WorldWideScience

Sample records for area adapted protocol

  1. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    OpenAIRE

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  2. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  3. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  4. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay. PMID:20703634

  5. Adaptive-Reliable Medium Access Control Protocol for Wireless Body Area Networks

    OpenAIRE

    Rahim, A.; Javaid, N.; M Aslam; Qasim, U.; Khan, Z. A.

    2012-01-01

    Extensive energy is consumed by Transceiver communication operation [1]. Existing research on MAC layer focuses to maximize battery-powered sensor node's life. Bottleneck of MAC layer protocol design for WBAN is to achieve high reliability and energy minimization. Majority of MAC protocols designed for WBANs are based upon TDMA approach. However, a new protocol needs to be defined to achieve high energy efficiency, fairness and avoid extra energy consumption due to synchronization.

  6. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  7. An adaptive protocol for distributed beamforming

    OpenAIRE

    Sigg, Stephan; Beigl, Michael

    2011-01-01

    We study distributed adaptive beamforming in networks of wireless nodes. In particular, we observe that for the synchronisation of carrier phases, distinct algorithmic configurations are optimal in various environmental settings and propose a protocol that utilises organic computing principles to find optimum parameters. Furthermore, we study the impact of different modulation schemes on the bit error rate of a signal sequence transmitted collaboratively by distributed devices via adaptive be...

  8. Protocol independent adaptive route update for VANET.

    Science.gov (United States)

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  9. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    Science.gov (United States)

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  10. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  11. Body surface area adapted iopromide 300 mg/ml versus 370 mg/ml contrast medium injection protocol: Influence on quantitative and clinical assessment in combined PET/CT

    International Nuclear Information System (INIS)

    Purpose: To investigate the quantitative and qualitative differences between combined positron emission tomography and computed X-ray tomography (PET/CT) enhanced with contrast medium with either an iodine concentration 300 mg/ml or 370 mg/ml. Materials and methods: 120 consecutive patients scheduled for F-18-Fluorodeoxyglucose (FDG) PET/CT were included. The first (second) 60 patients received contrast medium with 300 (370) mg iodine/ml. Intravenous injection protocols were adapted for an identical iodine delivery rate (1.3 mg/s) and body surface area (BSA) adapted iodine dose (22.26 g I/m2). Maximum and mean standardized uptake values (SUVmax; SUVmean) and contrast enhancement (HU) were determined in the ascending aorta, the abdominal aorta, the inferior vena cava, the portal vein, the liver and the right kidney in the venous contrast medium phase. PET data were evaluated visually for the presence of malignancy and image quality. Results: Both media caused significantly higher values for HU, SUVmean and SUVmax for the enhanced PET/CT than the non-enhanced one (all p < 0.01). There were no significant differences in the degree of increase of HU, SUVmean and SUVmax between the two contrast media at any anatomic site (all p > 0.05). Visual evaluation of lesions showed no differences between contrast and non-contrast PET/CT or between the two different contrast media (p = 0.77). Conclusion: When using a constant iodine delivery rate and total iodine dose in a BSA adapted injection protocol, there are no quantitative or qualitative differences in either CT or PET between contrast media with an iodine concentration of 300 mg/ml and 370 mg/ml, respectively

  12. Body surface area adapted iopromide 300 mg/ml versus 370 mg/ml contrast medium injection protocol: Influence on quantitative and clinical assessment in combined PET/CT

    Energy Technology Data Exchange (ETDEWEB)

    Verburg, Frederik A., E-mail: fverburg@ukaachen.de [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Apitzsch, Jonas [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Lensing, Carina [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Kuhl, Christiane K. [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Pietsch, Hubertus [Bayer Pharma AG, Müllerstrasse 178, 13353 Berlin (Germany); Mottaghy, Felix M. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Behrendt, Florian F. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany)

    2013-12-01

    Purpose: To investigate the quantitative and qualitative differences between combined positron emission tomography and computed X-ray tomography (PET/CT) enhanced with contrast medium with either an iodine concentration 300 mg/ml or 370 mg/ml. Materials and methods: 120 consecutive patients scheduled for F-18-Fluorodeoxyglucose (FDG) PET/CT were included. The first (second) 60 patients received contrast medium with 300 (370) mg iodine/ml. Intravenous injection protocols were adapted for an identical iodine delivery rate (1.3 mg/s) and body surface area (BSA) adapted iodine dose (22.26 g I/m{sup 2}). Maximum and mean standardized uptake values (SUV{sub max}; SUV{sub mean}) and contrast enhancement (HU) were determined in the ascending aorta, the abdominal aorta, the inferior vena cava, the portal vein, the liver and the right kidney in the venous contrast medium phase. PET data were evaluated visually for the presence of malignancy and image quality. Results: Both media caused significantly higher values for HU, SUV{sub mean} and SUV{sub max} for the enhanced PET/CT than the non-enhanced one (all p < 0.01). There were no significant differences in the degree of increase of HU, SUV{sub mean} and SUV{sub max} between the two contrast media at any anatomic site (all p > 0.05). Visual evaluation of lesions showed no differences between contrast and non-contrast PET/CT or between the two different contrast media (p = 0.77). Conclusion: When using a constant iodine delivery rate and total iodine dose in a BSA adapted injection protocol, there are no quantitative or qualitative differences in either CT or PET between contrast media with an iodine concentration of 300 mg/ml and 370 mg/ml, respectively.

  13. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  14. On Runtime Adaptation of Application-Layer Multicast Protocol Parameters

    OpenAIRE

    Hübsch, Christian; Mayer, Christoph P.; Waldhorst, Oliver P.

    2010-01-01

    Reasonable choice of protocol parameters is crucial for the successful deployment of overlay networks fulfilling given service quality requirements in next generation networks. Unfortunately, changing network conditions, as well as changing application and user requirements may invalidate an initial parameter choice during the lifetime of an overlay. To this end, runtime adaptation of protocol parameters seems to be a promising solution-however, it is not clear if protocol parameters can be a...

  15. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal

    course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...... definition of Canetti, for honest-but-curious adversaries, adaptive security is equivalent to non-adaptive security when the number of parties is logarithmic, and is strictly stronger than non-adaptive security when the number of parties is super-logarithmic. For Byzantine adversaries, adaptive security is...

  16. Dynamically Adaptable Improved OLSR (DA-IOLSR Protocol

    Directory of Open Access Journals (Sweden)

    P.S.Vinayagam,

    2016-05-01

    Full Text Available Optimized Link State Routing (OLSR protocol is a proactive type of routing protocol that uses Multipoint Relay (MPR set as the virtual backbone structure. The existing literature has identified various issues with respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on improving the OLSR protocol by employing a Connected Dominating Set (CDS based virtual backbone structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved Optimized Link State Routing (DA-IOLSR protocol is proposed that uses the local topology information to adapt the virtual backbone to topology changes. This assumes significance especially in networks that experience very high mobility. Changes in the network topology caused by node additions, node deletions and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.

  17. The TurboLAN project. Phase 1: Protocol choices for high speed local area networks. Phase 2: TurboLAN Intelligent Network Adapter Card, (TINAC) architecture

    Science.gov (United States)

    Alkhatib, Hasan S.

    1991-01-01

    The hardware and the software architecture of the TurboLAN Intelligent Network Adapter Card (TINAC) are described. A high level as well as detailed treatment of the workings of various components of the TINAC are presented. The TINAC is divided into the following four major functional units: (1) the network access unit (NAU); (2) the buffer management unit; (3) the host interface unit; and (4) the node processor unit.

  18. Protocol Independent Adaptive Route Update for VANET

    OpenAIRE

    Asim Rasheed; Sana Ajmal; Amir Qayyum

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptiv...

  19. Adaptive Locking Protocols for Mobile Databases

    OpenAIRE

    Skjerven, Steinar

    2006-01-01

    Denne diplomoppgaven har undersøkt hvordan en adaptiv låseprotokoll kan hjelpe mobile databaser til å håndtere forskjellige problemer som eksisterer i det mobile miljøet. Diplomoppgaven har også undersøkt hvordan andre låseprotokoller løser problemer i det mobile miljøet. En av disse andre låseprotokollene er låseprotokollen online-offline, som den adaptive låseprotokollen har tatt utgangspunkt i. Den adaptive låseprotokollen har også hentet ideer fra de andre låseprotokollene. Design og impl...

  20. Ee-Leach(Low Energy Adaptive Clustering Hierarchy Modified Protocol

    Directory of Open Access Journals (Sweden)

    Nishita Payar,

    2014-05-01

    Full Text Available A wireless sensor network is made by many homogeneous and/or nodes which can sense data and communicate to each other. As energy is a scarce resource in WSN, the main issue is energy efficient routing. Many flat and hierarchical protocols have been projected to enhance the network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH protocol is a basic energy efficient hierarchical routing protocol in WSN. In LEACH, cluster heads are selected and cluster is formed by joining non cluster head nodes. Member nodes transmit the data to respective cluster head and the cluster head is conscientious to transmit the gathered and aggregated data directly to the base station. This paper examines the performance of the conventional LEACH protocol and gives an enhancement to it for energy efficiency. The proposed protocol considers many parameters like residual energy and distance from base station etc. for cluster head selection and energy efficient routing.

  1. RE-ATTEMPT: A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks

    OpenAIRE

    2014-01-01

    Modern health care system is one of the most popular Wireless Body Area Sensor Network (WBASN) applications and a hot area of research subject to present work. In this paper, we present Reliability Enhanced-Adaptive Threshold based Thermal-unaware Energy-efficient Multi-hop ProTocol (RE-ATTEMPT) for WBASNs. The proposed routing protocol uses fixed deployment of wireless sensors (nodes) such that these are placed according to energy levels. Moreover, we use direct communication for the deliver...

  2. Adaptive Congestion Control Protocol (ACCP for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    James DzisiGadze

    2013-10-01

    Full Text Available In Wireless Sensor Networks (WSN when an event is detected there is an increase in data traffic that mightlead to packets being transmitted through the network close to the packet handling capacity of the WSN.The WSN experiences a decrease in network performance due to packet loss, long delays, and reduction inthroughput. In this paper we developed an adaptive congestion control algorithm that monitors networkutilization and adjust traffic levels and/or increases network resources to improve throughput and conserveenergy. The traffic congestion control protocol DelStatic is developed by introducing backpressuremechanism into NOAH. We analyzed various routing protocols and established that DSR has a higherresource congestion control capability. The proposed protocol, ACCP uses a sink switching algorithm totrigger DelStatic or DSR feedback to a congested node based on its Node Rank. From the simulationresults, ACCP protocol does not only improve throughput but also conserves energy which is critical tosensor application survivability on the field. Our Adaptive Congestion control achieved reliability, highthroughput and energy efficiency.

  3. PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS

    OpenAIRE

    Sotirios Kontogiannis; George Kokkonis; Stavros Valsamidis

    2016-01-01

    Wireless Body Area Networks (WBAN) is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed. This paper presents a new medical protocol MESETP (Medical Services Transport Protocol), that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-...

  4. PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS

    Directory of Open Access Journals (Sweden)

    Sotirios Kontogiannis

    2016-03-01

    Full Text Available Wireless Body Area Networks (WBAN is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed. This paper presents a new medical protocol MESETP (Medical Services Transport Protocol, that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-time protocols used by existing medical services are examined and comparison results are presented.

  5. Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks

    OpenAIRE

    Mullins, Barry E.

    1997-01-01

    An adaptive MAC protocol is developed and analyzed that offers a "best case" scenario by allowing the MAC to control medium parameters thereby fully exploiting the channel of an ad hoc wireless LAN. This new, opportunistic medium access control protocol is called CATER (Code Adapts To Enhance Reliability) and is based on the proposed MAC standard for wireless local area networks (WLAN)-IEEE 802.11 [IEE96]. As currently proposed, IEEE 802.11 uses a fixed pseudo-noise (PN) code for spreading ...

  6. Reliable adaptive multicast protocol in wireless Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Sun Baolin; Li Layuan

    2006-01-01

    In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoc network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoc network environment.In this paper, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multicast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoc network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmission.

  7. Fault-Tolerant Consensus of Multi-Agent System With Distributed Adaptive Protocol.

    Science.gov (United States)

    Chen, Shun; Ho, Daniel W C; Li, Lulu; Liu, Ming

    2015-10-01

    In this paper, fault-tolerant consensus in multi-agent system using distributed adaptive protocol is investigated. Firstly, distributed adaptive online updating strategies for some parameters are proposed based on local information of the network structure. Then, under the online updating parameters, a distributed adaptive protocol is developed to compensate the fault effects and the uncertainty effects in the leaderless multi-agent system. Based on the local state information of neighboring agents, a distributed updating protocol gain is developed which leads to a fully distributed continuous adaptive fault-tolerant consensus protocol design for the leaderless multi-agent system. Furthermore, a distributed fault-tolerant leader-follower consensus protocol for multi-agent system is constructed by the proposed adaptive method. Finally, a simulation example is given to illustrate the effectiveness of the theoretical analysis. PMID:25415998

  8. Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN

    OpenAIRE

    Kim Byung-Seo; Hong SungBack; Kim SungWon

    2010-01-01

    While bit-loading algorithms over wireless systems have been extensively studied, the development of a protocol which implements bit-loading-based rate adaptation over wireless systems has not been highlighted. The design of such a protocol is not a trivial problem, due to the overhead associated with the feedback information. In this paper, a novel protocol is proposed to provide an efficient way to implement subcarrier-wise rate adaptation in OFDM-based wireless systems. When receiving a R...

  9. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  10. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  11. IMPLEMENTATION OF ADAPTIVE ZONE ROUTING PROTOCOL FOR WIRELESS NETWORKS

    OpenAIRE

    T. RAVI NAYAK; SAKE. POTHALAIAH; Dr. K ASHOK BABU

    2010-01-01

    Mobile Ad hoc wireless Networks (MANETs) that do not need any fixed infrastructure. They are characterized by dynamic topology due to node mobility, limited channel bandwidth, and limited battery power of nodes. The key challenge in the design of ad hoc networks is the development of dynamic routing protocols that can efficiently findroutes between two communicating nodes. Thus, many ad hoc routing protocols have been proposed in recent years. All these routing protocols attempt to provide a ...

  12. Efficient Power Management using Adaptive Receiver Centric Transport Layer Protocols on Wireless Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Kamalakshi.N

    2009-11-01

    Full Text Available Today's wireless networks are highly heterogeneous, with mobile devices consisting of multiple wireless network interfaces (WNICs. Since battery lifetime is limited, power management of the interfaces has become essential with flexible and open architecture, capable of supporting various types of networks, terminals and applications. However how to integrate the protocols to meet the heterogeneous network environments becomes a significant challenge in the fourth generation wireless network. Adaptive protocols are proposed to solve heterogeneity problem in future wireless networks. This paper discusses two protocols R²CP, and RCP and feasibility of RCP protocols applied to the manage power efficiently and adaptive Congestion control on heterogeneous wireless network.

  13. Adaptive Relay Activation in the Network Coding Protocols

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    State-of-the-art Network coding based routing protocols exploit the link quality information to compute the transmission rate in the intermediate nodes. However, the link quality discovery protocols are usually inaccurate, and introduce overhead in wireless mesh networks. In this paper, we present...

  14. A Biometric Key Establishment Protocol for Body Area Networks

    OpenAIRE

    Lin Yao; Bing Liu; Guowei Wu; Kai Yao; Jia Wang

    2011-01-01

    Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for health monitoring. In the context of a body area network (BAN), the confidentiality and integrity of the sensitive health information is particularly important. In this paper, we present an ECG (electrocardiogram)-signal-based key establishment protocol to secure the communication between every sensor and the control unit before the physiological data are transferred...

  15. SLEACH: Secure Low- Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    WANG Xiao-yun; YANG Li-zhen; CHEN Ke-fei

    2005-01-01

    LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, a secure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensive cryptographic operations to each part of the protocol functionality to create an efficient, practical protocol. Then we give security analyses of SLEACH. Our security analyses show that our scheme is robust against any external attacker or compromised nodes in the sensor network

  16. An Adaptive Hierarchical Routing Protocol for Wireless Ad-hoc Sensor Networks

    OpenAIRE

    Nourizadeh, Shahram; Song, Ye-Qiong; Thomesse, Jean-Pierre

    2009-01-01

    This paper presents a cluster based, adaptive routing protocol that dynamically adapts to node's failure and mobility. Cluster head election, Mobility management, Failure management and Load balancing are the main parts of the protocol which are controlled by a Fuzzy decision making function. A new load balancing method by using Load tree is presented in this approach. The simulations results show the efficiency of this algorithm to manage the mobility and failure of the nodes and also to bal...

  17. Energy-efficient MAC Protocol for Patient Personal Area Networks.

    Science.gov (United States)

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2005-01-01

    The formulation of a Personal Area Network (PAN), consisting of a wireless infrastructure of medical sensors, attached to patient's body, and a supervising device carried by them, lays the path for continuous and real-time monitoring of vital signs without discomforting the person in question. This infrastructure enhances the context of remote healthcare services by supporting flexible acquisition of crucial vital signs, while at the same time it provides more convenience to the patient. Aiming at the exploitation of the inherent features and requirements of wireless medical sensor networks, in this paper we focus on the main design guidelines of a low power Medium Access Control (MAC) protocol, designated to support a patient PAN. The proposed protocol intends to improve energy efficiency in such applications and thus is oriented towards the prevention of main energy wastage sources, such as collision, idle listening and power outspending. PMID:17281057

  18. Adaptive MAC Protocol with Effective TDMA Time-slot Assignment and CSMA Contention Window Adaptation for WSN

    Directory of Open Access Journals (Sweden)

    K. Muthukumaran

    2015-06-01

    Full Text Available Wireless Sensor Networks (WSNs have emerged to meet the multimedia requirements in new emerging applications. So it’s important for WSN to have an adaptive and energy-efficient TDMA-CSMA based MAC protocol which significantly reduces energy consumption of the network. Here, this study proposes an Adaptive MAC protocol with effective TDMA time-slot assignment and CSMA contention window adaptation for WSN. This approach mainly consists of two parts which are TDMA time-slot assignment and CSMA contention window adaptation. Through TDMA time-slot assignment it is possible for the receiver nodes to re-organize the timeslots among the sender nodes according to their accessible traffic load. Through CSMA contention window, the network can reduce the latency occurring between the nodes during the transmission.

  19. Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    CERN Document Server

    Shukla, Piyush Kumar; Bhadoria, Dr Sarita Singh

    2009-01-01

    The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade...

  20. Protocol and Practice in the Adaptive Management of Waterfowl Harvests

    Directory of Open Access Journals (Sweden)

    Fred Johnson

    1999-06-01

    Full Text Available Waterfowl harvest management in North America, for all its success, historically has had several shortcomings, including a lack of well-defined objectives, a failure to account for uncertain management outcomes, and inefficient use of harvest regulations to understand the effects of management. To address these and other concerns, the U.S. Fish and Wildlife Service began implementation of adaptive harvest management in 1995. Harvest policies are now developed using a Markov decision process in which there is an explicit accounting for uncontrolled environmental variation, partial controllability of harvest, and structural uncertainty in waterfowl population dynamics. Current policies are passively adaptive, in the sense that any reduction in structural uncertainty is an unplanned by-product of the regulatory process. A generalization of the Markov decision process permits the calculation of optimal actively adaptive policies, but it is not yet clear how state-specific harvest actions differ between passive and active approaches. The Markov decision process also provides managers the ability to explore optimal levels of aggregation or "management scale" for regulating harvests in a system that exhibits high temporal, spatial, and organizational variability. Progress in institutionalizing adaptive harvest management has been remarkable, but some managers still perceive the process as a panacea, while failing to appreciate the challenges presented by this more explicit and methodical approach to harvest regulation. Technical hurdles include the need to develop better linkages between population processes and the dynamics of landscapes, and to model the dynamics of structural uncertainty in a more comprehensive fashion. From an institutional perspective, agreement on how to value and allocate harvests continues to be elusive, and there is some evidence that waterfowl managers have overestimated the importance of achievement-oriented factors in

  1. Microcontroller Protocol for Secure Broadcast in Controller Area Networks

    Directory of Open Access Journals (Sweden)

    B.Vijayalakshmi

    2014-04-01

    Full Text Available Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the application layer of CAN. Here we design, refine and implement a broadcast authentication protocol based on the well known paradigm of using key-chains and time synchronization, a commonly used Mechanism in wireless sensor networks, which allows us to take advantage from the use of symmetric primitives without the need of secret shared keys during broadcast. But, as process control is a time critical operation we make several refinements in order to improve on the authentication delay. For this we study several trade-offs to alleviate shortcomings on computational speed, memory and bandwidth up to the point of using reduced versions of hash functions that can assure ad hoc security. To prove the efficiency of the protocol

  2. Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN

    Directory of Open Access Journals (Sweden)

    Sung Won Kim

    2010-01-01

    Full Text Available While bit-loading algorithms over wireless systems have been extensively studied, the development of a protocol which implements bit-loading-based rate adaptation over wireless systems has not been highlighted. The design of such a protocol is not a trivial problem, due to the overhead associated with the feedback information. In this paper, a novel protocol is proposed to provide an efficient way to implement subcarrier-wise rate adaptation in OFDM-based wireless systems. When receiving a Ready-To-Send (RTS packet, the receiver determines the number of bits to be allocated on each subcarrier through channel estimation. This decision is delivered to the sender using an additional OFDM symbol in the Clear-To-Send (CTS packet. That is, bit-allocation over subcarriers is achieved using only one additional OFDM symbol. The protocol enhances the channel efficiency in spite of the overhead of one additional OFDM symbol.

