevention of: self harm in British South Asian women: study protocol of an exploratory RCT of culturally adapted manual assisted Problem Solving Training (C- MAP

    Directory of Open Access Journals (Sweden)

    Nagaraj Diwaker

    2011-06-01

    Full Text Available Abstract Background Suicide is a major public health problem worldwide. In the UK suicide is the second most common cause of death in people aged 15-24 years. Self harm is one of the commonest reasons for medical admission in the UK. In the year following a suicide attempt the risk of a repeat attempt or death by suicide may be up to 100 times greater than in people who have never attempted suicide. Research evidence shows increased risk of suicide and attempted suicide among British South Asian women. There are concerns about the current service provision and its appropriateness for this community due to the low numbers that get involved with the services. Both problem solving and interpersonal forms of psychotherapy are beneficial in the treatment of patients who self harm and could potentially be helpful in this ethnic group. The paper describes the trial protocol of adapting and evaluating a culturally appropriate psychological treatment for the adult British South Asian women who self harm. Methods We plan to test a culturally adapted Problem Solving Therapy (C- MAP in British South Asian women who self harm. Eight sessions of problem solving each lasting approximately 50 minutes will be delivered over 3 months. The intervention will be assessed using a prospective rater blind randomized controlled design comparing with treatment as usual (TAU. Outcome assessments will be carried out at 3 and 6 months. A sub group of the participants will be invited for qualitative interviews. Discussion This study will test the feasibility and acceptability of the C- MAP in British South Asian women. We will be informed on whether a culturally adapted brief psychological intervention compared with treatment as usual for self-harm results in decreased hopelessness and suicidal ideation. This will also enable us to collect necessary information on recruitment, effect size, the optimal delivery method and acceptability of the intervention in preparation for a

  14. Systematic testing of flood adaptation options in urban areas through simulations

    Science.gov (United States)

    Löwe, Roland; Urich, Christian; Sto. Domingo, Nina; Mark, Ole; Deletic, Ana; Arnbjerg-Nielsen, Karsten

    2016-04-01

    While models can quantify flood risk in great detail, the results are subject to a number of deep uncertainties. Climate dependent drivers such as sea level and rainfall intensities, population growth and economic development all have a strong influence on future flood risk, but future developments can only be estimated coarsely. In such a situation, robust decision making frameworks call for the systematic evaluation of mitigation measures against ensembles of potential futures. We have coupled the urban development software DAnCE4Water and the 1D-2D hydraulic simulation package MIKE FLOOD to create a framework that allows for such systematic evaluations, considering mitigation measures under a variety of climate futures and urban development scenarios. A wide spectrum of mitigation measures can be considered in this setup, ranging from structural measures such as modifications of the sewer network over local retention of rainwater and the modification of surface flow paths to policy measures such as restrictions on urban development in flood prone areas or master plans that encourage compact development. The setup was tested in a 300 ha residential catchment in Melbourne, Australia. The results clearly demonstrate the importance of considering a range of potential futures in the planning process. For example, local rainwater retention measures strongly reduce flood risk a scenario with moderate increase of rain intensities and moderate urban growth, but their performance strongly varies, yielding very little improvement in situations with pronounced climate change. The systematic testing of adaptation measures further allows for the identification of so-called adaptation tipping points, i.e. levels for the drivers of flood risk where the desired level of flood risk is exceeded despite the implementation of (a combination of) mitigation measures. Assuming a range of development rates for the drivers of flood risk, such tipping points can be translated into

  15. Effects of Global Change on U.S. Urban Areas: Vulnerabilities, Impacts, and Adaptation

    Science.gov (United States)

    Quattrochi, Dale A.; Wilbanks, Thomas J.; Kirshen, Paul; Romero-Lnkao, Patricia; Rosenzweig, Cynthia; Ruth, Matthias; Solecki, William; Tarr, Joel

    2007-01-01

    .g. public health, urban planning for mitigation strategies) on how cities can cope and adapt to climate change and variability. This latter point parallels the concepts and ideas presented in the U.S. National Academy of Sciences, Decadal Survey report on "Earth Science Applications from Space: National Imperatives for the Next Decade and Beyond" wherein the analysis of the impacts of climate change and variability, human health, and land use change are listed as key areas for development of future Earth observing remote sensing systems.

  16. Adaptive Levy processes and area-restricted search in human foraging.

    Directory of Open Access Journals (Sweden)

    Thomas T Hills

    Full Text Available A considerable amount of research has claimed that animals' foraging behaviors display movement lengths with power-law distributed tails, characteristic of Lévy flights and Lévy walks. Though these claims have recently come into question, the proposal that many animals forage using Lévy processes nonetheless remains. A Lévy process does not consider when or where resources are encountered, and samples movement lengths independently of past experience. However, Lévy processes too have come into question based on the observation that in patchy resource environments resource-sensitive foraging strategies, like area-restricted search, perform better than Lévy flights yet can still generate heavy-tailed distributions of movement lengths. To investigate these questions further, we tracked humans as they searched for hidden resources in an open-field virtual environment, with either patchy or dispersed resource distributions. Supporting previous research, for both conditions logarithmic binning methods were consistent with Lévy flights and rank-frequency methods-comparing alternative distributions using maximum likelihood methods-showed the strongest support for bounded power-law distributions (truncated Lévy flights. However, goodness-of-fit tests found that even bounded power-law distributions only accurately characterized movement behavior for 4 (out of 32 participants. Moreover, paths in the patchy environment (but not the dispersed environment showed a transition to intensive search following resource encounters, characteristic of area-restricted search. Transferring paths between environments revealed that paths generated in the patchy environment were adapted to that environment. Our results suggest that though power-law distributions do not accurately reflect human search, Lévy processes may still describe movement in dispersed environments, but not in patchy environments-where search was area-restricted. Furthermore, our results

  17. Systems to establish bioclimatic analogies to predict the area of adaptability of plant species to new environments: The case of Moringa oleifera Lam. in Chile

    Directory of Open Access Journals (Sweden)

    Fernando Santibañez

    2015-12-01

    Full Text Available Adaptability of a species to new territories is generally assessed by costly trial and error in situ experiments distributed throughout different agroclimatic environments. Nowadays climatic data are available to allow the construction of climatic maps based on data provided through world or local networks of climatic weather stations. The objective of this work was to establish a bioclimatic protocol, based on current and available sources of climate information, to make rapid surveys of suitability for plant species in a given environment. Moringa oleifera Lam. species, native from India, was chosen considering its rusticity and the increasing interest on this species due to its multiple uses, nutritional value, and medicinal properties. The first phase of this work was a compilation of data from climatic downscaling (WorldClim, University of East Anglia database (CRU, FAO database, and an historic datasets from Chilean meteorological stations. This information was used to test two different models to compare bioclimatic profiles, considering relevant climatic variables for plant adaptation: maximum and minimum temperatures, accumulated degree days, frost regime, and air humidity. The first approach, based on climatic analogy, was to compare each of these variables between Chilean and foreign localities, and the second, based on bioclimatic suitability, focus on the degree of meeting the minimum bioclimatic requirements by the species in each locality. This paper provides some tools to make this kind of comparisons. Both approaches were tested using M. oleifera as target. Both approaches were complementary and prove to be useful for identifying potential areas where the species could be cultivated. The use of these approaches suggested the existence of some bioclimatic suitability for this species in the coastal areas with mild winters and frosts, from 27° to 37° S lat.

  18. Resilience of Infrastructure Systems to Sea-Level Rise in Coastal Areas: Impacts, Adaptation Measures, and Implementation Challenges

    Directory of Open Access Journals (Sweden)

    Beatriz Azevedo de Almeida

    2016-11-01

    Full Text Available Expansive areas of low elevation in many densely populated coastal areas are at elevated risk of storm surges and flooding due to torrential precipitation, as a result of sea level rise. These phenomena could have catastrophic impacts on coastal communities and result in the destruction of critical infrastructure, disruption of economic activities and salt water contamination of the water supply. The objective of the study presented in this paper was to identify various impacts of sea level rise on civil infrastructures in coastal areas and examine the adaptation measures suggested in the existing literature. To this end, a systemic review of the existing literature was conducted in order to identify a repository of studies addressing sea level rise impacts and adaptation measures in the context of infrastructure systems. The study focused on three infrastructure sectors: water and wastewater, energy, and road transportation. The collected information was then analyzed in order to identify different categories of sea level rise impacts and corresponding adaptation measures. The findings of the study are threefold: (1 the major categories of sea level rise impacts on different infrastructure systems; (2 measures for protection, accommodation, and retreat in response to sea level rise impacts; and (3 challenges related to implementing adaptation measures.

  19. 基于自适应信标交换的方向广播协议%Directional broadcasting protocol based on adaptive beacon exchange

    Institute of Scientific and Technical Information of China (English)

    吴学文; 顾欣

    2015-01-01

    A novel directional broadcast considering intersection via adaptive beaconing (DB-IA)based on the analysis of consi-dering crossroads broadcast protocol was proposed.Adaptive beacon exchange mechanism was used to obtain the information of network topology,and node with the longest distance was selected to broadcast packet for each road,greatly reducing broadcast hop.DB-IA adopted acknowledgement (ACK)packets to ensure the reliability of broadcast.The combination of bi-directional propagation and carry-and-forward resolved the problem of network fragment.DB-IA controled the rebroadcast sequence by set-ting incremental backoff counter implicitly,in which way the relay nodes rebroadcasted in a timely and orderly fashion.Simula-tion results indicate that DB-IA performs better on effectiveness and reliability in different scenarios,which means it is suitable for traffic safety messages.%在分析考虑十字路口的广播协议的基础上,提出一种基于自适应信标交换的方向广播协议DB-IA。通过自适应信标交换机制获取网络拓扑信息,在各路段上选择最远节点转播分组,较大程度上减少广播跳数。采用ACK确认机制,结合双向传输和存储-转发策略缓解网络空洞造成的广播中断问题,提高广播的可靠性。通过设置递增的退避时间控制转播队列,使转播快速、有序完成。仿真结果表明,DB-IA具有相对较好且稳定的性能,适合交通安全类信息传输。

  20. Variation of forest surface and carbon fixation in mountain areas of the Regione Veneto (Italy and the application of the Kyoto protocol

    Directory of Open Access Journals (Sweden)

    Anfodillo T

    2007-01-01

    Full Text Available The Parties that have signed the Kyoto Protocol must reduce global emissions of Greenhouse Gasses (GHG during the First Commitment Period (2008 - 2012 by at least 5% with respect to 1990. This share is 6.5% for Italy. The Kyoto Protocol lays down some measures for reducing GHG emissions, which include actions in agriculture and forestry. it will thus be possible to take emissions and absorptions resulting from land use changes into account in the National Balances. Given the widespread forests in Italy, it is very important to have an assessment of the aptitude of this sector to act as a carbon sink. In this study we analysed the variation of forestland cover in a mountain area of the Veneto Region (NE Italy. The analysis was done by comparing aerial photos taken in 1991 with orthophotos reported to 2003, by photointerpretation of points with casual distribution on sample areas, according to a stratified sampling. We estimated a statistically relevant increment of about 0.095% of forest land only up to 1500 m compared to the estimated forest cover for 1990 (about 42 ha, underlining how this low increase is mainly due to forest management. The second step was to estimate the fixed carbon in the areas where forests increased. This was achieved by collecting biometrical data in the field, and then using allometric functions. The annual carbon sink was estimated as 0.69 Mg ha-1 year-1. Comparing these results with previous studies done in the pre-alpine region we estimate the annual increment of the forest area in the whole Veneto region to be about 409.94 ha and that the total carbon sink is about 282.86 Mg C year-1. A method for estimating carbon sink in afforestation/reforestation areas is proposed that could also be applied to other sites in Italy.

  1. Eco Bio Cultural Protocols for Preservation of Endangered Agrobiodiversity Areas from the Adjacent Regions of Danube and Danube Delta

    Directory of Open Access Journals (Sweden)

    Iudith Ipate

    2014-08-01

    Full Text Available Danube Strategy involves creating synergies between different sectors (tourism, environmental protection, agriculture and forestry, promoting solutions and contributing to the prosperity of social, economic and cultural sustainable development. It requires multiinterdisciplinary problem solving biodiversity conservation and environmental protection. Agrobiodiversity conservation and means must be assessed according to international risk categories, taking into account the culture, traditions and local lifestyle. Fundamental aspects of the protocols will be to assess species and breeds endangered and their influence on specific ecosystems of the Danube and Danube Delta to promote local tradition and cultural heritage. Our studies will have to reveal new interdependencies between socio- economic phenomena that occur in the context of regional sustainable development and identify viable solutions to ensure the conservation of agrobiodiversity as part of the natural and cultural heritage of the Danube Delta . Need of cooperation between Danube countries and between local authorities and research entities to conserve natural and cultural heritage that can be achieved based on eco-bio-diplomacy. Need of cooperation between Danube countries and between local authorities and research entities to conserve natural and cultural heritage that can be achieved based on eco-bio-diplomacy.

  2. Adaptation to climate change related risks in Dutch urban areas: stimuli and barriers

    NARCIS (Netherlands)

    Runhaar, H.A.C.; Mees, H.L.P.; Wardekker, J.A.; Sluijs, J.P. van der; Driessen, P.P.J.

    2012-01-01

    Climate change is associated with various risks, such as flooding and heat stress. So far, most research has concentrated on the identification and quantification of these risks as well as the development of adaptation measures. Yet much less is known about how planners actually perceive and deal wi

  3. FLOOD RISK FACTORS IN SUBURBAN AREA IN THE CONTEXT OF CLIMATE CHANGE ADAPTATION POLICIES – CASE STUDY OF WROCLAW, POLAND

    Directory of Open Access Journals (Sweden)

    Szymon Szewrański

    2015-02-01

    Full Text Available The uncontrolled sprawl of urban development exerts environmental impact in rural areas. The aim of this study is to identify areas vulnerable to climate change in the context of implementation of policies adapting to climate change at the local level. Such areas can be defined as those where the negative implication of flesh flood overlapping with soil sealing is observed. The study areas composed of municipalities which are influenced by the urban sprawl process of the city of Wroclaw, Poland. The analyses were performed using publicly available spatial data from aerial orthophotomaps from 2004–2012, the satellite images; archival and current land use maps. The database CORINE 1990, 2000, 2006; Urban Atlas and geodatabase of the European Environment Agency were also of an important usage for this study.

  4. A Review of Assessment and Adaptation Strategy to Climate Change Impacts on the Coastal Areas in South China

    Institute of Scientific and Technical Information of China (English)

    DU Yao-Dong; CHENG Xu-Hua; WANG Xian-Wei; AI Hui; DUAN Hai-Lai; HE Jian; WU Xiao-Xuan

    2013-01-01

    This paper reviews assessment of climate change impacts on economy, society and ecological environment in the coastal areas of South China based on published literatures;it also proposes suitable adaptation strategies and counter-measures. Review shows that climate change has resulted in sea level rise in the coastal areas of South China, increasing the occurrence and intensity of storm surges, aggravating the influence of saltwater intrusion, coastal erosion, urban drainage and flood control, threatening the coastal facility and infrastructures, inundating lowland areas, offsetting mudflat silting, and degrading mangroves and coral reef ecosystem. Therefore, in order to reduce the adverse effects of climate change and to support the sustainable development in the coastal areas of South China, it is critical to improve the monitoring and early warning system, enhance prevention criteria, fortify coastal protection engineering, strengthen salt tide prevention, and reinforce the ecological restoration and protection.

  5. SU-E-J-262: Variability in Texture Analysis of Gynecological Tumors in the Context of An 18F-FDG PET Adaptive Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Nawrocki, J [Duke University Medical Physics Graduate Program, Durham, NC (United States); Chino, J; Das, S; Craciunescu, O [Duke University Medical Center, Durham, NC (United States)

    2015-06-15

    Purpose: This study examines the effect on texture analysis due to variable reconstruction of PET images in the context of an adaptive FDG PET protocol for node positive gynecologic cancer patients. By measuring variability in texture features from baseline and intra-treatment PET-CT, we can isolate unreliable texture features due to large variation. Methods: A subset of seven patients with node positive gynecological cancers visible on PET was selected for this study. Prescribed dose varied between 45–50.4Gy, with a 55–70Gy boost to the PET positive nodes. A baseline and intratreatment (between 30–36Gy) PET-CT were obtained on a Siemens Biograph mCT. Each clinical PET image set was reconstructed 6 times using a TrueX+TOF algorithm with varying iterations and Gaussian filter. Baseline and intra-treatment primary GTVs were segmented using PET Edge (MIM Software Inc., Cleveland, OH), a semi-automatic gradient-based algorithm, on the clinical PET and transferred to the other reconstructed sets. Using an in-house MATLAB program, four 3D texture matrices describing relationships between voxel intensities in the GTV were generated: co-occurrence, run length, size zone, and neighborhood difference. From these, 39 textural features characterizing texture were calculated in addition to SUV histogram features. The percent variability among parameters was first calculated. Each reconstructed texture feature from baseline and intra-treatment per patient was normalized to the clinical baseline scan and compared using the Wilcoxon signed-rank test in order to isolate variations due to reconstruction parameters. Results: For the baseline scans, 13 texture features showed a mean range greater than 10%. For the intra scans, 28 texture features showed a mean range greater than 10%. Comparing baseline to intra scans, 25 texture features showed p <0.05. Conclusion: Variability due to different reconstruction parameters increased with treatment, however, the majority of texture

  6. The investigation of congenital infection by Trypanosoma cruzi in an endemic area of Chile: three protocols explored in a pilot project

    Science.gov (United States)

    Zulantay, I; Corral, G; Guzman, M C; Aldunate, F; Guerra, W; Cruz, I; Araya, A; Tapia, V; Marquez, F; Muñoz, C; Apt, W

    2011-01-01

    Given the increasing travel of pregnant women from areas were Trypanosoma cruzi is endemic, the congenital transmission of the parasite has become a global public-health problem. In a recent pilot study, which ran in Chile from 2006 to 2010, three strategies for exploring and managing T. cruzi-infected mothers and their infected or uninfected neonates were investigated. Any protocols applied to the investigation of such mother-and-child pairs need to include the detection of infection in pregnant women, the detection of infection, if any, in the children born to the women, the appropriate treatment of the infected neonates, and the serological–parasitological follow-up of all of the neonates until their medical discharge. PMID:21396248

  7. Adaptive Sampling-Based Information Collection for Wireless Body Area Networks.

    Science.gov (United States)

    Xu, Xiaobin; Zhao, Fang; Wang, Wendong; Tian, Hui

    2016-08-31

    To collect important health information, WBAN applications typically sense data at a high frequency. However, limited by the quality of wireless link, the uploading of sensed data has an upper frequency. To reduce upload frequency, most of the existing WBAN data collection approaches collect data with a tolerable error. These approaches can guarantee precision of the collected data, but they are not able to ensure that the upload frequency is within the upper frequency. Some traditional sampling based approaches can control upload frequency directly, however, they usually have a high loss of information. Since the core task of WBAN applications is to collect health information, this paper aims to collect optimized information under the limitation of upload frequency. The importance of sensed data is defined according to information theory for the first time. Information-aware adaptive sampling is proposed to collect uniformly distributed data. Then we propose Adaptive Sampling-based Information Collection (ASIC) which consists of two algorithms. An adaptive sampling probability algorithm is proposed to compute sampling probabilities of different sensed values. A multiple uniform sampling algorithm provides uniform samplings for values in different intervals. Experiments based on a real dataset show that the proposed approach has higher performance in terms of data coverage and information quantity. The parameter analysis shows the optimized parameter settings and the discussion shows the underlying reason of high performance in the proposed approach.

  8. Cost-Optimizing Adaptive Location Service Protocol in MANET%开销优化的MANET按需位置服务协议

    Institute of Scientific and Technical Information of China (English)

    宗明; 王晓东; 周兴铭

    2012-01-01

    Location service protocols in mobile ad hoc network maintain nodes' positions. The performance of upper layer protocols depends on the performance of location service. Protocol cost is defined as the number of one-hop location querying packages and location updating packages. It is one of the most important performance indices of location service protocol and determines the scalability and other performance of the protocol. Without considering location reguest, existing location service protocols optimize protocol cost for networks with specific communication features. For optimizing the location service protocol cost in networks with different communication features, this paper proposes a minimum cost location updating tree. It is used to optimize protocol cost of multi-home region location service protocol according to the number of location querying to each home region and the protocol package transmission costs. Then, it is proved that the minimum cost location updating tree problem is an NP-hard problem. Based on these works, this paper then proposes a demand-driven multi-home region location service protocol. This protocol uses a kind of real time algorithm to get the minimum cost location updating tree just before location updating, and then forwards location updating packages according to the tree. The experimental results show that the proposed protocol can decrease the protocol cost and is more scalable.%在移动自组网中,位置服务协议的开销是指更新和查询所发送的一跳报文数量,决定协议的可扩展性及其各方面性能.现有的位置服务协议只针对特定的通信场景,并且绝大部分不能根据位置需求的变化进一步优化开销.提出在基于多家乡区域的位置服务结构基础上,根据位置服务协议的报文传输开销以及位置信息请求在家乡区域中的分布情况,采用最小更新树来优化协议开销,并证明求解最小更新树的问题是NP难问题.在此基础上,

  9. 物联网广泛协议标准化适配接口系统设计与研究%Board protocol standard adaptation interface system design and research of internet of things

    Institute of Scientific and Technical Information of China (English)

    段为

    2016-01-01

    针对目前物联网发展过程中终端协议繁多、不统一且复杂等问题,本论文采用了NIO、NoSQL、XML和JavaEE等技术,对物联网广泛协议的标准化适配进行了研究与实现。研究结果阐明了物联网广泛协议标准化适配的重要意义,为物联网上层应用提供了简单、快速、高效的基础平台。%According to current development of internet of things with various, incongruous and complex terminal protocol, this paper had researched and implemented board protocol standard adaptation of internet of things using the technology of NIO, NoSQL, XML and JavaEE. The research results illustrate the important significance of board protocol standard adaptation of internet of things, which provides a simple, quick and effi cient platform for the application of internet of things.

  10. A study on immigration from rural to urban areas and the adaptation process of immigrants: Van example

    Directory of Open Access Journals (Sweden)

    Erol Etlan

    2009-10-01

    Full Text Available In this study, events terror which occurred in the region after 1980 and the migrations due to the effects of these events the socio-cultural and economic conditions of immigrants their adaptation to the city other problems was analyzed. Acceleration in the migrations from rural to urban areas in Van coincides with the years after 1980. The insecure environment and the broken economic balance has made rural are completely unpopular and repulsive. In this process, one of the cities which people leaving from rural areas chose to live first was Van.Screening method was used in the study. For this purpose a poll of 50 questions was prepared. The poll constituted with 4 parts for measuring the immigrants demographic, social-cultural and economic aspects and their adaptation process. The poll was applied to 290 subjects from 7 quarters where immigrants live intensely, and SPSS program was used in their evaluation.Immigrants usually come from the rural areas of Hakkari, Siirt, Bitlis and Van and are settled in sub-urban neighborhoods. The urban infrastructure problems which had already existed previously became much more complicated in the city with migrations. In addition, migrations caused many social-cultural an economic problem in the city. The immigrants who brought with themselves their own culture and lifestyles transformed the city into a village with the slums they constructed. Though they got rid of their rural habits, they still could not become accustomed to the civic environment.

  11. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  12. Mirror neurons in monkey area F5 do not adapt to the observation of repeated actions.

    Science.gov (United States)

    Caggiano, Vittorio; Pomper, Joern K; Fleischer, Falk; Fogassi, Leonardo; Giese, Martin; Thier, Peter

    2013-01-01

    Repetitive presentation of the same visual stimulus entails a response decrease in the action potential discharge of neurons in various areas of the monkey visual cortex. It is still unclear whether this repetition suppression effect is also present in single neurons in cortical premotor areas responding to visual stimuli, as suggested by the human functional magnetic resonance imaging literature. Here we report the responses of 'mirror neurons' in monkey area F5 to the repeated presentation of action movies. We find that most single neurons and the population at large do not show a significant decrease of the firing rate. On the other hand, simultaneously recorded local field potentials exhibit repetition suppression. As local field potentials are believed to be better linked to the blood-oxygen-level-dependent (BOLD) signal exploited by functional magnetic resonance imaging, these findings suggest caution when trying to derive conclusions on the spiking activity of neurons in a given area based on the observation of BOLD repetition suppression.

  13. Towards a New Policy for Climate Adaptive Water Management in Flanders: The Concept of Signal Areas

    NARCIS (Netherlands)

    de smedt, P.G.A.

    2014-01-01

    Climate change has a significant impact on the hydrological cycle and consequently on the future use of space. Flanders, like the Netherlands, is a low-lying area, and is therefore more vulnerable to changes in sea level, river discharge and rainfall. Furthermore, the so-called ‘Flemish Rhomb’, situ

  14. Kirtland's Warbler Annual Census - Seney National Wildlife Refuge (Kirtland's Warbler Wildlife Management Area)

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Adaptation of Kirtland's Warbler Recovery Team census protocol as applied to Seney National Wildlife Refuge and Kirtland's Warbler Wildlife Management Area

  15. Bromo volcano area as human-environment system: interaction of volcanic eruption, local knowledge, risk perception and adaptation strategy

    Science.gov (United States)

    Bachri, Syamsul; Stötter, Johann; Sartohadi, Junun

    2013-04-01

    People in the Bromo area (located within Tengger Caldera) have learn to live with the threat of volcanic hazard since this volcano is categorized as an active volcano in Indonesia. During 2010, the eruption intensity increased yielding heavy ash fall and glowing rock fragments. A significant risk is also presented by mass movement which reaches areas up to 25 km from the crater. As a result of the 2010 eruption, 12 houses were destroyed, 25 houses collapsed and there were severe also effects on agriculture and the livestock sector. This paper focuses on understanding the interaction of Bromo volcanic eruption processes and their social responses. The specific aims are to 1) identify the 2010 eruption of Bromo 2) examine the human-volcano relationship within Bromo area in general, and 3) investigate the local knowledge related to hazard, risk perception and their adaptation strategies in specific. In-depth interviews with 33 informants from four districts nearest to the crater included local people and authorities were carried out. The survey focused on farmers, key persons (dukun), students and teachers in order to understand how people respond to Bromo eruption. The results show that the eruption in 2010 was unusual as it took continued for nine months, the longest period in Bromo history. The type of eruption was phreatomagmatic producing material dominated by ash to fine sand. This kind of sediment typically belongs to Tengger mountain eruptions which had produced vast explosions in the past. Furthermore, two years after the eruption, the interviewed people explained that local knowledge and their experiences with volcanic activity do not influence their risk perception. Dealing with this eruption, people in the Bromo area applied 'lumbung desa' (traditional saving systems) and mutual aid activity for surviving the volcanic eruption. Keywords: Human-environment system, local knowledge, risk perception, adaptation strategies, Bromo Volcano Indonesia

  16. Idaho National Laboratory Test Area North: Application of Endpoints to Guide Adaptive Remediation at a Complex Site: INL Test Area North: Application of Endpoints

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M. Hope [PNNL Soil and Groundwater Program; Truex, Mike [PNNL; Freshley, Mark [PNNL; Wellman, Dawn [PNNL

    2016-09-01

    Complex sites are defined as those with difficult subsurface access, deep and/or thick zones of contamination, large areal extent, subsurface heterogeneities that limit the effectiveness of remediation, or where long-term remedies are needed to address contamination (e.g., because of long-term sources or large extent). The Test Area North at the Idaho National Laboratory, developed for nuclear fuel operations and heavy metal manufacturing, is used as a case study. Liquid wastes and sludge from experimental facilities were disposed in an injection well, which contaminated the subsurface aquifer located deep within fractured basalt. The wastes included organic, inorganic, and low-level radioactive constituents, with the focus of this case study on trichloroethylene. The site is used as an example of a systems-based framework that provides a structured approach to regulatory processes established for remediation under existing regulations. The framework is intended to facilitate remedy decisions and implementation at complex sites where restoration may be uncertain, require long timeframes, or involve use of adaptive management approaches. The framework facilitates site, regulator, and stakeholder interactions during the remedial planning and implementation process by using a conceptual model description as a technical foundation for decisions, identifying endpoints, which are interim remediation targets or intermediate decision points on the path to an ultimate end, and maintaining protectiveness during the remediation process. At the Test Area North, using a structured approach to implementing concepts in the endpoint framework, a three-component remedy is largely functioning as intended and is projected to meet remedial action objectives by 2095 as required. The remedy approach is being adjusted as new data become available. The framework provides a structured process for evaluating and adjusting the remediation approach, allowing site owners, regulators, and

  17. Application of Advanced Wide Area Early Warning Systems with Adaptive Protection

    Energy Technology Data Exchange (ETDEWEB)

    Blumstein, Carl [Univ. of California, Berkeley, CA (United States); Cibulka, Lloyd [Univ. of California, Berkeley, CA (United States); Thorp, James [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Centeno, Virgilio [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); King, Roger [Mississippi State Univ., Mississippi State, MS (United States); Reeves, Kari [Mississippi State Univ., Mississippi State, MS (United States); Ashrafi, Frank [Southern California Edison Co., Rosemead, CA (United States); Madani, Vahid [Pacific Gas & Electric Co., San Francisco, CA (United States)

    2014-09-30

    Recent blackouts of power systems in North America and throughout the world have shown how critical a reliable power system is to modern societies, and the enormous economic and societal damage a blackout can cause. It has been noted that unanticipated operation of protection systems can contribute to cascading phenomena and, ultimately, blackouts. This project developed and field-tested two methods of Adaptive Protection systems utilizing synchrophasor data. One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify relay response in real time to avoid false trips. The second method detects the possibility of false trips of impedance relays as stable system swings “encroach” on the relays’ impedance zones, and produces an early warning so that relay engineers can re-evaluate relay settings. In addition, real-time synchrophasor data produced by this project was used to develop advanced visualization techniques for display of synchrophasor data to utility operators and engineers.

  18. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  19. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  20. Adaptive method for quantifying uncertainty in discharge measurements using velocity-area method.

    Science.gov (United States)

    Despax, Aurélien; Favre, Anne-Catherine; Belleville, Arnaud

    2015-04-01

    Streamflow information provided by hydrometric services such as EDF-DTG allow real time monitoring of rivers, streamflow forecasting, paramount hydrological studies and engineering design. In open channels, the traditional approach to measure flow uses a rating curve, which is an indirect method to estimate the discharge in rivers based on water level and punctual discharge measurements. A large proportion of these discharge measurements are performed using the velocity-area method; it consists in integrating flow velocities and depths through the cross-section [1]. The velocity field is estimated by choosing a number m of verticals, distributed across the river, where vertical velocity profile is sampled by a current-meter at ni different depths. Uncertainties coming from several sources are related to the measurement process. To date, the framework for assessing uncertainty in velocity-area discharge measurements is the method presented in the ISO 748 standard [2] which follows the GUM [3] approach. The equation for the combined uncertainty in measured discharge u(Q), at 68% level of confidence, proposed by the ISO 748 standard is expressed as: Σ 2 2 2 -q2i[u2(Bi)+-u2(Di)+-u2p(Vi)+-(1ni) ×-[u2c(Vi)+-u2exp(Vi)

  1. Adaption strategies to the effect of climate change on a coastal area in Northwest Germany with different land management scenarios

    Science.gov (United States)

    Graeff, Thomas; Krause, Stefan; Maier, Martin; Oswald, Sascha

    2015-04-01

    Coastal areas are highly vulnerable to the impact of climate change and handling is difficult. Adaption to two different situations has to be taken into account. On the one hand, increasing global sea level in combination with increased precipitation and higher storm surge frequency has to be handled. On the other hand, in summer periods due to the increase of temperature, enhanced evapotranspiration and an increase of salty seawater intrusion into groundwater have to be managed. In this study we present different landuse management scenarios on a coastal area in Northwest Germany, East Frisia, and their effect on the hydrological response. Landuse is dominated by dairy farming and intensive crop farming. 30 percent of the area lies below sea level. A dense channel network in combination with several pumping stations allows permeant drainage. The soils are characterised by marsh soils and impermeable layers which prevent an interaction with the confined brackish aquifer. Observations in those areas indicate a high salinity with concentrations peaking during the summer period. The landuse strategies include a scenario that the technological level of the management will be adapted to rainfall and sea level but without additional drainage from the hinterland to reduce salt water concentration. A second scenario includes the adaptation to increasing precipitation and the sea level with a polder system and wetland areas designated as potential buffer for winter storm surges and inland floods and as freshwater storage for dry summer periods. Two scenarios use large polder areas in the future as potential buffer for winter storm surges and inland floods and as freshwater storage for dry summer periods, additional usage for nature conservation and as the storage of carbon sequestration or extensive farming are planned. Also, stakeholders have developed a system of several smaller polders in combination with an intensification of the water resource management, and this is

  2. The P-A-C-I-E-N-T-E Protocol: An instrument for breaking bad news adapted to the Brazilian medical reality

    Directory of Open Access Journals (Sweden)

    Carolina Rebello Pereira

    Full Text Available Summary Objective: There are plenty of published tools for breaking bad medical news; however, none of them is culturally appropriate to our reality or published in the Brazilian literature. This study proposes a genuinely Brazilian communication tool and evaluates its acceptance among doctors and nurses. Method: This was a prospective study. The data were collected after specific training of doctors and nurses on the bad news communication techniques based on the P-A-C-I-E-N-T-E ("patient," in Portuguese Protocol. This instrument is in accordance with the Brazilian reality and was based on the SPIKES communication tool. Results: The worst task to be performed during communication is "talking about death" followed by "discussing the end of curative treatment attempts" and "diagnosis" itself. Among the respondents, 48% reported they did not receive formal training for communicating. Also, 52% of respondents do not use any systematic approach in their daily practice when communicating with patients, but 97% considered the proposed P-A-C-I-E-N-T-E Protocol as a useful and appropriate communication tool. Conclusion: The P-A-C-I-E-N-T-E Protocol proved to be suitable to the Brazilian context.

  3. Broad-area search for targets in SAR imagery with context-adaptive algorithms

    Science.gov (United States)

    Patterson, Tim J.; Fairchild, Scott R.

    1996-06-01

    This paper describes an ATR system based on gray scale morphology which has proven very effective in performing broad area search for targets of interest. Gray scale morphology is used to extract several distinctive sets of features which combine intensity and spatial information. Results of direct comparisons with other algorithms are presented. In a series of tests which were scored independently the morphological approach has shown superior results. An automated training systems based on a combination of genetic algorithms and classification and regression trees is described. Further performance gains are expected by allowing context sensitive selection of parameter sets for the morphological processing. Context is acquired from the image using texture measures to identify the local clutter environment. The system is designed to be able to build new classifiers on the fly to match specific image to image variations.

  4. Adapted hydropower-driven water supply system: assessment of an underground application in an Indonesian karst area

    Science.gov (United States)

    Oberle, P.; Ikhwan, M.; Stoffel, D.; Nestmann, F.

    2016-09-01

    Populated karst landscapes can be found all over the world, although their natural boundary conditions mostly lead to distinct challenges regarding a sustainable water supply. Especially in developing and emerging countries, this situation aggravates since appropriate technologies and water management concepts are rarely available. Against this background, the interdisciplinary, German-Indonesian joint project " Integrated Water Resources Management (IWRM) Indonesia", funded by the German Federal Ministry of Education and Research (BMBF), focused on the development and exemplary implementation of adapted techniques to remedy the partly severe water scarcity in the region Gunung Sewu. This karst area, widely known as " Java's poorhouse", is located on the southern coast of Java Island and distinctly suffers from the mentioned constraints. Under the aegis of the Karlsruhe Institute of Technology (KIT), the conceptual and technical achievements of the "IWRM Indonesia" joint research project are characterized by a high potential for multiplication not only for karst areas but also for non-karst regions. One of the project's major accomplishments is the erection of an innovative hydropower-driven water supply facility located in a karst cave 100 m below ground and continuously supplying tens of thousands of people with fresh water. Referring to the plant's innovative character and the demanding conditions on-site, the implementation was a highly iterative process leading to today's autonomous operation by an Indonesian public authority. Based on the experiences gained during design, construction, operation and monitoring phase, this paper introduces an implementation approach for adapted technologies as well as a comprising technical and economical assessment of the plant's operation.

  5. URBAN EFFICIENT ENERGY EVALUATION IN HIGH RESOLUTION URBAN AREAS BY USING ADAPTED WRF-UCM AND MICROSYS CFD MODELS

    Science.gov (United States)

    San Jose, R.; Perez, J. L.; Gonzalez, R. M.

    2009-12-01

    Urban metabolism modeling has advanced substantially during the last years due to the increased detail in mesoscale urban parameterization in meteorological mesoscale models and CFD numerical tools. Recently the implementation of the “urban canopy model” (UCM) into the WRF mesoscale meteorological model has produced a substantial advance on the understanding of the urban atmospheric heat flux exchanges in the urban canopy. The need to optimize the use of heat energy in urban environment has produced a substantial increase in the detailed investigation of the urban heat flux exchanges. In this contribution we will show the performance of using a tool called MICROSYS (MICRO scale CFD modelling SYStem) which is an adaptation of the classical urban canopy model but on a high resolution environment by using a classical CFD approach. The energy balance in the urban system can be determined in a micrometeorologicl sense by considering the energy flows in and out of a control volume. For such a control volume reaching from ground to a certain height above buildings, the energy balance equation includes the net radiation, the anthropogenic heat flux, the turbulent sensible heat flux, the turbulent latent heat flux, the net storage change within the control volume, the net advected flux and other sources and sinks. We have applied the MICROSYS model to an area of 5 km x 5 km with 200 m spatial resolution by using the WRF-UCM (adapted and the MICROSYS CFD model. The anthropogenic heat flux has been estimated by using the Flanner M.G. (2009) database and detailed GIS information (50 m resolution) of Madrid city. The Storage energy has been estimated by calculating the energy balance according to the UCM procedure and implementing it into the MICROSYS tool. Results show that MICROSYS can be used as an energy efficient tool to estimate the energy balance of different urban areas and buildings.

  6. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  7. Secure Data Aggregation Protocol for M2M Communications

    Science.gov (United States)

    2015-03-24

    networking and collaboration among various devices has experienced tremendous growth. To adapt to the trend, the concept of Internet of Things ( IoT ...attention, has remained many security and privacy challenges. Since most devices in IoT are often deployed at unattended areas, they are vulnerable to the...application domain. 15. SUBJECT TERMS Aggregation Protocol, Data Integrity, Intelligent Device , Fault-Tolerant Computing, Multi

  8. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  9. Models for dose assessments. Models adapted to the SFR-area, Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Karlsson, Sara; Bergstroem, U.; Meili, M. [Studsvik Eco and Safety AB, Nykoeping (Sweden)

    2001-10-01

    This report presents a model system created to be used to predict dose rates to the most exposed individuals in case of a long-term release of radionuclides from the Final repository for radioactive operational waste (SFR) in Forsmark, Sweden. The system accounts for an underground point source emitting radionuclides to the biosphere,their transport and distribution in various ecosystem types, their uptake by various biota, and calculation of doses to man from a multitude of exposure pathways. Long-term aspects include the consideration of processes at geological time scales, such as land uplift and conversion of marine sediments to arable land. Model parameters are whenever possible based on local conditions and recent literature. The system has been used for simulations based on geospheric releases varying over time of a mixture of radionuclides. Here, the models have been subjected to various test scenarios, including different radionuclide entry points and sorption properties. Radionuclides released from SFR are efficiently diluted to low concentrations in the water of the coastal model. A large fraction of the nuclides leave the Model Area quickly as a consequence of the rapid water turnover. The total amount of radionuclides in water is about the same independent of particle affinity (K{sub d} ), and at most some percents of the amounts retained in the sediments for some time. The latter is also true for the lake model when releases of radionuclides to the water is simulated. The role of sediments as a radionuclide source seems of minor importance in lakes at least for long-term radiation doses. Modelling the sediments as a source of radionuclides most of the 'low K{sub d} radionuclides' will leave the lake whereas the 'high K{sub d} nuclides' are still present within the deeper sediments after 1 000 years. The amount of 'low K{sub d} radionuclides' present in the water and on suspended matter are about 8x10{sup -5} of the

  10. The Adaptation of Fishing Instruments by a Farmers' Community in the Thung Kula Area, in North Eastern Thailand

    Directory of Open Access Journals (Sweden)

    Worawan Ubonlert

    2009-01-01

    Full Text Available Problem statement: In a historical study of the ancient communities in the area of Thung Kula, it was revealed that there are important resources including rice, fish, salt and iron. Salt is used in making fermented fish (known locally as Pla Daek, a culinary culture which has been prevalent in the ethnic groups of Laos and Khmer. The availability of rice and fish in Thung Kula has continued to this day. Thung Kula farmers have extended their fishing sources from the government-owned places to their own fields or ponds. Approach: They use fishing instruments that had been developed out of folk wisdom in combination with the new technology in order to increase the fishing yields adequate for their own consumption and for commerce. The present research aimed to study the adaptation of fishing instruments of the farmers at Ban Ta Yuak, Thung Luang sub-district, Suwannaphum district, Roi-Et province. The studied area was Thung Kula in the North East of Thailand. The research method was qualitative. Data were collected from relevant documents and from field studies with 25 informants. Structured and unstructured interviews were conducted with local tradesmen, consumers, fishing-instrument shop owners. Results: The results were presented descriptively below. The adaptation of fishing instruments of Ban Ta Yuak farmers began with the increased population, the changing ecological systems as a result of the government’s construction of reservoirs, canals, public ponds and the market-oriented economy which had attracted the local fishing markets across the Thung Kula area. Ban Ta Yuak farmers have then adapted their fishing instruments to fit the available kinds of fish and the ecological systems of the local water sources. With assistance from the government, the farmers have their own fishing ponds. It was found that prior to the application of the national economic and social plan of 1962 these farmers created simple fishing instruments such as Sai (a

  11. Adaptive Correlation Space Adjusted Open-Loop Tracking Approach for Vehicle Positioning with Global Navigation Satellite System in Urban Areas.

    Science.gov (United States)

    Ruan, Hang; Li, Jian; Zhang, Lei; Long, Teng

    2015-08-28

    For vehicle positioning with Global Navigation Satellite System (GNSS) in urban areas, open-loop tracking shows better performance because of its high sensitivity and superior robustness against multipath. However, no previous study has focused on the effects of the code search grid size on the code phase measurement accuracy of open-loop tracking. Traditional open-loop tracking methods are performed by the batch correlators with fixed correlation space. The code search grid size, which is the correlation space, is a constant empirical value and the code phase measuring accuracy will be largely degraded due to the improper grid size, especially when the signal carrier-to-noise density ratio (C/N₀) varies. In this study, the Adaptive Correlation Space Adjusted Open-Loop Tracking Approach (ACSA-OLTA) is proposed to improve the code phase measurement dependent pseudo range accuracy. In ACSA-OLTA, the correlation space is adjusted according to the signal C/N₀. The novel Equivalent Weighted Pseudo Range Error (EWPRE) is raised to obtain the optimal code search grid sizes for different C/N₀. The code phase measuring errors of different measurement calculation methods are analyzed for the first time. The measurement calculation strategy of ACSA-OLTA is derived from the analysis to further improve the accuracy but reduce the correlator consumption. Performance simulation and real tests confirm that the pseudo range and positioning accuracy of ASCA-OLTA are better than the traditional open-loop tracking methods in the usual scenarios of urban area.

  12. Adaptability of some legume trees on quartz tailings of a former tin mining area in Bangka Island, Indonesia

    Directory of Open Access Journals (Sweden)

    B H Narendra

    2016-10-01

    Full Text Available Tin mining activities in Bangka Island, besides their important role in contributing to state revenues, also caused damage to the environment, among others in the form of quartz tailings overlay. To rehabilitate this land, in addition to the necessary efforts to improve soil conditions, success is also determined by the selection of appropriate plant species. This study was aimed to determine the adaptability of some legume trees grown on the quartz tailings in land rehabilitation trials in the post tin mining areas of Bangka Island. The legume trees tested were Calliandra calothyrsus Meisn., Caesalpinia sappan L., Enterolobium cyclocarpum (Jacq. Griseb., Gliricidia sepium (Jacq. Walp., Delonix regia ( Hook. Raf., and Cassia siamea Lamk. Treatments of growing media applied  in  the field were medium I (a mixture of 20% organic material, 20% top soil, 1% NPK fertilizer, 5% calcium, and 54% quartz tailings, media II (a mixture of 25%organic material, 25%top soil, 2% NPK fertilizer, 6% calcium, 42% quartz tailings, and media III (a mixture of 30% organic material, 30% top soil, 3% NPK fertilizer, 7% calcium, and 30% quartz tailings. The observation was done by measuring the height and diameter of the stem of the plants, as well as the viability of one year after planting. Analysis of the results of measurements of stem height and diameter showed their diversity. Enterolobium cyclocarpum had the largest dimensions, while the lowest was Caesalpinia sappan. At the age of one year in the field, Gliricida sepium and Enterolobium cyclocarpum showed the average ability of the high life of up to 100%, whereas Calliandra calothyrsus was totally death. In general, the types of legumes selected in this trial showed good adaptability, except for of Calliandra calothyrsus

  13. Comprehensive small animal imaging strategies on a clinical 3 T dedicated head MR-scanner; adapted methods and sequence protocols in CNS pathologies.

    Directory of Open Access Journals (Sweden)

    Deepu R Pillai

    Full Text Available BACKGROUND: Small animal models of human diseases are an indispensable aspect of pre-clinical research. Being dynamic, most pathologies demand extensive longitudinal monitoring to understand disease mechanisms, drug efficacy and side effects. These considerations often demand the concomitant development of monitoring systems with sufficient temporal and spatial resolution. METHODOLOGY AND RESULTS: This study attempts to configure and optimize a clinical 3 Tesla magnetic resonance scanner to facilitate imaging of small animal central nervous system pathologies. The hardware of the scanner was complemented by a custom-built, 4-channel phased array coil system. Extensive modification of standard sequence protocols was carried out based on tissue relaxometric calculations. Proton density differences between the gray and white matter of the rodent spinal cord along with transverse relaxation due to magnetic susceptibility differences at the cortex and striatum of both rats and mice demonstrated statistically significant differences. The employed parallel imaging reconstruction algorithms had distinct properties dependent on the sequence type and in the presence of the contrast agent. The attempt to morphologically phenotype a normal healthy rat brain in multiple planes delineated a number of anatomical regions, and all the clinically relevant sequels following acute cerebral ischemia could be adequately characterized. Changes in blood-brain-barrier permeability following ischemia-reperfusion were also apparent at a later time. Typical characteristics of intra-cerebral haemorrhage at acute and chronic stages were also visualized up to one month. Two models of rodent spinal cord injury were adequately characterized and closely mimicked the results of histological studies. In the employed rodent animal handling system a mouse model of glioblastoma was also studied with unequivocal results. CONCLUSIONS: The implemented customizations including extensive

  14. Low power listening MAC protocol with collision avoidance and traffic adaption%带冲突避免和流量自适应的低功耗侦听MAC协议

    Institute of Scientific and Technical Information of China (English)

    彭昌睿; 黄宏光

    2013-01-01

    为提升无线传感器网络在能耗、时延以及动态适应负载方面的综合性能,对几种典型MAC协议进行了分析,提出了一种带冲突避免和流量自适应的LCT-MAC协议.在该协议中,长前导码被划分为多个小前导码,并嵌入目的节点地址信息,避免了串音;节点可以根据网络流量调整睡眠周期,减少了时延;在重负载时,节点能基于优先级信息选择退避时长,避免冲突.仿真结果表明,与S-MAC协议和LPL协议相比,LCT-MAC协议降低了传输时延,并减少了全网能耗和数据包碰撞次数,具有优良的综合性能.%To improve performance of wireless sensor networks in terms of energy consumption,network latency and traffic adaption,this paper proposed LCT-MAC with collision avoidance and traffic adaption through analyzing some classic MAC protocols.This protocol divided the long preamble into lots of small ones embedded with destination address to avoid crosstalk,and adjusted nodes sleep cycle according to traffic loads dynamically,and chose proper backoff time to avoid message collisions on the basis of nodes' priority.Simulations demonstrate that LCT-MAC is superior to both S-MAC and LPL in aspects of network latency,energy consumption as well as message collision,and has a good performance.

  15. Design and implementation of UDP-based terminal adaptive protocol%基于UDP的终端性能自适应协议的设计与实现

    Institute of Scientific and Technical Information of China (English)

    王斌; 陈红梅; 张保平

    2013-01-01

    Aiming at terminal performance bottleneck among current data transfer process, a UDP-based terminal adaptive protocol was proposed. After the analysis and the comparison of many factors which affected terminal performance, this protocol viewed both the previous packet loss ratio and the current one as congestion detection parameters. It employed various rate adaption methods such as finite loop counter and process scheduling function in order to balance performance differences in real-time and ensured reliable and fast data transfer. Compared with traditional idle Automatic Repeat reQuest (ARQ) method, the average delay is reduced by more than 25%. The experimental results show that the proposed algorithm has the features of strong real-time, quick response, and it is compatible with large amount of data transmission, especially suitable for small amount of data transmission in engineering applications.%针对目前数据传输当中接收端性能瓶颈问题,提出一种基于UDP的终端自适应协议设计方法.通过对影响终端性能的若干因素的分析与比较,协议采用前后两次丢包率作为拥塞检测参数,结合有限循环计数器以及进程调度函数等多种速率适配方法,实时有效地平衡收发双方性能差异,并确保数据可靠快速地传输.与传统的空闲ARQ方式相比,平均延迟降低了25%以上.实验结果证实:该协议实时性强,反应迅速,支持大量数据传输,且更适于数据量不大的工程应用.

  16. A Study of Disaster Adaptation Behavior and Risk Communication for watershed Area Resident - the Case of Kaoping River Watershed in Taiwan

    Science.gov (United States)

    Te Pai, Jen; Chen, Yu-Yun; Huang, Kuan-Hua

    2016-04-01

    Along with the global climate change, the rainfall patterns become more centralized and cause natural disasters more frequently and heavily. Residents in river watersheds area are facing high risk of natural disasters and severe impacts, especially in Taiwan. From the experience of Typhoon Morakot in 2009, we learned that poor risk communication between the governments and the households and communities would lead to tremendous loss of property and life. Effective risk communication can trigger action to impending and current events. On the other hand, it can also build up knowledge on hazards and risks and encourage adaptation behaviors. Through the participation and cooperation of different stakeholders in disaster management, can reduce vulnerability, enhance adaptive capacity, improve the interaction between different stakeholders and also avoid conflicts. However, in Taiwan there are few studies about how households and communities perceive flood disaster risks, the process of risk communications between governments and households, or the relationship between risk communication and adaptation behaviors. Therefore, this study takes household and community of Kaoping River Watershed as study area. It aims to identify important factors in the process of disaster risk communication and find out the relationship between risk communication and adaptation behaviors. A framework of risk communication process was established to describe how to trigger adaptation behaviors and encourage adaptation behaviors with risk communication strategies. An ISM model was utilized to verify the framework by using household questionnaire survey. Moreover, a logit choice model was build to test the important factors for effective risk communication and adaption behavior. The result of this study would provide governments or relevant institutions suggestions about risk communication strategies and adaptation strategies to enhance the adaptive capacity of households and reduce the

  17. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  18. BrAD-seq: Breath Adapter Directional sequencing: a streamlined, ultra-simple and fast library preparation protocol for strand specific mRNA library construction.

    Directory of Open Access Journals (Sweden)

    Brad Thomas Townsley

    2015-05-01

    Full Text Available Next Generation Sequencing (NGS is driving rapid advancement in biological understanding and RNA-sequencing (RNA-seq has become an indispensable tool for biology and medicine. There is a growing need for access to these technologies although preparation of NGS libraries remains a bottleneck to wider adoption. Here we report a novel method for the production of strand specific RNA-seq libraries utilizing inherent properties of double-stranded cDNA to capture and incorporate a sequencing adapter. Breath Adapter Directional sequencing (BrAD-seq reduces sample handling and requires far fewer enzymatic steps than most available methods to produce high quality strand-specific RNA-seq libraries. The method we present is optimized for 3-prime Digital Gene Expression (DGE libraries and can easily extend to full transcript coverage shotgun (SHO type strand-specific libraries and is modularized to accommodate a diversity of RNA and DNA input materials. BrAD-seq offers a highly streamlined and inexpensive option for RNA-seq libraries.

  19. Adapting environmental function analysis for management of protected areas in small islands--case of Pico Island (the Azores).

    Science.gov (United States)

    Calado, Helena; Bragagnolo, Chiara; Silva, Susana; Vergílio, Marta

    2016-04-15

    Protected areas (PAs) are considered key priorities for ensuring long-term sustainability of small islands. The traditional approach of conservation versus development is currently being replaced by an approach of "win-win" relationships. During the last decades PAs have been increasingly requested to simultaneously ensure biodiversity conservation, mainstream ecosystem services into main development policies, and accounting for leisure-related revenues to sustain local and regional economies. Following this new paradigm, the Smartparks project (Planning and Management System for Small Islands Protected Areas), encompassing this study, aimed at an innovative approach for supporting the management of PAs in small islands. In this study, we propose a methodology based on Environmental Functional Analyses (EFA) to compare the potential for conservation and the potential for use of PAs that can be used not only on small islands but also in other territories. For this purpose, a set of environmental and socio-economic components was defined and selected indicators describing each component to calculate conservation and use/development functions of PAs were established. Pico Island, in the Azores archipelago (Portugal), was selected as the case study for testing the methodology. The EFA for all PAs of Pico Island was performed identifying those with more potential for conservation or for development of human activities, and also those with high levels of conflict. A total of 34 indicators was applied (assigning a value from 1 to 3) to the 22 PAs composing the INP of Pico Island: 44% were scored with a value of 1, in both ecological and social components; 22% and 29% were scored 3 in ecological and social components respectively. Social indicators were generally considered less important than environmental ones. In general, PAs presented higher values for conservation. The results further show that the potential for conservation and/or development was consistent with the

  20. Adapting to the European Higher Education Area a questionnaire on student opinion about the teaching of lecturers.

    Directory of Open Access Journals (Sweden)

    Lukas, José Francisco

    2014-10-01

    Full Text Available The aim of this work is to present the adaptation to the European Higher Education Area of a questionnaire on the opinions of University of the Basque Country students about their lecturers teaching process. This process undertaken at the University used a mixed methodology approach. After reviewing questionnaires from other universities, taking into account the theoretical framework of the new questionnaire, the transversal skills adopted by the University and the three dimensions set out by ANECA, a series of indicators and possible items deemed suitable to be included in the new questionnaire were drawn up. This theoretical framework, the indicators and the items were all compared and contrasted within various focus groups undertaken with experts in the topic, with lecturers from the different areas of the University, and with students. Based on this comparison, the pilot questionnaire, which had 18 items plus two more criterion-referenced items, was drawn up. This was applied to a sample of almost one thousand students. The analyses carried out to compare the efficacy of the items, as well as the reliability and the validity of the test, show that the questionnaire rigorously complies with the standards required by this type of instrument. Finally, in the discussion of the results, certain controversial aspects, or those relating to improving the evaluation of the university teaching staff, are presented. Indicated amongst these aspects, is the need to incorporate the questionnaire into a more wider-ranging evaluation plan, such as DOCENTIA, the possibility of creating banks of items, the inclusion of open items and the exigency of undertaking on-line applications of the questionnaire.

  1. An extended modeling approach to assess climate change impacts on groundwater recharge and adaptation in arid areas

    Directory of Open Access Journals (Sweden)

    H. Hashemi

    2014-10-01

    Full Text Available The impact of future climate scenarios on surface and groundwater resources was simulated using a modeling approach for an artificial recharge area in arid southern Iran. Future climate data for the periods of 2010–2030 and 2030–2050 were acquired from the Canadian Global Coupled Model (CGCM 3.1 for scenarios A1B, A2, and B1. These scenarios were adapted to the studied region using the delta-change method. The modified version of the HBV model (Qbox was used to simulate runoff in a flash flood prone catchment. The model was calibrated and validated for the period 2002–2011 using daily discharge data. The projected climate variables were used to simulate future runoff. The rainfall–runoff model was then coupled to a calibrated groundwater flow and recharge model (MODFLOW to simulate future recharge and groundwater hydraulic head. The results of the rainfall–runoff modeling showed that under the B1 scenario the number of floods might increase in the area. This in turn calls for a proper management, as this is the only source of fresh water supply in the studied region. The results of the groundwater recharge modeling showed no significant difference between present and future recharge for all scenarios. Owing to that, four abstraction and recharge scenarios were assumed to simulate the groundwater level and recharged water in the studied aquifer. The results showed that the abstraction scenarios have the most substantial effect on the groundwater level and the continuation of current pumping rate would lead to a groundwater decline by 18 m up to 2050.