  3. An Energy-Aware Geographical Forwarding Protocol Utilizing Adaptive Sleeping in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a novel energy-aware geographical forwarding protocol utilizing adaptive sleeping, in which each node selects its relay based on a new criterion that is based on its residual energy reserves and its geographical location to guarantee energy efficiency. In addition, this paper presents an adaptive sleep mechanism fully integrated into the new relay criterion, in which each node sleeps for a variable duration based on its residual energy reserves. Simulation results show that the proposed protocol significantly reduces the energy consumption of the network and improves its balance, especially when on heavy traffic load in dense networks. Our protocol is 20 times better in balancing the energy consumption compared with geographical random forwarding protocol.

  4. ATPM: An Energy Efficient MAC Protocol with Adaptive Transmit Power Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Hu

    2011-04-01

    Full Text Available The MAC protocol for wireless sensor networks is different from traditional wireless MACs such as IEEE 802.11. Energy conservation is one of the most important goals, while per-node fairness and latency are less important. This paper proposes an energy efficient MAC protocol with adaptive transmit power scheme based on SMAC/AL named ATPM (Adaptive Transmit Power MAC. In SMAC/AL, all the nodes transmit data with a fixed power level, no matter how close the involved nodes are. The proposed ATPM can calculate the distance between the sender and the receiver by measuring the received power, and then adaptively decide the appropriate transmit power level according to the propagation model and distance. Simulations have been done to evaluate the performance of the proposed new protocol, by which we can find out that ATPM can really reduce energy consumption compared with SMAC/AL.

  5. A Hybrid Adaptive Protocol for Reliable Data Delivery in WSNs with Multiple Mobile Sinks

    OpenAIRE

    Anastasi, Giuseppe; Borgia, Eleonora; Conti, Marco; Gregori, Enrico

    2010-01-01

    In this paper we deal with reliable and energy-efficient data delivery in sparse Wireless Sensor Networks with multiple Mobile Sinks (MSs). This is a critical task, especially when MSs move randomly, as interactions with sensor nodes are unpredictable, typically of short duration, and affected by message losses. In this paper we propose an adaptive data delivery protocol that combines efficiently erasure coding with an ARQ scheme. The key features of the proposed protocol are: (i) the use of ...

  6. Data Quality in Biofilm High-Throughput Routine Analysis: Intralaboratory Protocol Adaptation and Experiment Reproducibility.

    Science.gov (United States)

    Jorge, Paula; Lourenço, Anália; Pereira, Maria Olívia

    2015-01-01

    Biofilm research is growing more diverse and dependent on high-throughput technologies, and the large-scale production of results aggravates data substantiation. In particular, experimental protocols are often adapted to meet the needs of a particular laboratory, and no statistical validation of the modified method is provided. This paper discusses the impact of intralaboratory adaptation and non-rigorous documentation of experimental protocols on biofilm data interchange and validation. The case study is a non-standard, but widely used, workflow for Pseudomonas aeruginosa biofilm development considering three analysis assays: the crystal violet (CV) assay for biomass quantification, the 2,3-bis(2-methoxy-4-nitro-5-sulfophenyl)-2H-tetrazolium-5-carboxanilide inner salt (XTT) assay for respiratory activity assessment, and the colony forming units (CFU) assay for determination of cell viability. The ruggedness of the protocol was assessed by introducing small changes in the biofilm growth conditions, which simulate minor protocol adaptations and non- rigorous protocol documentation. Results show that even minor variations in the biofilm growth conditions may affect the results considerably, and that the biofilm analysis assays lack repeatability. Intralaboratory validation of non-standard protocols is found critical to ensure data quality and enable the comparison of results within and among laboratories. PMID:26651585

  7. Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven

    Directory of Open Access Journals (Sweden)

    Xin Hou

    2013-01-01

    Full Text Available Combined with WSN MAC layer protocol characteristics and design requirements, according to the characteristic of WSN monitoring application requirements, this paper puts forward a method based on event driven MAC protocol. The agreement algorithm is to solve the problem of network congestion and node energy unnecessary consumption cause by a large number of redundant monitoring data transceiver. It is a kind of adaptive low power consumption of the MAC layer protocol, which is pointed out based on theoretical foundation of S_MAC protocol, made use of the event driven mechanism system theory, combined with event driven mechanism and the characteristics of the WSN. It has the periodic dormancy mechanism of S_MAC protocol, in the premise of the reliability data, to reduce data redundancy and communication delay time, improve the overall network throughput, to ensure the safety and reliability of the network, which can greatly extends  the node of working time.

  8. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    Directory of Open Access Journals (Sweden)

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  9. AGEM: Adaptive Greedy-Compass Energy-aware Multipath Routing Protocol for WMSNs

    CERN Document Server

    Medjiah, Samir; Krief, Francine

    2012-01-01

    This paper presents an Adaptive Greedy-compass Energy-aware Multipath protocol (AGEM), a novel routing protocol for wireless multimedia sensors networks (WMSNs). AGEM uses sensors node positions to make packet forwarding decisions. These decisions are made online, at each forwarding node, in such a way that there is no need for global network topology knowledge and maintenance. AGEM routing protocol performs load-balancing to minimize energy consumption among nodes using twofold policy: (1) smart greedy forwarding, based on adaptive compass and (2) walking back forwarding to avoid holes. Performance evaluations of AGEM compared to GPSR (Greedy Perimeter Stateless Routing) show that AGEM can: (a) maximize the network lifetime, (b) guarantee quality of service for video stream transmission, and (c) scale better on densely deployed wireless sensors network.

  10. SA-MAC:Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    波澄; 韩君泽; 李向阳; 王昱; 肖波

    2014-01-01

    A common method of prolonging the lifetime of wireless sensor networks is to use low power duty cycling protocol. Existing protocols consist of two categories: sender-initiated and receiver-initiated. In this paper, we present SA-MAC, a self-stabilizing adaptive MAC protocol for wireless sensor networks. SA-MAC dynamically adjusts the transmission time-slot, waking up time-slot, and packet detection pattern according to current network working condition, such as packet length and wake-up patterns of neighboring nodes. In the long run, every sensor node will find its own transmission phase so that the network will enter a stable stage when the network load and qualities are static. We conduct extensive experiments to evaluate the energy consumption, packet reception rate of SA-MAC in real sensor networking systems. Our results indicate that SA-MAC outperforms other existing protocols.

  11. HARVESTED ENERGY-ADAPTIVE MAC PROTOCOL FOR ENERGY HARVESTING IOT NETWORKS

    Directory of Open Access Journals (Sweden)

    Hyeong-Kyu Lee

    2015-12-01

    Full Text Available In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA Medium Access Control (MAC protocol utilizes the fixed frame size, the resource efficiency can be reduced. In this paper, we propose a Harvested Energy-adaptive Medium Access Control (HEMAC protocol where an IoT Access Point (AP allocates slots in accordance with the number of IoT devices that try to transmit data in a frame. The proposed HE-MAC protocol improves the resource efficiency of the F-ALOHA MAC protocol. We show that the resource efficiency of the HE-MAC protocol is superior to those of the F-ALOHA MAC protocol through simulations.

  12. Individually weight-adapted examination protocol in retrospectively ECG-gated MSCT of the heart

    International Nuclear Information System (INIS)

    The standard protocol in multislice spiral CT (MSCT) angiography for coronary arteries with fixed tube current-time settings leads to an overexposure and thus to an unnecessary high radiation dose in patients with lower weight when compared to heavier patients. The purpose of this study was to estimate the effect of reducing the radiation dose by adapting the tube current-time settings individually. Fifty patients underwent retrospectively ECG-gated MSCT of the heart. In 25 patients (group A1) a standard protocol with constant tube current-time settings was used (4 x 1-mm collimation, 120 kV, 400 mAseff). Subsequently, artificial image noise was added to the data of these patients simulating a directive for weight-adapted tube current-time settings (group A2). In the other 25 patients (group B) an alternative protocol with individually weight-adapted tube current-time settings was applied. The data of all groups were evaluated by a regression analysis. The image quality was assessed objectively by measuring the CT attenuation in standardised regions of interest and subjectively by three radiologists using a five-point scoring system in a consensus reading. Applying the weight-adapted tube current-time settings the effective radiation dose was reduced by 17.9% for men and 26.3% for women. The standard protocol leads to an overexposure in light patients as seen in the plot of noise vs weight (slope 0.16±0.07 HU/kg). By applying the weight-adapted tube current-time settings a weight-independent, constant image noise is achieved (slope 0.04±0.1 HU/kg). Diagnostic image quality was preserved in all patients. Individually weight-adapted tube current-time settings allow for a substantial dose reduction when performing retrospectively ECG-gated MSCT angiography for coronary arteries without impairment of diagnostic image quality. (orig.)

  13. Development of comorbidity-adapted exercise protocols for patients with knee osteoarthritis

    Directory of Open Access Journals (Sweden)

    de Rooij M

    2014-05-01

    Full Text Available Mariëtte de Rooij,1 Marike van der Leeden,1,2 Ellis Avezaat,3 Arja Häkkinen,4 Rob Klaver,1 Tjieu Maas,5 Wilfred F Peter,1 Leo D Roorda,1 Willem F Lems,1,6 Joost Dekker1,71Amsterdam Rehabilitation Research Center, Reade, Amsterdam, the Netherlands; 2VU University Medical Center Department of Rehabilitation Medicine, Amsterdam, the Netherlands; 3Sint Lucas Andreas Hospital, Department of Physical Therapy, Amsterdam, the Netherlands; 4Department of Health Sciences, University of Jyväskylä and Jyväskylä Central Hospital, Jyväskylä, Finland; 5HAN University, Institute of Health, GGM, Institute for Sports and Exercise Studies, Nijmegen, the Netherlands; 6VU University Medical Center, Department of Rheumatology, Amsterdam, the Netherlands; 7VU University Medical Center, Department of Psychiatry and Department of Rehabilitation Medicine, EMGO Institute, Amsterdam, the NetherlandsBackground: Exercise therapy is generally recommended for patients with osteoarthritis (OA of the knee. Comorbidity, which is highly prevalent in OA, may interfere with exercise therapy. To date, there is no evidence-based protocol for the treatment of patients with knee OA and comorbidity. Special protocols adapted to the comorbidity may facilitate the application of exercise therapy in patients with knee OA and one or more comorbidities.Purpose: The purpose of this study was to develop comorbidity-adapted exercise protocols for patients with knee OA and comorbidity.Method: Several steps were undertaken to develop comorbidity-adapted protocols: selection of highly prevalent comorbidities in OA, a literature search to identify restrictions and contraindications for exercise therapy for the various comorbid diseases, consultation of experts on each comorbid disease, and field testing of the protocol in eleven patients with knee OA and comorbidity.Results: Based on literature and expert opinion, comorbidity-adapted protocols were developed for highly prevalent

  14. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Politis, Christos; 10.5121/ijwmn.2010.2205

    2010-01-01

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergency workers with intelligent devices such as smart phones and PDAs. This technology allows communication "islets" to be established between the members of the same or different emergency teams (policemen, firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed for the purposes of eMANETs. We evaluate the performance of the protocol by comparing it with other widely used routing protocols for MANETs. We finally show that the overhead introduced due to security considerations is affordable to support secure ad-hoc communications among lightweight devices.

  15. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  16. Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-05-01

    Full Text Available The nature of Mobile Ad hoc NETworks (MANETs makes them suitable to be utilized in the context of anextreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs inorder to describe next generation IP-based networks, which are deployed in emergency cases such asforest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergencyworkers with intelligent devices such as smart phones and PDAs. This technology allows communication”islets” to be established between the members of the same or different emergency teams (policemen,firemen, paramedics. In this article, we discuss an adaptive and secure routing protocol developed forthe purposes of eMANETs. We evaluate the performance of the protocol by comparing it with otherwidely used routing protocols for MANETs. We finally show that the overhead introduced due to securityconsiderations is affordable to support secure ad-hoc communications among lightweight devices.

  17. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    Science.gov (United States)

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-01-01

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393

  18. A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Ingelrest, François; Mitton, Nathalie; Simplot-Ryl, David

    2007-01-01

    International audience We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our knowledge, all existing solutions are based on specific assumptions (\\eg{} slotted networks) and/or require specific hardware (\\eg{} GPS) for speed evaluation. One of the key aspects of our solution is that no additional hardware is required since it does not ...

  19. Distributed Adaptive Consensus Protocols for Linear Multi-agent Systems with Directed Graphs and External Disturbances

    OpenAIRE

    LI, ZHONGKUI; Duan, Zhisheng

    2014-01-01

    This paper addresses the distributed consensus design problem for linear multi-agent systems with directed communication graphs and external disturbances. Both the cases with strongly connected communication graphs and leader-follower graphs containing a directed spanning tree with the leader as the root are discussed. Distributed adaptive consensus protocols based on the relative states of neighboring agents are designed, which can ensure the ultimate boundedness of the consensus error and a...

  20. An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Munam Ali Shah; Sijing Zhang; Carsten Maple

    2013-01-01

    The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased.Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time.The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment,observes the network changes,and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics.In this paper,some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed,and a novel adaptive MAC protocol for CR networks,decentralized non-global MAC (DNG-MAC),has been proposed.The results show the DNG-MAC outperforms other CR-MAC protocols in termsof time and energy efficiency.

  1. Adaptive enhancement of learning protocol in hippocampal cultured networks grown on multielectrode arrays

    Directory of Open Access Journals (Sweden)

    Alexey ePimashkin

    2013-05-01

    Full Text Available Learning in neuronal networks can be investigated using dissociated cultures on multielectrode arrays supplied with appropriate closed-loop stimulation. It was shown in previous studies that weakly respondent neurons on the electrodes can be trained to increase their evoked spiking rate within predefined time window after the stimulus. Such neurons can be associated with weak synaptic connections in nearby culture network. The stimulation leads to the increase in the connectivity and in the response. However, it was not possible to perform the learning protocol for the neurons on electrodes with relatively strong synaptic inputs and responding at higher rates. We proposed an adaptive closed-loop stimulation protocol capable to achieve learning even for the highly respondent electrodes. It means that the culture network can reorganize appropriately its synaptic connectivity to generate a desired response. We introduced an adaptive reinforcement condition accounted for response variability in control stimulation. It significantly enhanced the learning protocol to many responding electrode independently on its base response level. We also found that learning effect preserved after 4-6 hours after training.

  2. Exploring Round Trip Time fairness for Adaptive Layered Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    V.Kavidha

    2010-05-01

    Full Text Available High performance data transfer services is needed in long distance high-speed networks. In this paper Adaptive Layered Transmission Control Protocol (ALTCP is proposed, which is used for making more scalability in highspeed networks. ALTCP is a simple adaptive layering technique for making the Additive Increase Multiplicative Decrease (AIMD algorithms used by TCP more efficient in probing for the available link bandwidth. ALTCP uses a three-dimensional congestion control framework. First the macroscopic control is employed to layer quickly and made efficient by using available link bandwidth, second microscopic control is used for extends the existing AIMD algorithm of TCP to determine the per acknowledgement behavior. Third the intermediate control is employed for decoupling the aggregate throughout from the number of opened TCP flows in parallel. In this research paper ALTCP protocol is designed and analyzed based on ns-2 simulations. The results show that ALTCP has faster magnitude than TCP in utilizing high bandwidth links. ALTCP has better TCP friendliness and Round Trip Time (RTT fairness compared with high-speed protocols namely High-speed TCP and Scalable TCP.

  3. Adaptive Protocols to Improve TCP/IP Performance in an LMDS Network using a Broadband Channel Sounder

    OpenAIRE

    Eshler, Todd Jacob

    2002-01-01

    Virginia Tech researchers have developed a broadband channel sounder that can measure channel quality while a wireless network is in operation. Channel measurements from the broadband sounder hold the promise of improving TCP/IP performance by trigging configuration changes in an adaptive data link layer protocol. We present an adaptive data link layer protocol that can use different levels of forward error correction (FEC) codes and link layer automatic retransmission request ...

  4. Development of a protocol to quantify local bone adaptation over space and time: Quantification of reproducibility.

    Science.gov (United States)

    Lu, Yongtao; Boudiffa, Maya; Dall'Ara, Enrico; Bellantuono, Ilaria; Viceconti, Marco

    2016-07-01

    In vivo micro-computed tomography (µCT) scanning of small rodents is a powerful method for longitudinal monitoring of bone adaptation. However, the life-time bone growth in small rodents makes it a challenge to quantify local bone adaptation. Therefore, the aim of this study was to develop a protocol, which can take into account large bone growth, to quantify local bone adaptations over space and time. The entire right tibiae of eight 14-week-old C57BL/6J female mice were consecutively scanned four times in an in vivo µCT scanner using a nominal isotropic image voxel size of 10.4µm. The repeated scan image datasets were aligned to the corresponding baseline (first) scan image dataset using rigid registration. 80% of tibia length (starting from the endpoint of the proximal growth plate) was selected as the volume of interest and partitioned into 40 regions along the tibial long axis (10 divisions) and in the cross-section (4 sectors). The bone mineral content (BMC) was used to quantify bone adaptation and was calculated in each region. All local BMCs have precision errors (PE%CV) of less than 3.5% (24 out of 40 regions have PE%CV of less than 2%), least significant changes (LSCs) of less than 3.8%, and 38 out of 40 regions have intraclass correlation coefficients (ICCs) of over 0.8. The proposed protocol allows to quantify local bone adaptations over an entire tibia in longitudinal studies, with a high reproducibility, an essential requirement to reduce the number of animals to achieve the necessary statistical power. PMID:27262181

  5. Adapting a rapid river assessment protocols to be used by elementary school children

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2012-12-01

    Full Text Available The present study aimed to adapt a rapid river assessment protocols (RAP to be used by elementary school children. The study was conducted in Ipameri, GO and the RAP was adapted for the evaluation of streams in the Cerrado biome. Based on two protocol models, the developed RAP included: physical parameters that affect the functioning of streams, language adapted to the educational level of elementary school and the presence of drawings that could facilitate the field application of RAP by the students. For consolidation of the adapted instrument, it was offered a monitoring workshop to 95 students from two public education institutions, and developed an analysis and interpretation of the pattern of responses obtained during the practical step of the workshop. The Bartlett and Levene tests revealed no statistical differences between the response patterns of the students, allowing to infer that the developed RAP was understandable by the evaluators. The application of the RAP was fast (20 to 40 minutes and the students reported that the developed instrument helped them to familiarize with environmental issues. In addition, the monitoring workshop helped them to understand the instrument and the available illustrations facilitated the field evaluation. In addition, the students concluded that they have become aware of the issues related to the water resource preservation and also that participation in the environmental monitoring workshop allowed the appropriation of knowledge about the river system functioning. It was concluded that adapted RAP has been proved to be a useful and interesting tool for using in environmental education projects and programs.

  6. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  7. Adaptation to climate change: legal challenges for protected areas

    OpenAIRE

    2009-01-01

    Climate change will cause further loss of biodiversity. As negative effects are already taking place, adaptive measures are required to protect biodiversity from the effects of climate change. The EU policy on climate change and biodiversity aims at improving a coherent ecological network in order to have more resilient ecosystems and to provide for connectivity outside core areas. The existing legal framework, the Birds and Habitats Directives, can enable adaptive approache...