  2. Adaptive Correlation Space Adjusted Open-Loop Tracking Approach for Vehicle Positioning with Global Navigation Satellite System in Urban Areas

    Directory of Open Access Journals (Sweden)

    Hang Ruan

    2015-08-01

    Full Text Available For vehicle positioning with Global Navigation Satellite System (GNSS in urban areas, open-loop tracking shows better performance because of its high sensitivity and superior robustness against multipath. However, no previous study has focused on the effects of the code search grid size on the code phase measurement accuracy of open-loop tracking. Traditional open-loop tracking methods are performed by the batch correlators with fixed correlation space. The code search grid size, which is the correlation space, is a constant empirical value and the code phase measuring accuracy will be largely degraded due to the improper grid size, especially when the signal carrier-to-noise density ratio (C/N0 varies. In this study, the Adaptive Correlation Space Adjusted Open-Loop Tracking Approach (ACSA-OLTA is proposed to improve the code phase measurement dependent pseudo range accuracy. In ACSA-OLTA, the correlation space is adjusted according to the signal C/N0. The novel Equivalent Weighted Pseudo Range Error (EWPRE is raised to obtain the optimal code search grid sizes for different C/N0. The code phase measuring errors of different measurement calculation methods are analyzed for the first time. The measurement calculation strategy of ACSA-OLTA is derived from the analysis to further improve the accuracy but reduce the correlator consumption. Performance simulation and real tests confirm that the pseudo range and positioning accuracy of ASCA-OLTA are better than the traditional open-loop tracking methods in the usual scenarios of urban area.

  3. Evaluating farmers’ adaptation strategies to climate change: A case study of Kaou local government area, Tahoua State, Niger Republic

    Directory of Open Access Journals (Sweden)

    A. Moussa Tabbo

    2016-03-01

    Full Text Available The study discusses local farmers’ strategies of coping with and building resilience against the negative impact of climate change. Information for the discussion was from data collected using a set of structured questionnaires from interviews scheduled with 128 farmers. The questionnaire was based on previous literature and direct reconnaissance interview with farmers, which culminated in 13 strategies used for the study being reported. For each question, respondents were asked to choose their best and worst strategies. Thus, the difference between the best and worst strategies consistent with random utility theory has been used for the modelling. Results show that semi-transhumance, various handicrafts making, rural migration, small-scale vegetable production and small-scale river exploitation were the most important strategies identified, whilst water transport and vending, shifting cultivation, gypsum mining, gathering and trading of wild fruits and edible plants as well as cattle and sheep fattening were the least appreciated strategies identified amongst the farmers facing climate change. These findings are therefore imperative for planning farmers’ capacity-building and resilience against climate change projects to ensure sustainability in the study area.Keywords: Farmers’ adaptation strategies; Climate change resilience; Kaou

  4. Grazing game: a learning tool for adaptive management in response to climate variability in semiarid areas of Ghana

    Directory of Open Access Journals (Sweden)

    Grace B. Villamor

    2016-03-01

    Full Text Available In West Africa, the most extreme predicted effects of climate change are expected to occur in desert and grassland areas. It is crucial for local populations in this region to better understand what such projections signify to them to identify sound adaptation policies and interventions. We developed a game, called the "grazing game," and conducted trials with local farmers at multiple study sites as a learning tool to better understand their behavior in response to climate variability under semiarid conditions in West Africa and to facilitate social learning. The grazing game was designed to reveal the processes that lead to overgrazing and desertification based on the players' interactions with environmental conditions and their resulting decisions. We conducted a total of 23 game trials around the Vea catchment of the Upper East Region of Ghana involving 243 individual farmers. From the games, local farmers exhibited a very positive response to how the game replicated rainfall fluctuations that they currently experience and led to the identification of coping strategies, such as selling cows, seeking government assistance, and engaging in alternative livelihood means. Participating farmers tended to avoid uncertain situations and sought to simplify their decisions, and the game provided insight into the rich local ecological knowledge of environmental indicators. Based on the game trial results, we found that the game facilitated instrumental and communicative learning among the players and facilitators. Further, the game served as a platform where players could share their views, knowledge, and perceptions of climate-related issues.

  5. The ongoing development of a pragmatic and adaptive fire management policy in a large African savanna protected area.

    Science.gov (United States)

    van Wilgen, Brian W; Govender, Navashni; Smit, Izak P J; MacFadyen, Sandra

    2014-01-01

    This paper describes recent changes to the fire management policy of the 1.9 million ha Kruger National Park in South Africa. It provides a real-life example of adaptive learning in an environment where understanding is incomplete, but where management nonetheless has to proceed. The previous policy called for the application of fire to meet burnt area targets that were set for administrative subdivisions, and that were assessed at the scale of the entire park. This was problematic because the park is large and heterogeneous, and because sound ecological motivations that could link burning prescriptions to ecological objectives were missing. The new policy divides the park into five fire management zones on the basis of differences in mean annual rainfall, historic fire return periods, and geology. In addition, it proposes fire management actions designed to achieve specified ecological objectives in each zone, and includes fire-regime related thresholds and associated ecological outcomes against which to assess the effectiveness of management. The new policy is an improvement over previous iterations, but several challenges remain. Most important among these would be to continually improve the understanding of the effects of fire, and to develop frameworks for assessing the impacts of fire together with other ecosystem drivers that interact strongly with fire to influence the attainment of ecological objectives.

  6. Comprehensible Description Method Research for Adaptation Protocol%适配器协议表示方式的可理解性研究

    Institute of Scientific and Technical Information of China (English)

    郑剑; 江建慧

    2009-01-01

    Description of the adaptor protocol based on LTS is discussed in the first place, and then the deficiency is indicated. After that, methods of state-based description and label-based description are proposed, and the pattern of common match vector description is extended, which includes the binary operator called sequential composition. At last, the feasibility and effectiveness of these methods are verified.%对现有的用LTS描述的适配器协议的方法进行了讨论,指出了存在的不足.分别提出了基于状态节点的表示方法和基于标签的表示方法,并在消息匹配向量描述模式中扩展了顺序组合操作.最后对提出的方法的可行性和有效性进行了验证.

  7. Adaptación a un esquema de entrenamiento físico en pacientes con enfermedad pulmonar obstructiva crónica avanzada ADAPTATION TO A PHYSICAL TRAINING PROTOCOL OF SEVERE CHRONIC OBSTRUCTIVE PULMONARY DISEASE PATIENTS

    Directory of Open Access Journals (Sweden)

    RAMÓN PINOCHET U.

    2002-07-01

    Full Text Available RESUMEN El ejercicio físico es un elemento básico en la rehabilitación en pacientes con EPOC. Sin embargo, los resultados son variables, lo que puede deberse a las diferentes estrategias de entrenamiento utilizadas. En 22 pacientes con EPOC avanzada (VEF1 35,6 ± 15,7%; edad 63 ± 15 años; x ± DS evaluamos su adaptación a un esquema de entrenamiento (E en bicicleta ergométrica que consistió en aplicar inicialmente una carga inicial de 30% de la máxima previamente determinada (CM y aumentarla en 15 a 20% en las sesiones siguientes cuando el paciente era capaz de mantenerla por 45 minutos, hasta alcanzar la meta de 75% de la CM. La intensidad del E se midió en watts calculando el área bajo la curva de la relación entre las cargas aplicadas y el número de sesiones de entrenamiento. El efecto del E se evaluó a través de los cambios en la carga y el vO2 máximos, la duración de un ejercicio submáximo, la frecuencia cardíaca, (FC, disnea, fatiga de las extremidades inferiores y lactato sanguíneo para una misma carga y tiempo de ejercicio. La CM de E fue 61 ± 23% (x ± DS del máximo. Seis pacientes no fueron capaces de alcanzar la carga establecida como meta. En los restantes ésta se alcanzó en un número variable de sesiones (12 ± 7. La intensidad del entrenamiento fue de 952 ± 325 watt. El E produjo un aumento de la CM (p Exercise training is an important component of pulmonary rehabilitation in COPD. Clinical studies show highly variable results, probably due to the use of different training strategies. Our aim was to evaluate the adaptation of 22 severe COPD patients (FEV1: 36 ± 16% Pred; 63 ± 15 years of age; x ± SD to a training protocol: a Target load 75% of maximal workload (WRmax, b an initial load of 30% WRmax and c 15 to 20% increments of the load at the time the patients were able to sustain the previous load for 45 min. Training intensity was calculated by measuring the area under the workload times the number

  8. Adaptive grid secure routing protocol based on hash-chain in WSNs%一种基于散列链的自适应网格安全路由协议

    Institute of Scientific and Technical Information of China (English)

    王灿; 乔建华; 闫庆森

    2015-01-01

    LEACH(Low Energy Adaptive Clustering Hierarchy)路由协议是无线传感器网络拓扑控制中最具代表性和重要性的算法之一。针对LEACH路由协议簇头分布不均匀,节点死亡率高,易产生路由空洞及其所面临安全威胁等问题,提出一种基于散列链的区域划分网格自治安全路由协议LEACH-SEED。剔除低能量节点入选簇头的权利,改进簇头选举机制,簇头选举完成之后,每个簇头节点随机从散列链组成的密钥池中分配q个链密钥,其他节点利用单向哈希函数和伪随机函数生成通信密钥,网络遭受攻击后利用网格自治和待选簇头身份标识编号进行网络恢复。实验结果表明,改进的分簇算法能有效地降低节点死亡率,增强抗攻击能力,提高数据融合度,延长网络生存时间。%LEACH(Low Energy Adaptive Clustering Hierarchy)is a wireless sensor networks routing protocol in topology control algorithm of the most representative and important one. In order to solve LEACH uneven distribution of routing protocol suite, node high mortality rates, easy to produce issues of routing hole, security threats, it proposes an improved algorithms and simulation based on hash-chain and grid in wireless sensor networks. It deprives the right of selecting the low-energy node as a cluster node and improves cluster-head election mechanism. Each cluster head node is assigned with q chain keys from the hash chain randomly after cluster head selection. The other nodes use one-way hash function and pseudo-random function to generate communication keys. The network is recovered by adaptive grid and the cluster-head ID after attacking. The experimental results show that the improved clustering algorithm can reduce mortality node effec-tively, strengthen anti-attack ability of the network, improve data alignment and prolong network lifetimes.

  9. Low incidence of clonality in cold water corals revealed through the novel use of standardized protocol adapted to deep sea sampling

    Science.gov (United States)

    Becheler, Ronan; Cassone, Anne-Laure; Noel, Philippe; Mouchel, Olivier; Morrison, Cheryl; Arnaud-Haond, Sophie

    2016-01-01

    Sampling in the deep sea is a technical challenge, which has hindered the acquisition of robust datasets that are necessary to determine the fine-grained biological patterns and processes that may shape genetic diversity. Estimates of the extent of clonality in deep-sea species, despite the importance of clonality in shaping the local dynamics and evolutionary trajectories, have been largely obscured by such limitations. Cold-water coral reefs along European margins are formed mainly by two reef-building species, Lophelia pertusa and Madrepora oculata. Here we present a fine-grained analysis of the genotypic and genetic composition of reefs occurring in the Bay of Biscay, based on an innovative deep-sea sampling protocol. This strategy was designed to be standardized, random, and allowed the georeferencing of all sampled colonies. Clonal lineages discriminated through their Multi-Locus Genotypes (MLG) at 6–7 microsatellite markers could thus be mapped to assess the level of clonality and the spatial spread of clonal lineages. High values of clonal richness were observed for both species across all sites suggesting a limited occurrence of clonality, which likely originated through fragmentation. Additionally, spatial autocorrelation analysis underlined the possible occurrence of fine-grained genetic structure in several populations of both L. pertusa and M. oculata. The two cold-water coral species examined had contrasting patterns of connectivity among canyons, with among-canyon genetic structuring detected in M. oculata, whereas L. pertusa was panmictic at the canyon scale. This study exemplifies that a standardized, random and georeferenced sampling strategy, while challenging, can be applied in the deep sea, and associated benefits outlined here include improved estimates of fine grained patterns of clonality and dispersal that are comparable across sites and among species.

  10. Nature-based solutions to climate change mitigation and adaptation in urban areas: Perspectives on indicators, knowledge gaps, barriers, and opportunities for action

    NARCIS (Netherlands)

    N. Kabisch (Nadja); N. Frantzeskaki (Niki); S. Pauleit (Stephan); Naumann, S. (Sandra); Davis, M. (McKenna); M. Artmann (Martina); D. Haase (Dagmar); Knapp, S. (Sonja); Korn, H. (Horst); Stadler, J. (Jutta); Zaunberger, K. (Karin); Bonn, A. (Aletta)

    2016-01-01

    textabstractNature-based solutions promoting green and blue urban areas have significant potential to decrease the vulnerability and enhance the resilience of cities in light of climatic change. They can thereby help to mitigate climate change-induced impacts and serve as proactive adaptation option

  11. Modelling of adaptation to climate change and decision-makers behaviours for the Veluwe forest area in the Netherlands

    DEFF Research Database (Denmark)

    Yousefpour, Rasoul; Didion, Markus; Jacobsen, Jette Bredahl;

    2015-01-01

    rules for beliefs about climate trends, iii) evaluate the performance of adaptive strategies, and iv) apply (i)–(iii) at the local and forest landscape scale to find and compare individual versus joint adaptive decisions. We search for optimal forest management decisions maximizing total biomass...

  12. Adapting a Particle Model for Computing Sulfur Dioxide Concentrations in Mount Rainier Area and Comparing Them to Measured Values

    Science.gov (United States)

    Givati, Reuven

    In this work the SO_2 concentrations measured in the Mt. Rainier area during PREVENT Pacific Northwest Regional Visibility Experiment Using Natural Tracers, June to September 1990), were analyzed with the aid of the MATHEW/ADPIC models (a diagnostic wind model and a particle model) developed by Lawrence Livermore National Laboratory. Some changes were made in the models to adapt them to the specific conditions of this experiment. The models were run on a large domain in western Washington, and the SO_2 concentrations were evaluated at two specific points, Tahoma Woods and Paradise in the Nisqually Valley, the only points near Mt. Rainier where SO_2 concentrations were measured during PREVENT. The changes that were made were: including loss rates of SO_2 by oxidation, using different heights of the top of the boundary layer at different locations, enabling limited area of influence of specific meteorological stations when interpolating the wind fields, and including the possibility of reflection of the air "particles", from the top of the mixed layer. Because of the paucity of the meteorological measurements near the sampling points, an estimation was made about the wind behavior in the valley, based on the phenomena of wind channeling, mountain and valley winds, and historical wind measurements near Mt. Rainier. The models were run for several non-rainy days of PREVENT having large SO_2 concentrations, or that were interesting for other reasons. The agreement between the measured and modeled SO_2 concentrations at Tahoma Woods during the daytime periods, was quite good. Out of 14 days, for which the emissions of the previous night were taken into account, for 12 days (86%) the ratio of the modeled to the measured SO_2 concentrations, at Tahoma Woods during the daytime periods, was in the interval 0.45-2.00. The agreement between the modeled and measured SO_2 concentrations at Tahoma Woods during the nights, and at Paradise, during the day and the night, were not

  13. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  14. Protocol for a randomized controlled trial on risk adapted damage control orthopedic surgery of femur shaft fractures in multiple trauma patients

    Directory of Open Access Journals (Sweden)

    Rixen Dieter

    2009-08-01

    Full Text Available Abstract Background Fractures of the long bones and femur fractures in particular are common in multiple trauma patients, but the optimal management of femur fractures in these patients is not yet resolved. Although there is a trend towards the concept of "Damage Control Orthopedics" (DCO in the management of multiple trauma patients with long bone fractures as reflected by a significant increase in primary external fixation of femur fractures, current literature is insufficient. Thus, in the era of "evidence-based medicine", there is the need for a more specific, clarifying trial. Methods/Design The trial is designed as a randomized controlled open-label multicenter study. Multiple trauma patients with femur shaft fractures and a calculated probability of death between 20 and 60% will be randomized to either temporary fracture fixation with fixateur externe and defined secondary definitive treatment (DCO or primary reamed nailing (early total care. The primary objective is to reduce the extent of organ failure as measured by the maximum sepsis-related organ failure assessment (SOFA score. Discussion The Damage Control Study is the first to evaluate the risk adapted damage control orthopedic surgery concept of femur shaft fractures in multiple trauma patients in a randomized controlled design. The trial investigates the differences in clinical outcome of two currently accepted different ways of treating multiple trauma patients with femoral shaft fractures. This study will help to answer the question whether the "early total care" or the „damage control” concept is associated with better outcome. Trial registration Current Controlled Trials ISRCTN10321620

  15. Adaptive threat modeling for secure WSN routing protocols%面向WSN安全路由协议的自适应威胁模型

    Institute of Scientific and Technical Information of China (English)

    ZHANG Bing-tao; WANG Xiao-peng

    2014-01-01

    For the safety evaluation problems in wireless sensor network routing discovery process,this paper put forward a new adaptive threat model.The model improved Dolev-Yao model which attack could be divided into nine categories from limi-ted reception and tr%针对无线传感器网络路由发现过程中安全性评估问题,提出一种新的自适应威胁模型。该模型通过对传统Dolev-Yao模型进行改进,将攻击分为限定接收传输范围的单个攻击者到不限定任何能力的多个共谋攻击者等九类,在无须任何安全假设的情形下对不同路由发现过程的攻击进行分类安全评估,自适应地确定破坏协议时的攻击强度和破坏协议所需的最小攻击强度,以评估路由发现协议的安全性,进而采取相应的安全措施予以预防。最后以一类无线传感器网络自适应威胁模型为实例,说明该模型的正确性、有效性。

  16. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  17. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  18. High-throughput calculation of protein-ligand binding affinities: modification and adaptation of the MM-PBSA protocol to enterprise grid computing.

    Science.gov (United States)

    Brown, Scott P; Muchmore, Steven W

    2006-01-01

    We have developed a system for performing computations on an enterprise grid using a freely available package for grid computing that allows us to harvest unused CPU cycles off of employee desktop computers. By modifying the traditional formulation of Molecular Mechanics with Poisson-Boltzmann Surface Area (MM-PBSA) methodology, in combination with a coarse-grain parallelized implementation suitable for deployment onto our enterprise grid, we show that it is possible to produce rapid physics-based estimates of protein-ligand binding affinities that have good correlation to experimental data. This is demonstrated by examining the correlation of our calculated binding affinities to experimental data and also by comparison to the correlation obtained from the binding-affinity calculations using traditional MM-PBSA that are reported in the literature.

  19. Use of a hydrological model to evaluate the effects of climate change on adaptative capacity of a maize and fennel cultivation in an area of Southern Italy.

    Science.gov (United States)

    Bonfante, Antonello; Basile, Angelo; de Lorenzi, Francesca; Riggi, Ezio; Avola, Giovanni; Menenti, Massimo

    2010-05-01

    Crop production depends significantly on the pedoclimatic conditions. The evolution of climate may thus endanger not only yield (IPCC, 2007), but, more significantly, the sustainability of the cultivation of current varieties. Adaptation of current production systems may be feasible, but requires a timely evaluation of weather adaptation to climate evolution might be limited to improving crop and soil management or should involve replacement of varieties or species altogether. This study addressed this question by evaluating the adaptive capacity of a flat area of 22.000 ha "Destra Sele" (Campania Region, Southern Italy) where the main crops are is maize for livestock and fennel. Two climate scenarios have been considered at + 5 and + 30 years, generated by a regional climate model applied to Europe and the Mediterranean Basin. For each climate scenario the hydro-thermal regime of the soils of the selected study area has been calculated by means of a simulation model of the soil-water-atmosphere system (SWAP). Synthetic indicators of the regimes (e.g., crop water stress index, available water content, soil temperature) have been calculated and compared with the thermal and water requirements of a set of maize and fennel varieties, including the ones currently cultivated in the area. The hydrological model SWAP was applied to the representative soils of the entire area (20 soil units): their soil hydraulic properties were derived applying the pedo-transfer function HYPRES which reliability was tested and validated on three soils of the same area. Upper boundary conditions were derived from the regional climate scenarios. Unit gradient in soil water potential was set as lower boundary condition. Crop-specific input data and model parameters were estimated on the basis of literature and assumed to be generically representative of the species. This applies to Leaf Area Index (LAI), crop coefficient (Kc) and the root water uptake function parameters. From the comparison

  20. Etude et simulation du protocole TTEthernet sur un sous-systeme de gestion de vols et adaptation de la planification des tâches a des fins de simulation

    Science.gov (United States)

    Abidi, Dhafer

    TTEthernet is a deterministic network technology that makes enhancements to Layer 2 Quality-of-Service (QoS) for Ethernet. The components that implement its services enrich the Ethernet functionality with distributed fault-tolerant synchronization, robust temporal partitioning bandwidth and synchronous communication with fixed latency and low jitter. TTEthernet services can facilitate the design of scalable, robust, less complex distributed systems and architectures tolerant to faults. Simulation is nowadays an essential step in critical systems design process and represents a valuable support for validation and performance evaluation. CoRE4INET is a project bringing together all TTEthernet simulation models currently available. It is based on the extension of models of OMNeT ++ INET framework. Our objective is to study and simulate the TTEthernet protocol on a flight management subsystem (FMS). The idea is to use CoRE4INET to design the simulation model of the target system. The problem is that CoRE4INET does not offer a task scheduling tool for TTEthernet network. To overcome this problem we propose an adaptation for simulation purposes of a task scheduling approach based on formal specification of network constraints. The use of Yices solver allowed the translation of the formal specification into an executable program to generate the desired transmission plan. A case study allowed us at the end to assess the impact of the arrangement of Time-Triggered frames offsets on the performance of each type of the system traffic.

  1. Adaptation to the Impacts of Climate Extremes in Central Europe: A Case Study in a Rural Area in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Robert Stojanov

    2015-09-01

    Full Text Available The primary objective of this paper is to analyse households’ adaptation measures to the impacts of repeated extreme weather events, specifically floods, which belong amongst the most serious manifestation of ongoing climate change in Europe. The case study focuses on a rural area in the north-east part of the Czech Republic, in the catchment basin of the Bečva River. A total of 605 households were addressed within the framework of the questionnaire survey. On the basis of the conducted research, we determined that the total amount of adaptation measures adopted by those dwelling in residential homes within the investigated catchment area was relatively low. In contrast, however, one of the most important adaptation measures—house elevation—was applied by 46.94% of the houses (up to 1 m and by 21.16% houses (elevated more than 1 m respectively. We also found that the amount and scope of adaptation measures realized by households were influenced by certain socio-demographic factors of the inhabitants. The most statistically significant factors included households with more residents or families with more children living in the household, as well as those with a higher level of education. Flood experience, the level of damage, and individual flood risk perception also played an important role.

  2. Identifying sensitive areas of adaptive observations for prediction of the Kuroshio large meander using a shallow-water model

    Science.gov (United States)

    Zou, Guang'an; Wang, Qiang; Mu, Mu

    2016-09-01

    Sensitive areas for prediction of the Kuroshio large meander using a 1.5-layer, shallow-water ocean model were investigated using the conditional nonlinear optimal perturbation (CNOP) and first singular vector (FSV) methods. A series of sensitivity experiments were designed to test the sensitivity of sensitive areas within the numerical model. The following results were obtained: (1) the eff ect of initial CNOP and FSV patterns in their sensitive areas is greater than that of the same patterns in randomly selected areas, with the eff ect of the initial CNOP patterns in CNOP sensitive areas being the greatest; (2) both CNOP- and FSV-type initial errors grow more quickly than random errors; (3) the eff ect of random errors superimposed on the sensitive areas is greater than that of random errors introduced into randomly selected areas, and initial errors in the CNOP sensitive areas have greater eff ects on final forecasts. These results reveal that the sensitive areas determined using the CNOP are more sensitive than those of FSV and other randomly selected areas. In addition, ideal hindcasting experiments were conducted to examine the validity of the sensitive areas. The results indicate that reduction (or elimination) of CNOP-type errors in CNOP sensitive areas at the initial time has a greater forecast benefit than the reduction (or elimination) of FSV-type errors in FSV sensitive areas. These results suggest that the CNOP method is suitable for determining sensitive areas in the prediction of the Kuroshio large-meander path.

  3. Traffic Performance Analysis of Manet Routing Protocol

    CERN Document Server

    Rajeswari, S; 10.5121/ijdps.2011.2306

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET routing protocols. For Simulation, we have used ns-2 simulator.

  4. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  5. Climate-proof planning for flood-prone areas : assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    van den Brink, Margo; Meijerink, Sander; Termeer, Catrien; Gupta, Joyeeta

    2014-01-01

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses proble

  6. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    Brink, van den M.A.; Meijerink, S.; Termeer, C.J.A.M.; Gupta, J.

    2014-01-01

    It is generally acknowledged that adapting lowlying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses problem

  7. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    van den Brink, M.; Meijerink, S.; Termeer, C.; Gupta, J.

    2014-01-01

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses proble

  8. Posterior medial frontal cortex activity predicts post-error adaptations in task-related visual and motor areas

    NARCIS (Netherlands)

    Danielmeier, C.; Eichele, T.; Forstmann, B.U.; Tittgemeyer, M.; Ullsperger, M.

    2011-01-01

    As Seneca the Younger put it, "To err is human, but to persist is diabolical." To prevent repetition of errors, human performance monitoring often triggers adaptations such as general slowing and/or attentional focusing. The posterior medial frontal cortex (pMFC) is assumed to monitor performance pr

  9. Nature-based solutions to climate change mitigation and adaptation in urban areas: perspectives on indicators, knowledge gaps, barriers, and opportunities for action

    Directory of Open Access Journals (Sweden)

    Nadja Kabisch

    2016-06-01

    Full Text Available Nature-based solutions promoting green and blue urban areas have significant potential to decrease the vulnerability and enhance the resilience of cities in light of climatic change. They can thereby help to mitigate climate change-induced impacts and serve as proactive adaptation options for municipalities. We explore the various contexts in which nature-based solutions are relevant for climate mitigation and adaptation in urban areas, identify indicators for assessing the effectiveness of nature-based solutions and related knowledge gaps. In addition, we explore existing barriers and potential opportunities for increasing the scale and effectiveness of nature-based solution implementation. The results were derived from an inter- and transdisciplinary workshop with experts from research, municipalities, policy, and society. As an outcome of the workshop discussions and building on existing evidence, we highlight three main needs for future science and policy agendas when dealing with nature-based solutions: (i produce stronger evidence on nature-based solutions for climate change adaptation and mitigation and raise awareness by increasing implementation; (ii adapt for governance challenges in implementing nature-based solutions by using reflexive approaches, which implies bringing together new networks of society, nature-based solution ambassadors, and practitioners; (iii consider socio-environmental justice and social cohesion when implementing nature-based solutions by using integrated governance approaches that take into account an integrative and transdisciplinary participation of diverse actors. Taking these needs into account, nature-based solutions can serve as climate mitigation and adaptation tools that produce additional cobenefits for societal well-being, thereby serving as strong investment options for sustainable urban planning.