  8. Adaptation to climate change: Legal challenges for protected areas

    OpenAIRE

    Cliquet, An; Backes, Chris; Harris, Jim; Howsam, Peter

    2009-01-01

    Climate change will cause further loss of biodiversity. As negative effects are already taking place, adaptive measures are required to protect biodiversity from the effects of climate change. The EU policy on climate change and biodiversity aims at improving a coherent ecological network in order to have more resilient ecosystems and to provide for connectivity outside core areas. The existing legal framework, the Birds and Habitats Directives, can enable adaptive approaches, by establishing...

  9. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-07-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  10. Protocol of Magnetic Field Area Network and its Applications

    International Nuclear Information System (INIS)

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  11. Protocol of Magnetic Field Area Network and its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Won, Yunjae; Kang, Shinjae; Lim, Seungok [Korea Electronics Technology Institute, Seoul (Korea, Republic of); Kahng, Hyunkook [Korea Univ., Seoul (Korea, Republic of)

    2012-03-15

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  12. A Semantically Automated Protocol Adapter for Mapping SOAP Web Services to RESTful HTTP Format to Enable the Web Infrastructure, Enhance Web Service Interoperability and Ease Web Service Migration

    Directory of Open Access Journals (Sweden)

    Frank Doheny

    2012-04-01

    Full Text Available Semantic Web Services (SWS are Web Service (WS descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly defined constraints, maps SOAP Web Services to RESTful HTTP format. However, in the previous adapter, the configuration element is manual and the latency implications are locally based. This paper applies SWS technologies to automate the configuration element and the latency tests are conducted in a more realistic Internet based setting.

  13. Hash-area-based data dissemination protocol in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Tian; WANG Guo-jun; GUO Min-yi; JIA Wei-jia

    2008-01-01

    HashQuery, a Hash-area-based data dissemination protocol, was designed in wireless sensor networks. Using a Hash function which uses time as the key, both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network, and thus much energy can be saved. In addition, the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network, it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol, especially in large-scale wireless sensor networks.

  14. Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review

    OpenAIRE

    Luis Filipe; Florentino Fdez-Riverola; Nuno Costa; António Pereira

    2015-01-01

    Wireless Body Area Networks (WBANs) supporting healthcare applications are in early development stage but offer valuable contributions at monitoring, diagnostic, or therapeutic levels. They cover real-time medical information gathering obtained from different sensors with secure data communication and low power consumption. As a consequence of the increasing interest in the application of this type of networks, several articles dealing with different aspects of such systems have been publishe...

  15. A study of topologies and protocols for fiber optic local area network

    Science.gov (United States)

    Yeh, C.; Gerla, M.; Rodrigues, P.

    1985-01-01

    The emergence of new applications requiring high data traffic necessitates the development of high speed local area networks. Optical fiber is selected as the transmission medium due to its inherent advantages over other possible media and the dual optical bus architecture is shown to be the most suitable topology. Asynchronous access protocols, including token, random, hybrid random/token, and virtual token schemes, are developed and analyzed. Exact expressions for insertion delay and utilization at light and heavy load are derived, and intermediate load behavior is investigated by simulation. A new tokenless adaptive scheme whose control depends only on the detection of activity on the channel is shown to outperform round-robin schemes under uneven loads and multipacket traffic and to perform optimally at light load. An approximate solution to the queueing delay for an oscillating polling scheme under chaining is obtained and results are compared with simulation. Solutions to the problem of building systems with a large number of stations are presented, including maximization of the number of optical couplers, and the use of passive star/bus topologies, bridges and gateways.

  16. EXTENDING THE INTELLIGENT ADAPTIVE PARTICIPANT’S PRESUMPTION PROTOCOL TO THE MULTI-LEVEL DISTRIBUTED TRANSACTION EXECUTION MODEL

    Directory of Open Access Journals (Sweden)

    Yousef J. Al-Houmaily

    2015-12-01

    Full Text Available The “intelligent adaptive participant’s presumption protocol” (iAP3 is an integrated atomic commit protocol. It interoperates implicit yes-vote, which is a one-phase commit protocol, besides presumed abort and presumed commit, the most commonly pronounced two-phase commit protocol variants. The aim of this combination is to achieve the performance advantages of one-phase commit protocols, on one hand, and the wide applicability of two-phase commit protocols, on the other. iAP3 interoperates the three protocols in a dynamic fashion and on a per participant basis, in spite of the incompatibilities among the three protocols. Besides that, the protocol is backward compatible with the standardized presumed abort protocol. Whereas iAP3 was initially proposed for the two-level (or flat transaction execution model, this article extends the protocol to the multi-level distributed transaction execution model, the model adopted by the database standards and widely implemented in commercial database systems. Thus, broadening the applicability scope of the iAP3 .

  17. Cross-Layer Link Adaptation Design for Relay Channels with Cooperative ARQ Protocol

    CERN Document Server

    Mardani, Morteza; Lahouti, Farshad

    2008-01-01

    In the context of relay channel, cooperative automatic repeat request (ARQ) is known as a protocol which exploits the spatial diversity by allowing the relay node to retransmit the source data packet to the destination node, when the latter is unable to decode the source node data correctly. This paper presents a cross-layer link adaptation design for cooperative-ARQ based relay channels, which guarantees a target packet-loss rate (PLR) at the data-link layer. We consider a scenario in which both source and relay nodes employ adaptive modulation and coding and power control at the physical layer, and the relay node is allowed to retransmit the erroneous packets at the data-link layer. We first derive closed-form expressions for the system spectral efficiency and the system average power consumption. We then present a power and rate adaptation scheme for the source and relay nodes, which maximizes the spectral efficiency subject to a target PLR and a system average power constraint. A low complexity iterative ...

  18. Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in Peer-to-Peer Network

    Directory of Open Access Journals (Sweden)

    Chun-Ying Liu

    2013-04-01

    Full Text Available In order to solve the low searching efficiency in the peer-to-peer (P2P network, introduce the ant colony algorithm with the particle swarm optimization in searching procedure. Present a new adaptive search protocol (SACASP based on the ant colony algorithm with the particle swarm optimization in the Peer-to-Peer Network. The approach simulates the process of the ants’ searching food, and can direct the query routing efficiently according to the adaptive strategy and the positive feedback principle of the pheromone. Decrease the blindness of the messages transmitting in early searching stage by adding the particle swarm optimization to the ant colony algorithm. Give the adaptive P2P search model based on the fusion algorithm, and design the data structure and steps of the model. The simulation experiment shows, PSACASP can effectively shorten the time and reduce the search query packets comparing with the other search algorithms, and it can achieve better search performance and decrease the network loads.

  19. Modeling data rate agility in the IEEE 802.11a wireless local area networking protocol

    OpenAIRE

    Braswell, Bryan E.

    2001-01-01

    The IEEE 802.11a high-speed wireless local area networking (WLAN) protocol does not specify a mechanism for dynamically altering network data rates based on changing link conditions. This thesis first presents a baseline software model of the 802.11a protocol developed using the OPNET simulation tool. The model includes both the medium access control (MAC) and physical (PHY) layers of the standard. Two data rate agility mechanisms are then proposed and analyzed using the model. An infrastruct...

  20. Adaptive comanagement of a marine protected area network in Fiji.

    Science.gov (United States)

    Weeks, Rebecca; Jupiter, Stacy D

    2013-12-01

    Adaptive management of natural resources is an iterative process of decision making whereby management strategies are progressively changed or adjusted in response to new information. Despite an increasing focus on the need for adaptive conservation strategies, there remain few applied examples. We describe the 9-year process of adaptive comanagement of a marine protected area network in Kubulau District, Fiji. In 2011, a review of protected area boundaries and management rules was motivated by the need to enhance management effectiveness and the desire to improve resilience to climate change. Through a series of consultations, with the Wildlife Conservation Society providing scientific input to community decision making, the network of marine protected areas was reconfigured so as to maximize resilience and compliance. Factors identified as contributing to this outcome include well-defined resource-access rights; community respect for a flexible system of customary governance; long-term commitment and presence of comanagement partners; supportive policy environment for comanagement; synthesis of traditional management approaches with systematic monitoring; and district-wide coordination, which provided a broader spatial context for adaptive-management decision making. Co-Manejo Adaptativo de una Red de Áreas Marinas Protegidas en Fiyi. PMID:24112643

  1. DESIGN AND ANALYSIS OF AN ADAPTIVE SELFISH SCHEDULING ALGORITHM USING AODV PROTOCOL IN MANET

    Directory of Open Access Journals (Sweden)

    S.Lakshmi

    2012-07-01

    Full Text Available Due to dynamic nature of mobile ad-hoc network (MANETs which results in link breaks and repeatedly changing topology the aim of scheduling algorithm becomes more complex. In this paper we present an adaptive selfish aware queue scheduler for a M/M/1 and M/M/n queuing mechanism to schedule the packets for selfish nodes in mobile ad-hoc networks using AODV as the routing protocol. The performance of this scheduler has been studied using ns-2 simulator and performance can be analyzed by using metrics such as packet delivery ratio, end to end delay, throughput, control overhead and total overhead. This scheduler provides overall improvement under different packet sizes.

  2. A formal protocol test procedure for the Survivable Adaptable Fiber Optic Embedded Network (SAFENET)

    Science.gov (United States)

    High, Wayne

    1993-03-01

    This thesis focuses upon a new method for verifying the correct operation of a complex, high speed fiber optic communication network. These networks are of growing importance to the military because of their increased connectivity, survivability, and reconfigurability. With the introduction and increased dependence on sophisticated software and protocols, it is essential that their operation be correct. Because of the speed and complexity of fiber optic networks being designed today, they are becoming increasingly difficult to test. Previously, testing was accomplished by application of conformance test methods which had little connection with an implementation's specification. The major goal of conformance testing is to ensure that the implementation of a profile is consistent with its specification. Formal specification is needed to ensure that the implementation performs its intended operations while exhibiting desirable behaviors. The new conformance test method presented is based upon the System of Communicating Machine model which uses a formal protocol specification to generate a test sequence. The major contribution of this thesis is the application of the System of Communicating Machine model to formal profile specifications of the Survivable Adaptable Fiber Optic Embedded Network (SAFENET) standard which results in the derivation of test sequences for a SAFENET profile. The results applying this new method to SAFENET's OSI and Lightweight profiles are presented.

  3. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  4. Evaluation of replacement protocols and modifications to TCP to enhance ASC Wide Area Network performance.

    Energy Technology Data Exchange (ETDEWEB)

    Romero, Randy L. Jr.

    2004-09-01

    Historically, TCP/IP has been the protocol suite used to transfer data throughout the Advanced Simulation and Computing (ASC) community. However, TCP was developed many years ago for an environment very different from the ASC Wide Area Network (WAN) of today. There have been numerous publications that hint of better performance if modifications were made to the TCP algorithms or a different protocol was used to transfer data across a high bandwidth, high delay WAN. Since Sandia National Laboratories wants to maximize the ASC WAN performance to support the Thor's Hammer supercomputer, there is strong interest in evaluating modifications to the TCP protocol and in evaluating alternatives to TCP, such as SCTP, to determine if they provide improved performance. Therefore, the goal of this project is to test, evaluate, compare, and report protocol technologies that enhance the performance of the ASC WAN.

  5. Analysis of steps adapted protocol in cardiac rehabilitation in the hospital phase

    Directory of Open Access Journals (Sweden)

    Eliane Roseli Winkelmann

    2015-02-01

    Full Text Available Objective: To analyze a cardiac rehabilitation adapted protocol in physical therapy during the postoperative hospital phase of cardiac surgery in a service of high complexity, in aspects regarded to complications and mortality prevalence and hospitalization days. Methods: This is an observational cross-sectional, retrospective and analytical study performed by investigating 99 patients who underwent cardiac surgery for coronary artery bypass graft, heart valve replacement or a combination of both. Step program adapted for rehabilitation after cardiac surgery was analyzed under the command of the physiotherapy professional team. Results: In average, a patient stays for two days in the Intensive Care Unit and three to four days in the hospital room, totalizing six days of hospitalization. Fatalities occurred in a higher percentage during hospitalization (5.1% and up to two years period (8.6% when compared to 30 days after hospital discharge (1.1%. Among the postoperative complications, the hemodynamic (63.4% and respiratory (42.6% were the most prevalent. 36-42% of complications occurred between the immediate postoperative period and the second postoperative day. The hospital discharge started from the fifth postoperative day. We can observe that in each following day, the patients are evolving in achieving the Steps, where Step 3 was the most used during the rehabilitation phase I. Conclusion: This evolution program by steps can to guide the physical rehabilitation at the hospital in patients after cardiac surgery.

  6. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun; Wen, Jinyu; Wang, Shaorong

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying f...

  7. Enhancement of Adaptive Cluster Hierarchical Routing Protocol using Distance and Energy for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    The application of wireless networking is widely used in nuclear applications. This includes reactor control and fire dedication system. This paper is devoted to the application of this concept in the intrusion system of the Radioisotope Production Facility (RPF) of the Egyptian Atomic Energy Authority. This includes the tracking, monitoring and control components of this system. The design and implementation of wireless sensor networks has become a hot area of research due to the extensive use of sensor networks to enable applications that connect the physical world to the virtual world [1-2]. The original LEACH is named a communication protocol (clustering-based); the extended LEACH’s stochastic cluster head selection algorithm by a deterministic component. Depending on the network configuration an increase of network lifetime can be accomplished [3]. The proposed routing mechanisms after enhancement divide the nodes into clusters. A cluster head performs its task which is considerably more energy-intensive than the rest of the nodes inside sensor network. So, nodes rotate tasks at different rounds between a cluster head and other sensors throughout the lifetime of the network to balance the energy dissipation [4-5].The performance improvement when using routing protocol after enhancement of the algorithm which takes into consideration the distance and the remaining energy for choosing the cluster head by obtains from the advertise message. Network Simulator (Ns2 simulator) is used to prove that LEACH after enhancement performs better than the original LEACH protocol in terms of Average Energy, Network Life Time, Delay, Throughput and Overhead.

  8. MAC Protocol in Wireless Body Area Network for Mobile Health: A Survey and an Architecture Design

    OpenAIRE

    Xin Qi; Kun Wang; AnPeng Huang; Haifeng Hu; Guangjie Han

    2015-01-01

    Wireless body area networks (WBANs) have become a leading solution in mobile health (mHealth). Typically, a WBAN consists of in-body or around-body sensor nodes for collecting data of physiological feature. For a WBAN to provide high throughput and low delay in an energy-efficient way, designing an efficient medium access control (MAC) protocol is of paramount importance because the MAC layer coordinates nodes’ access to the shared wireless medium. To show the difference of MAC protocols betw...

  9. Indicators and protocols for monitoring impacts of formal and informal trails in protected areas

    Science.gov (United States)

    Marion, Jeffrey L.; Leung, Yu-Fai

    2011-01-01

    Trails are a common recreation infrastructure in protected areas and their conditions affect the quality of natural resources and visitor experiences. Various trail impact indicators and assessment protocols have been developed in support of monitoring programs, which are often used for management decision-making or as part of visitor capacity management frameworks. This paper reviews common indicators and assessment protocols for three types of trails, surfaced formal trails, unsurfaced formal trails, and informal (visitor-created) trails. Monitoring methods and selected data from three U.S. National Park Service units are presented to illustrate some common trail impact indicators and assessment options.

  10. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    Science.gov (United States)

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  11. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  12. A review of protocol implementations and energy efficient cross-layer design for wireless body area networks.

    Science.gov (United States)

    Hughes, Laurie; Wang, Xinheng; Chen, Tao

    2012-01-01

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring. PMID:23202185

  13. An adaptive framework for selecting environmental monitoring protocols to support ocean renewable energy development.

    Science.gov (United States)

    Shumchenia, Emily J; Smith, Sarah L; McCann, Jennifer; Carnevale, Michelle; Fugate, Grover; Kenney, Robert D; King, John W; Paton, Peter; Schwartz, Malia; Spaulding, Malcolm; Winiarski, Kristopher J

    2012-01-01

    Offshore renewable energy developments (OREDs) are projected to become common in the United States over the next two decades. There are both a need and an opportunity to guide efforts to identify and track impacts to the marine ecosystem resulting from these installations. A monitoring framework and standardized protocols that can be applied to multiple types of ORED would streamline scientific study, management, and permitting at these sites. We propose an adaptive and reactive framework based on indicators of the likely changes to the marine ecosystem due to ORED. We developed decision trees to identify suites of impacts at two scales (demonstration and commercial) depending on energy (wind, tidal, and wave), structure (e.g., turbine), and foundation type (e.g., monopile). Impacts were categorized by ecosystem component (benthic habitat and resources, fish and fisheries, avian species, marine mammals, and sea turtles) and monitoring objectives were developed for each. We present a case study at a commercial-scale wind farm and develop a monitoring plan for this development that addresses both local and national environmental concerns. In addition, framework has provided a starting point for identifying global research needs and objectives for understanding of the potential effects of ORED on the marine environment. PMID:23319884

  14. An Adaptive Framework for Selecting Environmental Monitoring Protocols to Support Ocean Renewable Energy Development

    Directory of Open Access Journals (Sweden)

    Emily J. Shumchenia

    2012-01-01

    Full Text Available Offshore renewable energy developments (OREDs are projected to become common in the United States over the next two decades. There are both a need and an opportunity to guide efforts to identify and track impacts to the marine ecosystem resulting from these installations. A monitoring framework and standardized protocols that can be applied to multiple types of ORED would streamline scientific study, management, and permitting at these sites. We propose an adaptive and reactive framework based on indicators of the likely changes to the marine ecosystem due to ORED. We developed decision trees to identify suites of impacts at two scales (demonstration and commercial depending on energy (wind, tidal, and wave, structure (e.g., turbine, and foundation type (e.g., monopile. Impacts were categorized by ecosystem component (benthic habitat and resources, fish and fisheries, avian species, marine mammals, and sea turtles and monitoring objectives were developed for each. We present a case study at a commercial-scale wind farm and develop a monitoring plan for this development that addresses both local and national environmental concerns. In addition, framework has provided a starting point for identifying global research needs and objectives for understanding of the potential effects of ORED on the marine environment.

  15. Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hwa-Jung Lim

    2010-04-01

    Full Text Available In this paper we propose an adaptive square-shaped trajectory (ASST-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the hash. Both the width and the size of the trajectory are dynamically adjustable, depending on the number of queries made to the service information on the trajectory. The number of sensor nodes on the trajectory varies in proportion to the changing trajectory shape, allowing high loads to be distributed around the hot spot area.

  16. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-01-01

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research. PMID:25903551

  17. A Survey of MAC Protocols for Cognitive Radio Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2015-04-01

    Full Text Available The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  18. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    Directory of Open Access Journals (Sweden)

    Maria Sefuba

    2015-09-01

    Full Text Available This paper presents an Energy Efficient Medium Access Control (MAC protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN. This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH, and the base station (BS. The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI for the relay cluster head (RCH. An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  19. Communications protocols for a fault tolerant, integrated local area network for Space Station applications

    Science.gov (United States)

    Meredith, B. D.

    1984-01-01

    The evolutionary growth of the Space Station and the diverse activities onboard are expected to require a hierarchy of integrated,local area networks capable of supporting data, voice and video communications. In addition, fault tolerant network operation is necessary to protect communications between critical systems attached to the net and to relieve the valuable human resources onboard Space Station of day-to-day data system repair tasks. An experimental, local area network is being developed which will serve as a testbed for investigating candidate algorithms and technologies for a fault tolerant, integrated network. The establishment of a set of rules or protocols which govern communications on the net is essential to obtain orderly and reliable operation. A hierarchy of protocols for the experimental network is presented and procedures for data and control communications are described.

  20. A Study of Medium Access Control Protocols for Wireless Body Area Networks

    OpenAIRE

    Ullah, Sana; Shen, Bin; Islam, S.M. Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satis...

  1. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  2. A Study of Medium Access Control Protocols for Wireless Body Area Networks

    CERN Document Server

    Ullah, Sana; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup; 10.3390/s100100128

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.

  3. Development of a Protocol to Test Proprioceptive Utilization as a Predictor for Sensorimotor Adaptability

    Science.gov (United States)

    Goel, R.; De Dios, Y. E.; Gadd, N. E.; Caldwell, E. E.; Peters, B. T.; Bloomberg, J. J.; Oddsson, L. I. E.; Mulavara, A. P.

    2016-01-01

    Astronauts returning from space flight show significant inter-subject variations in their abilities to readapt to a gravitational environment because of their innate sensory weighting. The ability to predict the manner and degree to which each individual astronaut will be affected would improve the effectiveness of countermeasure training programs designed to enhance sensorimotor adaptability. We hypothesize participant's ability to utilize individual sensory information (vision, proprioception and vestibular) influences adaptation in sensorimotor performance after space flight. The goal of this study is to develop a reliable protocol to test proprioceptive utilization in a functional postural control task. Subjects "stand" in a supine position while strapped to a backpack frame holding a friction-free device using air-bearings that allow the subject to move freely in the frontal plane, similar to when in upright standing. The frame is attached to a pneumatic cylinder, which can provide different levels of a gravity-like force that the subject must balance against to remain "upright". The supine posture with eyes closed ensures reduced vestibular and visual contribution to postural control suggesting somatosensory and/or non-otolith vestibular inputs will provide relevant information for maintaining balance control in this task. This setup is called the gravity bed. Fourteen healthy subjects carried out three trials each with eyes open alternated with eyes closed, "standing" on their dominant leg in the gravity bed environment while loaded with 60 percent of their body weight. Subjects were instructed to: "use your sense of sway about the ankle and pressure changes under the foot to maintain balance." Maximum length of a trial was 45 seconds. A force plate underneath the foot recorded forces and moments during the trial and an inertial measurement unit (IMU) attached on the backpack's frame near the center of mass of the subject recorded upper body postural

  4. Cross Layer Adaptation of Check Intervals in Low Power Listening MAC Protocols for Lifetime Improvement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maria-Cristina Marinescu

    2012-08-01

    Full Text Available Preamble sampling-based MAC protocols designed forWireless Sensor Networks (WSN are aimed at prolonging the lifetime of the nodes by scheduling their times of activity. This scheduling exploits node synchronization to find the right trade-off between energy consumption and delay. In this paper we consider the problem of node synchronization in preamble sampling protocols. We propose Cross Layer Adaptation of Check intervals (CLAC, a novel protocol intended to reduce the energy consumption of the nodes without significantly increasing the delay. Our protocol modifies the scheduling of the nodes based on estimating the delay experienced by a packet that travels along a multi-hop path. CLAC uses routing and MAC layer information to compute a delay that matches the packet arrival time. We have implemented CLAC on top of well-known routing and MAC protocols for WSN, and we have evaluated our implementation using the Avrora simulator. The simulation results confirm that CLAC improves the network lifetime at no additional packet loss and without affecting the end-to-end delay.

  5. Secure publish-subscribe protocols for heterogeneous medical wireless body area networks.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Tapiador, Juan E; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  6. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Pablo Picazo-Sanchez

    2014-11-01

    Full Text Available Security and privacy issues in medical wireless body area networks (WBANs constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution.

  7. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  8. Characterizing urban areas with good sound quality: Development of a research protocol

    Directory of Open Access Journals (Sweden)

    Elise van Kempen

    2014-01-01

    Full Text Available Due to rapid urbanization, the spatial variation between wanted and unwanted sounds will decrease or even disappear. Consequently, the characteristics of (urban areas where people can temporarily withdraw themselves from urban stressors such as noise may change or become increasingly scarce. Hardly any research has been carried out into the positive health effects of spending time in areas with a good sound quality. One of the problems is that an overview of what aspects determines good sound quality in urban areas and how these are interrelated is lacking. This paper reviews the literature pertaining to the sound quality of urban areas. Aim is to summarize what is known about the influence of social, spatial, and physical aspects other than sounds, on peoples′ perception of urban sound qualities. Literature from both conventional sound research and from the so-called soundscape field, published between 2000 and the beginning of 2013 in English or Dutch, was evaluated. Although a general set of validated indicators that can be directly applied, is not available yet, a set of indicators was derived from the literature. These form the basis of a study protocol that will be applied in "Towards a Sustainable acoustic Environment", a project that aims to describe sound qualities at a low-scale level. Key-elements of this study protocol, including a questionnaire and the systematic audit of neighborhoods, were presented in this paper.

  9. Characterizing urban areas with good sound quality: development of a research protocol.

    Science.gov (United States)

    van Kempen, Elise; Devilee, Jeroen; Swart, Wim; van Kamp, Irene

    2014-01-01

    Due to rapid urbanization, the spatial variation between wanted and unwanted sounds will decrease or even disappear. Consequently, the characteristics of (urban) areas where people can temporarily withdraw themselves from urban stressors such as noise may change or become increasingly scarce. Hardly any research has been carried out into the positive health effects of spending time in areas with a good sound quality. One of the problems is that an overview of what aspects determines good sound quality in urban areas and how these are interrelated is lacking. This paper reviews the literature pertaining to the sound quality of urban areas. Aim is to summarize what is known about the influence of social, spatial, and physical aspects other than sounds, on peoples' perception of urban sound qualities. Literature from both conventional sound research and from the so-called soundscape field, published between 2000 and the beginning of 2013 in English or Dutch, was evaluated. Although a general set of validated indicators that can be directly applied, is not available yet, a set of indicators was derived from the literature. These form the basis of a study protocol that will be applied in "Towards a Sustainable acoustic Environment", a project that aims to describe sound qualities at a low-scale level. Key-elements of this study protocol, including a questionnaire and the systematic audit of neighborhoods, were presented in this paper. PMID:25387534

  10. Improved Adaptive Routing for Multihop IEEE 802.15.6 Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shariar Imtiaz

    2013-11-01

    Full Text Available Wireless Body Area Network has the ability to collect and send data on body measurement to the server through PDA or other device. Nodes (sensors collect vital signs from the body or environmental factor and check them. In IEEE 802.15.6 routing is discussed as a part of the link layer where multihop is not fully considered. Improving network performance, reducing energy consumption, thus extending the network lifetime is the main challenge in BANs. Several studies mention that multihop for BANs helps for achieving network performance, reducing energy consumption and extending network lifetime. One work presents the Adaptive multihop tree-based Routing (AMR protocol that is extensively evaluated in a real testbed deployment. They use fuzzy logic to combine all metrics they use. Another limitation is that they have used Prim's algorithm which is not a realistic approach. So in this work we have improved their multihop tree-based Routing (AMR protocol using Kruskal's algorithm instead of Prim's algorithm. The time complexity of Kruskal's algorithm is way less than prims's algorithm. We have used network simulator 3 (NS3 to simulate and found that our algorithm is better than AMR if many of nodes.

  11. Road and street smart lighting control systems as a new application area of the hot-potato protocol

    DEFF Research Database (Denmark)

    Kiedrowski, Piotr; Gutierrez Lopez, Jose Manuel; Boniewicz, Piotr; Perez de Prado, Rocio

    2014-01-01

    This paper presents the new application area of the hot-potato routing protocol, which is a “last-mile” communication network for controlling systems of road and street lighting. Four variants of the hot-potato protocol are analyzed with use of the graph theory. For the assessment of the traffic ...

  12. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  13. A very low power MAC (VLPM) protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Ullah, Niamat; Khan, Pervez; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient's movements. They are an easy and fast way to diagnose the patient's status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM) based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit) along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator)] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node's ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B-MAC and X-MAC in terms

  14. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B

  15. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  16. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  17. Design of an Energy Efficient and Delay Tolerant Routing Protocol for Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Ms.Venkateswari.R

    2012-05-01

    Full Text Available The Wireless Body Area Network provide continuous health monitoring and real-time feedback to the medical personnel. The devices used for WBAN have limited energy resources. For most devices it is impossible to recharge or change the batteries. Low power is needed to provide long lifetime to the devices. All devices are equally important and devices are only added when they are needed for an application. The data mostly consists of medical information. Hence, high reliability and low delay is required. Cluster topology and Dynamic Source Routing Protocol provides high packet delivery ratio, low delay and low energy consumption. In this paper, a modification in the DSR routing protocol has been proposed. The modified DSR named as EDSR (Efficient Dynamic Source Routing, reduces the delay by reducing the average end to end delay for the node and reduces the number of packets dropped thereby increasing packet delivery ratio. Energy consumption in EDSR is decreased by 16.73% when compared to DSR. This protocol reduces the energy consumption and delay by reducing the time needed for route discovery process. EDSR achieves high residual battery capacity which eliminates the need for recharging the batteries thereby ensuring long lifetime of the devices.

  18. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  19. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  20. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process. PMID:23853128

  1. HARVESTED ENERGY-ADAPTIVE MAC PROTOCOL FOR ENERGY HARVESTING IOT NETWORKS

    OpenAIRE

    Hyeong-Kyu Lee; MinGyu Lee; Tae-Jin Lee

    2015-01-01

    In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes the fixed frame size, the resource efficiency can be reduced. In this paper, we propose...

  2. New Architectures for ubiquitous networks : use and adaptation of internet protocols over wireless sensor networks

    OpenAIRE

    Ludovici, Alessandro

    2014-01-01

    This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures in order to choose the most appropriate for the constraints of WSNs, which is REST. Based on this analysis, we review the state-of-the-art of protocols that allows implementing REST Web services. To this end, we adopt the IEEE 802.15.4 standard for the physical and data-li...

  3. Research on Design Scheme of WLAN Communication Adapter Based on 802.11 Protocols

    Science.gov (United States)

    Xiang, Chen; Guo-hua, Zhan

    in the present mobile data transmission methods, only WLAN has the high data rate supporting video service, so it will necessarily be an important part of future personal communication networks. This paper researches into the characteristics and technologies of WLAN, analyses the properties and features of stochastic competitive MAC protocol, and designs a high-rate WLAN terminal card, which is based on IEEE802.11 protocol. The card applies Direct-Sequence Spread-Spectrum technology, can support a highest data rate at 11Mbps and meet the high-rate wireless access requirement.

  4. EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol

    Directory of Open Access Journals (Sweden)

    Chinmaya Ku. Mishra,

    2011-04-01

    Full Text Available In wireless sensor network the efficient use of energy leads to enhance the network lifetime. As idle listening, collision, control overhead and over hearing are the main reasons of energy waste. Manytypical MAC protocols are designed to conserve energy and enhance network lifetime. In this paper we propose a new contention based energy efficient protocol called Extended S-MAC (EX-SMAC forwireless sensor networks. It is designed with three main features namely Low duty cycle, less number of collisions and minimum overhearing. As the name indicates it is the extension of S-MAC protocol, so this paper also eliminates the long latency of packets at intermediate nodes which is one of the demerits of SMAC.Sensor nodes in Extended S-MAC have a very short listening time, hence reduces the energy required to communicate with other nodes i.e. idle listening. Also the number of collisions in cases wheretwo or more nodes try to send packets at the same time is minimized in Extended S-MAC, hence retransmission cost for lost packets reduces and also overhearing by other nodes is also minimized by thisprotocol by having a very short listening time for each node of the sensor network. With such improvements over existing MAC protocol the performance is expected to be much better.

  5. Retrospective analysis of prostate cancer patients with implanted gold markers using off-line and adaptive therapy protocols

    International Nuclear Information System (INIS)

    Purpose: To determine the efficacy of applying adaptive and off-line setup correction models to bony anatomy and gold fiducial markers implanted in the prostate, relative to daily alignment to skin tattoos and daily on-line corrections of the implanted gold markers. Methods and Materials: Ten prostate cancer patients with implanted gold fiducial markers were treated using a daily on-line setup correction protocol. The patients' positions were aligned to skin tattoos and two orthogonal diagnostic digital radiographs were obtained before treatment each day. These radiographs were compared with digitally reconstructed radiographs to obtain the translational setup errors of the bony anatomy and gold markers. The adaptive, no-action-level and shrinking-action-level off-line protocols were retrospectively applied to the bony anatomy to determine the change in the setup errors of the gold markers. The protocols were also applied to the gold markers directly to determine the residual setup errors. Results: The percentage of remaining fractions that the gold markers fell within the adaptive margins constructed with 1.5σ' (estimated random variation) after 5, 10, and 15 measurement fractions was 74%, 88%, and 93% for the prone patients and 55%, 77%, and 93% for the supine patients, respectively. Using 2σ', the percentage after 5, 10, and 15 measurements was 85%, 95%, and 97% for the prone patients and 68%, 87%, and 99% for the supine patients, respectively. The average initial three-dimensional (3D) setup error of the gold markers was 0.92 cm for the prone patients and 0.70 cm for the supine patients. Application of the no-action-level protocol to bony anatomy with Nm = 3 days resulted in significant benefit to 4 of 10 patients, but 3 were significantly worse. The residual average 3D setup error of the gold markers was 1.14 cm and 0.51 cm for the prone and supine patients, respectively. When applied directly to the gold markers with Nm = 3 days, 5 patients benefited and 3

  6. A Multi-Objectif Genetic Algorithm-Based Adaptive Weighted Clustering Protocol in VANET

    OpenAIRE

    Hadded, Mohamed; Zagrouba, Rachid; Laouiti, Anis; Muhlethaler, Paul; Saidane, Leila Azouz

    2015-01-01

    —Vehicular Ad hoc NETwork (VANET) is the main component that is used recently for the development of Intelligent Transportation Systems (ITSs). VANET has a highly dynamic and portioned network topology due to the constant and rapid movement of vehicles. Recently, the clustering algorithms are widely used as the control schemes to make VANET topology less dynamic for MAC, routing and security protocols. An efficient clustering algorithm must take into consideration all the necessary informatio...

  7. Building Fault-Tolerant Consistency Protocols for an Adaptive Grid Data-Sharing Service

    OpenAIRE

    Antoniu, Gabriel; Deverge, Jean-François; Monnet, Sébastien

    2004-01-01

    We address the challenge of sharing large amounts of numerical data within computing grids consisting of clusters federation. We focus on the problem of handling the consistency of replicated data in an environment where the availability of storage resources dynamically changes. We propose a software architecture which decouples consistency management from fault-tolerance management. We illustrate this architecture with a case study showing how to design a consistency protocol using fault-tol...

  8. Climate Adaptation for Rural arEas (CARE); Midterm review report; Knowledge for Climate Theme 3

    OpenAIRE

    Brink, van den, R.B.A.; Bakker, M.M.; Vos, C.C.; J. P. M. Witte

    2012-01-01

    This midterm review report presents the structure, progress and first results of the Knowledge for Climate Theme 3 research programme Climate Adaptation for Rural arEas (CARE). This research programme aims to generate the fundamental knowledge that is necessary to design and evaluate adaptation strategies to cope with the impacts of climate change on rural areas in the Netherlands.

  9. Adaptation to climate change: Legal challenges for protected areas

    NARCIS (Netherlands)

    Cliquet, An; Backes, Chris; Harris, Jim; Howsam, Peter

    2009-01-01

    Climate change will cause further loss of biodiversity. As negative effects are already taking place, adaptive measures are required to protect biodiversity from the effects of climate change. The EU policy on climate change and biodiversity aims at improving a coherent ecological network in order t

  10. Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip

    CERN Document Server

    Soliman, Ahmed H M; El-Bably, M; Keshk, Hesham M A M

    2012-01-01

    The Scaling of microchip technologies, from micron to submicron and now to deep sub-micron (DSM) range, has enabled large scale systems-on-chip (SoC). In future deep submicron (DSM) designs, the interconnect effect will definitely dominate performance. Network-on-Chip (NoC) has become a promising solution to bus-based communication infrastructure limitations. NoC designs usually targets Application Specific Integrated Circuits (ASICs), however, the fabrication process costs a lot. Implementing a NoC on an FPGA does not only reduce the cost but also decreases programming and verification cycles. In this paper, an Asynchronous NoC has been implemented on a SPARTAN-3E\\textregistered device. The NoC supports basic transactions of both widely used on-chip interconnection standards, the Open Core Protocol (OCP) and the WISHBONE Protocol. Although, FPGA devices are synchronous in nature, it has been shown that they can be used to prototype a Global Asynchronous Local Synchronous (GALS) systems, comprising an Asynchr...

  11. Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip

    Directory of Open Access Journals (Sweden)

    Ahmed H M Soliman

    2011-07-01

    Full Text Available The Scaling of microchip technologies, from micron to submicron and now to deep sub-micron (DSM range, has enabled large scale systems-on-chip (SoC. In future deep submicron (DSM designs, the interconnect effect will definitely dominate performance. Network-on-Chip (NoC has become a promising solution to bus-based communication infrastructure limitations. NoC designs usually targets Application Specific Integrated Circuits (ASICs, however, the fabrication process costs a lot. Implementing a NoC on an FPGA does not only reduce the cost but also decreases programming and verification cycles. In this paper, an Asynchronous NoC has been implemented on a SPARTAN-3Eandamp;reg; device. The NoC supports basic transactions of both widely used on-chip interconnection standards, the Open Core Protocol (OCP and the WISHBONE Protocol. Although, FPGA devices are synchronous in nature, it has been shown that they can be used to prototype a Global Asynchronous Local Synchronous (GALS systems, comprising an Asynchronous NoC connecting IP cores operating in different clock domains.

  12. Monitoring of high voltage supply using the Controller Area Network protocol

    Energy Technology Data Exchange (ETDEWEB)

    Luz, Igo Amauri dos S.; Farias, Paulo Cesar M.A.; Guedes, Germano P. [Universidade Estadual de Feira de Santana (UEFS), BA (Brazil)

    2011-07-01

    Full text: In recent years, experimental physics has made great progress in the investigation of the phenomenology of neutrinos, with significant contribution from experiments using nuclear reactors as source of particles. In this context, The Neutrinos Angra Project proposes the use of an anti-neutrinos detector with ability to monitor parameters related to the activity of nuclear reactors. One of the tasks defined in the project is the development of a system to control and to monitor the high voltage supply units used by the photomultiplier tubes (PMTs) of the detector. The solution proposed in this work is based on the use of microcontrollers, from Microchip PIC family to adjust the operating point of the high voltage supply units and to acquire the current and output voltage data. Analysis of these data allows the effective control of the gain of the PMTs and to identify anomalous operational conditions. In this work is proposed the study of the Controller Area Network (CAN) protocol and the implementation of a laboratory network to reproduce the typical operations of data acquisition and information transfer between the nodes. The development of this network is divided in two stages. The first part consisted of the setup of a CAN network, using the PIC18F2680 microcontroller, which has the CAN protocol internally implemented. This network serves as a reduced model of the final system, allowing simulation of typical situations of data acquisition and transmission between the nodes and a computer. In the second part of the work, the PIC18F4550 microcontroller was associated with the external CAN controller MCP2515 to develop a CAN/USB converter. This converter provides a new communication channel between network nodes and the computer, in addition to the RS232 interface. (author)

  13. Energy-Aware Adaptive Cooperative FEC Protocol in MIMO Channel for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2013-01-01

    Full Text Available We propose an adaptive cooperative forward error correction (ACFEC based on energy efficiency combining Reed-Solomon (RS coder algorithm and multiple input multiple output (MIMO channel technology with monitoring signal-to-noise ratio (SNR in wireless sensor networks. First, we propose a new Markov chain model for FEC based on RS codes and derive the expressions for QoS on the basis of this model, which comprise four metrics: throughput, packet error rate, delay, and energy efficiency. Then, we apply RS codes with the MIMO channel technology to the cross-layer design. Numerical and simulation results show that the joint design of MIMO and adaptive cooperative FEC based on RS codes can achieve considerable spectral efficiency gain, real-time performance, reliability, and energy utility.

  14. An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless Sensor Networks (WSNs) are highly distributed networks consisting of a large number of tiny, low-cost, light-weight wireless nodes deployed to monitor an environment or a system. Each node in a WSN consists of three subsystems: the sensor subsystem which senses the environment, the processing subsystem which performs local computations on the sensed data, and the communication subsystem which is responsible for message exchange with neighboring sensor nodes. While an individual sensor node has limited sensing region, processing power, and energy, networking a large number of sensor nodes give rise to a robust, reliable, and accurate sensor network covering a wide region. Thus, routing in WSNs is a very important issue. This paper presents a query-based routing protocol for a WSN that provides different levels of Quality of Service (QoS): energy-efficiency, reliability, low latency and fault-tolerance-under different application scenarios. The algorithm has low computational complexity but can dynamic...

  15. Comparative adaptations of lower limb biomechanics during unilateral and bilateral landings after different neuromuscular-based ACL injury prevention protocols.