  10. An Adaptive Polling Periods MAC Protocol for Wireless Sensor Networks%一种自适应侦听的异步无线传感器网络MAC协议

    Institute of Scientific and Technical Information of China (English)

    陈德富; 陶正苏

    2011-01-01

    To improve network performance in dynamic traffic load conditions, an adaptive polling periods MAC protocol called AA-MAC is proposed. Based on short preamble sampling technology, after receiving messages rather nodes in AA-MAC perform some additional polling periods than switch off radios immediately. It allows several transmissions upon one rendezvous between the sender and its destination especially when network traffic is high. To give insight into protocol, energy consumption and network latency are both modeled. Simulations on a 9 hop linear topology illustrate that AA-MAC is superior to S-MAC in any traffic conditions and it performs equally to X-MAC in light traffic conditions and performs better than X-MAC in high traffic conditions. When traffic load is high, AA-MAC decrease network latency by 56% compared to X-MAC.%为了提升异步无线传感器网络MAC协议在动态网络负载下的性能,论文提出了一种流量自适应的异步协议AA-MAC.该协议基于短前导序列采样技术,当节点收稿数据后并不理解转入睡眠而自适应增加若干个最短侦听时间用以接收发送节点的可能其他数据,使得收发双方在网络负载较重时能实现一次配对多次收发数据.分析并对比了AA-MAC和X-MAC的能耗和延时模型.在一个9跳线形拓扑网络上的仿真结果表明:AA-MAC在各种负载下性能均优于S-MAC;当网络负载很轻时,AA-MAC表现和X-MAC相当;随着网络负载加重,AA-MAC和X-MAC能耗相当但延时减少了56%以上.

  11. A Highly-efficient Energy-saving Wireless Body Area Network MAC Protocol%一种高效节能的无线体域网MAC层协议

    Institute of Scientific and Technical Information of China (English)

    谢语天; 王珺; 闵建民; 司桂静

    2015-01-01

    With the rapid development of wireless sensor network technology,wearable and implantable biosensor technology,wearable and implantable wireless equipment can be used for remote monitoring signs information. To link the nodes and equipment which are atta-ched with person skin,implanted in person and surround people,wireless body area network arises at the historic moment. In WBAN, MAC protocol is responsible of conflict detection and processing,priority control,timeslot assignment,transmission order etc. So the de-sign of MAC protocol plays an important role in the reliability and efficiency of WBAN. In this paper,propose a high efficiency and ener-gy-saving MAC protocol (HE-MAC),which is based on IEEE 802. 15. 6. The protocol adopts dynamic priority control,dynamic time-slot allocation mechanism,dynamic proportion allocation mechanism of different access period length to achieve reliable transmission in the situation of low latency and low power consumption. By using the OMNet++ simulation platform,evaluate the network performance of AD-MAC protocol,IEEE 802. 15. 6 MAC protocol and CA-MAC protocol. The result of simulation shows that the proposed MAC protocol is superior to IEEE 802. 15. 6 MAC and CA-MAC in terms of throughput,power consumption and time delay.%随着无线传感网技术、可穿戴和可植入生物传感器技术的快速发展,可穿戴式和可植入式无线设备可用于远程监控体征信息. 为了连接附着于人身上、植入人体内部的节点和存在于人体周围的设备,无线体域网应运而生. 在无线体域网中,MaC协议负责节点的冲突检测与处理,优先级控制、时隙分配以及节点传输顺序,故MaC协议的设计在无线体域网的可靠性和能效性上发挥着核心作用. 文中提出了一种基于IEEE 802. 15. 6高效节能的MaC协议( HE-MaC). 该协议采用动态化的优先级控制、时隙分配机制、不同接入期长度的动态比例分配等措施实现低时延、低功

  12. Local area networks and protocols of data transmission in electric power systems: current status and tendencies; Redes locales y protocolos de transmision de datos en sistemas electricos de potencia: estado actual y tendencias

    Energy Technology Data Exchange (ETDEWEB)

    Pellizzoni, Rodolfo [TRANSBA S.A., Empresa de Transporte de Energia Electrica por Distribucion Troncal de la Provincia de Buenos Aires (Argentina); Vignoni, Roberto [Universidad Nacional de La Plata (UNLP), Ciudad de La Plata, Buenos Aires (Argentina)

    2001-07-01

    In electric power systems, overcome the stage of the remote system (SCADA) implementation, the current tendency is the automation and use of open architectures. That tendency is reflected in the use of standardized local area networks of industrial use and adoption of data transmission protocols which are based in international standards. The result is the connectivity and operationalization among the local devices and terminals usually called IED. In this document it is presented a summary of the standardized data transmission protocols, which have been used in electric power substations currently, based on a architecture which defines three layers of the OSI/ISO reference pattern. Based on the tendency increase of automation in substations, some ways of communication have been analyzed, they mean: local area networks such as the Ethernet pattern and some industrial ones and others such as Profibus and its respective implementation in electric power systems. It also is analyzed the tasks which have supported IEC and EPRI for defining a standardization and a model for the open communications in electric power substations.

  13. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero err

  14. Adaptive Slope Filtering of Airborne LiDAR Data in Urban Areas for Digital Terrain Model (DTM Generation

    Directory of Open Access Journals (Sweden)

    Junichi Susaki

    2012-06-01

    Full Text Available A filtering algorithm is proposed that accurately extracts ground data from airborne light detection and ranging (LiDAR measurements and generates an estimated digital terrain model (DTM. The proposed algorithm utilizes planar surface features and connectivity with locally lowest points to improve the extraction of ground points (GPs. A slope parameter used in the proposed algorithm is updated after an initial estimation of the DTM, and thus local terrain information can be included. As a result, the proposed algorithm can extract GPs from areas where different degrees of slope variation are interspersed. Specifically, along roads and streets, GPs were extracted from urban areas, from hilly areas such as forests, and from flat area such as riverbanks. Validation using reference data showed that, compared with commercial filtering software, the proposed algorithm extracts GPs with higher accuracy. Therefore, the proposed filtering algorithm effectively generates DTMs, even for dense urban areas, from airborne LiDAR data.

  15. The Role of Biodiversity, Traditional Knowledge and Participatory Plant Breeding in Climate Change Adaptation in Karst Mountain Areas in SW China

    Energy Technology Data Exchange (ETDEWEB)

    Song, Yiching; Li, Jingsong [Center for Chinese Agricultural Policy (China)

    2011-07-15

    This is a report of a country case study on the impacts of climate change and local people's adaptation. The research sites are located in the karst mountainous region in 3 SW China provinces - Guangxi, Guizhou and Yunnan – an area inhabited by 33 ethnic groups of small farmers and the poor, with rich Plant Genetic Resources (PGR) and culture. Climate change is exacerbating already harsh natural conditions and impacting on biodiversity of remote farmers living in extreme poverty, with very limited arable land. Genetic diversity has also suffered from the adoption of high yielding hybrids. Yet traditional varieties, related TK and Participatory Plant Breeding (PPB) for maize and rice are showing real potential for resilience and adaptation.

  16. An adaptive set-point modulation technique to enhance the performance of load frequency controllers in a multi-area power system

    Directory of Open Access Journals (Sweden)

    Abbas Ketabi

    2015-12-01

    Full Text Available Parameters and configuration of power systems are continuously prone to change. This might negatively affect the performance of load frequency controllers. PI controllers are widely used for load frequency control (LFC in power systems. Hence, enhancing the performance of these controllers is of great importance. In this paper, an adaptive set-point modulation (ASPM method is proposed to enhance the performance of PI controllers. Simulation studies carried out on a two-area power system with different types of generating units and HVDC link prove the superiority of the proposed adaptive set-point modulation assisted proportional integral (ASPM-PI over the conventional proportional integral (PI and proportional integral derivative (PID controllers. It has also been shown that the ASPM-PI controller is robust in case of power system parameters variations and change in the configuration.

  17. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  18. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  19. 无模型自适应广域阻尼控制设计方法%Design of Model-Free Adaptive Wide Area Damping Controller

    Institute of Scientific and Technical Information of China (English)

    李建; 赵艺; 陆超; 庞晓艳

    2014-01-01

    电力系统的运行方式和结构的时变特性越来越突出,传统广域阻尼控制器(conventional wide-area power system stabilizer,CWAPSS)由于参数固定,无法保证系统在不同运行状态下的控制效果。为此,文章采用无模型自适应控制(model free adaptive control,MFAC)算法实现了具有自适应功能的广域阻尼控制器的设计。首先讨论了 MFAC 算法的基本原理;然后通过分析比较WAPSS和MFAC算法参数之间的关系,给出了 MFAC 算法的参数设置方法;最后,通过四机两区系统的仿真验证了 MFAC 算法的有效性。仿真结果表明在系统结构发生变化时,无模型自适应广域阻尼控制器能够在线调整控制器参数,控制效果优于CWAPSS。%The time-varying characteristics of power grid operating modes and structure become more and more conspicuous, and due to fixed parameters of traditional wide-area power system stabilizer (WAPSS) the control effect of power grid under various operating conditions could not be ensured. Utilizing model-free adaptive control (MFAC) algorithm the authors implement the design of adaptive wide-area damping controller. Firstly, basic principle of MFAC is discussed; then the relationship between parameters of WAPSS and those of MFAC are analyzed and compared and the method of parameter setting of MFAC algorithm is given; finally, through simulation of a 4-machine 2-area system the effectiveness of MFAC algorithm is validated. Simulation results show that during the change of power system structure the online adjustment of parameters of the model-free adaptive wide-area damping controller can be implemented, and its control effect is better than WAPSS.

  20. Myocardial area at risk and salvage measured by T2-weighted cardiovascular magnetic resonance: reproducibility and comparison of two T2-weighted protocols

    DEFF Research Database (Denmark)

    Lønborg, Jacob; Vejlstrup, Niels; Mathiasen, Anders B

    2011-01-01

    Late gadolinium enhancement (LGE) and T2-weighted cardiovascular magnetic resonance (CMR) provides a means to measure myocardial area at risk (AAR) and salvage. Several T2-weighted CMR sequences are in use, but there is no consensus in terms of which sequence to be the preferred. Therefore, the aim...

  1. Satellite-Friendly Protocols and Standards

    Science.gov (United States)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  2. An Arbitrary 2D Structured Replica Control Protocol

    OpenAIRE

    Basmadjian, Robert; Meer, Hermann,

    2011-01-01

    Traditional replication protocols that logically arrange the replicas into a specific structure have reasonable availability, lower communication cost as well as system load than those that do not require any logical organisation of replicas. We propose in this paper the A2DS protocol: a single protocol that, unlike the existing proposed protocols, can be adapted to any 2D structure. Its read operation is carried out on any replica of every level of the structure whereas write operations are ...

  3. Performance Evaluation of the WSN Routing Protocols Scalability

    OpenAIRE

    2008-01-01

    Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network ...

  4. Performance Evaluation of the WSN Routing Protocols Scalability

    Directory of Open Access Journals (Sweden)

    L. Alazzawi

    2008-01-01

    Full Text Available Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs. A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.

  5. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  6. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  7. What is the impact on fish recruitment of anthropogenic physical and structural habitat change in shallow nearshore areas in temperate systems? A systematic review protocol

    DEFF Research Database (Denmark)

    MacUra, B.; Lönnstedt, O.M.; Byström, P.

    2016-01-01

    and spawning habitats of many fish and other aquatic species. Several coastal fish populations have seen marked declines in abundance and diversity during the past two decades. A systematic review on the topic would clarify if anthropogenic physical and structural changes of near-shore areas have effects...... on fish recruitment and which these effects are. Methods: The review will examine how various physical and structural anthropogenic changes of nearshore fish habitats affect fish recruitment. Relevant studies include small- and large-scale field studies in marine and brackish systems or large lakes...

  8. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  9. Adaption of Cognitive Radio technology to low-cost and low-power wireless Personal Area Network devices

    DEFF Research Database (Denmark)

    Rohde, John; Toftegaard, Thomas Skjødeberg

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...

  10. An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

    Directory of Open Access Journals (Sweden)

    Hu Guoqing

    2015-01-01

    Full Text Available This paper presents an interested area visible watermark algorithm for digital color image based on internet. By converting color image from RGB to HSI and using the original image information to obtain the watermark coefficient, the algorithm embeds watermark on the spatial domain and selects the interested area by clicking on the picture. By visiting the site (http://dgdz.ccee.cqu.edu.cn/watermark/watermarkb.aspx and uploading the original image and watermark image, the color image with the visible watermark can be gained on web. Experimental results show that the algorithm has only a little influence on the original image and the image of watermark is clearly visible. It is very suitable for obvious identification of the copyright from digital image through Internet.

  11. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  12. Assessing the response of area burned to changing climate in western boreal North America using a Multivariate Adaptive Regression Splines (MARS) approach

    Science.gov (United States)

    Balshi, M. S.; McGuire, A.D.; Duffy, P.; Flannigan, M.; Walsh, J.; Melillo, J.

    2009-01-01

    Fire is a common disturbance in the North American boreal forest that influences ecosystem structure and function. The temporal and spatial dynamics of fire are likely to be altered as climate continues to change. In this study, we ask the question: how will area burned in boreal North America by wildfire respond to future changes in climate? To evaluate this question, we developed temporally and spatially explicit relationships between air temperature and fuel moisture codes derived from the Canadian Fire Weather Index System to estimate annual area burned at 2.5?? (latitude ?? longitude) resolution using a Multivariate Adaptive Regression Spline (MARS) approach across Alaska and Canada. Burned area was substantially more predictable in the western portion of boreal North America than in eastern Canada. Burned area was also not very predictable in areas of substantial topographic relief and in areas along the transition between boreal forest and tundra. At the scale of Alaska and western Canada, the empirical fire models explain on the order of 82% of the variation in annual area burned for the period 1960-2002. July temperature was the most frequently occurring predictor across all models, but the fuel moisture codes for the months June through August (as a group) entered the models as the most important predictors of annual area burned. To predict changes in the temporal and spatial dynamics of fire under future climate, the empirical fire models used output from the Canadian Climate Center CGCM2 global climate model to predict annual area burned through the year 2100 across Alaska and western Canada. Relative to 1991-2000, the results suggest that average area burned per decade will double by 2041-2050 and will increase on the order of 3.5-5.5 times by the last decade of the 21st century. To improve the ability to better predict wildfire across Alaska and Canada, future research should focus on incorporating additional effects of long-term and successional

  13. Adaption of the MODIS aerosol retrieval algorithm by airborne spectral surface reflectance measurements over urban areas: a case study

    Directory of Open Access Journals (Sweden)

    E. Jäkel

    2015-07-01

    Full Text Available MODIS retrievals of the aerosol optical depth (AOD are biased over urban areas, where surface reflectance is not well characterized. Since the operational MODIS aerosol retrieval for dark targets assumes fixed spectral slopes to calculate the surface reflectance at 0.47 μm, the algorithm may fail in urban areas with different spectral characteristics of the surface reflectance. To investigate this bias we have implemented variable spectral slopes into the operational MODIS aerosol algorithms of Collection 5 (C5 and C6. The variation of slopes is based on airborne measurements of surface reflectances over the city of Zhongshan, China. AOD retrieval results of the operational and the modified algorithms were compared for a MODIS measurement over Zhongshan. For this case slightly lower AOD values were derived using the modified algorithm. The retrieval methods were additionally applied to MODIS data of the Beijing area for a period between 2010–2014 when also AERONET data were available. A reduction of the differences between the AOD retrieved using the modified C5 algorithm and AERONET was found, whereby the mean difference from 0.31 ± 0.11 for the operational C5 and 0.18 ± 0.12 for the operational C6 where reduced to a mean difference of 0.09 ± 0.18 by using the modified C5 retrieval. Furthermore, the sensitivity of the MODIS AOD retrieval for several surface types was investigated. Radiative transfer simulations were performed to model reflectances at top of atmosphere for predefined aerosol properties. The reflectances were used as input for the retrieval methods. It is shown that the operational MODIS AOD retrieval over land reproduces the AOD reference input of 0.85 for dark surface types [retrieved AOD = 0.87 (C5]. An overestimation of AOD = 0.99 is found for urban surfaces, whereby the modified C5 algorithm shows a good performance with a retrieved value of AOD = 0.86.

  14. Mind the gap in SEA: An institutional perspective on why assessment of synergies amongst climate change mitigation, adaptation and other policy areas are missing

    Energy Technology Data Exchange (ETDEWEB)

    Vammen Larsen, Sanne, E-mail: sannevl@plan.aau.dk [Aalborg University, Lautrupvang 1A, 2750 Ballerup (Denmark); Kornov, Lone, E-mail: lonek@plan.aau.dk [Aalborg University, Fibigerstraede 13, 9220 Aalborg O (Denmark); Wejs, Anja, E-mail: wejs@plan.aau.dk [Aalborg University, Fibigerstraede 13, 9220 Aalborg O (Denmark)

    2012-02-15

    This article takes its point of departure in two approaches to integrating climate change into Strategic Environmental Assessment (SEA): Mitigation and adaptation, and in the fact that these, as well as the synergies between them and other policy areas, are needed as part of an integrated assessment and policy response. First, the article makes a review of how positive and negative synergies between a) climate change mitigation and adaptation and b) climate change and other environmental concerns are integrated into Danish SEA practice. Then, the article discusses the implications of not addressing synergies. Finally, the article explores institutional explanations as to why synergies are not addressed in SEA practice. A document analysis of 149 Danish SEA reports shows that only one report comprises the assessment of synergies between mitigation and adaptation, whilst 9,4% of the reports assess the synergies between climate change and other environmental concerns. The consequences of separation are both the risk of trade-offs and missed opportunities for enhancing positive synergies. In order to propose explanations for the lacking integration, the institutional background is analysed and discussed, mainly based on Scott's theory of institutions. The institutional analysis highlights a regulatory element, since the assessment of climate change synergies is underpinned by legislation, but not by guidance. This means that great focus is on normative elements such as the local interpretation of legislation and of climate change mitigation and adaptation. The analysis also focuses on how the fragmentation of the organisation in which climate change and SEA are embedded has bearings on both normative and cultural-cognitive elements. This makes the assessment of synergies challenging. The evidence gathered and presented in the article points to a need for developing the SEA process and methodology in Denmark with the aim to include climate change in the assessments

  15. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  16. Protocol Writing in Clinical Research

    Science.gov (United States)

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  17. Development of mathematical models to elaborate strategies, select alternatives and development of plans for adaptation of communities to climate change in different geographical areas including costs to implement it

    Science.gov (United States)

    Anton, J. M.; Grau, J. B.; Tarquis, A. M.; Andina, D.; Cisneros, J. M.

    2012-04-01

    There is evidence that the climate changes and that now, the change is influenced and accelerated by the CO2 augmentation in atmosphere due to combustion by humans. Such "Climate change" is on the policy agenda at the global level, with the aim of understanding and reducing its causes and to mitigate its consequences. In most countries and international organisms UNO (e.g. Rio de Janeiro 1992), OECD, EC, etc … the efforts and debates have been directed to know the possible causes, to predict the future evolution of some variable conditioners, and trying to make studies to fight against the effects or to delay the negative evolution of such. The Protocol of Kyoto 1997 set international efforts about CO2 emissions, but it was partial and not followed e.g. by USA and China …, and in Durban 2011 the ineffectiveness of humanity on such global real challenges was set as evident. Among all that, the elaboration of a global model was not boarded that can help to choose the best alternative between the feasible ones, to elaborate the strategies and to evaluate the costs, and the authors propose to enter in that frame for study. As in all natural, technological and social changes, the best-prepared countries will have the best bear and the more rapid recover. In all the geographic areas the alternative will not be the same one, but the model must help us to make the appropriated decision. It is essential to know those areas that are more sensitive to the negative effects of climate change, the parameters to take into account for its evaluation, and comprehensive plans to deal with it. The objective of this paper is to elaborate a mathematical model support of decisions, which will allow to develop and to evaluate alternatives of adaptation to the climatic change of different communities in Europe and Latin-America, mainly in especially vulnerable areas to the climatic change, considering in them all the intervening factors. The models will consider criteria of physical

  18. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  19. Climate Change Adaptation Strategies through Indigenous Knowledge System: Aspect on Agro-Crop Production in the Flood Prone Areas of Bangladesh

    Directory of Open Access Journals (Sweden)

    Md Abdullah Al Mamun

    2014-01-01

    Full Text Available This study explores the climate change adaptation strategies for agro crop production and assesses the financial suitability through indigenous knowledge in flood prone areas of Bangladesh. However, for this purpose two types of experiments have conducted with selected eight agro crop species. Firstly, the seven treatments have been experimented in a Tub (an earthen pot. In this case, Tomato (Lycoperscion esculeatum is more beneficial among these seven treatments and average benefit-cost ratio of this treatment was 3.54. Thereafter, the seven treatments also have been experimenting in Tukri (a bamboo basket. Likewise, Tomato (Lycoperscion esculeatum is more beneficial in the second experiment and average benefit-cost ratio in this treatment is 3.52 because the soil and the cow dung mixture have been used as a potting medium. On the contrary, Long coriander (Eryngium foetidum is more beneficial and average benefit-cost ratio in this treatment is 4.74 after using the soil and water hyacinth mixture as a potting medium. According to indigenous knowledge, these results could be developed from different climate change adaptation strategies in farming system for production of common agro crops as well as their financial suitability by the flood affected people of Bangladesh to harness the effect of climate change.

  20. Spatial Analysis of Soil Subsidence in Peat Meadow Areas in Friesland in Relation to Land and Water Management, Climate Change, and Adaptation

    Science.gov (United States)

    Brouns, Karlijn; Eikelboom, Tessa; Jansen, Peter C.; Janssen, Ron; Kwakernaak, Cees; van den Akker, Jan J. H.; Verhoeven, Jos T. A.

    2015-02-01

    Dutch peatlands have been subsiding due to peat decomposition, shrinkage and compression, since their reclamation in the 11th century. Currently, subsidence amounts to 1-2 cm/year. Water management in these areas is complex and costly, greenhouse gases are being emitted, and surface water quality is relatively poor. Regional and local authorities and landowners responsible for peatland management have recognized these problems. In addition, the Netherlands Royal Meteorological Institute predicts higher temperatures and drier summers, which both are expected to enhance peat decomposition. Stakeholder workshops have been organized in three case study areas in the province of Friesland to exchange knowledge on subsidence and explore future subsidence rates and the effects of land use and management changes on subsidence rates. Subsidence rates were up to 3 cm/year in deeply drained parcels and increased when we included climate change in the modeling exercises. This means that the relatively thin peat layers in this province (ca 1 m) would shrink or even disappear by the end of the century when current practices continue. Adaptation measures were explored, such as extensive dairy farming and the production of new crops in wetter conditions, but little experience has been gained on best practices. The workshops have resulted in useful exchange of ideas on possible measures and their consequences for land use and water management in the three case study areas. The province and the regional water board will use the results to develop land use and water management policies for the next decades.

  1. Spatial analysis of soil subsidence in peat meadow areas in Friesland in relation to land and water management, climate change, and adaptation.

    Science.gov (United States)

    Brouns, Karlijn; Eikelboom, Tessa; Jansen, Peter C; Janssen, Ron; Kwakernaak, Cees; van den Akker, Jan J H; Verhoeven, Jos T A

    2015-02-01

    Dutch peatlands have been subsiding due to peat decomposition, shrinkage and compression, since their reclamation in the 11th century. Currently, subsidence amounts to 1-2 cm/year. Water management in these areas is complex and costly, greenhouse gases are being emitted, and surface water quality is relatively poor. Regional and local authorities and landowners responsible for peatland management have recognized these problems. In addition, the Netherlands Royal Meteorological Institute predicts higher temperatures and drier summers, which both are expected to enhance peat decomposition. Stakeholder workshops have been organized in three case study areas in the province of Friesland to exchange knowledge on subsidence and explore future subsidence rates and the effects of land use and management changes on subsidence rates. Subsidence rates were up to 3 cm/year in deeply drained parcels and increased when we included climate change in the modeling exercises. This means that the relatively thin peat layers in this province (ca 1 m) would shrink or even disappear by the end of the century when current practices continue. Adaptation measures were explored, such as extensive dairy farming and the production of new crops in wetter conditions, but little experience has been gained on best practices. The workshops have resulted in useful exchange of ideas on possible measures and their consequences for land use and water management in the three case study areas. The province and the regional water board will use the results to develop land use and water management policies for the next decades.

  2. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  3. Leaf thickness controls variation in leaf mass per area (LMA) among grazing-adapted grasses in Serengeti.

    Science.gov (United States)

    Griffith, Daniel M; Quigley, Kathleen M; Anderson, T Michael

    2016-08-01

    Leaf mass per area (LMA) is a primary plant functional trait that represents the cost of constructing a leaf. Ultimately, plants modify LMA by altering leaf thickness (LT), leaf dry matter content (LDMC), or both. While LMA can be modified through both of these constituents, studies of LMA have found that there is variation in whether LT or LDMC changes are responsible for LMA-and the relationships change depending on the species or functional groups being compared. In this study, we used a phylogenetic framework to determine that evolutionary shifts in LMA are driven by LT, and not LDMC, among 45 Serengeti grass species. We considered two alternative hypotheses that could result in evolutionary correlation of LMA on LT but not LDMC: either (1) LT is more labile than LDMC-and is therefore a less costly means to change LMA or (2) LDMC is tightly coupled to a different dimension of leaf variation (e.g., leaf hydraulics), leaving LT as the source of variation in LMA. LT was not more labile than LDMC, leading us to conclude that the evolution of LMA has been shaped by LT because LDMC is responding to other demands on leaf physiology. We speculate that leaf hydraulics provide this constraint on LDMC. The decoupling of LDMC from LT may allow plants to better optimize resource allocation in ecosystems where gradients in light competition, herbivory, and aridity place competing demands on leaf economics.

  4. [The teaching of microbiology and parasitology in undergraduate medical education and its adaptation to the European Higher Education Area].

    Science.gov (United States)

    Ruiz, Vicente Ausina; Otero, Beatriz Mirelis; Pastor, Guillem Prats

    2010-10-01

    The creation of the European Higher Education Area provides a series of opportunities for far-reaching reform of medical education and changes in the way both students and teachers work. The Bologna process must be implemented before 2010 in signatory countries, which include Spain, and must allow education and academic titles to be homologated. Medical degrees must consist of 360 European Credit Transfer System (ECTS) credits, divided into six academic years (60 credits per academic year). The Faculty of Medicine of the Autonomous University of Barcelona has already put the finishing touches to a proposal for the distribution of subjects in the new curriculum. This proposal strengthens and reassesses the teaching of microbiology and parasitology compared with current curricula, giving these subjects appropriate weight in undergraduate medical education. The teaching of medical microbiology and parasitology is included as a core subject worth 8 ECTS in the third year and two free-choice modules of 2.5 and 3 ECTS to be taken in the first semesters of the fifth and sixth years as part of the minor in "Clinical and Experimental Laboratory"(30 ECTS). The teaching of microbiology will also play an important role in the Integrated Learning in Medicine (INTEL-M) course in the third, fourth and fifth years. INTEL-M is an innovation in the syllabus based on the joint planning, organization and evaluation of a series of subjects (24.5 ECTS) that are developed in small groups of students and in the form of problem-based learning.

  5. Topological Design of Protocols

    CERN Document Server

    Jaffe, Arthur; Wozniakowski, Alex

    2016-01-01

    We give a topological simulation for tensor networks that we call the two-string model. In this approach we give a new way to design protocols, and we discover a new multipartite quantum communication protocol. We introduce the notion of topologically compressed transformations. Our new protocol can implement multiple, non-local compressed transformations among multi-parties using one multipartite resource state.

  6. Adaptation of the dynamic model for radiological assessment of nuclear accident in rural area under conditions of tropical climate; Adaptacao do modelo dinamico para avaliacao radiologica de acidente nuclear em area rural nas condicoes de clima tropical

    Energy Technology Data Exchange (ETDEWEB)

    Vinhas, Denise Martins

    2004-07-01

    Following an accidental release of radionuclides to the atmosphere that leads to the contamination of large areas, a detailed and fast methodology to assess the prognosis of public exposure is needed, in order to estimate radiological consequences and propose and optimize decisions related to the protection of the public. The model ECOSYS has been chosen to integrate the SIEM, the Integrated Emergency System developed by IRD/CNEN, to assess the doses at the short, medium and long term to the public after an accidental contamination of rural areas. The objective of this work is to perform the adaptation of the model ECOSYS to be used in Brazil to assess public exposure and support decision processes regarding the implementation of protective measures but also to guide the need for studies and research aiming to improve the adequacy of estimates to the actual Brazilian situation. The area select for reference to this work consists on the 50 km radius area surrounding the Brazilian nuclear power plants, located at Angra dos Reis County, in the state of Rio de Janeiro. The methodology included the definition of criteria to select agricultural cultures and animals to be simulated, taking into account both the availability of the production at the selected area and the relevance of the food to the population regional diet. Radionuclides included in this study were {sup 137}Cs, {sup 90} Sr and {sup 131} I. A large survey has been performed to gather data related to both agricultural practices and behavior of radionuclides in the selected agricultural-systems. The results of simulation indicated the relevance of the knowledge of local aspects on the estimated doses. Important factors included the kind of products produced, seasonality, agricultural practices, animals feed practices, kind of soil, and ingestion habits of the population. (author)

  7. Adaption of the MODIS aerosol retrieval algorithm using airborne spectral surface reflectance measurements over urban areas: a case study

    Science.gov (United States)

    Jäkel, E.; Mey, B.; Levy, R.; Gu, X.; Yu, T.; Li, Z.; Althausen, D.; Heese, B.; Wendisch, M.

    2015-12-01

    MODIS (MOderate-resolution Imaging Spectroradiometer) retrievals of aerosol optical depth (AOD) are biased over urban areas, primarily because the reflectance characteristics of urban surfaces are different than that assumed by the retrieval algorithm. Specifically, the operational "dark-target" retrieval is tuned towards vegetated (dark) surfaces and assumes a spectral relationship to estimate the surface reflectance in blue and red wavelengths. From airborne measurements of surface reflectance over the city of Zhongshan, China, were collected that could replace the assumptions within the MODIS retrieval algorithm. The subsequent impact was tested upon two versions of the operational algorithm, Collections 5 and 6 (C5 and C6). AOD retrieval results of the operational and modified algorithms were compared for a specific case study over Zhongshan to show minor differences between them all. However, the Zhongshan-based spectral surface relationship was applied to a much larger urban sample, specifically to the MODIS data taken over Beijing between 2010 and 2014. These results were compared directly to ground-based AERONET (AErosol RObotic NETwork) measurements of AOD. A significant reduction of the differences between the AOD retrieved by the modified algorithms and AERONET was found, whereby the mean difference decreased from 0.27±0.14 for the operational C5 and 0.19±0.12 for the operational C6 to 0.10±0.15 and -0.02±0.17 by using the modified C5 and C6 retrievals. Since the modified algorithms assume a higher contribution by the surface to the total measured reflectance from MODIS, consequently the overestimation of AOD by the operational methods is reduced. Furthermore, the sensitivity of the MODIS AOD retrieval with respect to different surface types was investigated. Radiative transfer simulations were performed to model reflectances at top of atmosphere for predefined aerosol properties. The reflectance data were used as input for the retrieval methods. It

  8. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  9. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  10. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field d

  11. Examining the Specific Effects of Context on Adaptive Behavior and Achievement in a Rural African Community: Six Case Studies from Rural Areas of Southern Province, Zambia

    Science.gov (United States)

    Tan, Mei; Reich, Jodi; Hart, Lesley; Thuma, Philip E.; Grigorenko, Elena L.

    2014-01-01

    Generally accepted as universal, the construct of adaptive behavior differs in its manifestations across different cultures and settings. The Vineland-II (Sparrow et al. in "Vineland Adaptive Behavior Scales, Second edn." AGS Publishing, Circle Pines, MN, 2005) was translated into Chitonga and adapted to the setting of rural Southern…

  12. Investigation of Adaptive-threshold Approaches for Determining Area-Time Integrals from Satellite Infrared Data to Estimate Convective Rain Volumes

    Science.gov (United States)

    Smith, Paul L.; VonderHaar, Thomas H.

    1996-01-01

    The principal goal of this project is to establish relationships that would allow application of area-time integral (ATI) calculations based upon satellite data to estimate rainfall volumes. The research is being carried out as a collaborative effort between the two participating organizations, with the satellite data analysis to determine values for the ATIs being done primarily by the STC-METSAT scientists and the associated radar data analysis to determine the 'ground-truth' rainfall estimates being done primarily at the South Dakota School of Mines and Technology (SDSM&T). Synthesis of the two separate kinds of data and investigation of the resulting rainfall-versus-ATI relationships is then carried out jointly. The research has been pursued using two different approaches, which for convenience can be designated as the 'fixed-threshold approach' and the 'adaptive-threshold approach'. In the former, an attempt is made to determine a single temperature threshold in the satellite infrared data that would yield ATI values for identifiable cloud clusters which are closely related to the corresponding rainfall amounts as determined by radar. Work on the second, or 'adaptive-threshold', approach for determining the satellite ATI values has explored two avenues: (1) attempt involved choosing IR thresholds to match the satellite ATI values with ones separately calculated from the radar data on a case basis; and (2) an attempt involved a striaghtforward screening analysis to determine the (fixed) offset that would lead to the strongest correlation and lowest standard error of estimate in the relationship between the satellite ATI values and the corresponding rainfall volumes.

  13. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  14. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  15. On the Connection between Leakage Tolerance and Adaptive Security

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela

    2013-01-01

    We revisit the context of leakage-tolerant interactive protocols as defined by Bitanski, Canetti and Halevi (TCC 2012). Our contributions can be summarized as follows: For the purpose of secure message transmission, any encryption protocol with message space M and secret key space SK tolerating...... at the end of the protocol execution, if and only if the protocol has passive adaptive security against an adaptive corruption of one party at the end of the protocol execution. This shows that as soon as a little leakage is tolerated, one needs full adaptive security. In case more than one party can...... be corrupted, we get that leakage tolerance is equivalent to a weaker form of adaptivity, which we call semi-adaptivity. Roughly, a protocol has semi-adaptive security if there exist a simulator which can simulate the internal state of corrupted parties, however, such a state is not required...

  16. A Low Energy Intelligent Clustering Protocol for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Li, Qiao; Cui, Lingguo; Zhang, Baihai

    2010-01-01

    LEACH (low-energy adaptive clustering hierarchy) is a well-known self-organizing, adaptive clustering protocol of wireless sensor networks. However it has some shortcomings when it faces such problems as the cluster construction and energy management. In this paper, LEICP (low energy intelligent...... clustering protocol), an improvement of the LEACH protocol is proposed to overcome the shortcomings of LEACH. LEICP aims at balancing the energy consumption in every cluster and prolonging the network lifetime. A fitness function is defined to balance the energy consumption in every cluster according...

  17. Social Protocols for Agile Virtual Teams

    Science.gov (United States)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  18. Social Protocols for Agile Virtual Teams

    CERN Document Server

    Picard, Willy

    2011-01-01

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  19. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  1. Effectiveness and cost-effectiveness of cognitive adaptation training as a nursing intervention in long-term residential patients with severe mental illness : study protocol for a randomized controlled trial

    NARCIS (Netherlands)

    Stiekema, Annemarie P. M.; Quee, Piotr J.; Dethmers, Marian; van den Heuvel, Edwin R.; Redmeijer, Jeroen E.; Rietberg, Kees; Stant, A. Dennis; Swart, Marte; van Weeghel, Jaap; Aleman, Andre; Velligan, Dawn I.; Schoevers, Robert A.; Bruggeman, Richard; van der Meer, Lisette

    2015-01-01

    Background: Despite the well-known importance of cognitive deficits for everyday functioning in patients with severe mental illness (SMI), evidence-based interventions directed at these problems are especially scarce for SMI patients in long-term clinical facilities. Cognitive adaptation Training (C

  2. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  3. Adaptation, Implementation Plan, and Evaluation of an Online Tobacco Cessation Training Program for Health Care Professionals in Three Spanish-Speaking Latin American Countries: Protocol of the Fruitful Study

    Science.gov (United States)

    Company, Assumpta; Guillen, Olga; Margalef, Mercè; Arrien, Martha Alicia; Sánchez, Claudia; Cáceres de León, Paula

    2017-01-01

    Background Tobacco cessation training programs to treat tobacco dependence have measureable effects on patients’ smoking. Tobacco consumption in low- and middle-income countries (LMICs) is high and slowly decreasing, but these countries usually lack measures to face the epidemic, including tobacco cessation training programs for health professionals and organizations. Based on a previous online smoking cessation training program for hospital workers in Spain, the Fruitful Study aims to increase smoking cessation knowledge, attitudes, self-confidence, and performance interventions among health care professionals of three Spanish-speaking low- and middle-income Latin American and Caribbean (LAC) countries. Objective The purpose of this paper is to describe the methodology and evaluation strategy of the Fruitful Study intended to adapt, implement, and test the effectiveness of an online, evidence-based tobacco cessation training program addressed to health professionals from Bolivia, Guatemala, and Paraguay. Methods This study will use a mixed-methods design with a pre-post evaluation (quantitative approach) and in-depth interviews and focus groups (qualitative approach). The main outcomes will be (1) participants’ attitudes, knowledge, and behaviors before and after the training; and (2) the level of implementation of tobacco control policies within the hospitals before and after the training. Results To date, adaptation of the materials, study enrollment, and training activities have been completed. During the adaptation, the main mismatches were language background and content adaptation. Several aids were developed to enable students’ training enrollment, including access to computers, support from technicians, and reminders to correctly complete the course. Follow-up data collection is in progress. We have enrolled 281 hospital workers. Results are expected at the beginning of 2017 and will be reported in two follow-up papers: one about the formative

  4. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  5. Mega drought in the Colorado River Basin, water supply, and adaptive scenario planning for the Phoenix Metropolitan Area; simulations using WaterSim 5.

    Science.gov (United States)

    Sampson, D. A.

    2015-12-01

    The Decision Center for a Desert City (DCDC), a boundary organization, bridges science and policy (to foster knowledge-based decision making); we study how decisions are made in the face of uncertainty. Our water policy and management model for the Phoenix Metropolitan Area (hereafter "Phoenix"), termed WaterSim, represents one such bridging mechanism. We evaluated the effect of varying the length of drought on water availability for Phoenix. We examined droughts (starting in 2000) lasting 15, 25, and 50 years. We picked a 60-year window of runoff estimates from the paleo reconstruction data for the Colorado River (CO) (1121 through 1180 A.D.), and the two local rivers (1391 through 1450 A.D.), and assumed that the proportional difference in median flow between these periods and the long-term record represented an estimate of potential drought reductions on river flows. This resulted in a 12%, and 19% reduction in flows for the CO River and the Salt-Verde (SV) Rivers, respectively. WaterSim uses 30-year trace periods from the historical flow records to simulate river flow for future projections. We used each 30-year trace from the historical record (1906 to present, CO River; 1945 to present SV Rivers) , and default settings, to simulate 60 year projections of Lake Mead elevation and the accompanying Colorado River water shortages to Phoenix. Overall, elevations for Lake Mead fell below the 1st shortage sharing tier (1075 ft) in 83% of the simulations; 74% of the simulations fell below the 2nd tier (1050 ft), and 64% fell below the 3rd (1025 ft). Length of drought, however, determined the shortage tiers met. Median elevations for droughts ending in 2015, 2025, and 2050 were 1036, 1019, and 967 feet msl, respectively. We present the plausible water futures with adaptive anticipatory scenario planning for the projected reductions in surface water availability to demonstrate decision points for water conservation measures to effectively manage shortage conditions.

  6. Analysis on Adaptability of Montessori Teaching Method in Ethnic Minority Areas%民族地区实施蒙氏教育的适切性研究

    Institute of Scientific and Technical Information of China (English)

    袁梅

    2014-01-01

    Montessori teaching method has initiated a broad impact in the world since its birth at the begin-ning of 20 century.Although Montessori teaching method was introduced to China only a short time ago, the enthusiasm to promote this method is extremely high and there are already many Montessori kinder-gartens or Montessori classes.T herefore, whether in theoretic or practical level, it is necessary to do a in-depth research on Montessori teaching method so as to promote its wholesome development in China.With the advantages of high quality, the adaptation to multi-culture and the quality of economy, Montessori teaching method is comparatively fit to be carried out in the underdeveloped ethnic minority areas in China.%蒙台梭利教学法自20世纪初诞生至今,在世界范围内产生了广泛的影响。中国引进蒙台梭利教学法的时间虽短,但对蒙氏教学法的推广热情极高,已有众多蒙氏幼儿园或蒙氏班。因此,无论从理论层面还是实践层面,有必要对蒙氏教学法进行深入研究,以推进我国蒙氏教育的健康发展。由于蒙台梭利教育体系所具备的高质性、对多元文化的适应以及经济性等优质特性,因此在我国欠发达民族地区比较适合运用蒙台梭利幼儿教育体系。

  7. A Priority Protocol for Token-Ring Networks

    Science.gov (United States)

    Liu, H. T.

    1986-01-01

    New priority protocol controls access to token-ring local-area network (LAN) of digital-communication stations over widely ranging mix of low- and high-priority traffic. Protocol, called round-robin priority scheme (RRPS), introduces only small overhead and therefore degrades system performance only minimally. Key messages guaranteed access to local-area network during peak loads.

  8. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  9. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  10. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise......Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification...... implementations that closely correspond to their legal specification, thereby increasing trust....

  11. A cluster randomised controlled trial protocol of an adapted intervention for alcohol use disorders in people living with HIV and AIDS: impact on alcohol use, general functional ability, quality of life and adherence to HAART

    OpenAIRE

    Madhombiro, Munyaradzi; Dube-Marimbe, Bazondlile; Dube, Michelle; Chibanda, Dixon; Zunza, Moleen; Rusakaniko, Simbarashe; Stewart, David; Seedat, Soraya

    2017-01-01

    Background Interventions for alcohol use disorders (AUDs) in HIV infected individuals have been primarily targeted at HIV risk reduction and improved antiretroviral treatment adherence. However, reduction in alcohol use is an important goal. Alcohol use affects other key factors that may influence treatment course and outcome. In this study the authors aim to administer an adapted intervention for AUDs to reduce alcohol use in people living with HIV/AIDS (PLWHA). Methods This study is a clust...

  12. Routing Protocol Performance Issues and Evaluation Considerations in MANET

    Directory of Open Access Journals (Sweden)

    P.Venkata Maheswara,

    2013-07-01

    Full Text Available Mobile nodes in Wire less a d-hoc networ k need to operate as routers in or d er to maintain the informa tion ab out network connectivity as there is no centralized infrastructure. Therefore,Routing Protocols are required which could adapt dynamically to the changing topologies and works at low data rates. As are sult, there arises a need for the compreh ensive performance evaluation of the ad-doc routing protocols in same frame work to under stand their comparative merits and suitability for deployment in different scenarios. In this paper the protocols suite selected for comparison are AODV, DSR, TORA and OLSR ad- hoc routing protocols, as these were the most promising from all other protocols. The performance of these protocols is evaluated through exhaustive simulations using the OPNET Model network simulator under different parameters like routing over head, delay , throughput and network load under varying the mobile nodes .

  13. AN INTERACTIVE VISUALIZATION TOOL FOR ANIMATING BEHAVIOR OF CRYPTOGRAPHIC PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mabroka Maeref

    2015-03-01

    Full Text Available Cryptography and Network Security is a difficult subject to understand, mainly because of the complexity of security protocols and the mathematical rigour required to understand encryption algorithms. Realizing the need for an interactive visualization tool to facilitate the understanding of cryptographic concepts and protocols, several tools had been developed. However, these tools cannot be easily adapted to animate different protocols. The aim of this paper is to propose an interactive visualization tool, called the Cryptographic Protocol Animator (CPAnim. The tool enables a student to specify a protocol and gain knowledge about the impact of its behavior. The protocol is specified by using a scenario-based approach and it is demonstrated as a number of scenes displaying a complete scenario. The effectiveness of this tool was tested using an empirical evaluation method. The results show that this tool was effective in meeting its learning objectives.

  14. Kyoto protocol and cogeneration in rural areas: institutional and organizational configuration and perspectives; Protocolo de Kyoto e co-geracao no meio rural: configuracao institucional e organizacional e perspectivas

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Zilmar Jose de; Azevedo, Paulo Furquim de [Fundacao Getulio Vargas (EESP/FGV), Sao Paulo, SP (Brazil). Escola de Economia de Sao Paulo], e-mails: zilmar.souza@energiasdobrasil.com.br, pfa@fgvsp.br

    2006-07-01

    This article presents a brief historical record concerning the Brazilian institutional arrangement given to the Kyoto Protocol and, based on the Brazilian emissions profile, discusses general perspectives to the use of the CDM, mainly in projects involving co-generation in the agricultural sector. It is observed high uncertainty about the liquidity and development of the carbon credit market, above all, with reference to the definition of the second period of the Kyoto Protocol commitments. Even so, with the consolidation of the institutional environment, the carbon credit market must become favorable to the projects of co-generation in agricultural sector, especially in countries as Brazil. (author)

  15. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  16. Effect of Blackhole Attack on Single Hop and Multihop Leach Protocol

    Directory of Open Access Journals (Sweden)

    Siddiq Iqbal,

    2014-05-01

    Full Text Available Wireless micro sensor networks provide reliable monitoring of remote areas for data-gathering. Due to the limited battery capacity of sensor nodes, energy consumption plays an important role in the operation of WSN. This can be improved by using a protocol called Low energy adaptive clustering hierarchy (LEACH.Malicious attacks are generated in the network due to power supply, processing abilities and capacity for high power radio transmission. In this paper one such attack namely BlackHole attack and its effect on single hop LEACH and multihop LEACH has been compared, simulated and analyzed.

  17. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  18. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  19. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  20. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  1. Highly Efficient Inversion of the C-3 Configuration in 1,2-O-Isopropylidenefuranose Derivatives by an Adapted Swern Oxidation/Sodium Borohydride Reduction Protocol in One Pot

    OpenAIRE

    Silvano Cruz-Gregorio; Luis Hernández; Mónica Vargas; Leticia Quintero; Fernando Sartillo-Piscil

    2005-01-01

    One pot Swern oxidation-sodium borohydride reduction of 1,2-O-isopropylidenefuranose derivatives having the D-gluco or Dxylo configurations led to the corresponding stereoisomers resulting from the stereoselective inversion of C-3. This method is a simple adaptation to the traditional procedure that consists in quenching the Swern oxidation at -60 ºC with a mixture of H2O/EtOH (1:4), in which NaBH4 is dissolved. Thus, the inversion of the configuration at C-3 of 1,2-O-isopropylidenefuranose d...

  2. A simulation study of TaMAC protocol using network simulator 2.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-10-01

    A Wireless Body Area Network (WBAN) is expected to play a significant role in future healthcare system. It interconnects low-cost and intelligent sensor nodes in, on, or around a human body to serve a variety of medical applications. It can be used to diagnose and treat patients with chronic diseases such as hypertensions, diabetes, and cardiovascular diseases. The lightweight sensor nodes integrated in WBAN require low-power operation, which can be achieved using different optimization techniques. We introduce a Traffic-adaptive MAC protocol (TaMAC) for WBAN that supports dual wakeup mechanisms for normal, emergency, and on-demand traffic. In this letter, the TaMAC protocol is simulated using a well-known Network Simulator 2 (NS-2). The problem of multiple emergency nodes is solved using both wakeup radio and CSMA/CA protocol. The power consumption, delay, and throughput performance are closely compared with beacon-enabled IEEE 802.15.4 MAC protocol using extensive simulations.

  3. 一种自适应功率控制的信道预约多址接入协议%Channel reservation MAC protocol with adaptive power control mechanism carrier sensing

    Institute of Scientific and Technical Information of China (English)

    袁韵洁; 李波; 闫中江

    2013-01-01

    提出了一种动态调整发送功率和载波侦听门限的信道预约多址接入协议(PC-CRM).该协议将功率控制技术应用于信道预约机制,通过对预约节点发送功率的优化设定和载波侦听门限的动态调整,使得相邻节点可以同时复用信道,从而在增强预约稳定性的基础上,提升了网络容量,降低了节点能耗.仿真结果显示,与IEEE 802.11 DCF和基本信道预约协议相比,PC-CRM协议在网络吞吐率、能量消耗效率和分组延迟抖动方面均有明显优势.%vA channel reservation MAC protocol with the adjustable transmission power and carrier sensing threshold, called PC-CRM, is proposed. PC-CRM solves the problems of poor transmission quality, low network capacity and high energy consumption, which are caused by the distributed contention based channel access scheme in Ad Hoc networks. By employing power control into the channel reservation schemes, PC-CRM adjusts the transmission power and carrier sensing threshold to the optimum values, such that the channel is multiplexed in space. Additionally, PC-CRM is also capable of stabilizing the channel reservation, improving the network capacity, and reducing the energy cost. Simulation results show that, compared with IEEE 802. 11DCF and the basic channel reservation scheme, PC-CRM performs better in terms of the throughput, energy efficiency and delay jitter.

  4. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  5. Blind Cognitive MAC Protocols

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2008-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.

  6. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  7. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  8. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  9. Protocol for a Delay-Tolerant Data-Communication Network

    Science.gov (United States)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  10. Dynamic Routing Protocol for Computer Networks with Clustering Topology

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.

  11. Protocol Materials: A Clarification.

    Science.gov (United States)

    Innerd, Wilfred; O'Gorman, David

    "Protocol materials" are records or recordings of a wide variety of behavioral situations. Characteristically they are neither simulated nor extensively edited. They are to be used for the empirical verification of concepts derived from both educational theory and the social sciences. They are attempts to capture reality so that it may be studied…

  12. THE MASTER PROTOCOL CONCEPT

    Science.gov (United States)

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  13. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  14. ECHO's Reverb as a Client to the CEOS CWIC Catalog Portal using OGC's CSW Protocol

    Science.gov (United States)

    Farley, J. D.; Mitchell, A.; Nakamura, E.; Duma, C.; Enloe, Y.

    2011-12-01

    China's Academy of Opto-Electronics (AOE). CWIC provides both ISO 19115 and ebRIM CSW profiles. For this study, we developed a protocol adapter which exposes an ECHO API interface to which Reverb connects and communicates. The adapter software provides bi-directional translation of the ECHO protocol with the CSW protocol. The CSW side of the adapter communicates with CWIC using the CSW protocol. In between, the adapter transforms the requests and responses from one protocol to the other. This provided us the opportunity to analyze the results of mapping all of the attributes of Reverb's multi-discipline search requests into CSW requests as well as mapping the CSW/ISO-19115 search results back into Reverb results. This talk will focus upon lessons learned from our study, especially in the areas of: - Efficiency of the CSW protocol for performing cross-discipline Earth Science data search and access. - Application of the ISO 19115 profile. - The challenges of attribute mapping. - Performance and scalability issues. A live demo of the Reverb to CWIC system will be provided.

  15. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  16. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  17. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    OpenAIRE

    2013-01-01

    Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  18. Communication Protocols Augmentation in VLSI Design Applications

    Directory of Open Access Journals (Sweden)

    Kanhu Charan Padhy

    2015-05-01

    Full Text Available With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.

  19. 北京门头沟采石场废弃地造林树种生长状况调查%Adaptability analysis of planting species in the abandoned area of quarry in Mentougou District of Beijing

    Institute of Scientific and Technical Information of China (English)

    石丽丽; 赵廷宁; 王雄宾; 谷建才

    2013-01-01

    矿山废弃地生态恢复是环境建设的一项重要工作,为了探讨不同矿山废弃地植被恢复措施,作者对门头沟采石场不同植被恢复措施中实施6年后的乔木、灌木树种生长状况进行了调查,在建立树种适应性指数的基础上,对11种树种在门头沟采石场废弃地适应性进行了评价.结果表明:1)灌木类型适应性普遍高于乔木树种类型,各乔木、灌木适应性差异显著;2)乔木适应性表现为黄栌>银杏>油松>火炬>侧柏>桧柏+侧柏混交林>杜仲>国槐,灌木适应性表现为桃树>丁香>连翘.%The ecological restoration of abandoned mines is an important work to environment construction. In order to discuss vegetation restoration measures of abandoned mines, the growth adaptability of planting species were investigated after different vegetation restoration measures were implemented for six years on abandoned quarry in Mentougou. The adaptability of 11 kinds of planting species was evaluated based on the adaptability index. The vegetation investigation was implemented in the abandoned area of quarry in Mentougou, and the adaptability of 11 kinds of planting species was evaluated based on the adaptability index. The results showed; the adaptability of shrubs was better than that of arbors; the difference of the adaptability of the 11 kinds of planting species was significant. Adaptability of the 8 arbors were in the following order; Cotinus coggygria > Ginkgo biloba > Pinus tabulaeformis > Rhus typhina > Platycladus orientalis > mixed forest of Sabina chinensis and Platycladus orientalis > Eucommia ulmoides > Sophora japonica, and that of shrubs were; Amygdalus persica > Syringa pekinensis > Forsythia suspensa.

  20. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  1. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  2. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    level. In noisy-channel cryptography security proofs are based on the assumption that a given physical means of communication is at a sufficiently low level inherently noisy. In bounded-storage cryptography security proofs are based on the assumption that there exists streams of information, generated...... by computers or other physical phenomena, so intense that no one is able to fully store them. In quantum cryptography security proofs are based on the assumption that nature behaves consistently with quantum mechanics. In the following we describe the state of the art and some main open problems in the three......This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...

  3. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  4. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  5. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park , NC 27709-2211 cognitive...related to mobility and topology changes in a wireless multi-hop ad hoc network. (xv) We used a cross-layer formulation to design transmission...the transmission parameters, the implemented protocol and the network topology . The solution adopted involves a heuristic metric to measure how the

  6. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  7. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  8. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  9. Adaptive Communication Techniques for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Du

    2013-03-01

    Full Text Available The vision for the Internet of Things (IoT demands that material objects acquire communications and computation capabilities and become able to automatically identify themselves through standard protocols and open systems, using the Internet as their foundation. Yet, several challenges still must be addressed for this vision to become a reality. A core ingredient in such development is the ability of heterogeneous devices to communicate adaptively so as to make the best of limited spectrum availability and cope with competition which is inevitable as more and more objects connect to the system. This survey provides an overview of current developments in this area, placing emphasis on wireless sensor networks that can provide IoT capabilities for material objects and techniques that can be used in the context of systems employing low-power versions of the Internet Protocol (IP stack. The survey introduces a conceptual model that facilitates the identification of opportunities for adaptation in each layer of the network stack. After a detailed discussion of specific approaches applicable to particular layers, we consider how sharing information across layers can facilitate further adaptation. We conclude with a discussion of future research directions.

  10. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  11. 高速公路服务区危化品车辆停放的适应性评价%Study on Adaptability Evaluation of Dangerous Chemical Vehicles Parking in Expressway Service Areas

    Institute of Scientific and Technical Information of China (English)

    潘玲

    2014-01-01

    Based on a wide investigation of parking facilities and safety management requirements for dangerous chemical vehicles in highway service areas of Guangdong Province, a series of indexes for evaluating the adaptability of dangerous chemical vehicles parking in a service area are designed and selected. The evaluation standards and weights of those indexes are also determined. Then an adaptability evaluation system of dangerous chemical vehicles parking in service areas is proposed. Taking 5 typical service areas as examples, such as Liang Jinshan, Houmen, Heng Shishui, Zhongxin and Xiangang Service Areas, the evaluation method proposed in this paper is applied to value the adaptabilities of dan-gerous chemical vehicles parking in those service areas. The effectiveness of the evaluation method is showed by comparison between evaluation results and actual investigations. The research conclusions provide some theory evidences for highway dangerous chemical vehicle parking planning.%在广泛调研广东省高速公路服务区危化品车辆的停车配套及服务区安全管理要求的基础上,设计、筛选服务区危化品车辆停放的适应性评价指标,确定各指标的赋值标准与权重,建立服务区危化品车辆停放的适应性评价体系。选取梁金山、鲘门、横石水、忠信和蚬岗5个典型服务区作试点,运用该评价方法判断各服务区危化品车辆停放的适应程度,并与实际调研情况比对,说明该评价方法的有效性。评价结果为高速公路危化品车辆的停靠规划提供理论依据。

  12. Cross-sectional study of rate-adaptive pacemaker in Shanghai area%频率应答起搏器在上海地区的应用情况

    Institute of Scientific and Technical Information of China (English)

    李骁; 毛家亮; 刘志刚; 李京波; 蒋金发; 李莹; 乔增勇; 宿燕岗; 葛均波

    2016-01-01

    Objective To investigate the use of rate-adaptive pacemaker in Shanghai area and provide a preliminary overview of application of rate-adaptive function in clinical practice. Methods We selected 16 hospitals covering most districts of Shanghai and collected data in the patient demographics,types of arrhythmi-a,types of pacemaker and status of rate-adaptive function of pacemakers that were implanted from February 2013 to February 2014. In addition,we analyzed clinicians’ perspective in rate-adaptive function by means of questionnaire. Results The proportion of rate-adaptive pacemaker was 74. 86 ( predominantly DDDR) . How-ever,only 36. 63% of these pacemaker had rate-adaptive function turned on. Most were kept turned off on pur-pose. The main reason for rate-adaptive function turned off was that patients had been used to low heart rate be-fore pacemaker implantation,leading to 50. 97% patients had it turned off during follow up. Clinicians paid little attention to chronotropic incompetence or age before rate-adaptive pacemaker implantation. Conclusion The proportion of rate-adaptive pacemaker is high. However,the proportion of these pacemakers that had rate-adap-tive function turned on is low. More attention should be paid to standardize default setting and follow up strategy of rate-adaptive pacemakers.%目的:调查上海地区频率应答起搏器的使用情况,为国内该领域提供较为客观的临床现状数据。方法选取覆盖上海多数区县的16家医院,对2013年2月至2014年2月已植入频率应答起搏器患者的人口学情况、心律失常原因、起搏器类型和开启及开启后关闭频率应答功能的情况进行回顾性研究。另外,问卷调查每家医院2~3名植入医生对频率应答起搏器使用情况等的看法。结果①频率应答起搏器植入比例高达74.86%(主要为DDDR),但频率应答功能开启比例不高(平均36.63%),主观有意识不开启R功能的主要原因;②开启

  13. Assessing competence: The European survey on aging protocol (ESAP)

    NARCIS (Netherlands)

    Fernandez-Ballesteros, R.; Zamarron, M.D.; Rudinger, G.; Schroots, J.J.F.