    Science.gov (United States)

    Brown, Tyler N; Palmieri-Smith, Riann M; McLean, Scott G

    2014-10-01

    Potentially valuable anterior cruciate ligament (ACL) injury prevention strategies are lengthy, limiting training success. Shorter protocols that achieve beneficial biomechanical adaptations may improve training effectiveness. This study examined whether core stability/balance and plyometric training can modify female landing biomechanics compared with the standard neuromuscular and no training models. Forty-three females had lower limb biomechanics analyzed during unilateral and bilateral landings immediately before and after a 6-week neuromuscular or no training programs. Sagittal and frontal plane hip and knee kinematics and kinetics were submitted to 3-way repeated-measures analyses of variance to test for the main and interaction effects of training group, landing type, and testing time. Greater peak knee flexion was evident in the standard neuromuscular group following training, during both bilateral (p = 0.027) and unilateral landings (p = 0.076 and d = 0.633). The plyometric group demonstrated reduced hip adduction (p = 0.010) and greater knee flexion (p = 0.065 and d = 0.564) during bilateral landings following training. The control group had significant reduction in peak stance knee abduction moment (p = 0.003) posttraining as compared with pretraining. The current outcomes suggest that significant biomechanical changes are possible by an isolated plyometric training component. The benefits, however, may not be evident across all landing types, seemingly limited to simplistic, bilateral landings. Integrated training protocols may still be the most effective training model, currently improving knee flexion posture during both bilateral and unilateral landings following training. Future prevention efforts should implement integrated training protocols that include plyometric exercises to reduce ACL injury risk of female athletes. PMID:24714537

  16. Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks

    OpenAIRE

    Hwa-Jung Lim; Joa-Hyoung Lee; Heon-Guil Lee

    2010-01-01

    In this paper we propose an adaptive square-shaped trajectory (ASST)-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the hash. Both the width and the size of the trajectory are dynamically adjustable, depending on the number of queries made to the service information on the trajectory. The number of ...

  17. Disorders of psychic adaptation of teenagers from radionuclides contaminated areas

    International Nuclear Information System (INIS)

    Results of complex psychological and psychopathological survey of 729 teenagers living in various regions of Belarus are considered. The all teenagers were divided into two groups: the first group had 557 teenagers living in region with a level of pollution by 137Cs less than 1 Ci/sq.km, the second groups - 172 teenagers, constantly living on controllable territories with the 137Cs contents more than 15 Ci/sq.km. The change of psychological adaptation in the form of strengthening of the situation and individual disturb, emotional lability and psychoasthenia was detected for the teenagers from contaminated regions. It may be a basic for development of various neurotic disorders. The received results show that the radioactive contaminated of constant living regions teenagers leads to disorders of the psychological adaptation at teenagers. These were characterized by lability of mood, increased sensitivity to external irritants, indecision, disturbing hypochondria and uncertainty in own forces. At late effect of small dozes of radiation the initial stimulation transforms to exhaustion of protective mechanisms of a head brain and leads to disorganization of the regulator mechanisms

  18. Prophylactic aortic root surgery in patients with Marfan syndrome : 10 years' experience with a protocol based on body surface area

    NARCIS (Netherlands)

    Aalberts, Jan J. J.; van Tintelen, J. Peter; Hillege, Hans L.; Boonstra, Piet W.; van den Berg, Maarten P.; Waterbolk, T

    2008-01-01

    Background: Current guidelines recommending prophylactic aortic root replacement in Marfan syndrome are based on absolute diameters of the aortic root. However, aortic root diameter is a function of body surface area (BSA). Here, we report our experience with a protocol for prophylactic aortic root

  19. How effective is 'greening' of urban areas in reducing human exposure to ground-level ozone concentrations, UV exposure and the ‘urban heat island effect’? A protocol to update a systematic review

    OpenAIRE

    Knight, Teri; Price, Sian; Bowler, Diana; King, Sian

    2016-01-01

    Background: The impact of climate change on public health may occur through a number of main pathways including increased temperature, ground-level ozone levels and ultra-violet radiation, which have a range of consequences for human health. One strategy for adaptation to the predicted effects of climate change on health that has been proposed, is to ‘green’ urban areas, essentially by increasing the abundance and cover of vegetation. This protocol is for an update of a systematic review whic...

  20. Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network

    Indian Academy of Sciences (India)

    NONITA SHARMA; AJAY K SHARMA

    2016-03-01

    This study aims to explore the impact of heterogeneity on a hybrid algorithm called Multi Adaptive Filter Algorithm by constructing series of experiments. Here, the simulations were made between ‘Total Energy Spent’ and ‘Number of Sources’ considering temporal correlation. The results were drawn from the trace information generated using ‘Monte Carlo’ simulation methods. After keen analysis, the results show that different levels of heterogeneity are best suited for correlated event detections. Moreover, based on the conclusions drawn,it can be safely inferred that n-level heterogeneity reduces the total energy spent close to 60%. Further, cost analysis recommends that adding progressive nodes preserves the cost factor in the bracket of 230–280$/Joule. Thenovel approach can immensely help the future solution providers to overcome the battery limitations of wireless sensor networks. This study provides insights into designing heterogeneous wireless sensor networks and aims atproviding the cost-benefit analysis that can be used in selecting the critical parameters of the network.

  1. Acute symptoms related to air pollution in urban areas: a study protocol

    Directory of Open Access Journals (Sweden)

    Forouzanfar Mohammad

    2006-08-01

    Full Text Available Abstract Background The harmful effects of urban air pollution on general population in terms of annoying symptoms are not adequately evaluated. This is in contrast to the hospital admissions and short term mortality. The present study protocol is designed to assess the association between the level of exposure to certain ambient air pollutants and a wide range of relevant symptoms. Awareness of the impact of pollution on the population at large will make our estimates of the pertinent covert burden imposed on the society more accurate. Methods/design A cross sectional study with spatial analysis for the addresses of the participants was conducted. Data were collected via telephone interviews administered to a representative sample of civilians over age four in the city. Households were selected using random digit dialling procedures and randomization within each household was also performed to select the person to be interviewed. Levels of exposure are quantified by extrapolating the addresses of the study population over the air pollution matrix of the city at the time of the interview and also for different lag times. This information system uses the data from multiple air pollution monitoring stations in conjunction with meteorological data. General linear models are applied for statistical analysis. Discussion The important limitations of cross-sectional studies on acute effects of air pollution are personal confounders and measurement error for exposure. A wide range of confounders in this study are controlled for in the statistical analysis. Exposure error may be minimised by employing a validated geographical information system that provides accurate estimates and getting detailed information on locations of individual participants during the day. The widespread operation of open air conditioning systems in the target urban area which brings about excellent mixing of the outdoor and indoor air increases the validity of outdoor pollutants

  2. An Adaptive Allocation Algorithm using Directional CSMA/CA over mmWave Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Hyunhee Park

    2012-04-01

    Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni‐antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention‐based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP\tcontrol procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.

  3. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC for Long-lived Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wen Hu

    2010-06-01

    Full Text Available We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC algorithm for long-lived Wireless Sensor Networks (WSNs. Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  4. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    Science.gov (United States)

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  5. A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network

    OpenAIRE

    Sana Ullah; Muhammad Imran; Mohammed Alnuem

    2014-01-01

    This paper introduces a hybrid and secure MAC protocol (PMAC) for WBAN. The PMAC protocol uses two contention access periods (CAPs) for accommodating normal and life-critical traffic and one contention-free period (CFP) for accommodating large amount of data packets. The priority-guaranteed CSMA/CA procedure is used in the CAP period, where different priorities are assigned to WBAN nodes by adjusting the backoff window size. In addition, a set of security keys is used to prevent illegal acces...

  6. Sustainability: Its adaptation and relevance in remote area housing

    Directory of Open Access Journals (Sweden)

    Rosemarie Rusch

    2014-03-01

    Full Text Available Little consideration has been given to the context of housing in remote areas.  It is important for the economic survival of many remote communities that appropriate and sustainable housing solutions are decided and implemented. This report examines housing at St Pauls, Moa Island in the Torres Strait, using site information, historical research and a review of cultural and geo-political factors to compare the current model with similar studies in self-build housing undertaken in the region between 1986 and 1992.  It not only demonstrates tangible economic benefits, but also evaluates the environmental and social improvements which can be achieved with a re-examination of the existing model.  It is important to consider the value of investing in policies and practices of sustainable development that can play a pivotal role in potential capacity building within such communities. Current land tenure policy means that families wishing to own their own homes must leave St Pauls, or build illegally.  Economically they cannot establish businesses so must leave the island or remain on welfare.  The result of this is an exponential increase in the cost of providing community housing and the associated increase in social and health stresses.  Acknowledgement at a policy level of the links between social and emotional well-being, and ‘Closing the Gap’ initiatives, have the potential to offer a wide range of funding opportunities and innovative approaches to solving the housing crisis in remote Australia, if they can be implemented in an open and effective manner.

  7. Sustainability: Its adaptation and relevance in remote area housing

    Directory of Open Access Journals (Sweden)

    Rosemarie Rusch

    2014-03-01

    Full Text Available Little consideration has been given to the context of housing in remote areas.  It is important for the economic survival of many remote communities that appropriate and sustainable housing solutions are decided and implemented.This report examines housing at St Pauls, Moa Island in the Torres Strait, using site information, historical research and a review of cultural and geo-political factors to compare the current model with similar studies in self-build housing undertaken in the region between 1986 and 1992. It not only demonstrates tangible economic benefits, but also evaluates the environmental and social improvements which can be achieved with a re-examination of the existing model.  It is important to consider the value of investing in policies and practices of sustainable development that can play a pivotal role in potential capacity building within such communities.Current land tenure policy means that families wishing to own their own homes must leave St Pauls, or build illegally.  Economically they cannot establish businesses so must leave the island or remain on welfare.  The result of this is an exponential increase in the cost of providing community housing and the associated increase in social and health stresses.  Acknowledgement at a policy level of the links between social and emotional well-being, and ‘Closing the Gap’ initiatives, have the potential to offer a wide range of funding opportunities and innovative approaches to solving the housing crisis in remote Australia, if they can be implemented in an open and effective manner.

  8. Analytical protocols for sampling extended areas: Comparing simulated field analysis to laboratory analysis for metal characterization of soils

    International Nuclear Information System (INIS)

    This paper describes a methodology for sampling large areas taking into account QA and QC protocols, in order to ensure representative samples. The proposed methodology covers a general approach to planning field investigations that could be useful for any type of environmental study. Procedures for sampling planning, a sampling protocols checklist, sampling devices and elements, transportation and blank sample requirements are presented. The final objective is to design a sampling strategy that will eventually allow the use of portable EDXRF instruments for in situ use in soil analysis. This methodology will be applied for a soil characterization study in the zone of Campana, Argentina, in order to identify possible contamination taking into account the industrial activity in this area. Sample concentrations were evaluated in the laboratory using an EDXRF spectrometer with radioisotope excitation. (author)

  9. A double fluorescence staining protocol to determine the cross-sectional area of myofibers using image analysis

    Science.gov (United States)

    Mozdziak, P. E.; Fassel, T. A.; Schultz, E.; Greaser, M. L.; Cassens, R. G.

    1996-01-01

    A double fluorescence staining protocol was developed to facilitate computer based image analysis. Myofibers from experimentally treated (irradiated) and control growing turkey skeletal muscle were labeled with the anti-myosin antibody MF-20 and detected using fluorescein-5-isothiocyanate (FITC). Extracellular material was stained with concanavalin A (ConA)-Texas red. The cross-sectional area of the myofibers was determined by calculating the number of pixels (0.83 mu m(2)) overlying each myofiber after subtracting the ConA-Texas red image from the MF-20-FITC image for each region of interest. As expected, myofibers in the irradiated muscle were smaller (P staining protocol combined with image analysis is accurate and less labor-intensive than classical procedures for determining the cross-sectional area of myofibers.

  10. Adaptation to climate change
    Legal challenges for protected areas

    OpenAIRE

    An Cliquet; Chris Backes; Jim Harris; Peter Howsam

    2009-01-01

    Climate change will cause further loss of biodiversity. As negative effects are already taking place, adaptive measures are required to protect biodiversity from the effects of climate change. The EU policy on climate change and biodiversity aims at improving a coherent ecological network in order to have more resilient ecosystems and to provide for connectivity outside core areas. The existing legal framework, the Birds and Habitats Directives, can enable adaptive approaches, by establishing...

  11. Adaptation to climate change in urban areas: climate-greening London, Rotterdam, and Toronto

    OpenAIRE

    Mees, H.L.P.; Driessen, P.P.J.

    2011-01-01

    This article aims to gain insight into the governance capacity of cities to adapt to climate change through urban green planning, which we will refer to as climate-greening. The use of green space is considered a no-regrets adaptation strategy, since it not only absorbs rainfall and moderates temperature, but simultaneously can contribute to the sustainable development of urban areas. However, green space competes with other socio-economic interests that also require space. Urban planning can...

  12. Disinfection Contact Time study plan (100-N Area tracer protocol). Revision 1

    International Nuclear Information System (INIS)

    Bechtel Hanford, Inc. will prepare an Engineering Tracer Study Protocol for the determination of contact time for the disinfection process at Group A Non-transient Non-community water treatment plant for the 100-N Water Plant at the Hanford Site in Richland, Washington. Included in this report are the results of a study that determine the actual detention time within the plant clearwell, and thus the disinfection contact time at several clearwell effluent flow rates

  13. International and European Law on Protected Areas and Climate Change: Need for Adaptation or Implementation?

    Science.gov (United States)

    Cliquet, A.

    2014-10-01

    The protection and management of protected areas must be adapted to the effects of climate change. An important question is if the law on protected areas is capable of dealing with the required changes. In general, both international nature conventions and European Union nature conservation law do not contain any specific provisions on climate change and protected areas. Attention has been paid to this link in non-binding decisions and policy documents. In order to adapt the law to increased dynamics from climate change, more flexibility is needed. This flexibility should not be understood as "legal" flexibility, in the sense of the weakening nature conservation provisions. Scientific uncertainties on the effects of climate change might conflict with the need for legal certainties. In order to adapt to the effects of climate change, the two crucial elements are the strengthening of core protected areas and connectivity between the core areas. At the international level, both elements can be found in non-binding documents. International law enables the required adaptation; however, it often lacks concrete obligations. A stronger legal framework can be found at the level of the European Union. The Birds and Habitats Directives contain sufficient tools to deal with the effects of climate change. The Directives have been insufficiently implemented so far. Especially the central goals of reaching a favorable conservation status and connectivity measures need to be addressed much more in the future.

  14. Adaptive capacity of fishing communities at marine protected areas: a case study from the Colombian Pacific.

    Science.gov (United States)

    Moreno-Sánchez, Rocío del Pilar; Maldonado, Jorge Higinio

    2013-12-01

    Departing from a theoretical methodology, we estimate empirically an index of adaptive capacity (IAC) of a fishing community to the establishment of marine protected areas (MPAs). We carried out household surveys, designed to obtain information for indicators and sub-indicators, and calculated the IAC. Moreover, we performed a sensitivity analysis to check for robustness of the results. Our findings show that, despite being located between two MPAs, the fishing community of Bazán in the Colombian Pacific is highly vulnerable and that the socioeconomic dimension of the IAC constitutes the most binding dimension for building adaptive capacity. Bazán is characterized by extreme poverty, high dependence on resources, and lack of basic public infrastructure. Notwithstanding, social capital and local awareness about ecological conditions may act as enhancers of adaptive capacity. The establishment of MPAs should consider the development of strategies to confer adaptive capacity to local communities highly dependent on resource extraction. PMID:24213997

  15. A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas

    Directory of Open Access Journals (Sweden)

    Carolina Tripp-Barba

    2014-01-01

    Full Text Available In recent years, the general interest in routing for vehicular ad hoc networks (VANETs has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles’ density, the vehicles’ trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector, GPSR (Greedy Perimeter Stateless Routing, I-GPSR (Improvement GPSR and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware. Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.

  16. A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas

    Science.gov (United States)

    Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Igartua, Mónica Aguilar; Rebollo-Monedero, David; de la Cruz Llopis, Luis J.; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso

    2014-01-01

    In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery. PMID:24476683

  17. Coordination of Teachers in New Undergraduate Degrees Adapted to European Higher Education Area

    Science.gov (United States)

    Mondéjar-Jiménez, Juan-Antonio; Cordente-Rodríguez, María; Meseguer-Santamaría, María-Leticia; Vargas-Vargas, Manuel; Mondéjar-Jiménez, José

    2010-01-01

    The introduction of new undergraduate degrees adapted to the European Higher Education Area (EHEA) requires a coordinated effort by teachers, because the different subjects are based on a new methodology of teaching and learning. The Social Sciences School of Cuenca offers degrees in Business Administration, Law and Labor Sciences. The progressive…

  18. Simulation of Old Urban Residential Area Evolution Based on Complex Adaptive System

    Institute of Scientific and Technical Information of China (English)

    YANG Fan; WANG Xiao-ming; HUA Hong

    2009-01-01

    On the basis of complex adaptive system theory,this paper proposed an agent-based model of old urban residential area,in which,residents and providers are the two adaptive agents.The behaviors of residents and providers in this model are trained with back propagation and simulated with Swarm software based on environment-rules-agents interaction.This model simulates the evolution of old urban residential area and analyzes the relations between the evolution and urban management with the background of Chaozhou city.As a result,the following are obtained:(1) Simulation without government intervention indicates the trend of housing ageing,environmental deterioration,economic depression,and social filtering-down in old urban residential area.If the development of old urban residential area is under control of developers in market,whose desire is profit maximization,and factors such as social justice,historic and culture value will be ignored.(2) If the government carries out some policies and measures which will perfectly serve their original aims,simulation reveals that old urban residential area could be adapted to environment and keep sustainable development.This conclusion emphasizes that government must act as initiator and program maker for guiding residents and other providers directly in the development of old urban residential area.

  19. DETERMINANTS OF ADAPTATION TO DEFORESTATION AMONG FARMERS IN MADAGALI LOCAL GOVERNMENT AREA OF ADAMAWA STATE, NIGERIA

    Directory of Open Access Journals (Sweden)

    S.B. Mustapha

    2012-08-01

    Full Text Available The study examined the determinants of adaptation to deforestation among farmers in Madagali Local Government Area of Adamawa state, Nigeria. Structured interview schedule were used to obtain information from 200 respondents selected through simple random sampling techniques. The data collected were analyzed using descriptive (frequencies and percentages and inferential (chi-square test statistics. The result indicated that majority (84% of the respondents were male with 21-40 years of age representing 58.50%. The study also showed that most (45% of the respondents had attained post primary education with majority (80% having 6 and above years of farming experience. The respondents perceived fuel wood extraction as the major (42% cause of deforestation in the study area. The result showed that the most (30.50% frequently employed adaptation strategy against deforestation was reducing quantity of fire wood consumption. The study further showed that the factors which significantly influenced adaptation to deforestation among the respondents were age, farming experience and educational status with X2=9.216, 8.697 and 11.238 at P<0.05 respectively. While those factors which did not influence adaptation to deforestation among the respondents were gender, access to agricultural credit and access to extension services with X2=1.286, 7.923 and 5.862 at P<0.05 respectively. The major constraints faced by respondents in adaptation to deforestation were lack of capital and lack of accessible alternative energy. The study recommends that awareness campaign should be mounted to increase the level of knowledge of respondents on the significance of adaptation to deforestation. Respondents should also be encouraged towards establishment of adaptation cooperative societies in order to take advantage of some government policies and programmes.

  20. Characterizing urban areas with good sound quality: Development of a research protocol

    OpenAIRE

    Elise van Kempen; Jeroen Devilee; Wim Swart; Irene van Kamp

    2014-01-01

    Due to rapid urbanization, the spatial variation between wanted and unwanted sounds will decrease or even disappear. Consequently, the characteristics of (urban) areas where people can temporarily withdraw themselves from urban stressors such as noise may change or become increasingly scarce. Hardly any research has been carried out into the positive health effects of spending time in areas with a good sound quality. One of the problems is that an overview of what aspects determines good soun...

  1. Frontal Cryosectioning: An Improved Protocol for Sectioning Large Areas of Fibrous Scaffolds

    Directory of Open Access Journals (Sweden)

    Casey P. Grey

    2015-01-01

    Full Text Available Fibrous tissue engineering scaffolds, such as those produced by electrospinning, cannot achieve their clinical potential until deep cell-scaffold interactions are understood. Even the most advanced imaging techniques are limited to capturing data at depths of 100 µm due to light scatter associated with the fibers that compose these scaffolds. Conventional cross-sectional analysis provides information on relatively small volumes of space and frontal sections are difficult to generate. Current understanding of cellular penetration into fibrous scaffolds is limited predominantly to the scaffold surface. Although some information is available from cross-sections, sections vary in quality, can distort spatial scaffold properties, and offer virtually no spatial cues as to what scaffold properties instigate specific cellular responses. Without the definitive ability to understand how cells interact with the architecture of an entire scaffold it is difficult to justify scaffold modifications or in-depth cell penetration analyses until appropriate techniques are developed. To address this limitation we have developed a cryosectioning protocol that makes it possible to obtain serial frontal sections from electrospun scaffolds. Microscopic images assembled into montage images from serial sections were then used to create three-dimensional (3D models of cellular infiltration throughout the entire scaffold.