    2004-01-01

    Objectives: The main goal of this research project was to translate and adapt the European Survey on Ageing Protocol (ESAP) to 7 European countries/cultures. This article presents preliminary results from the ESAP, the basic assessment instrument of EXCELSA (European Longitudinal Study of Aging). Me

  14. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  15. CT protocol review and optimization.

    Science.gov (United States)

    Kofler, James M; Cody, Dianna D; Morin, Richard L

    2014-03-01

    To reduce the radiation dose associated with CT scans, much attention is focused on CT protocol review and improvement. In fact, annual protocol reviews will soon be required for ACR CT accreditation. A major challenge in the protocol review process is determining whether a current protocol is optimal and deciding what steps to take to improve it. In this paper, the authors describe methods for pinpointing deficiencies in CT protocols and provide a systematic approach for optimizing them. Emphasis is placed on a team approach, with a team consisting of at least one radiologist, one physicist, and one technologist. This core team completes a critical review of all aspects of a CT protocol and carefully evaluates proposed improvements. Changes to protocols are implemented only with consensus of the core team, with consideration of all aspects of the CT examination, including image quality, radiation dose, patient care and safety, and workflow.

  16. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  17. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  18. The Public Perception and Adaptive Behavior of Geological Disaster in Coal Mine Area%公众对煤矿区地质灾害的感知与适应行为研究

    Institute of Scientific and Technical Information of China (English)

    史兴民

    2015-01-01

    Geological hazards are more common in coal mining areas.As exploitation time goes on,geological disasters are more and more serious in coal mine.The public perception and adaptive behaviors of the geological hazard are related with their life and property directly.They also affect the establishment of the environment policy, laws.Based on the questionnaires,the public perception and adaptive behaviors of the geological hazard are ana-lyzed in this paper.The results show that the public perception of the severity and cause of geological disasters is more accurate.However there is still a considerable proportion of the public to take urgent adaptation behavior in-valid.Nearly 1 /3 of the public did not consider the adaptive behavior of migration.There is a game of stakeholders behind the public adaptive behavior of the geological disasters in coal mine area.%煤矿区的地质灾害较为常见,而且随着开采时间的推移地质灾害问题日益严重。公众对煤矿区地质灾害的感知与适应行为直接与他们的生命财产相关,同时还关系到政策法规的制定。通过对煤矿区公众的问卷调查发现,公众对地质灾害的严重程度和灾害原因感知是比较准确的,但仍有相当比例的公众选择采取无效的紧急适应行为,有近三分之一的公众没有考虑采用迁移的适应行为。公众对煤矿区地质灾害适应行为的背后涉及利益相关方的博弈。

  19. 都市密集区的气候风险与适应性建设——以上海为例%Climate Risk and Adaptation Strategies in Metropolis Dense Areas: A Case Study of Shanghai

    Institute of Scientific and Technical Information of China (English)

    宋蕾

    2012-01-01

    Frequent extreme climate events are increasing climate risk and challenging adaptive capabilities in metropolis dense areas. The vulnerability assessment and the demands for adaptive capabilities are the crux of climate risk management and policy-making decisions. This research had emphasis on the specific characteristics of climate risk as well as the impact factors of vulnerabilities. Furthermore, grounded on the approach of participatory analysis, the case studies in Shanghai had been carried out, which reflected how different the stakeholders had the perception of climate risk and the demands of adaptation. The main hazard factors of climate change in Shanghai focused on the typhoons, rain storms and heat waves, which had impacts on social and economic development including the transportations, energy supply, agricultural development and urban waterlogging. The participatory stakeholder analysis in Shanghai depicted the different adaption demands. The communities in Shanghai emphasized the adaptation demands for heat weaves. The meteorologists paid more attention on the agricultural climate adaptation. Compared with the formers, Shanghai municipal managers would rather pay more concern on flood risk management. The research outcomes discussed the force driving factors of metropolitan climate risk including coastal geographic location, the population vulnerabilities (aging and high-density population), ecological vulnerabilities (the degraded ecological bearing capacities and resilience) and the vulnerabilities of economic structures. All in all, the metropolitan areas should build more incremental adaptive capabilities. In Shanghai' case, it should highlight adaptive capabilities building in communicates and ecological environments.%频繁发生的极端气候灾害正在挑战都市密集区的气候风险管理能力.气候脆弱性评价和适应性建设需求是气候风险管理及政策制定的关键.研究着重探讨都市密集区

  20. Generation of Multicellular Breast Cancer Tumor Spheroids: Comparison of Different Protocols.

    Science.gov (United States)

    Froehlich, Karolin; Haeger, Jan-Dirk; Heger, Julia; Pastuschek, Jana; Photini, Stella Mary; Yan, Yan; Lupp, Amelie; Pfarrer, Christiane; Mrowka, Ralf; Schleußner, Ekkehard; Markert, Udo R; Schmidt, André

    2016-12-01

    Multicellular tumor spheroids are widely used models in tumor research. Because of their three dimensional organization they can simulate avascular tumor areas comprising proliferative and necrotic cells. Nonetheless, protocols for spheroid generation are still inconsistent. Therefore, in this study the breast cancer cell lines MCF-7, MDA-MB-231 and SK-BR-3 have been used to compare different spheroid generation models including hanging drop, liquid overlay and suspension culture techniques, each under several conditions. Experimental approaches differed in cell numbers (400-10,000), media and additives (25 % methocel, 25 % methocel plus 1 % Matrigel, 3.5 % Matrigel). In total, 42 different experimental setups have been tested. Generation of spheroids was evaluated by light microscopy and the structural composition was assessed immunohistochemically by means of Ki-67, cleaved poly (ADP-ribose) polymerase (cPARP) and mucin-1 (MUC-1) expression. Although the tested cell lines diverged widely in their capacity of forming spheroids we recommend hanging drops supplemented with 25 % methocel as the most reliable and efficient method with regard to success of generation of uniform spheroids, costs, experimental complexity and time expenditure in the different cell lines. MCF-7 cells formed spheroids under almost all analyzed conditions, and MDA-MB-231 cells under only one protocol (liquid overlay technique, 3.5 % Matrigel), while SK-BR-3 did not under neither condition. Therefore, we outline specific methods and recommend the use of adapted and standardized spheroid generation protocols for each cell line.

  1. RESEARCH ON SECURITY PROTOCOL FOR COLLABORATING MOBILE AGENTS IN NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Olumide Simeon Ogunnusi

    2013-01-01

    Full Text Available Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the field of intrusion detection, can be harnessed. Such properties include: adaptability, autonomous nature, low bandwidth utilization, latency eradication, mobility and intelligence. A number of protocols have been developed by researchers for different key distribution techniques to enhance their performance and to protect communicating entities against malicious attacks that can hinder their activities. However, they do not take into account the availability and fault tolerance of the protocols in case of any possible attack despite the authentication methods offered by encryption. This study therefore, proposes a fault-tolerant key distribution protocol for distributed mobile agents (communicating entities in network intrusion detection system to facilitate hitch-free collaboration geared towards intrusive packets detection in Wireless Local Area Network (WLAN.

  2. Spatial Analysis of Soil Subsidence in Peat Meadow Areas in Friesland in Relation to Land and Water Management, Climate Change, and Adaptation

    NARCIS (Netherlands)

    Brouns, Karlijn; Eikelboom, Tessa; Jansen, Peter C; Janssen, Ron; Kwakernaak, Cees; van den Akker, Jan J H; Verhoeven, Jos T A

    2015-01-01

    Dutch peatlands have been subsiding due to peat decomposition, shrinkage and compression, since their reclamation in the 11th century. Currently, subsidence amounts to 1-2 cm/year. Water management in these areas is complex and costly, greenhouse gases are being emitted, and surface water quality is

  3. POWER EFFICIENT CLUSTERING PROTOCOL (PECP- HETEREGENOUS WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    S.Taruna

    2011-07-01

    Full Text Available In this paper we propose a new Power Efficient Clustering Protocol(PECP for prolonging the sensornetwork lifetime. Homogeneous clustering protocols assume that all the sensor nodes are equipped withthe same amount of energy and as a result, they cannot take the advantage of the presence of nodeheterogeneity. Adapting this approach, we propose a new protocol named PECP (Power EfficientClustering Protocol to improve the stable region of the clustering hierarchy process using thecharacteristics parameters of heterogeneity, namely the fraction of powerful nodes( with more energymore suitable to become a cluster head. Intuitively, powerful nodes have to become cluster heads moreoften than normal nodes. The performance of the PECP via computer simulation is evaluated andcompared with other clustering algorithms. It has been found that PECP prolongs the sensor networklifetime.

  4. Rate Compatible Protocol for Information Reconciliation: An application to QKD

    CERN Document Server

    Elkouss, David; Lancho, Daniel; Martin, Vicente

    2010-01-01

    Information Reconciliation is a mechanism that allows to weed out the discrepancies between two correlated variables. It is an essential component in every key agreement protocol where the key has to be transmitted through a noisy channel. The typical case is in the satellite scenario described by Maurer in the early 90's. Recently the need has arisen in relation with Quantum Key Distribution (QKD) protocols, where it is very important not to reveal unnecessary information in order to maximize the shared key length. In this paper we present an information reconciliation protocol based on a rate compatible construction of Low Density Parity Check codes. Our protocol improves the efficiency of the reconciliation for the whole range of error rates in the discrete variable QKD context. Its adaptability together with its low interactivity makes it specially well suited for QKD reconciliation.

  5. Distributed reservation control protocols for random access broadcasting channels

    Science.gov (United States)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  6. Adaptive Lighting

    DEFF Research Database (Denmark)

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... differently into an architectural body. We also examine what might occur when light is dynamic and able to change colour, intensity and direction, and when it is adaptive and can be brought into interaction with its surroundings. In short, what happens to an architectural space when artificial lighting ceases...

  7. Adaptive network countermeasures.

    Energy Technology Data Exchange (ETDEWEB)

    McClelland-Bane, Randy; Van Randwyk, Jamie A.; Carathimas, Anthony G.; Thomas, Eric D.

    2003-10-01

    This report describes the results of a two-year LDRD funded by the Differentiating Technologies investment area. The project investigated the use of countermeasures in protecting computer networks as well as how current countermeasures could be changed in order to adapt with both evolving networks and evolving attackers. The work involved collaboration between Sandia employees and students in the Sandia - California Center for Cyber Defenders (CCD) program. We include an explanation of the need for adaptive countermeasures, a description of the architecture we designed to provide adaptive countermeasures, and evaluations of the system.

  8. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Sarah G. [Royal Surrey County Hospital, Department of Radiology, Surrey (United Kingdom); Calder, Alistair D. [Great Ormond Street Hospital for Children, NHS Foundation Trust, Department of Radiology, London (United Kingdom); Offiah, Amaka C. [Sheffield Children' s NHS Foundation Trust, The University of Sheffield Academic Unit of Child Health, Sheffield (United Kingdom); Negus, Samantha [St George' s Hospital, Department of Radiology, London (United Kingdom)

    2015-11-15

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  9. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  10. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Science.gov (United States)

    Almutairi, Abdulrahman; Sun, Zhonghua; Al Safran, Zakariya; Poovathumkadavi, Abduljaleel; Albader, Suha; Ifdailat, Husam

    2015-01-01

    Objective: To identify the optimal dual-energy computed tomography (DECT) scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI) protocols, three pitch values, and four kiloelectron volts (keV) ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR), different levels of adaptive statistical iterative reconstruction (ASIR), and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05). In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001). In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015) and a very high significant difference between keV and ASIR (p < 0.001). A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images. PMID:26006234

  11. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  12. Adapting to a changing world: unraveling the role of man-made habitats as alternative feeding areas for slender-billed gull (Chroicocephalus genei.

    Directory of Open Access Journals (Sweden)

    Francisco Ramírez

    Full Text Available Current rates of wildlife habitat loss have placed increasing demands on managers to develop, validate and implement tools aimed at improving our ability to evaluate such impacts on wildlife. Here, we present a case study conducted at the Natural Area of Doñana (SW Spain where remote sensing and stable isotope (δ(13C, δ(15N analyses of individuals were combined to unravel (1 the effect of variations in availability of natural food resources (i.e. from natural marshes on reproductive performance of a Slender-billed Gull (Chroicocephalus genei population, and (2 the role of two adjacent, artificial systems (a fish farm and saltmines as alternate anthropogenic feeding areas. Based on long-term (1983-2004 remote-sensing, we inferred the average extent of flooded area at the marshland (a proxy to natural resource availability annually. Estimated flooded areas (ranging from extreme drought [ca. 151 ha, 1995] to high moisture [15,049 ha, 2004] were positively related to reproductive success of gulls (estimated for the 1993-2004 period, and ranging from ca. 0 to 1.7 fledglings per breeding pairs, suggesting that habitat availability played a role in determining their reproductive performance. Based on blood δ(13C and δ(15N values of fledglings, 2001-2004, and a Bayesian isotopic mixing model, we conclude that saltmines acted as the main alternative foraging habitat for gulls, with relative contributions increasing as the extent of marshland decreased. Although adjacent, anthropogenic systems have been established as the preferred breeding sites for this gull population, dietary switches towards exploitation of alternative (anthropogenic food resources negatively affected the reproductive output of this species, thus challenging the perception that these man-made systems are necessarily a reliable buffer against loss of natural feeding habitats. The methodology and results derived from this study could be extended to a large suite of threatened

  13. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  14. MIMO model free adaptive wide area power system stabilizer design%多输入多输出无模型自适应广域阻尼控制器设计

    Institute of Scientific and Technical Information of China (English)

    赵艺; 陆超; 韩英铎

    2013-01-01

    随着电网的快速发展,系统结构和运行方式不断发生变化,传统广域阻尼控制器(wide area power system stabilizer,WAPSS)不能保证其在各种运行状态下控制效果;此外,互联系统在投入多台WAPSS时,各控制器之间面临相互协调问题.该文将无模型自适应控制(model free adaptive control,MFAC)应用于多输入多输出(multi-input multioutput,MIMO)的WAPSS设计中,给出了适用于MIMO广域阻尼控制的MFAC改进算法,并讨论了MFAC改进控制算法参数设置方法.在川渝和华中电网互联系统中测试改进算法的控制效果,仿真结果表明:MIMO-MFAC-WAPSS能适应系统变化,有效抑制多个区间低频振荡模式,并实现了多个控制器之间的相互协调.%Since the structure and operating conditions of power systems change with time,wide-area power system stabilizers (WAPSS) with fixed parameters cannot perform well for all conditions.In addition,when several WAPSSs are installed in a system,they must be well coordinated.This paper describes a model free adaptive control method (MFAC) multi-input multi-output (MIMO) WAPSS designs.An MFAC method for MIMO wide area damping control is given with the relevant parameter settings.Simulation results in local and large scale power grids show that this MIMO-MFAC-WAPSS system can adapt to system changes,efficiently damp inter-area oscillations and coordinate multiple controllers.

  15. Comparison of different PCR protocols for the detection and diagnosis of Plasmodium falciparum.

    Science.gov (United States)

    Oster, N; Abdel-Aziz, I Z; Stich, A; Coulibaly, B; Kouyatè, B; Andrews, K T; McLean, J E; Lanzer, M

    2005-11-01

    An assessment of differing PCR protocols for the diagnosis of Plasmodium falciparum infection was performed on samples from an area of holoendemic malaria transmission in western Burkina Faso. The PCR protocols had generally high sensitivities (>92%) and specificities (>69%), but the negative predictive values (NPV) were moderate and differed widely among the PCR protocols tested. These PCR protocols that amplified either the P. falciparum pfcrt gene or the small subunit ribosomal DNA were the most reliable diagnostic tools. However, the moderate NPV imply that more than one PCR protocol should be used for diagnosis in holoendemic areas.

  16. 宁夏地区引种葡萄的光合适应性研究%Study on photosynthetic adaptability of introduced grapevine cultivar in Ningxia area

    Institute of Scientific and Technical Information of China (English)

    关越; 李熙萌; 李征珍; 石莎; 冯金朝

    2013-01-01

    为了了解红提和摩尔多瓦的光合生理适应性,在大田条件下,使用Li-6400便携式光合仪测定了2个葡萄品种生长期内的光合作用日变化、光响应和CO2响应曲线.结果表明:①摩尔多瓦叶片的净光合速率(Pn)日变化规律在7月和8月为双峰型曲线,具有光合“午休”现象,在6月则为单峰曲线.红提在生长期内则均为单峰曲线;②除7月外,6月和8月摩尔多瓦的气孔导度(G8)、蒸腾速率(E)及水分利用效率(WUE)均高于红提;③红提具有较高的表观量子效率(AQY),而摩尔多瓦则具有较高的光饱和点(LSP)、光补偿点(LCP)、暗呼吸速率(Rd)和最大净光合速率(Pnmax);④摩尔多瓦叶片的光合能力(Amax)、CO2饱和点(CSP)、最大羧化速率(Vcmax)、最大电子传递速率(Jmax)以及光呼吸速率(Rp)均高于红提.总体上,在其生长期内,摩尔多瓦光合作用表现出对当地环境良好的适应特征,同时其光能利用能力和CO2利用能力也都高于红提,这些特性对其高产具有重要意义.%In order to understand the photosynthetic physiological adaptability,diurnal courses of net photosynthetic rate (Pn),light response curves and CO2 response curves of 2 grapevine cultivars (Vitis vinifera L.and Vitis vinifera L.) were measured by Li-6400 portable photosynthetic system.The results showed that:① The diurnal course of Pn of V.vinifera L.presented a double peak curve with an evidently midday depression in July and August,a single peak curve in June was also observed.By contrast,diurnal course of Pn of V.vinifera L.manifested single peak curve during the whole experimental period.② except for July,the stomatal conductance (Gs),evaporation rate (E) and water use efficiency (EUE) were significantly higher than that of V.vinifera L..③ V.vinifera L.had a higher apparent quantum yield (AQY),whilst Vitis vinifera L.had a higher light saturation point (LSP),light compensation point (LCP

  17. Implementation of Symptom Protocols for Nurses Providing Telephone‐Based Cancer Symptom Management: A Comparative Case Study

    Science.gov (United States)

    Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris

    2016-01-01

    ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use

  18. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  19. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  20. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  1. Adapting to sea-level rise in the US Southeast: The influence of built infrastructure and biophysical factors on the inundation of coastal areas

    Energy Technology Data Exchange (ETDEWEB)

    Daniels, R. C. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center Oak Ridge National Lab., TN (United States); Gornitz, V. M. [National Aeronautics and Space Administration, New York, NY (United States). Goddard Inst. for Space Studies; Mehta, A. J.; Lee, Saychong [Florida Univ., Gainesville, FL (United States). Dept. of Coastal and Oceanographic Engineering

    1992-11-01

    The earth' s global mean surface air temperature has increased by 0.5°C over the past 100 years. This warming trend has occurred concurrently with increases in the concentration and number of greenhouse gases in the atmosphere. These gases may cause this trend to accelerate in the future and result in a net increase in the earth's global mean surface air temperature of 1.5 to 4.5°C by the year 2100. An increase of this magnitude could cause sea surface temperatures to increase would cause sea levels to rise -from thermal expansion of the sea, and the addition of melt waters from alpine glaciers and continental ice sheets. To allow for the cost-effective analysis of the impacts that sea-level rise may have on the US Southeast, a method is needed that will allow sites that are potentially at risk to be identified for study. Previously, no objective method was available to identify such sites. This project addresses this problem by using a geographic data base with information on both physical and climatological factors to identify coastal areas of the US Southeast that are at risk to inundation or accelerated erosion due to sea-level rise. The following six areas were selected for further study from the many identified as being at high risk: Galveston, Texas; Caminada Pass, Louisiana; Bradenton Beach, Florida; Daytona Beach, Florida; McClellanville, South Carolina; and Nags Head, North Carolina. For each study area the amount of land, by land use type, in danger from inundation from three sea-level-rise scenarios was calculated. The calculated values were based on elevation alone.

  2. Adapting to sea-level rise in the US Southeast: The influence of built infrastructure and biophysical factors on the inundation of coastal areas

    Energy Technology Data Exchange (ETDEWEB)

    Daniels, R.C. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center]|[Oak Ridge National Lab., TN (United States); Gornitz, V.M. [National Aeronautics and Space Administration, New York, NY (United States). Goddard Inst. for Space Studies; Mehta, A.J.; Lee, Saychong [Florida Univ., Gainesville, FL (United States). Dept. of Coastal and Oceanographic Engineering; Cushman, R.M. [Oak Ridge National Lab., TN (United States)

    1992-11-01

    The earth` s global mean surface air temperature has increased by 0.5{degrees}C over the past 100 years. This warming trend has occurred concurrently with increases in the concentration and number of greenhouse gases in the atmosphere. These gases may cause this trend to accelerate in the future and result in a net increase in the earth`s global mean surface air temperature of 1.5 to 4.5{degrees}C by the year 2100. An increase of this magnitude could cause sea surface temperatures to increase would cause sea levels to rise -from thermal expansion of the sea, and the addition of melt waters from alpine glaciers and continental ice sheets. To allow for the cost-effective analysis of the impacts that sea-level rise may have on the US Southeast, a method is needed that will allow sites that are potentially at risk to be identified for study. Previously, no objective method was available to identify such sites. This project addresses this problem by using a geographic data base with information on both physical and climatological factors to identify coastal areas of the US Southeast that are at risk to inundation or accelerated erosion due to sea-level rise. The following six areas were selected for further study from the many identified as being at high risk: Galveston, Texas; Caminada Pass, Louisiana; Bradenton Beach, Florida; Daytona Beach, Florida; McClellanville, South Carolina; and Nags Head, North Carolina. For each study area the amount of land, by land use type, in danger from inundation from three sea-level-rise scenarios was calculated. The calculated values were based on elevation alone.

  3. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  4. Analysis on Ad Hoc Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.N.Renjith

    2012-12-01

    Full Text Available Outlook of wireless communication system marked an extreme transform with the invention of Wireless Sensor Networks (WSN. WSN is a promising technolog y for enabling a variety of applications like environmental monitoring, security and applications that save our lives and assets. In WSN, large numbers of sensor nodes are deployed to sensing and gathering information and forward them to the base station with the help of routing protocol. Routing protocols plays a major role by identifying and maintaining the routes in the network. Competence o f sensor networks relay on the strong and effective routing protocol used. In this paper, we present a simulation based performance evaluation of differen t Ad hoc routing protocols like AODV, DYMO, FSR, LANM AR, RIP and ZRP in Wireless Sensor Networks. Based on the study, the future research areas and k ey challenges for routing protocol in WSN are to optimize network performance for QoS support and en ergy conservation

  5. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  6. ADAPT Dataset

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced Diagnostics and Prognostics Testbed (ADAPT) Project Lead: Scott Poll Subject Fault diagnosis in electrical power systems Description The Advanced...

  7. High speed transport protocols: An attempt to find the best solution

    Science.gov (United States)

    Lazaris, Konstantinos A.

    1994-03-01

    The development and advances in fiber optic technology are leading to major changes in modern telecommunications systems. In short, the transmission of data through optical fiber has become so fast that the computers which the fibers connect have become a bottleneck. The transport layer protocol, which is the software interface between the network and the computer, is one of the most important sources of this bottleneck. The purpose of this thesis is to investigate several 'high-speed' transport protocols, evaluate them, and attempt to determine which transport protocol or combination of transport protocols is optimal for high speed networks of the future. The approach is to first study the requirements of transport protocols for high speed networks. Then the properties of several specific transport protocols are studied with these requirements in mind. A detailed analysis of the strengths and shortcomings of Transmission Control Protocol/Internet Protocol (TCP/IP), Xpress Transfer Protocol (XTP), and SNR are presented. TCP/IP, which is in wide use today, was designed when transmission rates were much slower and error rates were much higher than today. XTP and SNR are two new experimental transport layer protocols which have been recently designed with high speed networks in mind. The primary contribution of this thesis is an evaluation of the requirements of future transport protocols. In short, TCP/IP in its present form is simply not adequate; it must change and adapt, or be replaced by a new transport protocol like XTP or SNR.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Rapid object category adaptation during unlabelled classification.

    Science.gov (United States)

    Hadas, David; Intrator, Nathan; Yovel, Galit

    2010-01-01

    Recent reports from electrophysiological and psychophysical experiments provide evidence that repeated exposure to an ordered sequence of morphed stimuli may over time adapt a prelearned object category such that the category may generalise the entire sequence as belonging to the same object. Here, a new protocol that includes a single exposure to a morphing sequence is presented. Subjects exposed to the new protocol replaced a prelearned face with an entirely different face within just 3 days, significantly faster than in previous reports.

  10. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  11. Automated Image Intelligence Adaptive Sensor Management System for High Altitude Long Endurance UAVs in a Dynamic and Anti-Access Area Denial Environment

    Science.gov (United States)

    Kim, Gi Young

    The problem we investigate deals with an Image Intelligence (IMINT) sensor allocation schedule for High Altitude Long Endurance UAVs in a dynamic and Anti-Access Area Denial (A2AD) environment. The objective is to maximize the Situational Awareness (SA) of decision makers. The value of SA can be improved in two different ways. First, if a sensor allocated to an Areas of Interest (AOI) detects target activity, then the SA value will be increased. Second, the SA value increases if an AOI is monitored for a certain period of time, regardless of target detections. These values are functions of the sensor allocation time, sensor type and mode. Relatively few studies in the archival literature have been devoted to an analytic, detailed explanation of the target detection process, and AOI monitoring value dynamics. These two values are the fundamental criteria used to choose the most judicious sensor allocation schedule. This research presents mathematical expressions for target detection processes, and shows the monitoring value dynamics. Furthermore, the dynamics of target detection is the result of combined processes between belligerent behavior (target activity) and friendly behavior (sensor allocation). We investigate these combined processes and derive mathematical expressions for simplified cases. These closed form mathematical models can be used for Measures of Effectiveness (MOEs), i.e., target activity detection to evaluate sensor allocation schedules. We also verify these models with discrete event simulations which can also be used to describe more complex systems. We introduce several methodologies to achieve a judicious sensor allocation schedule focusing on the AOI monitoring value. The first methodology is a discrete time integer programming model which provides an optimal solution but is impractical for real world scenarios due to its computation time. Thus, it is necessary to trade off the quality of solution with computation time. The Myopic Greedy

  12. Performance enhancement of OSPF protocol in the private network

    Science.gov (United States)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    The private network serves as an information exchange platform to support the integrated services via microwave channels and accordingly selects the open shortest path first (OSPF) as the IP routing protocol. But the existing OSPF can't fit the private network very well for its special characteristics. This paper presents our modifications to the standard protocol in such aspects as the single-area scheme, link state advertisement (LSA) types and formats, OSPF packet formats, important state machines, setting of protocol parameters and link flap damping. Finally simulations are performed in various scenarios and the results indicate that our modifications can enhance the OSPF performance in the private network effectively.

  13. Formal Models and Techniques for Analyzing Security Protocols

    CERN Document Server

    Cortier, V

    2011-01-01

    Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro

  14. Adaptable data management for systems biology investigations

    Directory of Open Access Journals (Sweden)

    Burdick David

    2009-03-01

    Full Text Available Abstract Background Within research each experiment is different, the focus changes and the data is generated from a continually evolving barrage of technologies. There is a continual introduction of new techniques whose usage ranges from in-house protocols through to high-throughput instrumentation. To support these requirements data management systems are needed that can be rapidly built and readily adapted for new usage. Results The adaptable data management system discussed is designed to support the seamless mining and analysis of biological experiment data that is commonly used in systems biology (e.g. ChIP-chip, gene expression, proteomics, imaging, flow cytometry. We use different content graphs to represent different views upon the data. These views are designed for different roles: equipment specific views are used to gather instrumentation information; data processing oriented views are provided to enable the rapid development of analysis applications; and research project specific views are used to organize information for individual research experiments. This management system allows for both the rapid introduction of new types of information and the evolution of the knowledge it represents. Conclusion Data management is an important aspect of any research enterprise. It is the foundation on which most applications are built, and must be easily extended to serve new functionality for new scientific areas. We have found that adopting a three-tier architecture for data management, built around distributed standardized content repositories, allows us to rapidly develop new applications to support a diverse user community.

  15. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    V.Nivedhitha

    2013-04-01

    Full Text Available Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  16. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  17. Reserch on Network Covering Without Blind Area in Mine Roadway Based on IEEE802.11 Protocol%基于IEEE802.11协议的巷道网络无盲区覆盖研究

    Institute of Scientific and Technical Information of China (English)

    史岩岩; 丁恩杰; 奚锦锦; 张耀

    2012-01-01

    Based on the Infrastructure mode of the Wifi communication system,in combination with the cross section size and the geometric shape of the mine roadway,the paper had a study on the layout location of AP(Access Point) affected to the network covering in the mine roadway.An analysis was conducted on two conventional AP layout locations in the mine roadway.The min AP covering radius and the optimized distance between the AP required in the two plans were obtained.Thus,under the two conditions,there would be an overlap between the AP covering areas.The overlap area would be min and could meet the covering requirement of the network blind area.Therefore the service quality of the network could be improved.In combination with the above parameters,a comparison was conducted on the two layout modes from the cost point and an optimized layout plan was obtained.%基于WiFi通信系统Infrastructure模式,结合矿井巷道截面大小和几何形状,研究了网络桥接器AP的放置位置对巷道中网络覆盖的影响。对2种常用的煤矿巷道中AP的布置位置进行分析,分别得出2种方案所需要AP的最小覆盖半径以及AP之间的最佳距离,使得2种情况下AP覆盖区域之间有重叠,并且重叠区域最小,满足网络的无盲区覆盖要求,进而提高了网络的服务质量。结合以上参数,对2种布置方式从成本的角度进行了比较,得出最佳布置方案。

  18. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  19. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  20. 内蒙古典型地区牧户气候变化感知与适应的实证研究%Herdsmen's perceptions and adaptation of climate change in typical areas of Inner Mongolia

    Institute of Scientific and Technical Information of China (English)

    侯向阳; 韩颖

    2011-01-01

    我国北方草原地区是气候变化影响的脆弱和敏感地区。研究北方草原地区牧户对气候变化的感知和适应,对于提高牧区气候变化的适应能力,促进草原地区可持续发展意义重大。本文利用问卷调查的实证分析方法,研究了内蒙古草甸草原、荒漠草原、荒漠生态区牧户对气候变化趋势和极端气候灾害事件的感知和适应的现状与行为特征。结果表明:过去30年内蒙古草原地区气候基本呈暖湿化趋势,近10年极端气候灾害事件有所增加,其中大雪和干旱分别是东、西部草原地区最主要的极端气候灾害;牧户能够正确感知变暖趋势,但无法正确判断降水情况;东部牧户对大雪事件的感知度较高,西部牧户对干旱的记忆最深刻,并分别针对大雪和干旱采取有差别的应对措施;当前,牧户应对措施相对缺失,需要进一步探求更为积极、高效的应对行为,以便更好更快地适应气候变化。%Temperate steppe of northern China is very vulnerable and sensitive to climate change.It is significant to study herdsmen's perception and adaptation of climate change to enhance adaptive capacity and sustainable development of grassland area.Using a household survey based on questionnaire,this study analyzes the current status and behavior characters of herdsmen's perception and adaptation to climate change and extreme climate events in meadow steppe,desert steppe and desert respectively.The results showed that the climate became warmer and wetter in the last 30 years.There was more heavy snow in the east but more droughts in the west,and extreme climate disasters occurred more frequently in the last 10 years in the grassland area of Inner Mongolia.Although most herdsmen correctly perceived the change of temperature,they gave wrong judge to precipitation.Herdsmen in the east were more impressible to heavy snow and their counterparts in the west more impressible to droughts

  1. A Localized Coverage Preserving Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuheng Liu

    2009-01-01

    Full Text Available In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N2log(N, lower than the eligibility rule in the Coverage Control Protocol (CCP, O(N3, where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree.

  2. Toothbrush Adaptations.

    Science.gov (United States)

    Exceptional Parent, 1987

    1987-01-01

    Suggestions are presented for helping disabled individuals learn to use or adapt toothbrushes for proper dental care. A directory lists dental health instructional materials available from various organizations. (CB)

  3. Ambiguous Adaptation

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Lyngsie, Jacob

    We investigate why some exchange relationships terminate prematurely. We argue that investments in informal governance structures induce premature termination in relationships already governed by formal contracts. The formalized adaptive behavior of formal governance structures and the flexible a...

  4. Hedonic "adaptation"

    OpenAIRE

    2008-01-01

    People live in a world in which they are surrounded by potential disgust elicitors such as ``used'' chairs, air, silverware, and money as well as excretory activities. People function in this world by ignoring most of these, by active avoidance, reframing, or adaptation. The issue is particularly striking for professions, such as morticians, surgeons, or sanitation workers, in which there is frequent contact with major disgust elicitors. In this study, we study the ``adaptation'' process to d...

  5. Strategic Adaptation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul

    2015-01-01

    This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation...

  6. The use of a hydrological physically based model to evaluate the vine adaptability to future climate: the case study of a Protected Designation of Origin area (DOC and DOCG) of Southern Italy

    Science.gov (United States)

    Bonfante, Antonello; Basile, Angelo; Menenti, Massimo; Monaco, Eugenia; Alfieri, Silvia Maria; Manna, Piero; Langella, Giuliano; De Lorenzi, Francesca

    2013-04-01

    The quality of grape and wine is variety-specific and depends significantly on the pedoclimatic conditions, thus from the terroir characteristics. In viticulture the concept of terroir is known to be very complex. At present some changes are occurring in the studies of terroir. Their spatial analysis is improving by means of studies that account for the spatial distribution of solar radiation and of bioclimatic indexes. Moreover, simulation models are used to study the water flow in the soil-plant-atmosphere system in order to determine the water balance of vines as a function of i) soil physical properties, ii) climatic regime and iii) agro-ecosystems characteristics. The future climate evolution may endanger not only yield production (IPCC, 2007), but also its quality. The effects on quality may be relevant for grape production, since they can affect the sustainability of the cultivation of grape varieties in the areas where they are currently grown. This study addresses this question by evaluating the adaptive capacity of grape's cultivars in a 20000 ha viticultural area in the "Valle Telesina" (Campania Region, Southern Italy). This area has a long tradition in the production of high quality wines (DOC and DOCG) and it is characterized by a complex geomorphology with a large variability of soils and micro-climate. Two climate scenarios were considered: "past" (1961-1990) and "future" (2021-2050), the latter constructed applying statistical downscaling to GCMs scenarios. For each climate scenario the moisture regime of the soils of the study area was calculated by means of a simulation model of the soil-water-atmosphere system (SWAP). The hydrological model SWAP was applied to the representative soils of the entire area (47 soil units); the soil hydraulic properties were estimated (by means of pedo-transfer function HYPRES) and measured. Upper boundary conditions were derived from the climate scenarios. Unit gradient in soil water potential was set as lower

  7. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  8. Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rudranath Mitra

    2012-06-01

    Full Text Available Routing protocols have been a challenging issue in wireless sensor networks. WSN is one of the focussed are of research because of its multi-aspect applications. These networks are self-organized using clustering algorithms to conserve energy. LEACH (Low-Energy Adaptive Clustering Hierarchy protocol[1] is one of the significant protocols for routing in WSN. In LEACH, sensor nodes are organized in several small clusters where there are cluster heads in each cluster. These CHs gather data from their local clusters aggregate them & send them to the base station. On the LEACH many new schemes have been proposed to enhance its activity like its efficiency, security etc. In this paper the fault tolerance issue is being incorporated.

  9. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  10. Standardised test protocol (Constant Score) for evaluation of functionality in patients with shoulder disorders

    DEFF Research Database (Denmark)

    Ban, Ilija; Troelsen, Anders; Christiansen, David Høyrup;

    2013-01-01

    -culturally adapt this version into Danish. MATERIAL AND METHODS: An English test protocol was developed and translated into Danish at two independent centres according to international recommendations. Consensus on a preliminary version was achieved. The subjective part was tested on six patients, while two...... published in 2008 with several new recommendations, but a standardised test protocol was not included. Also, this new version has not been translated into Danish. The aims of the present study were to develop a standardised English test protocol for the newly modified CS, and to translate and cross...... differences. One of the authors of the modified CS approved both the English and the Danish test protocol. CONCLUSION: A simple test protocol of the modified CS was developed in both English and Danish. With precise terminology and definitions, the test protocol is the first of its kind. We suggest its use...

  11. Interoperation between AODV protocol and AOHR protocol for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Wang, Changhong; Zhang, Jiayan

    2009-12-01

    Although AOHR protocol has some excellent performance, no actual network utilizes AOHR as routing protocol. It is because that this protocol cannot interoperate with AODV protocol, which is the most famous routing protocol and used all over the world. The cost will be very huge to replace AODV protocol with AOHR protocol for existing networks, so the only feasible method is to modify AOHR protocol to interoperate with AODV as introduced in this paper. The simulation results prove that the modified AOHR protocol can help the existing AODV protocol provide routing service, and the interoperation of these two routing protocols is realized.

  12. Is adaptation. Truly an adaptation? Is adaptation. Truly an adaptation?

    Directory of Open Access Journals (Sweden)

    Thais Flores Nogueira Diniz

    2008-04-01

    Full Text Available The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition, joined with the study of recycling, remaking, and every form of retelling. The film deals with the attempt by the scriptwriter Charles Kaufman, cast by Nicholas Cage, to adapt/translate a non-fictional book to the cinema, but ends up with a kind of film which is by no means what it intended to be: a film of action in the model of Hollywood productions. During the process of creation, Charles and his twin brother, Donald, undergo a series of adventures involving some real persons from the world of film, the author and the protagonist of the book, all of them turning into fictional characters in the film. In the film, adaptation then signifies something different from itstraditional meaning. The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition

  13. MANETs performance analysis with dos attack at different routing protocols

    Directory of Open Access Journals (Sweden)

    Alaa Zain

    2015-05-01

    Full Text Available A Mobile Ad-Hoc Networks (MANET is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV, Hybrid routing protocols like Geographic Routing Protocol (GRP. Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.

  14. Intestinal mucosal adaptation

    Institute of Scientific and Technical Information of China (English)

    Laurie Drozdowski; Alan BR Thomson

    2006-01-01

    Intestinal failure is a condition characterized by malnutrition and/or dehydration as a result of the inadequate digestion and absorption of nutrients. The most common cause of intestinal failure is short bowel syndrome, which occurs when the functional gut mass is reduced below the level necessary for adequate nutrient and water absorption. This condition may be congenital, or may be acquired as a result of a massive resection of the small bowel. Following resection, the intestine is capable of adaptation in response to enteral nutrients as well as other trophic stimuli. Identifying factors that may enhance the process of intestinal adaptation is an exciting area of research with important potential clinical applications.

  15. Process for Reviewing Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes the process for conducting two types of reviews of survey protocols. A quick assessment is used to acknowledge and describe to potential...

  16. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously (prior to 2013) reviewed or approved survey protocol for use as a National or Regional survey...

  17. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...

  18. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  19. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  20. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  1. Adaptive filtering and change detection

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    Adaptive filtering is a classical branch of digital signal processing (DSP). Industrial interest in adaptive filtering grows continuously with the increase in computer performance that allows ever more conplex algorithms to be run in real-time. Change detection is a type of adaptive filtering for non-stationary signals and is also the basic tool in fault detection and diagnosis. Often considered as separate subjects Adaptive Filtering and Change Detection bridges a gap in the literature with a unified treatment of these areas, emphasizing that change detection is a natural extensi

  2. Petri Net-based Analysis of the Safety Communication Protocol

    Directory of Open Access Journals (Sweden)

    Liu Hongjie

    2013-10-01

    Full Text Available There is a few research in area of safety-critical system, therefore the study of performance analyzing method of the protocol has important practical significance for transportation engineering. This paper first briefly introduces the execution procedure of safety communication protocol, then explores the application of Petri net to establish the model of the protocol, including the process of state transition and corresponding timer which record the time, then obtains related performance data such as maintainability and failure probability, which users usually pay most attention to, with different probability of time delay and no fault in channel by simulation. Finally this paper finds that how the probability of time delay and no fault in channel could influent the maintainability and failure probability through data process with theory of probability and mathematical statistic, this could provide a certain reference for development of safety communication protocol.    

  3. A native Bayesian classifier based routing protocol for VANETS

    Science.gov (United States)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  4. Planning and costing agriculture's adaptation to climate change

    Energy Technology Data Exchange (ETDEWEB)

    Chambwera, Muyeye; Downing, Tom; Venton, Courtenay Cabot; Dyszynski, Jillian; Crawford, Victoria; Butterfield, Ruth; Kaur, Nanki; Birch, Tom; Loga, Denise

    2011-11-15

    Changing climate will have adverse effects on food production, food distribution, infrastructure, land availability for agriculture, and livelihood assets and opportunities in rural and urban areas. Adapting food systems to both enhance food security for the poor and to prevent the future negative impacts of climate change will require attention to more than just agricultural production. Food security can only be ensured and enhanced through a range of interventions across different agricultural systems and along the associated value chains, from production to distribution and allocation. The current efforts to get agriculture into the global climate policy framework after the expiry of the Kyoto Protocol emphasises mitigation. Adaptation is an equally important objective in a world that cannot avoid climate change any more because of already accumulated greenhouse gases. In developing countries, adaptation is the primary concern due to their vulnerability to climate change and high dependence on weather-dependent agricultural systems. A complete response to climate change that integrates agriculture should therefore pursue both agricultural mitigation and adaptation. In order to plan for adaptation effectively, policy makers need reliable information from developing countries on the nature of adaptation, its costs and how these are related to ongoing efforts to develop the agriculture sector and food systems of developing countries. This study set out to inform climate policy development by analysing agricultural adaptation in developing countries using a combination of desk studies and country case studies to provide a framework, areas to focus on when planning agricultural adaptation and the likely costs. It followed key steps for bringing together global and local perspectives for the benefit of both global stakeholders and developing countries.

  5. Adaptability Evaluation of Introduced Alfalfas in the Arid and Semi-humid Area%苜蓿引进品种半干旱、半湿润区适应性试验

    Institute of Scientific and Technical Information of China (English)

    杨红善; 常根柱; 周学辉; 路远

    2011-01-01

    苜蓿王、Spreador-3,Pick 3006和Pick 8925是从美国和加拿大引进的优良苜蓿品种,以国产中兰1号为对照品种,2002-2004年在兰州半干旱地区开展引种试验,2008年与2009年在半湿润区天水甘谷继续开展适应性试验,同时对其营养成分和抗旱指标进行测定.结果表明,引进的4个苜蓿品种,在半干旱、半湿润区均能正常生长生活,完成生育周期的全过程,无异常表现,未发现病虫害侵染,苜蓿王的抗旱性最强,鲜草产量在半干旱区兰州达68 715.8 kg/hm2,在半湿润区天水高达125 642.8 kg/hm2;Spreador-3具叶大、杆中实,抗倒伏等优良特性,对照中兰1号具优良抗旱性能,建议3种苜蓿在中国黄土高原半干旱地区及半湿润区推广种植.%Alfaking, Pick 3006, Pick 8925 and Spreador-3 were introduced from America and Canada,using Zhonglan No. 1 as the regional control After completed district tests in the arid and semi-arid areas in 2002-2004, adaptability evaluation were conducted in the semi-humid area in 2008 and 2009.The result indicated that, five introduced alfalfa could grow normally in the semi-humid area and completed all the procreation periodicity, without exceptional representation and diseases and pests. We analyzed procreation periodicity, nutrition component, growth rapidity and ratio of stem and leaf. It also shown that the highest content of dissociative proline and soluble sugar was Alfaking, the lowest content of malondialdehyde also was Alfaking and the fresh yield of Alfaking was 125 642.8 kg/hm2 in the semi-aridity areas. Spreador-3nd Zhonglan No. 1 were the choiceness varieties. The study advised that those five alfalfas can cultivate in the semi-arid and semi-humid areas in Loess plateau.

  6. Adaptive Alternating Minimization Algorithms

    CERN Document Server

    Niesen, Urs; Wornell, Gregory

    2007-01-01

    The classical alternating minimization (or projection) algorithm has been successful in the context of solving optimization problems over two variables or equivalently of finding a point in the intersection of two sets. The iterative nature and simplicity of the algorithm has led to its application to many areas such as signal processing, information theory, control, and finance. A general set of sufficient conditions for the convergence and correctness of the algorithm is quite well-known when the underlying problem parameters are fixed. In many practical situations, however, the underlying problem parameters are changing over time, and the use of an adaptive algorithm is more appropriate. In this paper, we study such an adaptive version of the alternating minimization algorithm. As a main result of this paper, we provide a general set of sufficient conditions for the convergence and correctness of the adaptive algorithm. Perhaps surprisingly, these conditions seem to be the minimal ones one would expect in ...

  7. Adaptive test

    DEFF Research Database (Denmark)

    Kjeldsen, Lars Peter; Rose, Mette

    2010-01-01

    Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale.......Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale....

  8. Zebrafish embryology and cartilage staining protocols for high school students.

    Science.gov (United States)

    Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A

    2009-06-01

    The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.

  9. International Veterinary Epilepsy Task Force recommendations for a veterinary epilepsy-specific MRI protocol.

    Science.gov (United States)

    Rusbridge, Clare; Long, Sam; Jovanovik, Jelena; Milne, Marjorie; Berendt, Mette; Bhatti, Sofie F M; De Risio, Luisa; Farqhuar, Robyn G; Fischer, Andrea; Matiasek, Kaspar; Muñana, Karen; Patterson, Edward E; Pakozdy, Akos; Penderis, Jacques; Platt, Simon; Podell, Michael; Potschka, Heidrun; Stein, Veronika M; Tipold, Andrea; Volk, Holger A

    2015-08-28

    Epilepsy is one of the most common chronic neurological diseases in veterinary practice. Magnetic resonance imaging (MRI) is regarded as an important diagnostic test to reach the diagnosis of idiopathic epilepsy. However, given that the diagnosis requires the exclusion of other differentials for seizures, the parameters for MRI examination should allow the detection of subtle lesions which may not be obvious with existing techniques. In addition, there are several differentials for idiopathic epilepsy in humans, for example some focal cortical dysplasias, which may only apparent with special sequences, imaging planes and/or particular techniques used in performing the MRI scan. As a result, there is a need to standardize MRI examination in veterinary patients with techniques that reliably diagnose subtle lesions, identify post-seizure changes, and which will allow for future identification of underlying causes of seizures not yet apparent in the veterinary literature.There is a need for a standardized veterinary epilepsy-specific MRI protocol which will facilitate more detailed examination of areas susceptible to generating and perpetuating seizures, is cost efficient, simple to perform and can be adapted for both low and high field scanners. Standardisation of imaging will improve clinical communication and uniformity of case definition between research studies. A 6-7 sequence epilepsy-specific MRI protocol for veterinary patients is proposed and further advanced MR and functional imaging is reviewed.

  10. Program on Promoting Climate Change Adaptation Technologies Bridging Policy Making and Science Research in Taiwan

    Science.gov (United States)

    Chiang, Y.; Chiang, W.; Sui, C.; Tung, C.; Ho, H.; Li, M.; Chan, S.; Climate Change Adaptation Technologies Program, National Science Council, Taiwan

    2010-12-01

    Climate changes adaptation needs innovative technological revolution on demand for transdisciplinary studies in various temporal and spatial scales. In our proposed program, a systematic and scientific framework will be developed to promote innovative adaptation technologies with respect to providing decision making information for government sectors, enhancing applicability of scientific research output, strengthening national research capabilities, and integrating both academic and non-academic resources. The objectives of this program are to identify key issues, required technologies, and scientific knowledge for climate change adaptations, and to build a transdisciplinary platform bridging science-supported technologies required by government sectors and demand-oriented scientific research conducted by academic communities. The approach proposed herein will be practiced in vulnerable regions, such as urban, rural, mountain, river basin, and coastal areas, which are particularly sensitive to climate change. The first phase of 3-year (2011~2013) work is to deploy framework and strategies of climate change impact assessment and adaptation measures between related government sectors and researchers from academic communities. The proposed framework involves three principle research groups, namely Environmental System, Vulnerability Assessment, and Risk Management and Adaptation Technology. The goal of the first group, Environmental System, is to combine climate change projections with enhanced scientific and environmental monitoring technologies for better adaptations to future scenarios in different social, economic, and environmental sectors to support adaptation measures planning and to reduce uncertainties on assessing vulnerability. The goal of the second group, Vulnerability Assessment, is to identify interfaces and information structures of climate change vulnerably issues and to develop protocol, models, and indices for vulnerability assessment. The goal of

  11. Adaptive management of marine protected areas in Chile: a method for his evaluation Gestión adaptativa en áreas marinas protegidas de Chile: un método para su evaluación

    Directory of Open Access Journals (Sweden)

    Andrés Guajardo

    2012-09-01

    Full Text Available The evaluation of the performance of the management is essential to fulfill the objectives in a Marine Protected Area (MPA. Therefore, Robert Pomeroy in 2004 presents a manual to evaluate the development of the marine protected areas through time, by using of indicators which measure the biophysical state, socioeconomic state and governance. The present work adopts the use of those indicators to evaluate the performance of the management in the Marine Reserve Chanaral Island, Atacama region. The results of the evaluation show a partial level of protection objectives fulfillment, suggesting the lack of efficient management of the reserve to ensure its suitable development. This work also presented a descriptive model, that interprets the behavior that area would facein front of two opposed scenarios, and the expected due to inefficient management of the area and otherwise an adaptive management.La evaluación del desempeno en la gestión es esencial para el eventual logro de los objetivos de las áreas marinas protegidas (AMP. Robert Pomeroy en 2004 presenta un manual para evaluar el desarrollo de las áreas marinas protegidas en el tiempo, por medio de la medición de indicadores de estado: biofísicos, socioeconómicos y de gobernabilidad. El presente trabajo adopta el uso de estos indicadores, para evaluar el desempeno en la gestión de la Reserva Marina Isla Chanaral, región de Atacama. Los resultados de su evaluación muestran que se cumplen parcialmente los objetivos de protección, sugiriendo la falta de una gestión efectiva que asegure el adecuado desarrollo de la reserva. En el trabajo también se presenta un modelo descriptivo que interpreta el comportamiento que tendría el área frente a dos escenarios opuestos y los resultados esperados a causa de una gestión ineficiente del área y en caso contrario una gestión adaptativa.

  12. Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.

    Science.gov (United States)

    Willis, John L; Yuan, Zhiguo; Murthy, Sudhir

    2016-08-01

    Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.

  13. Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density

    Directory of Open Access Journals (Sweden)

    Arpita Mahajan

    2014-09-01

    Full Text Available Mobile Ad Hoc Networks (MANET is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV is based on the well known single path Destination Sequenced Distance Vector (DSDV is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy

  14. The Adaptation Gap Report - a Preliminary Assessment

    DEFF Research Database (Denmark)

    Alverson, Keith; Olhoff, Anne; Noble, Ian;

    This first Adaptation Gap report provides an equally sobering assessment of the gap between adaptation needs and reality, based on preliminary thinking on how baselines, future goals or targets, and gaps between them might be defined for climate change adaptation. The report focuses on gaps in de...... in developing countries in three important areas: finance, technology and knowledge....

  15. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  16. Study on the Adaptability of Suffolk Sheep in the Yili River Valley Area of Zhaosu County%萨福克羊在伊犁河谷昭苏县的适应性研究

    Institute of Scientific and Technical Information of China (English)

    刘宜勇; 柯丽白; 谭小海; 努尔巴哈提

    2012-01-01

    昭苏马场于2004年引进萨福克羊,通过对萨福克羊在昭苏马场生长发育、繁殖性能、改良效果观察,进口萨福克羊的初生重、断奶重、日增重、繁殖率达到了本品种水平,表明萨福克羊在昭苏有良好的适应性,在肉羊改良中具有很高的推广价值。%Since Suffolk Sheep was introduced into Zhaosu Horse Farm in 2004, we have realized based on the results of the observation of its growth, reproductivity and effect of breeding that the weight of birth, weaning, daily gain and reproduction rate all have reached to its original level of the Sheep. These positive results showed that Suffolk Sheep can adapt well to the environment of Zhaosu County, and the Sheep has high value for promoting and improving meat sheep in the area.

  17. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  18. The mesh network protocol evaluation and development

    OpenAIRE

    Pei Ping; PETRENKO Y.N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  19. Internet of Things: Architectures, Protocols, and Applications

    Directory of Open Access Journals (Sweden)

    Pallavi Sethi

    2017-01-01

    Full Text Available The Internet of Things (IoT is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

  20. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  1. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  2. Design of a decentralized asynchronous group membership protocol and an implementation of its communications layer

    OpenAIRE

    Pires, Fernando Jorge.

    1993-01-01

    Approved for public release; distribution is unlimited. For development of group-oriented distributed applications, a group membership protocol provides the mechanisms to dynamically adapt to changes in the membership, ensuring consistent views among all members of the group. This is achieved, by executing a distributed script, that implements a protocol, at each member to maintain a sequence of identical views, in spite of continuous changes, either voluntary or due to failure, to the mem...

  3. A dosimetric comparison of real-time adaptive and non-adaptive radiotherapy

    DEFF Research Database (Denmark)

    Colvill, Emma; Booth, Jeremy; Nill, Simeon;

    2016-01-01

    AND MATERIALS: Ten institutions with robotic(2), gimbaled(2), MLC(4) or couch tracking(2) used common materials including CT and structure sets, motion traces and planning protocols to create a lung and a prostate plan. For each motion trace, the plan was delivered twice to a moving dosimeter; with and without...... accounted for realistic tumor motion accurately and performed to a similar high standard, with real-time adaptation significantly outperforming non-adaptive delivery methods....