  2. Adaptability and stability of conilon coffee in areas of high altitude.

    Science.gov (United States)

    Barbosa, D H G S; Rodrigues, W P; Vieira, H D; Partelli, F L; Viana, A P

    2014-01-01

    In view of the predicted models of global climate change and differences in prices and production costs, there is increased interest in Coffea canephora cultivation in areas of high altitude. However, this species is sensitive to low temperatures, where genotypes vary regarding adaptation/tolerance mechanisms, demonstrating genotype x environment interaction. The aim of this study was to evaluate the stability and adaptability of C. canephora varieties in high-altitude areas. The experiments were carried out in February 2004, in Bom Jesus do Itabapoana, Rio de Janeiro State, Brazil, at an altitude of 725 m. Four clonal varieties (EMCAPA 8111, EMCAPA 8121, EMCAPA 8131, and EMCAPA 8151) and five harvests (2006 to 2010) were used. The experimental design was randomized blocks with four treatments and six plots, with 12 plants in each plot and spaced 2.5 x 1.2 m. Adaptability and stability parameters were determined using methods based on nonparametric analysis and analysis of variance. The results showed that the EMCAPA 8131 had the best performance according to stability and adaptability parameters and may be promising for high-altitude regions. PMID:25299102

  3. Parks, people, and change: the importance of multistakeholder engagement in adaptation planning for conserved areas

    Directory of Open Access Journals (Sweden)

    Corrine N. Knapp

    2014-12-01

    Full Text Available Climate change challenges the traditional goals and conservation strategies of protected areas, necessitating adaptation to changing conditions. Denali National Park and Preserve (Denali in south central Alaska, USA, is a vast landscape that is responding to climate change in ways that will impact both ecological resources and local communities. Local observations help to inform understanding of climate change and adaptation planning, but whose knowledge is most important to consider? For this project we interviewed long-term Denali staff, scientists, subsistence community members, bus drivers, and business owners to assess what types of observations each can contribute, how climate change is impacting each, and what they think the National Park Service should do to adapt. The project shows that each type of long-term observer has different types of observations, but that those who depend more directly on natural resources for their livelihoods have more and different observations than those who do not. These findings suggest that engaging multiple groups of stakeholders who interact with the park in distinct ways adds substantially to the information provided by Denali staff and scientists and offers a broader foundation for adaptation planning. It also suggests that traditional protected area paradigms that fail to learn from and foster appropriate engagement of people may be maladaptive in the context of climate change.

  4. Assessing the effectiveness and cost effectiveness of adaptive e-Learning to improve dietary behaviour: protocol for a systematic review

    Directory of Open Access Journals (Sweden)

    Michie Susan

    2010-04-01

    Full Text Available Abstract Background The composition of habitual diets is associated with adverse or protective effects on aspects of health. Consequently, UK public health policy strongly advocates dietary change for the improvement of population health and emphasises the importance of individual empowerment to improve health. A new and evolving area in the promotion of dietary behavioural change is e-Learning, the use of interactive electronic media to facilitate teaching and learning on a range of issues, including diet and health. The aims of this systematic review are to determine the effectiveness and cost-effectiveness of adaptive e-Learning for improving dietary behaviours. Methods/Design The research will consist of a systematic review and a cost-effectiveness analysis. Studies will be considered for the review if they are randomised controlled trials, involving participants aged 13 or over, which evaluate the effectiveness or efficacy of interactive software programmes for improving dietary behaviour. Primary outcome measures will be those related to dietary behaviours, including estimated intakes of energy, nutrients and dietary fibre, or the estimated number of servings per day of foods or food groups. Secondary outcome measures will be objective clinical measures that are likely to respond to changes in dietary behaviours, such as anthropometry or blood biochemistry. Knowledge, self-efficacy, intention and emotion will be examined as mediators of dietary behaviour change in order to explore potential mechanisms of action. Databases will be searched using a comprehensive four-part search strategy, and the results exported to a bibliographic database. Two review authors will independently screen results to identify potentially eligible studies, and will independently extract data from included studies, with any discrepancies at each stage settled by a third author. Standardised forms and criteria will be used. A descriptive analysis of included

  5. Socio-economic factors influencing climate change adaptation among crop farmers in Umuahia South Area of Abia State, Nigeria

    OpenAIRE

    N. O. Anyoha; F. N. Nnadi; J. Chikaire; J. A. Echetama; C. O. Utazi; R. A. Ihenacho

    2013-01-01

    The aim of the study was to determine the socioeconomic factors influencing climate change adaptation among crop farmers in Umuahia South Area of Abia State, Nigeria. The specific objectives of the study were to determine socioeconomic characteristics of crop farmers in the area, determine farmers level of awareness of climate change in the area, ascertain effects of climate change in crop production, identify adaptation strategies adopted by the farmers in the area and determine socioeconomi...

  6. Analysis of neighbour and isolated node of intersection area based geocasting protocol (IBGP) in VANET

    CERN Document Server

    Das, Sanjoy

    2012-01-01

    Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined geographical location i.e., known as geocast region. The applications of geocasting in VANET are to disseminate information like, collision warning, advertising, alerts message, etc. In this paper, we have proposed a model for highway scenario where the highway is divided into number of cells. The intersection area between two successive cells is computed to find the number of common nodes. Therefore, probabilistic analysis of the nodes present and void occurrence in the intersection area is carried out. Further, we have defined different forwarding zones to restrict the number of participated nodes for data delivery. Number of nodes present and void occurrence in the different forwarding zones have also been analysed based on various node density in the network to determine the successful delivery of data. Our analytical results show that in a densely populated network, data can be transmitted with lo...

  7. A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks

    CERN Document Server

    Mana, Mohammed; Bensaber, Boucif Amar; 10.5121/ijnsa.2011.3201

    2011-01-01

    Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user's privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).

  8. Understanding and Using the Controller Area Network Communication Protocol Theory and Practice

    CERN Document Server

    Di Natale, Marco; Giusto, Paolo; Ghosal, Arkadeb

    2012-01-01

    This is the first book to offer a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus.  Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance.   This book offers a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers.    Offers the first comprehensive guide to bridging the gap between theory and implementation of the widely accepted Controller Area Network (CAN) bus; Provides examples and best practices for design of communication systems, as w...

  9. Reliable and Energy Efficient Network Protocols for Wireless Body Area Networks

    OpenAIRE

    Latré, B.

    2008-01-01

    In a wireless Body Area Network (WBAN) various sensors are attached on clothing, on the body or are even implanted under the skin. The wireless nature of the network and the wide variety of sensors offers numerous new, practical and innovative applications. A motivating example can be found in the world of health monitoring. The sensors of the WBAN measure for example the heartbeat, the body temperature or record a prolonged electrocardiogram. Using a WBAN, the patient experiences a greater p...

  10. Application of the protocol for marine biological valuation to selected case study areas

    OpenAIRE

    Derous, S.; Courtens, W; Deckers, P.; Deneudt, K.; Forero, C.E.; Hostens, K.; Moulaert, I.; Stienen, E.W.M.; Vanden Eede, S.; Van Lancker, V. R. M; Verfaillie, E; Vincx, M.; Degraer, S.

    2008-01-01

    Marine biological valuation integrates all biological and ecological information that is available for a study area into a relative biological value. The resulting biological valuation map (BVM) is easy to interpret and translates complex scientific data into a tool that can be used by policy makers as a baseline layer for spatial planning at sea. When such BVM is lacking, managers can only trust on the available best expert judgement to include biological aspects into their decisions, a proc...

  11. Cooperative Communications inWireless Local Area Networks: MAC Protocol Design and Multi-layer Solutions

    OpenAIRE

    He, Xin

    2012-01-01

    This dissertation addresses cooperative communications and proposes multi-layer solu- tions for wireless local area networks, focusing on cooperative MAC design. The coop- erative MAC design starts from CSMA/CA based wireless networks. Three key issues of cooperation from the MAC layer are dealt with: i.e., when to cooperate (opportunistic cooperation), whom to cooperate with (relay selection), and how to protect cooperative transmissions (message procedure design). In addition...

  12. Adaptive Wide-Area Damping Control Scheme for Smart Grids with Consideration of Signal Time Delay

    Directory of Open Access Journals (Sweden)

    Deyou Yang

    2013-09-01

    Full Text Available As an important part of the smart grid, a wide-area measurement system (WAMS provides the key technical support for power system monitoring, protection and control. But 20 uncertainties in system parameters and signal transmission time delay could worsen the damping effect and deteriorate the system stability. In the presented study, the subspace system identification technique (SIT is used to firstly derive a low-order linear model of a power system from the measurements. Then, a novel adaptive wide-area damping control scheme for online tuning of the wide-area damping controller (WADC parameters using the residue method is proposed. In order to eliminate the effects of the time delay to the signal transmission, a simple and practical time delay compensation algorithm is proposed to compensate the time delay in each wide-area control signal. Detailed examples, inspired by the IEEE test system under various disturbance scenarios, have been used to verify the effectiveness of the proposed adaptive wide-area damping control scheme.

  13. Identification of national priority areas for adaptation to climate change in China

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The problem of global warming has been identified as the first in the list of the top ten environmental problems in the world.As climate change will seriously affect the social and natural world that people live in,so it may lay serious repercussions on economic progress,social improvement,and sustainable development,Internationalbodies everywhere and many of the countries' governments are responding urgently to this call.In recent years,climate change has affected different regions in China in different ways.In its national agenda,the Chinese government should address the problem of climate change and its negative impact on socio-economic development.In this endeavor the nation should introduce policies which will help its people and economy to adapt to these effectts and changes.Priority-fields of adaptation to climate change are the sensitive areas or departments which are more vulnerable to the negative influences of climate change.The negative impacts of climate change in some parts of China are considered to be very serious indeed as they affect the whole economy and community.As a result,priority should be given to these more affected regions for the limited state financing.This paper defines adaptation and discusses the basic principles and programs in the identification of national priority areas where adaptation ,should be exercised.Based on the past studies,four priority areas in China are identified,namely,disaster prevention and mitigation,water resources,agriculture,and ecosystem.An analysis on the identification procedures,and the reasons and tasks involved are given for each.

  14. A Very Low Power MAC (VLPM) Protocol for Wireless Body Area Networks

    OpenAIRE

    Ullah, Niamat; Khan, Pervez; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. T...

  15. Protocol for the E-Area Low Level Waste Facility Disposal Limits Database

    International Nuclear Information System (INIS)

    A database has been developed to contain the disposal limits for the E-Area Low Level Waste Facility (ELLWF). This database originates in the form of an EXCEL(copyright) workbook. The pertinent sheets are translated to PDF format using Adobe ACROBAT(copyright). The PDF version of the database is accessible from the Solid Waste Division web page on SHRINE. In addition to containing the various disposal unit limits, the database also contains hyperlinks to the original references for all limits. It is anticipated that database will be revised each time there is an addition, deletion or revision of any of the ELLWF radionuclide disposal limits

  16. Analysis of Neighbour and Isolated Node of Intersection Area Based Geocasting Protocol (IBGP in VANET

    Directory of Open Access Journals (Sweden)

    Sanjoy Das

    2012-03-01

    Full Text Available Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined geographical location i.e., known as geocast region. The applications of geocasting in VANET are to disseminate information like, collision warning, advertising, alerts message, etc. In this paper, we have proposed a model for highway scenario where the highway is divided into number of cells. The intersection area between two successive cells is computed to find the number of common nodes. Therefore, probabilistic analysis of the nodes present and void occurrence in the intersection area is carried out. Further, we have defined different forwarding zones to restrict the number of participated nodes for data delivery. Number of nodes present and void occurrence in the different forwarding zoneshave also been analysed based on various node density in the network to determine the successful delivery of data. Our analytical results show that in a densely populated network, data can be transmitted with low radio transmission range. In a densely populated network smaller forwarding zones will be selected for data delivery.

  17. Leveraging modern climatology to increase adaptive capacity across protected area networks

    Science.gov (United States)

    Davison, J.E.; Graumlich, L.J.; Rowland, E.L.; Pederson, G.T.; Breshears, D.D.

    2012-01-01

    Human-driven changes in the global environment pose an increasingly urgent challenge for the management of ecosystems that is made all the more difficult by the uncertain future of both environmental conditions and ecological responses. Land managers need strategies to increase regional adaptive capacity, but relevant and rapid assessment approaches are lacking. To address this need, we developed a method to assess regional protected area networks across biophysically important climatic gradients often linked to biodiversity and ecosystem function. We plot the land of the southwestern United States across axes of historical climate space, and identify landscapes that may serve as strategic additions to current protected area portfolios. Considering climate space is straightforward, and it can be applied using a variety of relevant climate parameters across differing levels of land protection status. The resulting maps identify lands that are climatically distinct from existing protected areas, and may be utilized in combination with other ecological and socio-economic information essential to collaborative landscape-scale decision-making. Alongside other strategies intended to protect species of special concern, natural resources, and other ecosystem services, the methods presented herein provide another important hedging strategy intended to increase the adaptive capacity of protected area networks. ?? 2011 Elsevier Ltd.

  18. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  19. Climate adaptation in NVE's areas of responsibility - Strategy 2010 - 2014; Klimatilpasning innen NVEs ansvarsomraader - Strategi 2010 - 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hamarsland, Arne T. (ed.)

    2010-09-15

    NVE has developed a comprehensive climate change strategies within their areas of responsibility. There is a systematic review of how a future climate change will affect NVE management areas; how to meet challenges, vulnerabilities, opportunities and proposals for adaptation measures. Climate adaptation is a dynamic process. It is therefore necessary to follow up the work continuously and correct direction at regular intervals. Climate change adaptation strategy of adaptation measures is a foundation and a direction sensor in NVE's business planning. (AG)

  20. 64-slice spiral computed tomography of the coronary arteries: dose reduction using an optimized imaging protocol including individual weight-adaptation of voltage and current-time product

    International Nuclear Information System (INIS)

    Radiation dose and image quality were compared between a standard protocol (40 patients, group A) and a weight-adapted protocol of voltage and current-time product (44 patients, group B) using 64-slice coronary multidetector computed tomography (MDCT). Effective dose estimate was lower by 37% in all patients of group B (9.2±2.5 mSv) compared with group A (14.6±2.3 mSv, P<0.0001). Group B patients with a small body mass index (BMI) benefited most with a dose reduction of 53% (6.7±1.5 mSv in group B versus 14.1±1.8 mSv in group A, P < 0.0001). Moderate reductions of 32% and 20% were achieved for patients with a medium and large BMI, respectively. Reduction in radiation dose did not affect the image quality as assessed by image noise, signal-to-noise ratios, and number of coronary segments with good diagnostic image quality. Individual weight-adaptation of voltage and current-time product significantly reduces the radiation dose without loss of image quality. (orig.)

  1. Assessment of protocols in cone-beam CT with symmetric and asymmetric beams usingeffective dose and air kerma-area product

    International Nuclear Information System (INIS)

    This study aims to evaluate and compare protocols with similar purposes in a cone beam CT scanner using thermoluminescent dosimeter (TLD) and the air kerma-area product (PKA) as the kerma index. The measurements were performed on two protocols used to obtain an image of the maxilla–mandible using the equipment GENDEX GXCB 500: Protocol [GX1] extended diameter and asymmetric beam (14 cm×8.5 cm-maxilla/mandible) and protocol [GX2] symmetrical beam (8.5 cm×8.5 cm-maxillary/mandible). LiF dosimeters inserted into a female anthropomorphic phantom were used. For both protocols, the value of PKA was evaluated using a PTW Diamentor E2 meter and the multimeter Radcal Rapidose system. The results obtained for the effective dose/PKA were separated by protocol image. [GX1]: 44.5 µSv/478 mGy cm2; [GX2]: 54.8 µSv/507 mGy cm2. Although the ratio of the diameters (14 cm/8.5 cm)=1.65, the ratio of effective dose values (44.5 µSv/54.8 µSv)=0.81, that is, the effective dose of the protocol with extended diameter is 19% smaller. The PKA values reveal very similar results between the two protocols. For the cases where the scanner uses an asymmetric beam to obtain images with large diameters that cover the entire face, there are advantages from the point of view of reducing the exposure of patients when compared to the use of symmetrical beam and/or to FOV images with a smaller diameter. - Highlights: • The study relies on the comparison of two image protocols in CBCT: symmetrical and asymmetrical FOV. • Effective dose assessment for symmetrical and asymmetrical FOV. • Measurements of air kerma-area product for CBCT with symmetrical and asymmetrical FOV

  2. Adapted strategic plannig model applied to small business: a case study in the fitness area

    Directory of Open Access Journals (Sweden)

    Eduarda Tirelli Hennig

    2012-06-01

    Full Text Available The strategic planning is an important management tool in the corporate scenario and shall not be restricted to big Companies. However, this kind of planning process in small business may need special adaptations due to their own characteristics. This paper aims to identify and adapt the existent models of strategic planning to the scenario of a small business in the fitness area. Initially, it is accomplished a comparative study among models of different authors to identify theirs phases and activities. Then, it is defined which of these phases and activities should be present in a model that will be utilized in a small business. That model was applied to a Pilates studio; it involves the establishment of an organizational identity, an environmental analysis as well as the definition of strategic goals, strategies and actions to reach them. Finally, benefits to the organization could be identified, as well as hurdles in the implementation of the tool.

  3. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks

    Science.gov (United States)

    Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup

    2016-01-01

    Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes. PMID:27171085

  4. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup

    2016-01-01

    Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes. PMID:27171085

  5. Similar adaptation effects in primary visual cortex and area MT of the macaque monkey under matched stimulus conditions

    OpenAIRE

    Patterson, Carlyn A.; Duijnhouwer, Jacob; Wissig, Stephanie C.; Krekelberg, Bart; Kohn, Adam

    2013-01-01

    Recent stimulus history, or adaptation, can alter neuronal response properties. Adaptation effects have been characterized in a number of visually responsive structures, from the retina to higher visual cortex. However, it remains unclear whether adaptation effects across stages of the visual system take a similar form in response to a particular sensory event. This is because studies typically probe a single structure or cortical area, using a stimulus ensemble chosen to provide potent drive...

  6. Adaptive changes in pancreatic beta cell fractional area and beta cell turnover in human pregnancy

    OpenAIRE

    Butler, A. E.; Cao-Minh, L.; Galasso, R; Rizza, R. A.; Corradin, A.; Cobelli, C; Butler, P C

    2010-01-01

    Aims/hypothesis We sought to establish the extent and basis for adaptive changes in beta cell numbers in human pregnancy. Methods Pancreas was obtained at autopsy from women who had died while pregnant (n = 18), post-partum (n = 6) or were not pregnant at or shortly before death (controls; n = 20). Pancreases were evaluated for fractional pancreatic beta cell area, islet size and islet fraction of beta cells, beta cell replication (Ki67) and apoptosis (TUNEL), and indirect markers of beta cel...

  7. Soybean adaptation in Chernobyl area (what happen to soybean if something happen)

    International Nuclear Information System (INIS)

    In this presentation author deals with transfer of cesium-137 and strontium-90 by the soybeans into the seeds and analysis of production of proteins on the contaminated sites of Chernobyl and Fukushima areas. The results indicate that alterations in the proteome include adaptation to heavy metal stress and mobilization of seed storage proteins. The results also suggest that there have been adjustments to carbon metabolism in the cytoplasm and plastids, increased activity of the Krebs tricarboxylic acid cycle, and decreased condensation of malonyl-acyl carrier protein during fatty acid biosynthesis.

  8. Adapt

    Science.gov (United States)

    Bargatze, L. F.

    2015-12-01

    Active Data Archive Product Tracking (ADAPT) is a collection of software routines that permits one to generate XML metadata files to describe and register data products in support of the NASA Heliophysics Virtual Observatory VxO effort. ADAPT is also a philosophy. The ADAPT concept is to use any and all available metadata associated with scientific data to produce XML metadata descriptions in a consistent, uniform, and organized fashion to provide blanket access to the full complement of data stored on a targeted data server. In this poster, we present an application of ADAPT to describe all of the data products that are stored by using the Common Data File (CDF) format served out by the CDAWEB and SPDF data servers hosted at the NASA Goddard Space Flight Center. These data servers are the primary repositories for NASA Heliophysics data. For this purpose, the ADAPT routines have been used to generate data resource descriptions by using an XML schema named Space Physics Archive, Search, and Extract (SPASE). SPASE is the designated standard for documenting Heliophysics data products, as adopted by the Heliophysics Data and Model Consortium. The set of SPASE XML resource descriptions produced by ADAPT includes high-level descriptions of numerical data products, display data products, or catalogs and also includes low-level "Granule" descriptions. A SPASE Granule is effectively a universal access metadata resource; a Granule associates an individual data file (e.g. a CDF file) with a "parent" high-level data resource description, assigns a resource identifier to the file, and lists the corresponding assess URL(s). The CDAWEB and SPDF file systems were queried to provide the input required by the ADAPT software to create an initial set of SPASE metadata resource descriptions. Then, the CDAWEB and SPDF data repositories were queried subsequently on a nightly basis and the CDF file lists were checked for any changes such as the occurrence of new, modified, or deleted

  9. Preston and Park-Sanders protocols adapted for semi-quantitative isolation of thermotolerant Campylobacter from chicken rinse

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann; Lübeck, Peter Stephensen; Aalbaek, B.;

    2003-01-01

    detection methods. Thus, semi-quantitative detection of thermophilic Campylobacter spp. in 20 naturally contaminated chicken rinse samples was carried out using the two most common standard protocols: Preston and Park-Sanders, as proposed by Nordic Committee on Food Analysis (NMKL) and International......Human campylobacteriosis has become the major cause of foodborne gastrointestinal diseases in several European countries. In order to implement effective control measures in the primary production, and as a tool in risk assessment studies, it is necessary to have sensitive and quantitative...

  10. Flood risk analysis in the Tokyo metropolitan area for climate change adaptation

    Science.gov (United States)

    Hirano, J.; Dairaku, K.

    2011-12-01

    Flood is one of the most significant natural hazards in Japan. In particular, the Tokyo metropolitan area is highly vulnerable to flood, because densely populated area is located along mouth of major rivers. The Tokyo metropolitan area has been affected by several large flood disasters. We aim to evaluate potential flood risk in Tokyo Metropolitan area by considering effect of historical land use change, land cover change, socio-economic change, and climatic change. For this purpose, it is necessary to build up a consistent flood database system, which contains long-term consistent flood data for the past. Ministry of land, infrastructure, transport and tourism in Japan published "Statistics of flood", which contains data for flood causes, number of damaged houses, area of wetted surface, and total amount of damage for each flood at small municipal level. Based on these flood data documented in "Statistics of flood", we construct a flood database system for Tokyo metropolitan area for the period from 1961 to 2008 by using ArcGIS software. In this database, each flood record is linked to municipal polygons. By using this flood database, we can refer to a specific flood record for each year at small municipal level. We can also calculate total amount of damage for each flood cause such as innuduation inside the levee, over flow,innunduation by river water. First, we analyze long-term variations of flood risk in Tokyo metropolitan area based on this flood database. Then, we aim to evaluate influence of socio-economic and climatic change on flood risk variations by comparing flood variations in the past with rainfall data and socio-economic indicators. Finally, we construct a flood risk curve representing exceedance probability for total damage of flood by using past flood data. Based on the flood risk curve, we discuss potential vulnerability to flooding and risk of economic losses in Tokyo metropolitan area for climate change adaptation.

  11. Fast protocol for extraction of DNA from Prosopis spp leaves (plant adapted to arid environment) without liquid nitrogen.

    Science.gov (United States)

    Michel-López, C Y; González-Mendoza, D; Grimaldo-Juarez, O

    2013-01-01

    The extraction of high-quality genomic DNA from Prosopis spp for polymerase chain reaction (PCR) amplification is complicated, owing to the presence of a high percentage of secondary metabolites that bind to or co-precipitate with nucleic acids. In the present study, we report a modified sodium dodecyl sulfate/phenol protocol that eliminates the use of liquid nitrogen in the maceration process, β-mercaptoethanol in the buffer extraction, and the ethanol precipitation step. The A₂₆₀/A₂₈₀ absorbance ratios of the isolated DNA were approximately 2.0 to 1.9, suggesting that the DNA fraction was pure and can be used for further PCR analysis. The DNA isolated by this protocol is of sufficient quality for molecular applications; this technique could be applied to other organisms that have similar substances that hinder DNA extraction. Finally, this proposal represents an alternative fast, cheap, and effective method for the isolation of genomic DNA from fresh leaves of Prosopis spp, even in low-technology laboratories. PMID:24089098

  12. Building the framework for climate change adaptation in the urban areas using participatory approach: the Czech Republic experience

    Science.gov (United States)

    Emmer, Adam; Hubatová, Marie; Lupač, Miroslav; Pondělíček, Michael; Šafařík, Miroslav; Šilhánková, Vladimíra; Vačkář, David

    2016-04-01

    The Czech Republic has experienced numerous extreme hydrometeorological / climatological events such as floods (significant ones in 1997, 2002, 2010, 2013), droughts (2013, 2015), heat waves (2015) and windstorms (2007) during past decades. These events are generally attributed to the ongoing climate change and caused loss of lives and significant material damages (up to several % of GDP in some years), especially in urban areas. To initiate the adaptation process of urban areas, the main objective was to prepare a framework for creating climate change adaptation strategies of individual cities reflecting physical-geographical and socioeconomical conditions of the Czech Republic. Three pilot cities (Hradec Králové, Žďár nad Sázavou, Dobru\\vska) were used to optimize entire procedure. Two sets of participatory seminars were organised in order to involve all key stakeholders (the city council, department of the environment, department of the crisis management, hydrometeorological institute, local experts, ...) into the process of creation of the adaptation strategy from its early stage. Lesson learned for the framework were related especially to its applicability on a local level, which is largely a matter of the understandability of the concept. Finally, this illustrative and widely applicable framework (so called 'road map to adaptation strategy') includes five steps: (i) analysis of existing strategies and plans on national, regional and local levels; (ii) analysing climate-change related hazards and key vulnerabilities; (iii) identification of adaptation needs, evaluation of existing adaptation capacity and formulation of future adaptation priorities; (iv) identification of limits and barriers for the adaptation (economical, environmental, ...); and (v) selection of specific types of adaptation measures reflecting identified adaptation needs and formulated adaptation priorities. Keywords: climate change adaptation (CCA); urban areas; participatory approach

  13. Adaptability of Paulownia tomentosa (thumb. Sieb. et Zucc. on green areas in Belgrade

    Directory of Open Access Journals (Sweden)

    Stojičić Đurđa

    2010-01-01

    Full Text Available The taxa with the improved esthetical characteristics, increased or decreased productivity, higher resistance to diseases, insect attacks, air pollution, as well as with optimal adaptability in urban coenoses are of great importance to land­scape architecture, horticulture and forestry. The criteria for the selection of individual plants out of the number of many individuals depend on their future usage, but also on their esthetical features, morphology and physiology. One of the species that fulfils the above criteria is Paulownia tomentosa (Thumb. Sieb. et Zucc. Different morphophysiological features of royal paulownia cultivated on green areas in Banovo Brdo, Dorćol, Tašmajdan, Novi Beograd and Zemun are analyzed. The study results prove the adaptability of royal paulownia on green areas in Belgrade, but also the need to select the parent trees with the best combining features prior to production, aiming at the improvement and production of planting material for urban coenoses and specific-purpose plantations of this species.

  14. Role of institutional entrepreneurship in building adaptive capacity in community-based healthcare organisations: realist review protocol

    Science.gov (United States)

    Iyengar, Sweatha; Katz, Aaron; Durham, Jo

    2016-01-01

    Introduction Over the past 3 decades, there has been a substantial shift to the marketisation of government-funded health services. For organisations traditionally buffered from the competitive pressures of for-profit enterprises, such as community-based organisations, this means developing the capacity to adapt to competitive tendering processes, shifting client expectations, and increasing demands for greater accountability. Drawing on ideas of institutional entrepreneurship, we believe that attempts to build adaptive capacity require the transformation of existing institutional arrangements. Key in this may be identifying and fostering institutional entrepreneurs—actors who take the lead in being the impetus for, and giving direction to, structural change. This study focuses on the strategies used by institutional entrepreneurs to build adaptive capacity in the community-based healthcare sector. Methods and analysis The research will use an adapted rapid realist review. The review will find underlying theories that explain the circumstances surrounding the implementation of capacity-building strategies that shape organisational response and generate outcomes by activating causal mechanisms. An early scoping of the literature, and consultations with key stakeholders, will be undertaken to identify an initial programme theory. We will search for relevant journal articles and grey literature. Data will be extracted based on contextual factors, mechanisms and outcomes, and their configurations. The analysis will seek patterns and regularities in these configurations and will focus on confirming, refuting or refining our programme theory. Ethics and dissemination The study does not involve primary research and, therefore, does not require formal ethical approval. However, ethical standards of utility, usefulness, feasibility, propriety, accuracy and accountability will be followed. The results will be written up according to the Realist and Meta-Review Evidence

  15. PM10 modeling in the Oviedo urban area (Northern Spain) by using multivariate adaptive regression splines

    Science.gov (United States)

    Nieto, Paulino José García; Antón, Juan Carlos Álvarez; Vilán, José Antonio Vilán; García-Gonzalo, Esperanza

    2014-10-01

    The aim of this research work is to build a regression model of the particulate matter up to 10 micrometers in size (PM10) by using the multivariate adaptive regression splines (MARS) technique in the Oviedo urban area (Northern Spain) at local scale. This research work explores the use of a nonparametric regression algorithm known as multivariate adaptive regression splines (MARS) which has the ability to approximate the relationship between the inputs and outputs, and express the relationship mathematically. In this sense, hazardous air pollutants or toxic air contaminants refer to any substance that may cause or contribute to an increase in mortality or serious illness, or that may pose a present or potential hazard to human health. To accomplish the objective of this study, the experimental dataset of nitrogen oxides (NOx), carbon monoxide (CO), sulfur dioxide (SO2), ozone (O3) and dust (PM10) were collected over 3 years (2006-2008) and they are used to create a highly nonlinear model of the PM10 in the Oviedo urban nucleus (Northern Spain) based on the MARS technique. One main objective of this model is to obtain a preliminary estimate of the dependence between PM10 pollutant in the Oviedo urban area at local scale. A second aim is to determine the factors with the greatest bearing on air quality with a view to proposing health and lifestyle improvements. The United States National Ambient Air Quality Standards (NAAQS) establishes the limit values of the main pollutants in the atmosphere in order to ensure the health of healthy people. Firstly, this MARS regression model captures the main perception of statistical learning theory in order to obtain a good prediction of the dependence among the main pollutants in the Oviedo urban area. Secondly, the main advantages of MARS are its capacity to produce simple, easy-to-interpret models, its ability to estimate the contributions of the input variables, and its computational efficiency. Finally, on the basis of

  16. An integrated method for assessing climate-related risks and adaptation alternatives in urban areas

    Directory of Open Access Journals (Sweden)

    Yvonne Andersson-Sköld

    2015-01-01

    Full Text Available The urban environment is a complex structure with interlinked social, ecological and technical structures. Global warming is expected to have a broad variety of impacts, which will add to the complexity. Climate changes will force adaptation, to reduce climate-related risks. Adaptation measures can address one aspect at the time, or aim for a holistic approach to avoid maladaptation. This paper presents a systematic, integrated approach for assessing alternatives for reducing the risks of heat waves, flooding and air pollution in urban settings, with the aim of reducing the risk of maladaptation. The study includes strategies covering different spatial scales, and both the current climate situation and the climate predicted under climate change scenarios. The adaptation strategies investigated included increasing vegetation; selecting density, height and colour of buildings; and retreat or resist (defend against sea-level rise. Their effectiveness was assessed with regard to not only flooding, heat stress and air quality but also with regard to resource use, emissions to air (incl. GHG, soil and water, and people’s perceptions and vulnerability. The effectiveness of the strategies were ranked on a common scale (from −3 to 3 in an integrated assessment. Integrated assessments are recommended, as they help identify the most sustainable solutions, but to reduce the risk of maladaptation they require experts from a variety of disciplines. The most generally applicable recommendation, derived from the integrated assessment here, taking into account both expertise from different municipal departments, literature surveys, life cycle assessments and publics perceptions, is to increase the urban greenery, as it contributes to several positive aspects such as heat stress mitigation, air quality improvement, effective storm-water and flood-risk management, and it has several positive social impacts. The most favourable alternative was compact, mid

  17. The network structure of adaptive governance - A single case study of a fish management area

    Directory of Open Access Journals (Sweden)

    Annica Charlotte Sandström

    2009-09-01

    Full Text Available The challenge of establishing adaptive management systems is a widely discussed topic in the literature on natural resource management. Adaptive management essentially focuses on achieving a governance process that is both sensitive to and has the capacity to continuously react to changes within the ecosystem being managed. The adoption of a network approach that perceives governance structures as social networks, searching for the kind of network features promoting this important feature, has been requested by researchers in the field. In particular, the possibilities associated with the application of a formal network approach, using the tools and concepts of social network analysis (SNA, have been identified as having significant potential for advancing this branch of research. This paper aims to address the relation between network structure and adaptability using an empirical approach. With the point of departure in a previously generated theoretical framework as well as related hypotheses, this paper presents a case study of a governance process within a fish management area in Sweden. The hypotheses state that, although higher levels of network density and centralisation promote the rule-forming process, the level of network heterogeneity is important for the existence and spread of ecological knowledge among the actors involved. According to the empirical results, restricted by the single-case study design, this assumption is still a well-working hypothesis. However, in order to advance our knowledge concerning these issues and test the validity of the hypotheses, more empirical work using a similar approach in multiple case study designs is needed.

  18. Adaptive Co-management Networks: a Comparative Analysis of Two Fishery Conservation Areas in Sweden

    Directory of Open Access Journals (Sweden)

    Carl Rova

    2010-09-01

    Full Text Available Co-management constitutes a certain type of institutional arrangement that has gained increased attention among both policy makers and researchers involved in the field of natural resource management. Yet the concept of co-management is broad, and our knowledge about how different kinds of management structures affect the ability to deal with challenges pertinent to the commons is limited. One of these challenges is to foster an adaptive management process, i.e., a process in which rules are continuously revised and changed according to what is known about the ecological system. We aim to address the relationship between different kinds of co-management structures and adaptive management. To this end, we conducted a comparative case study of two Fishery Conservation Areas in Sweden. The concept of networks and the formal method of social network analysis are applied as theoretical and methodological devices. Building on previous research, we propose that adaptive management processes occur in co-management networks consisting of a heterogeneous set of actors that are centrally and densely integrated. Networks of this kind are believed to promote a management process in which actors with disparate perspectives and resources formulate a common view regarding the condition of the ecosystem, the basic problem to be solved, and what measures to adopt. The empirical findings support the existence of such a relationship. Nonetheless, the restricted empirical material, an inability to control for hidden variables, and a lack of success in determining causality among variables are all factors that call for more research.

  19. Health heat stress in the Porto Metropolitan Area – a matter of temperature or inadequate adaptation?

    Directory of Open Access Journals (Sweden)

    Monteiro, Ana

    2014-09-01

    Full Text Available The aim of this contribution is to understand the negative outcomes for human health during hot weather in a Mediterranean urban environment. Examining seasonal variations of thermal comfort in Porto, by Physiologically Equivalent Temperature (PET, and comparing expected and observed daily mortality (all causes and morbidity (all causes, respiratory and circulatory diseases, suggests that in southern Europe, people’s adaptation techniques for reducing heat stress and associated health risks need to be developed much further. Research already done in Porto shows that social and economic vulnerability must be included alongside with individual characteristics, like age, gender or genetics, when defining the thresholds above which negative health impacts begin to become severe. Findings from Porto show that a climate risk map is needed for every metropolitan area, with sufficient detail to give locally appropriate temperature thresholds taking into account both the local climate and the socio-economic conditions of every sector of the urban environment.

  20. Protocol between the Nuclear Protection and Safety Bureau of Portugal and the Nuclear Energy Commission of Spain on Technical Information concerning Nuclear Installations in Border Areas

    International Nuclear Information System (INIS)

    This Protocol was concluded under the Agreement of the same date on the safety of nuclear installations in border areas. Its purpose is to prescribe the type of information referred to in the Agreement. It lays down in detail all the documents to be supplied concerning the siting, construction, operation and decommissioning of nuclear installations, including the geological, seismological, meteorological, hydrological and ecological aspects of the sites concerned, for purposes of environmental protection; the characteristics of the projected installations and emergency plans must also be provided. Similarly to the Agreement, this Protocol will remain in force for a period of ten years. (NEA)

  1. Integrating Collaboration, Adaptive Management, and Scenario-Planning: Experiences at Las Cienegas National Conservation Area

    Directory of Open Access Journals (Sweden)

    Jeremy K. Caves

    2013-09-01

    Full Text Available There is growing recognition that public lands cannot be managed as islands; rather, land management must address the ecological, social, and temporal complexity that often spans jurisdictions and traditional planning horizons. Collaborative decision making and adaptive management (CAM have been promoted as methods to reconcile competing societal demands and respond to complex ecosystem dynamics. We detail the experiences of land managers and stakeholders in using CAM at Las Cienegas National Conservation Area (LCNCA, a highly valued site under the jurisdiction of the Bureau of Land Management (BLM. The CAM process at Las Cienegas is marked by strong stakeholder engagement, with four core elements: (1 shared watershed goals with measurable resource objectives; (2 relevant and reliable scientific information; (3 mechanisms to incorporate new information into decision making; and (4 shared learning to improve both the process and management actions. The combination of stakeholder engagement and adaptive management has led to agreement on contentious issues, more innovative solutions, and more effective land management. However, the region is now experiencing rapid changes outside managers' control, including climate change, human population growth, and reduced federal budgets, with large but unpredictable impacts on natural resources. Although the CAM experience provides a strong foundation for making the difficult and contentious management decisions that such changes are likely to require, neither collaboration nor adaptive management provides a sufficient structure for addressing the externalities that drive uncontrollable and unpredictable change. As a result, LCNCA is exploring two specific modifications to CAM that may better address emerging challenges, including: (1 creating nested resource objectives to distinguish between those objectives that may be crucial to maintaining ecological resilience from those that may hinder a flexible

  2. Evaluation of Implant Communication with Polarisation and Unslotted CSMA/CA Protocol in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2010-01-01

    Full Text Available The performance of the implant inside a human body with polarisation, distance, and different power settings at the base-station is presented. In addition, the unslotted CSMA/CA protocol is studied for a heterogeneous WBAN.

  3. Evaluation of a Chest Circumference-Adapted Protocol for Low-Dose 128-Slice Coronary CT Angiography with Prospective Electrocardiogram Triggering

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Chenying; Wang, Zufei; Ji, Jiansong; Wang, Hailin; Hu, Xianghua; Chen, Chunmiao [Department of Radiology, Lishui Central Hospital, The Fifth Affiliated Hospital of Wenzhou Medical College, Lishui, Zhejiang 323000 (China)

    2015-11-01

    To assess the effect of chest circumference-adapted scanning protocol on radiation exposure and image quality in patients undergoing prospective electrocardiogram (ECG)-triggered coronary CT angiography (CCTA). One hundred-eighty-five consecutive patients, who had undergone prospective ECG triggering CCTA with a 128-slice CT, were included in the present study. Nipple-level chest circumference, body weight and height were measured before CT examinations. Patients were divided into four groups based on kV/ref·mAs = 100/200, 100/250, 120/200, and 120/250, when patient's chest circumference was ≤ 85.0 (n = 56), 85.0-90.0 (n = 53), 90.0-95.0 (n = 44), and > 95.0 (n = 32), respectively. Image quality per-segment was independently assessed by two experienced observers. Image noise and attenuation were also measured. Signal-to-noise ratio (SNR) and contrast-to-noise ratio (CNR) were calculated. The effective radiation dose was calculated using CT dose volume index and the dose-length product. A significant correlation was observed between patients' chest circumference and body mass index (r = 0.762, p < 0.001). Chest circumference ranged from 74 to 105 cm, and the mean effective radiation dose was 1.9-3.8 mSv. Diagnostic image quality was obtained in 98.5% (2440/2478) of all evaluated coronary segments without any significant differences among the four groups (p = 0.650). No significant difference in image noise was observed among the four groups (p = 0.439), thus supporting the validity of the chest circumference-adapted scanning protocol. However, vessel attenuation, SNR and CNR were significantly higher in the 100 kV groups than in the 120 kV groups (p < 0.05). A measure of chest circumference can be used to adapt tube voltage and current for individualized radiation dose control, with resultant similar image noise and sustained diagnostic image quality.