  4. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  5. Adaptive Wide-Area Damping Control for HVDC Transmission System Considering Influence of Time-Varying Delay%考虑时变时滞影响的直流广域阻尼自适应控制

    Institute of Scientific and Technical Information of China (English)

    胡楠; 李兴源; 杨毅强; 覃波

    2014-01-01

    针对交直流系统区间低频振荡问题,尤其是广域测量系统引入的时滞影响问题,利用递归最小二乘法在线辨识区间振荡主导模态,在直流附加控制抑制低频振荡机理的基础上,通过在线计算利用交流联络线功率信号进行阻尼控制的滞后相位与时变时滞造成低频振荡模态信号的滞后相位,将时域信号转化为二维旋转坐标体系中的向量信号,经过参考坐标体系的角度旋转,分别进行阻尼与时滞滞后相角的自适应补偿,结合增益放大,通过时域反变换后可得到最终补偿后的直流附加控制量。8机36节点系统仿真表明,所提设计方法能够消除时变时滞的影响,有效阻尼系统低频振荡,并且具有鲁棒性,适合在线应用。%In allusion to inter-area low-frequency oscillation occurred in AC-DC power transmission system, especially to the time delay caused by wide-area measurement system, using recursive least squares (RLS), the online identification of dominant modal of inter-area oscillation is implemented, and on the basis of suppressing low-frequency oscillation by adding supplementary control of HVDC, through the online calculation of the lagging phase caused by utilizing power signal of AC tie line transmission line for damping control and the lagging phase of low-frequency oscillation signal due to the time-varying delay, the time-domain signals are transformed into vector signals in the two dimensional rotating coordinate system, then by means of angle rotated in reference coordinate system the adaptive compensation for lagging phase due to damping control and the adaptive compensation for lagging phase due to time-varying delay are carried out respectively. Combining with gain amplification, after the inverse transformation in time-domain the post-final compensation DC supplementary controlled quantity can be obtained. Simulation results of a 8-machine 36-bus system show that the

  6. Developing protocols for obstetric emergencies.

    Science.gov (United States)

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  8. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  9. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  10. Adaptive CT scanning system

    Energy Technology Data Exchange (ETDEWEB)

    Sampayan, Stephen E.

    2016-11-22

    Apparatus, systems, and methods that provide an X-ray interrogation system having a plurality of stationary X-ray point sources arranged to substantially encircle an area or space to be interrogated. A plurality of stationary detectors are arranged to substantially encircle the area or space to be interrogated, A controller is adapted to control the stationary X-ray point sources to emit X-rays one at a time, and to control the stationary detectors to detect the X-rays emitted by the stationary X-ray point sources.

  11. Joint Subcarrier Pairing and Resource Allocation for Cognitive Network and Adaptive Relaying Strategy

    KAUST Repository

    Soury, Hamza

    2012-05-01

    Recent measurements show that the spectrum is under-utilized by licensed users in wireless communication. Cognitive radio (CR) has been proposed as a suitable solution to manage the inefficient usage of the spectrum and increase coverage area of wireless networks. The concept is based on allowing a group of secondary users (SUs) to share the unused radio spectrum originally owned by the primary user (PUs). The operation of CR should not cause harmful interference to the PUs. In the other hand, relayed transmission increases the coverage and achievable capacity of communication systems and in particular in CR systems. In fact there are many types of cooperative communications, however the two main ones are decode-and-forward (DAF) and amplify-and-forward (AAF). Adaptive relaying scheme is a relaying technique by which the benefits of the amplifying or decode and forward techniques can be achieved by switching the forwarding technique according to the quality of the signal. In this dissertation, we investigate the power allocation for an adaptive relaying protocol (ARP) scheme in cognitive system by maximizing the end-to-end rate and searching the best carriers pairing distribution. The optimization problem is under the interference and power budget constraints. The simulation results confirm the efficiency of the proposed adaptive relaying protocol in comparison to other relaying techniques, and the consequence of the choice of the pairing strategy.

  12. Hedonic "adaptation"

    Directory of Open Access Journals (Sweden)

    Paul Rozin

    2008-02-01

    Full Text Available People live in a world in which they are surrounded by potential disgust elicitors such as ``used'' chairs, air, silverware, and money as well as excretory activities. People function in this world by ignoring most of these, by active avoidance, reframing, or adaptation. The issue is particularly striking for professions, such as morticians, surgeons, or sanitation workers, in which there is frequent contact with major disgust elicitors. In this study, we study the ``adaptation'' process to dead bodies as disgust elicitors, by measuring specific types of disgust sensitivity in medical students before and after they have spent a few months dissecting a cadaver. Using the Disgust Scale, we find a significant reduction in disgust responses to death and body envelope violation elicitors, but no significant change in any other specific type of disgust. There is a clear reduction in discomfort at touching a cold dead body, but not in touching a human body which is still warm after death.

  13. Adaptation Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Huq, Saleemul

    2011-11-15

    Efforts to help the world's poor will face crises in coming decades as climate change radically alters conditions. Action Research for Community Adapation in Bangladesh (ARCAB) is an action-research programme on responding to climate change impacts through community-based adaptation. Set in Bangladesh at 20 sites that are vulnerable to floods, droughts, cyclones and sea level rise, ARCAB will follow impacts and adaptation as they evolve over half a century or more. National and international 'research partners', collaborating with ten NGO 'action partners' with global reach, seek knowledge and solutions applicable worldwide. After a year setting up ARCAB, we share lessons on the programme's design and move into our first research cycle.

  14. Yoga protocol for treatment of breast cancer-related lymphedema

    Science.gov (United States)

    Narahari, SR; Aggithaya, Madhur Guruprasad; Thernoe, Liselotte; Bose, Kuthaje S; Ryan, Terence J

    2016-01-01

    Introduction: Vaqas and Ryan (2003) advocated yoga and breathing exercises for lymphedema. Narahari et al. (2007) developed an integrative medicine protocol for lower-limb lymphedema using yoga. Studies have hypothesized that yoga plays a similar role as that of central manual lymph drainage of Foldi's technique. This study explains how we have used yoga and breathing as a self-care intervention for breast cancer-related lymphedema (BCRL). Methods: The study outcome was to create a yoga protocol for BCRL. Selection of yoga was based on the actions of muscles on joints, anatomical areas associated with different groups of lymph nodes, stretching of skin, and method of breathing in each yoga. The protocol was piloted in eight BCRL patients, observed its difficulties by interacting with patients. A literature search was conducted in PubMed and Cochrane library to identify the yoga protocols for BCRL. Results: Twenty yoga and 5 breathing exercises were adopted. They have slow, methodical joint movements which helped patients to tolerate pain. Breathing was long and diaphragmatic. Flexion of joints was coordinated with exhalation and extension with inhalation. Alternate yoga was introduced to facilitate patients to perform complex movements. Yoga's joint movements, initial positions, and mode of breathing were compared to two other protocols. The volume reduced from 2.4 to 1.2 L in eight patients after continuous practice of yoga and compression at home for 3 months. There was improvement in the range of movement and intensity of pain. Discussion: Yoga exercises were selected on the basis of their role in chest expansion, maximizing range of movements: flexion of large muscles, maximum stretch of skin, and thus part-by-part lymph drainage from center and periphery. This protocol addressed functional, volume, and movement issues of BCRL and was found to be superior to other BCRL yoga protocols. However, this protocol needs to be tested in centers routinely managing BCRL

  15. SDL design of MPLS routing protocol in the private network

    Science.gov (United States)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-02-01

    Nowadays multi-protocol label switching (MPLS) technology has achieved great popularity in the world. Because MPLS adopts the scheme of "route once and switch many", routing is the key element to ensure packets are transmitted to destinations. Though there are many designs of MPLS routing protocol for public networks, they can hardly fit the private network very well for its special characteristics. This paper presents the design of MPLS routing protocol in the private network using the specification and description language (SDL), which is an object-oriented formal language and mainly used in communications area. In our design the whole autonomous system (AS) is regarded as a single area to reduce the number of protocol packets. The SDL module of MPLS routing protocol consists of four kinds of processes, namely Management, Checking, NeigSession and LSADbase. Simulations of the SDL design are run in many scenarios, the results of which indicate that the SDL module is manageable and the overall performance is satisfying. From our design and simulation experience, we find that the software development cycle can be drastically reduced by the use of SDL, and the code is easy to maintain and reuse.

  16. Validity of Short and Long Self-Administered Food Frequency Questionnaires in Ranking Dietary Intake in Middle-Aged and Elderly Japanese in the Japan Public Health Center-Based Prospective Study for the Next Generation (JPHC-NEXT) Protocol Area

    Science.gov (United States)

    Yokoyama, Yuta; Takachi, Ribeka; Ishihara, Junko; Ishii, Yuri; Sasazuki, Shizuka; Sawada, Norie; Shinozawa, Yurie; Tanaka, Junta; Kato, Erika; Kitamura, Kaori; Nakamura, Kazutoshi; Tsugane, Shoichiro

    2016-01-01

    Background Longitudinal epidemiological studies require both the periodic update of intake information via repeated dietary survey and the minimization of subject burden in responding to questionnaires. We developed a 66-item Food Frequency Questionnaire (short-FFQ) for the Japan Public Health Center-based prospective Study for the Next Generation (JPHC-NEXT) follow-up survey using major foods from the FFQ developed for the original JPHC Study. For the JPHC-NEXT baseline survey, we used a larger 172-item FFQ (long-FFQ), which was also derived from the JPHC-FFQ. We compared the validity of ranking individuals by levels of dietary consumption by these FFQs among residents of selected JPHC-NEXT study areas. Methods From 2012 to 2013, 240 men and women aged 40–74 years from five areas in the JPHC-NEXT protocol were asked to respond to the long-FFQ and provide 12-day weighed food records (WFR) as reference; 228 also completed the short-FFQ. Spearman’s correlation coefficients (CCs) between estimates from the FFQs and WFR were calculated and corrected for intra-individual variation of the WFR. Results Median CC values for energy and 53 nutrients for the short-FFQ for men and women were 0.46 and 0.44, respectively. Respective values for the long-FFQ were 0.50 and 0.43. Compared with the long-FFQ, cross-classification into exact plus adjacent quintiles with the short-FFQ ranged from 68% to 91% in men and 58% to 85% in women. Conclusions Similar to the long-FFQ, the short-FFQ provided reasonably valid measures for ranking middle-aged and elderly Japanese for many nutrients and food groups. The short-FFQ can be used in follow-up surveys in prospective cohort studies aimed at updating diet rank information. PMID:27064130

  17. Energy efficient TDMA-based MAC protocol associated with GAF for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    XIAO Xiao; ZHENG Bao-yu; YAN Zhen-ya; CHEN Chao

    2007-01-01

    The design of media access control (MAC) protocol for wireless sensor networks (WSNs) with the idea of cross layer attracts more and more attention. People can improve the MAC protocol by obtaining certain information regarding the network layer and physical layer. This article synthesizes and optimizes certain cross-layer protocols which have existed. On the basis of the routing, topology information in the network layer, and transmission power information in the physical layer, the time slot assignment algorithm has been improved in the MAC layer.By using geographical adaptive fidelity algorithm (GAF) to divide the grids, controlling of transmission power and scheduling the work/sleep duty cycle for sensor nodes, a new MAC protocol has been proposed to decrease energy consumption and enlarge the lifetime of WSNs. Simulation results show that the MAC protocol functions well.

  18. Exercise and Training at Altitudes: Physiological Effects and Protocols

    Directory of Open Access Journals (Sweden)

    Olga Cecilia Vargas Pinilla

    2014-01-01

    Full Text Available An increase in altitude leads to a proportional fall in the barometric pressure, and a decrease in atmospheric oxygen pressure, producing hypobaric hypoxia that affects, in different degrees, all body organs, systems and functions. The chronically reduced partial pressure of oxygen causes that individuals adapt and adjust to physiological stress. These adaptations are modulated by many factors, including the degree of hypoxia related to altitude, time of exposure, exercise intensity and individual conditions. It has been established that exposure to high altitude is an environmental stressor that elicits a response that contributes to many adjustments and adaptations that influence exercise capacity and endurance performance. These adaptations include in crease in hemoglobin concentration, ventilation, capillary density and tissue myoglobin concentration. However, a negative effect in strength and power is related to a decrease in muscle fiber size and body mass due to the decrease in the training intensity. Many researches aim at establishing how training or living at high altitudes affects performance in athletes. Training methods, such as living in high altitudes training low, and training high-living in low altitudes have been used to research the changes in the physical condition in athletes and how the physiological adaptations to hypoxia can enhanceperformance at sea level. This review analyzes the literature related to altitude training focused on how physiological adaptations to hypoxic environments influence performance, and which protocols are most frequently used to train in high altitudes.

  19. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  20. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  1. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  2. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  3. Metabolomics protocols for filamentous fungi.

    Science.gov (United States)

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  4. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols and...

  5. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  6. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  7. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analys...

  8. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  9. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  10. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  11. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  12. RTnet: a real-time protocol for broadcast-capable networks

    NARCIS (Netherlands)

    Hanssen, Ferdy; Jansen, Pierre G.; Scholten, Hans; Hattink, Tjalling

    2004-01-01

    This paper presents an overview of a real-time network protocol, meant to be used on fully-connected local area networks with a broadcast capability. The intended use of this protocol is an in-home digital network, with support for on-the-fly addition and removal of network nodes, for resource-lavis

  13. Research on the adaptability of Elaeagnus angustifolia L.in saline sodic soil areas of Jilin province%沙枣在吉林苏打盐碱土区的适应性研究

    Institute of Scientific and Technical Information of China (English)

    陈士刚; 陶晶; 秦彩云; 李青梅; 王聪慧; 赵吉胜; 杨晶

    2014-01-01

    以甘肃张掖、新疆塔城、内蒙古巴盟磴口、加拿大埃德蒙顿地区生长的沙枣为种源,在吉林省西部苏打盐碱土区经过7a引种栽培试验,结果表明:4个种源之间的物候期无明显差别,且与引种地相差不大;当年成活率达到90%以上,未发生盐害;株高、根径生长与引种地虽然存在一定差距,但差异不显著;加拿大、新疆、内蒙古种源可以自然越冬,甘肃种源越冬率在80%左右;未见明显病虫害。沙枣在吉林苏打盐碱土区具有良好的生长表现和适应性。%Elaeagnus angustifolia L.growing in Zhang ye,Gansu province, Tacheng, Xinjiang province, Bamengdengkou, Inner Mongolia and Edmonton , Canada were taken as provenances by 7 a introduction and cultivation test in saline sodic soil areas of west Jilin province .The results showed:phenophase among 4 provenances indicated no significant difference , and was also no significant difference with provenance .The survival rate of current year was more than 90%, salt damage was unhappened .There were non-significant differences of plant height and root diameter growth between cultivations and provenances;provenances of Canada , Xinjiang province and Inner Mongolia could overwinter naturally , overwintering rate of Gansu was about 80% without obviousplant diseases and insect pests .Elaeagnus angustifolia L.showed favourable growth performance and adaptability in saline sodic soil areas of Jilin province .

  14. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  15. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  16. Drug-usage evaluation by disease state: developing protocols.

    Science.gov (United States)

    Enlow, M L

    1996-07-01

    The Joint Commission definition of drug-usage evaluation (DUE) also applies to DUE by disease state. The criteria for disease process selection, key processes being evaluated, methods to develop initial DUE protocols, and DUE validation and approval processes are reviewed. The treatment of community-acquired pneumonia is a disease state DUE performed at Saint Joseph Health Center in Kansas City, Missouri. The preliminary protocol was developed by a collaborative network of clinical pharmacists in the metropolitan area. Outcome measures were included in the evaluation. The results were used as baseline data in the development of a pneumonia clinical pathway.

  17. Survey on Routing Protocol in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    R.Devika

    2013-02-01

    Full Text Available The Wireless Sensor Network (WSN is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. WSN are generally used to monitor activities and report events, such as fire, overheating etc. in a specific area or environment. It routs data back to the Base Station (BS. Data transmission is usually a multi-hop from node to nodetowards the BS. Sensor nodes are limited in power, computational and communication bandwidth. Primary goal of researchers is to find the energy efficient routing protocol. This study highlights the different routing protocol with advantages and limitations.

  18. The influence of different contrast medium concentrations and injection protocols on quantitative and clinical assessment of FDG–PET/CT in lung cancer

    Energy Technology Data Exchange (ETDEWEB)

    Verburg, Frederik A., E-mail: fverburg@ukaachen.de [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Kuhl, Christiane K. [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Pietsch, Hubertus [Bayer Pharma AG, Berlin, Müllerstrasse 178, 13353 Berlin (Germany); Palmowski, Moritz [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Mottaghy, Felix M. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Behrendt, Florian F. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany)

    2013-10-01

    Objectives: To compare the effects of two different contrast medium concentrations for use in computed X-ray tomography (CT) employing two different injection protocols on positron emission tomography (PET) reconstruction in combined 2-{sup 18}F-desoxyglucose (FDG) PET/CT in patients with a suspicion of lung cancer. Methods: 120 patients with a suspicion of lung cancer were enrolled prospectively. PET images were reconstructed with the non-enhanced and venous phase contrast CT obtained after injection of iopromide 300 mg/ml or 370 mg/ml using either a fixed-dose or a body surface area adapted injection protocol. Maximum and mean standardized uptake values (SUVmax and SUVmean) and contrast enhancement (HU) were determined in the subclavian vein, ascending aorta, abdominal aorta, inferior vena cava, portal vein, liver and kidney and in the suspicious lung lesion. PET data were evaluated visually for the presence of malignancy and image quality. Results: At none of the sites a significant difference in the extent of the contrast enhancement between the four different protocols was found. However, the variability of the contrast enhancement at several anatomical sites was significantly greater in the fixed dose groups than in the BSA groups for both contrast medium concentrations. At none of the sites a significant difference was found in the extent of the SUVmax and SUVmean increase as a result of the use of the venous phase contrast enhanced CT for attenuation. Visual clinical evaluation of lesions showed no differences between contrast and non-contrast PET/CT (P = 0.32). Conclusions: Contrast enhanced CT for attenuation correction in combined PET/CT in lung cancer affects neither the clinical assessment nor image quality of the PET-images. A body surface adapted contrast medium protocol reduces the interpatient variability in contrast enhancement.

  19. MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    YANG Shiwei; ZHU Keqing; XU Quankui; YANG Lin; ZHUO Bin

    2008-01-01

    The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP , with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs.

  20. A superovulation protocol for the spiny mouse (Acomys cahirinus).

    Science.gov (United States)

    Pasco, Rachael; Gardner, David K; Walker, David W; Dickinson, Hayley

    2012-01-01

    This study aimed to develop a superovulation protocol for the spiny mouse (Acomys cahirinus). The spiny mouse is a desert-adapted rodent species, with a long oestrus cycle (11 days) compared with rat and mouse, and gives birth to few (mean litter size is 3) precocial offspring after a relatively long gestation (39 days). We successfully optimised a superovulation protocol that elicited a 5-fold increase in the normal ovulation rate of this species. To induce superovulation in the spiny mouse 2 injections of equine chorionic gonadotrophin (eCG, 10 IU each), 9h apart, were required, followed by 20 IU of human chorionic gonadotrophin (hCG). This protocol was successful in 100% of females trialed and at 33 h post-hCG an average of 14.7 ± 1.5, 1-2 cell embryos were recovered. Histological analysis of ovaries following superovulation revealed large corpus lutea and post-ovulatory follicles occupying a large part of the ovary. Ovulation commenced 6-12 h after the hCG injection and continued until 24-33 h post-hCG as indicated by both histological analysis of ovaries and the presence of oocytes/embryos in the oviduct. This superovulation protocol will facilitate the development of an in vitro culture system for spiny mouse embryos.

  1. Recovery Act: Energy Efficiency of Data Networks through Rate Adaptation (EEDNRA) - Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Andrews; Spyridon Antonakopoulos; Steve Fortune; Andrea Francini; Lisa Zhang

    2011-07-12

    using feasibly-implementable rate adaptivity. • A buffer-management algorithm that is designed to reduce the size of router buffers, and hence energy consumed. • A packet-scheduling algorithm designed to minimize packet-processing energy requirements. Additional research is recommended in at least two areas: further exploration of rate-adaptation in network switching equipment, including incorporation of rate-adaptation in actual hardware, allowing experimentation in operational networks; and development of control protocols that allow parts of networks to be shut down while minimizing disruption to traffic flow in the network. The research is an integral part of a large effort within Bell Laboratories, Alcatel-Lucent, aimed at dramatic improvements in the energy efficiency of telecommunication networks. This Study did not explicitly consider any commercialization opportunities.

  2. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  3. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  4. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  5. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  6. A Sensing Error Aware MAC Protocol for Cognitive Radio Networks

    CERN Document Server

    Hu, Donglin

    2011-01-01

    Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

  7. An Efficient Key Management Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    ZENG Qingguang; CUI Yanling; LUO Juan

    2006-01-01

    Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of an efficient key management scheme based on low energy adaptive clustering hierarchy(LEACH) for wireless sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. The paper presents different keys are set to the sensors for meeting different transmitting messages and variable security requirements. Simulation results show that our key management protocol based-on LEACH can achieve better performance. The energy consumption overhead introduced is remarkably low compared with the original Kerberos schemes.

  8. Synchrony between orientation-selective neurons is modulated during adaptation-induced plasticity in cat visual cortex

    Directory of Open Access Journals (Sweden)

    Shumikhina Svetlana

    2008-07-01

    Full Text Available Abstract Background Visual neurons respond essentially to luminance variations occurring within their receptive fields. In primary visual cortex, each neuron is a filter for stimulus features such as orientation, motion direction and velocity, with the appropriate combination of features eliciting maximal firing rate. Temporal correlation of spike trains was proposed as a potential code for linking the neuronal responses evoked by various features of a same object. In the present study, synchrony strength was measured between cells following an adaptation protocol (prolonged exposure to a non-preferred stimulus which induce plasticity of neurons' orientation preference. Results Multi-unit activity from area 17 of anesthetized adult cats was recorded. Single cells were sorted out and (1 orientation tuning curves were measured before and following 12 min adaptation and 60 min after adaptation (2 pairwise synchrony was measured by an index that was normalized in relation to the cells' firing rate. We first observed that the prolonged presentation of a non-preferred stimulus produces attractive (58% and repulsive (42% shifts of cell's tuning curves. It follows that the adaptation-induced plasticity leads to changes in preferred orientation difference, i.e. increase or decrease in tuning properties between neurons. We report here that, after adaptation, the neuron pairs that shared closer tuning properties display a significant increase of synchronization. Recovery from adaptation was accompanied by a return to the initial synchrony level. Conclusion We conclude that synchrony reflects the similarity in neurons' response properties, and varies accordingly when these properties change.

  9. Health diplomacy the adaptation of global health interventions to local needs in sub-Saharan Africa and Thailand: Evaluating findings from Project Accept (HPTN 043

    Directory of Open Access Journals (Sweden)

    Kevany Sebastian

    2012-06-01

    Full Text Available Abstract Background Study-based global health interventions, especially those that are conducted on an international or multi-site basis, frequently require site-specific adaptations in order to (1 respond to socio-cultural differences in risk determinants, (2 to make interventions more relevant to target population needs, and (3 in recognition of ‘global health diplomacy' issues. We report on the adaptations development, approval and implementation process from the Project Accept voluntary counseling and testing, community mobilization and post-test support services intervention. Methods We reviewed all relevant documentation collected during the study intervention period (e.g. monthly progress reports; bi-annual steering committee presentations and conducted a series of semi-structured interviews with project directors and between 12 and 23 field staff at each study site in South Africa, Zimbabwe, Thailand and Tanzania during 2009. Respondents were asked to describe (1 the adaptations development and approval process and (2 the most successful site-specific adaptations from the perspective of facilitating intervention implementation. Results Across sites, proposed adaptations were identified by field staff and submitted to project directors for review on a formally planned basis. The cross-site intervention sub-committee then ensured fidelity to the study protocol before approval. Successfully-implemented adaptations included: intervention delivery adaptations (e.g. development of tailored counseling messages for immigrant labour groups in South Africa political, environmental and infrastructural adaptations (e.g. use of local community centers as VCT venues in Zimbabwe; religious adaptations (e.g. dividing clients by gender in Muslim areas of Tanzania; economic adaptations (e.g. co-provision of income generating skills classes in Zimbabwe; epidemiological adaptations (e.g. provision of ‘youth-friendly’ services in South Africa, Zimbabwe

  10. Adapt or Die

    DEFF Research Database (Denmark)

    Brody, Joshua Eric; Larsen, Kasper Green

    2015-01-01

    read cells. We study such non-adaptive data structures in the cell probe model. This model is one of the least restrictive lower bound models and in particular, cell probe lower bounds apply to data structures developed in the popular word-RAM model. Unfortunately, this generality comes at a high cost...... several different notions of non-adaptivity and identify key properties that must be dealt with if we are to prove polynomial lower bounds without restrictions on the data structures. Finally, our results also unveil an interesting connection between data structures and depth-2 circuits. This allows us...... to translate conjectured hard data structure problems into good candidates for high circuit lower bounds; in particular, in the area of linear circuits for linear operators. Building on lower bound proofs for data structures in slightly more restrictive models, we also present a number of properties of linear...

  11. Designing Adaptive Web Applications

    DEFF Research Database (Denmark)

    Dolog, Peter

    2008-01-01

    Learning system to study a discipline. In business to business interaction, different requirements and parameters of exchanged business requests might be served by different services from third parties. Such applications require certain intelligence and a slightly different approach to design. Adpative web...... adaptation to the changed parameters of environments, user or context. Adaptation can be seen as an orthogonal concern or viewpoint in a design process. In this paper I will discuss design abstractions which are employed in current design methods for web applications. I will exemplify the use......The unique characteristic of web applications is that they are supposed to be used by much bigger and diverse set of users and stakeholders. An example application area is e-Learning or business to business interaction. In eLearning environment, various users with different background use the e...

  12. Implementation of I 2C Master Bus Protocol on FPGA

    Directory of Open Access Journals (Sweden)

    Regu Archana

    2014-10-01

    Full Text Available The focus of this paper is on I 2C (Inter-Integrated Circuit protocol interface between Master Bus protocol and slave. Here we are interfacing between micro-controller and DS1307. I 2C bus protocol sends 8 bit data from micro-controller to DS1307. This module was designed in VHDL and simulated and synthesized using Xilinx ISE Design Suite 14.2. I 2C and optimized for area and power. This concept is widely applicable from any high speed device or low speed device to any low speed device or high speed device. This module acts as a slave for the DS1307 at the same time acts like a master for the micro-controller device which can be considered as a slave. . It can be used to interface low speed peripherals like motherboard, embedded system, mobile phones, set top boxes, DVD, PDA’s or other electronic devices.

  13. PadSteg: Introducing Inter-Protocol Steganography

    CERN Document Server

    Jankowski, Bartosz; Szczypiorski, Krzysztof

    2011-01-01

    Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.

  14. Nurse driven protocol for head injured patients on warfarin.

    Science.gov (United States)

    Bair, Holly; Ivascu, Felicia; Janczyk, Randy; Nittis, Tara; Bendick, Philip; Howells, Greg

    2005-01-01

    The trauma quality improvement committee at our facility identified a significant number of patients on warfarin presenting to the emergency center after minor head trauma that subsequently expired from their intracranial hemorrhage prior to appropriate intervention. An analysis of this patient population identified multiple areas of delay. A collaborative effort between the emergency center nurses and the trauma service personnel resulted in a formal protocol to address each component of delay and expedite the process. Since implementation of this nursing driven protocol we have dramatically decreased the time to (1) Emergency Center Physician evaluation, (2) completion of head computerized tomography, (3) reversal of anticoagulation with fresh frozen plasma (FFP), and (4) most importantly, patient mortality rate. We conclude that this nursing driven protocol is effective in decreasing the mortality rate by eliminating diagnostic and therapeutic delays in this high-risk patient population.

  15. Kioto protocol; Protocolo de Kioto

    Energy Technology Data Exchange (ETDEWEB)

    Romero, A.

    2005-07-01

    Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)

  16. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  17. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  18. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  19. Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Vahid Hosseini

    2013-07-01

    Full Text Available Target tracking is one of the applications of wireless sensor network which is set up in the areas of field surveillance, habitat monitoring, and intruder tracking. Energy saving is one of the main challenges in target tracking sensor networks. In this paper, we present a Clustering and Prediction-Based Protocol (CPBP for Target Tracking in Wireless Sensor Networks (WSNs. Also, the Base Station (BS was exploited as a cluster formation manager and target movement predictor. Our protocol uses two parameters, distance and energy, for clustering algorithm. For evaluation, the proposed protocol was compared to a number of protocols in terms of network lifetime, number of transmitted packets and number of target miss during network lifetime. Performance of the proposed protocol was compared with cluster size 5 and 7. The simulation results represented desirable performance of the presented protocol.

  20. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.