  4. Air quality modeling in the Oviedo urban area (NW Spain) by using multivariate adaptive regression splines.

    Science.gov (United States)

    Nieto, P J García; Antón, J C Álvarez; Vilán, J A Vilán; García-Gonzalo, E

    2015-05-01

    The aim of this research work is to build a regression model of air quality by using the multivariate adaptive regression splines (MARS) technique in the Oviedo urban area (northern Spain) at a local scale. To accomplish the objective of this study, the experimental data set made up of nitrogen oxides (NO x ), carbon monoxide (CO), sulfur dioxide (SO2), ozone (O3), and dust (PM10) was collected over 3 years (2006-2008). The US National Ambient Air Quality Standards (NAAQS) establishes the limit values of the main pollutants in the atmosphere in order to ensure the health of healthy people. Firstly, this MARS regression model captures the main perception of statistical learning theory in order to obtain a good prediction of the dependence among the main pollutants in the Oviedo urban area. Secondly, the main advantages of MARS are its capacity to produce simple, easy-to-interpret models, its ability to estimate the contributions of the input variables, and its computational efficiency. Finally, on the basis of these numerical calculations, using the MARS technique, conclusions of this research work are exposed. PMID:25414030

  5. Assessing the effectiveness and cost effectiveness of adaptive e-Learning to improve dietary behaviour: protocol for a systematic review

    OpenAIRE

    Michie Susan; Lock Karen; Landon Jane; Free Caroline; Ferguson Elaine; Harris Jody; Felix Lambert; Edwards Phil; Miners Alec; Murray Elizabeth

    2010-01-01

    Abstract Background The composition of habitual diets is associated with adverse or protective effects on aspects of health. Consequently, UK public health policy strongly advocates dietary change for the improvement of population health and emphasises the importance of individual empowerment to improve health. A new and evolving area in the promotion of dietary behavioural change is e-Learning, the use of interactive electronic media to facilitate teaching and learning on a range of issues, ...

  6. SU-E-J-249: Characterization of Gynecological Tumor Heterogeneity Using Texture Analysis in the Context of An 18F-FDG PET Adaptive Protocol

    International Nuclear Information System (INIS)

    Purpose: We propose a method to examine gynecological tumor heterogeneity using texture analysis in the context of an adaptive PET protocol in order to establish if texture metrics from baseline PET-CT predict tumor response better than SUV metrics alone as well as determine texture features correlating with tumor response during radiation therapy. Methods: This IRB approved protocol included 29 women with node positive gynecological cancers visible on FDG-PET treated with EBRT to the PET positive nodes. A baseline and intra-treatment PET-CT was obtained. Tumor outcome was determined based on RECIST on posttreatment PET-CT. Primary GTVs were segmented using 40% threshold and a semi-automatic gradient-based contouring tool, PET Edge (MIM Software Inc., Cleveland, OH). SUV histogram features, Metabolic Volume (MV), and Total Lesion Glycolysis (TLG) were calculated. Four 3D texture matrices describing local and regional relationships between voxel intensities in the GTV were generated: co-occurrence, run length, size zone, and neighborhood difference. From these, 39 texture features were calculated. Prognostic power of baseline features derived from gradientbased and threshold GTVs were determined using the Wilcoxon rank-sum test. Receiver Operating Characteristics and logistic regression was performed using JMP (SAS Institute Inc., Cary, NC) to find probabilities of predicting response. Changes in features during treatment were determined using the Wilcoxon signed-rank test. Results: Of the 29 patients, there were 16 complete responders, 7 partial responders, and 6 non-responders. Comparing CR/PR vs. NR for gradient-based GTVs, 7 texture values, TLG, and SUV kurtosis had a p < 0.05. Threshold GTVs yielded 4 texture features and TLG with p < 0.05. From baseline to intra-treatment, 14 texture features, SUVmean, SUVmax, MV, and TLG changed with p < 0.05. Conclusion: Texture analysis of PET imaged gynecological tumors is an effective method for early prognosis and should

  7. SU-E-J-249: Characterization of Gynecological Tumor Heterogeneity Using Texture Analysis in the Context of An 18F-FDG PET Adaptive Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Nawrocki, J [Duke University Medical Physics Graduate Program, Durham, NC (United States); Chino, J; Craciunescu, O [Duke University Medical Center Department of Radiation Oncology, Durham, NC (United States); Das, S [University of North Carolina School of Medicine, Chapel Hill, NC (United States)

    2015-06-15

    Purpose: We propose a method to examine gynecological tumor heterogeneity using texture analysis in the context of an adaptive PET protocol in order to establish if texture metrics from baseline PET-CT predict tumor response better than SUV metrics alone as well as determine texture features correlating with tumor response during radiation therapy. Methods: This IRB approved protocol included 29 women with node positive gynecological cancers visible on FDG-PET treated with EBRT to the PET positive nodes. A baseline and intra-treatment PET-CT was obtained. Tumor outcome was determined based on RECIST on posttreatment PET-CT. Primary GTVs were segmented using 40% threshold and a semi-automatic gradient-based contouring tool, PET Edge (MIM Software Inc., Cleveland, OH). SUV histogram features, Metabolic Volume (MV), and Total Lesion Glycolysis (TLG) were calculated. Four 3D texture matrices describing local and regional relationships between voxel intensities in the GTV were generated: co-occurrence, run length, size zone, and neighborhood difference. From these, 39 texture features were calculated. Prognostic power of baseline features derived from gradientbased and threshold GTVs were determined using the Wilcoxon rank-sum test. Receiver Operating Characteristics and logistic regression was performed using JMP (SAS Institute Inc., Cary, NC) to find probabilities of predicting response. Changes in features during treatment were determined using the Wilcoxon signed-rank test. Results: Of the 29 patients, there were 16 complete responders, 7 partial responders, and 6 non-responders. Comparing CR/PR vs. NR for gradient-based GTVs, 7 texture values, TLG, and SUV kurtosis had a p < 0.05. Threshold GTVs yielded 4 texture features and TLG with p < 0.05. From baseline to intra-treatment, 14 texture features, SUVmean, SUVmax, MV, and TLG changed with p < 0.05. Conclusion: Texture analysis of PET imaged gynecological tumors is an effective method for early prognosis and should

  8. Clinical Implementation of an Online Adaptive Plan-of-the-Day Protocol for Nonrigid Motion Management in Locally Advanced Cervical Cancer IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Heijkoop, Sabrina T., E-mail: s.heijkoop@erasmusmc.nl; Langerak, Thomas R.; Quint, Sandra; Bondar, Luiza; Mens, Jan Willem M.; Heijmen, Ben J.M.; Hoogeman, Mischa S.

    2014-11-01

    Purpose: To evaluate the clinical implementation of an online adaptive plan-of-the-day protocol for nonrigid target motion management in locally advanced cervical cancer intensity modulated radiation therapy (IMRT). Methods and Materials: Each of the 64 patients had four markers implanted in the vaginal fornix to verify the position of the cervix during treatment. Full and empty bladder computed tomography (CT) scans were acquired prior to treatment to build a bladder volume-dependent cervix-uterus motion model for establishment of the plan library. In the first phase of clinical implementation, the library consisted of one IMRT plan based on a single model-predicted internal target volume (mpITV), covering the target for the whole pretreatment observed bladder volume range, and a 3D conformal radiation therapy (3DCRT) motion-robust backup plan based on the same mpITV. The planning target volume (PTV) combined the ITV and nodal clinical target volume (CTV), expanded with a 1-cm margin. In the second phase, for patients showing >2.5-cm bladder-induced cervix-uterus motion during planning, two IMRT plans were constructed, based on mpITVs for empty-to-half-full and half-full-to-full bladder. In both phases, a daily cone beam CT (CBCT) scan was acquired to first position the patient based on bony anatomy and nodal targets and then select the appropriate plan. Daily post-treatment CBCT was used to verify plan selection. Results: Twenty-four and 40 patients were included in the first and second phase, respectively. In the second phase, 11 patients had two IMRT plans. Overall, an IMRT plan was used in 82.4% of fractions. The main reasons for selecting the motion-robust backup plan were uterus outside the PTV (27.5%) and markers outside their margin (21.3%). In patients with two IMRT plans, the half-full-to-full bladder plan was selected on average in 45% of the first 12 fractions, which was reduced to 35% in the last treatment fractions. Conclusions: The implemented

  9. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  10. Erosion and Land Degradation in Mediterranean areas as a adaptive response to Mediterranean agriiculture

    Science.gov (United States)

    Imeson, Anton

    2014-05-01

    The motivation for this session is the statement or claim that Mediterranean areas are sensitive to erosion and desertification. One result of the LEDDRA Approach, which is applying the Complex Adaptive (CAS)paradigm at study sites in Mediterranean Spain, Greece and Italy is that there is just a single socio-environmental system in which land degradation is being caused by the actions of people and the Mediterranean soils have co-eveolved with people under the influence of fire and grazing. They are therefore resilient, and this was demonstrated by Naveh and Thornes. Also the Medalus field sites showed very low rates of erosion. With examples from different Mediterranean landscapes, it is considered that Mediterranean landscapes went through an initial phase of being sensitive to erosion which ended up with the original soils before ploughing or deforestation, being eroded from most of the areas, In some places these are found. LEDDRA The Leddra approach is to consider different states which are separated by transitions. The first state is that of the deforestaion and destruction of the forest that took place 6000 10000 years ago, in the Eastern and Northern Mediterranean, and 2000 to 4,000 years ago in large areas of the Western Mediterranean, and 100 to 400 years ago in California. Australia, New Zealand and Chile. The second state involves appropriating and settling the land from indigenous people and introducing cattle and sheep and Mediterranean crops. The current state of desertification is one in which erosion occurs because of the use of specific cultivation methods and subsidies for irrigating and producing crops outside of their range. In the Mediterranean landscape State, such as found near Santiago in Chile and in Crete, society gains many cultural benefits from grazing. However, the consequences of this are that the whole ecosystem is maintained in an arid state, so that areas in Crete receiving 800-1100 mm rainfall have a semi arid vegetation, instead

  11. Energy harvesting aware hybrid MAC protocol for WBANs

    OpenAIRE

    Ibarra, Ernesto; Antonopoulos, Angelos; KARTSAKLI, Elli; Verikoukis, Christos

    2013-01-01

    In this paper, we propose a hybrid polling Medium Access Control (MAC) protocol with Human Energy Harvesting capabilities, called HEH-BMAC, designed for Wireless Body Area Networks (WBANs). The proposed protocol uses a dynamic schedule algorithm to combine User Identification polling (ID) and Probabilistic Contention (PC) random access, adapting the network operation to the random, time-varying nature of the human energy harvesting sources. HEH-BMAC offers different levels of node priorities ...

  12. Coupled modeling approach to assess climate change impacts on groundwater recharge and adaptation in arid areas

    Science.gov (United States)

    Hashemi, H.; Uvo, C. B.; Berndtsson, R.

    2015-10-01

    The effect of future climate scenarios on surface and groundwater resources was simulated using a modeling approach for an artificial recharge area in arid southern Iran. Future climate data for the periods of 2010-2030 and 2030-2050 were acquired from the Canadian Global Coupled Model (CGCM 3.1) for scenarios A1B, A2, and B1. These scenarios were adapted to the studied region using the delta-change method. A conceptual rainfall-runoff model (Qbox) was used to simulate runoff in a flash flood prone catchment. The model was calibrated and validated for the period 2002-2011 using daily discharge data. The projected climate variables were used to simulate future runoff. The rainfall-runoff model was then coupled to a calibrated groundwater flow and recharge model (MODFLOW) to simulate future recharge and groundwater hydraulic heads. As a result of the rainfall-runoff modeling, under the B1 scenario the number of floods is projected to slightly increase in the area. This in turn calls for proper management, as this is the only source of fresh water supply in the studied region. The results of the groundwater recharge modeling showed no significant difference between present and future recharge for all scenarios. Owing to that, four abstraction and recharge scenarios were assumed to simulate the groundwater level and recharge amount in the studied aquifer. The results showed that the abstraction scenarios have the most substantial effect on the groundwater level and the continuation of current pumping rate would lead to a groundwater decline by 18 m up to 2050.

  13. Adaptation to speed in macaque middle temporal and medial superior temporal areas.

    Science.gov (United States)

    Price, Nicholas S C; Born, Richard T

    2013-03-01

    The response of a sensory neuron to an unchanging stimulus typically adapts, showing decreases in response gain that are accompanied by changes in the shape of tuning curves. It remains unclear whether these changes arise purely due to spike rate adaptation within single neurons or whether they are dependent on network interactions between neurons. Further, it is unclear how the timescales of neural and perceptual adaptation are related. To examine this issue, we compared speed tuning of middle temporal (MT) and medial superior temporal neurons in macaque visual cortex after adaptation to two different reference speeds. For 75% of speed-tuned units, adaptation caused significant changes in tuning that could be explained equally well as lateral shifts, vertical gain changes, or both. These tuning changes occurred rapidly, as both neuronal firing rate and Fano factor showed no evidence of changing beyond the first 500 ms after motion onset, and the magnitude of tuning curve changes showed no difference between trials with adaptation durations shorter or longer than 1 s. Importantly, the magnitude of tuning shifts was correlated with the transient-sustained index, which measures a well characterized form of rapid response adaptation in MT, and is likely associated with changes at the level of neuronal networks. Tuning curves changed in a manner that increased neuronal sensitivity around the adapting speed, consistent with improvements in human and macaque psychophysical performance that we observed over the first several hundred ms of adaptation. PMID:23467352

  14. Research on performance analysis for MAC protocol in wireless local area network%WLAN中MAC协议性能分析研究

    Institute of Scientific and Technical Information of China (English)

    金莹; 吴其林; 张以文

    2012-01-01

    对媒体接入控制(Media Access Control,MAC)协议进行性能分析,可以深入理解MAC协议的操作特点,发现吞吐量、数据包时延与丢失等性能遭受影响的本质原因.对当前马尔可夫链性能分析法加以详细地分析与总结,分别阐述了无线局域网络中分布式协调功能和增强的分布式信道接入两种MAC协议的性能分析研究工作.对进一步的研究工作进行了分析与展望.%Through performance analysis for MAC (Media Access Control) protocol in Wireless Local Area Network (WLAN), it can understand in depth the operational characteristic of MAC protocol and find out the essential reason of affecting the performance of MAC protocol, such as throughput, packet delay and packet loss. It elaborates detailedly the related work using the Markov chain analysis and gives a survey of the related work of performance analysis for the distributed coordination function and enhanced distributed channel access MAC protocol in WLAN. It gives analyses and outlooks for the further research.

  15. Prevention of: self harm in British South Asian women: study protocol of an exploratory RCT of culturally adapted manual assisted Problem Solving Training (C- MAP

    Directory of Open Access Journals (Sweden)

    Nagaraj Diwaker

    2011-06-01

    Full Text Available Abstract Background Suicide is a major public health problem worldwide. In the UK suicide is the second most common cause of death in people aged 15-24 years. Self harm is one of the commonest reasons for medical admission in the UK. In the year following a suicide attempt the risk of a repeat attempt or death by suicide may be up to 100 times greater than in people who have never attempted suicide. Research evidence shows increased risk of suicide and attempted suicide among British South Asian women. There are concerns about the current service provision and its appropriateness for this community due to the low numbers that get involved with the services. Both problem solving and interpersonal forms of psychotherapy are beneficial in the treatment of patients who self harm and could potentially be helpful in this ethnic group. The paper describes the trial protocol of adapting and evaluating a culturally appropriate psychological treatment for the adult British South Asian women who self harm. Methods We plan to test a culturally adapted Problem Solving Therapy (C- MAP in British South Asian women who self harm. Eight sessions of problem solving each lasting approximately 50 minutes will be delivered over 3 months. The intervention will be assessed using a prospective rater blind randomized controlled design comparing with treatment as usual (TAU. Outcome assessments will be carried out at 3 and 6 months. A sub group of the participants will be invited for qualitative interviews. Discussion This study will test the feasibility and acceptability of the C- MAP in British South Asian women. We will be informed on whether a culturally adapted brief psychological intervention compared with treatment as usual for self-harm results in decreased hopelessness and suicidal ideation. This will also enable us to collect necessary information on recruitment, effect size, the optimal delivery method and acceptability of the intervention in preparation for a

  16. Systematic testing of flood adaptation options in urban areas through simulations

    Science.gov (United States)

    Löwe, Roland; Urich, Christian; Sto. Domingo, Nina; Mark, Ole; Deletic, Ana; Arnbjerg-Nielsen, Karsten

    2016-04-01

    While models can quantify flood risk in great detail, the results are subject to a number of deep uncertainties. Climate dependent drivers such as sea level and rainfall intensities, population growth and economic development all have a strong influence on future flood risk, but future developments can only be estimated coarsely. In such a situation, robust decision making frameworks call for the systematic evaluation of mitigation measures against ensembles of potential futures. We have coupled the urban development software DAnCE4Water and the 1D-2D hydraulic simulation package MIKE FLOOD to create a framework that allows for such systematic evaluations, considering mitigation measures under a variety of climate futures and urban development scenarios. A wide spectrum of mitigation measures can be considered in this setup, ranging from structural measures such as modifications of the sewer network over local retention of rainwater and the modification of surface flow paths to policy measures such as restrictions on urban development in flood prone areas or master plans that encourage compact development. The setup was tested in a 300 ha residential catchment in Melbourne, Australia. The results clearly demonstrate the importance of considering a range of potential futures in the planning process. For example, local rainwater retention measures strongly reduce flood risk a scenario with moderate increase of rain intensities and moderate urban growth, but their performance strongly varies, yielding very little improvement in situations with pronounced climate change. The systematic testing of adaptation measures further allows for the identification of so-called adaptation tipping points, i.e. levels for the drivers of flood risk where the desired level of flood risk is exceeded despite the implementation of (a combination of) mitigation measures. Assuming a range of development rates for the drivers of flood risk, such tipping points can be translated into

  17. Adaptation to climate change in urban areas: climate-greening London, Rotterdam, and Toronto

    NARCIS (Netherlands)

    Mees, H.L.P.; Driessen, P.P.J.

    2011-01-01

    This article aims to gain insight into the governance capacity of cities to adapt to climate change through urban green planning, which we will refer to as climate-greening. The use of green space is considered a no-regrets adaptation strategy, since it not only absorbs rainfall and moderates temper

  18. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  19. Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applications

    Directory of Open Access Journals (Sweden)

    Dipti Durgesh Patil

    2012-08-01

    Full Text Available Since the population is growing, the need for high quality and efficient healthcare, both at home and in hospital, is becoming more important. This paper presents the innovative wireless sensor network basedMobile Real-time Health care Monitoring (WMRHM framework which has the capacity of giving health predictions online based on continuously monitored real time vital body signals. Developments in sensors, miniaturization of low-power microelectronics, and wireless networks are becoming a significant opportunity for improving the quality of health care services. Physiological signals like ECG, EEG, SpO2, BP etc. can be monitor through wireless sensor networks and analyzed with the help of data mining techniques. These real-time signals are continuous in nature and abruptly changing hence there is a need to apply an efficient and concept adapting real-time data stream mining techniques for taking intelligent health care decisions online. Because of the high speed and huge volume data set in data streams, the traditional classification technologies are no longer applicable. The most important criteria are to solve the real-time data streams mining problem with ‘concept drift’ efficiently. This paper presents the state-of-the art in this field with growing vitality and introduces the methods for detecting concept drift in data stream, then gives a significant summary of existing approaches to the problem of concept drift. The work is focused on applying these real time stream mining algorithms on vital signals of human body in Wireless Body Area Network( WBAN based health care environment.

  20. Socio-economic factors influencing climate change adaptation among crop farmers in Umuahia South Area of Abia State, Nigeria

    Directory of Open Access Journals (Sweden)

    N. O. Anyoha

    2013-04-01

    Full Text Available The aim of the study was to determine the socioeconomic factors influencing climate change adaptation among crop farmers in Umuahia South Area of Abia State, Nigeria. The specific objectives of the study were to determine socioeconomic characteristics of crop farmers in the area, determine farmers level of awareness of climate change in the area, ascertain effects of climate change in crop production, identify adaptation strategies adopted by the farmers in the area and determine socioeconomic factors influencing adaptation to climate change. Data were collected through a questionnaire distributed to 120 farmers. Data were analyzed using descriptive statistical tools such as tables, likert type scale and multiple regression analysis. Results of data collected shows that the strategies adopted to combat the effects of climate change by farmers in the area include tree planting, cultivation of early maturing crops, mixed farming, use of improved crop varieties, increased use of family labour, engagement in complementary/diverse livelihoods, cover cropping, changes in planting and harvesting dates, irrigation practices, crop rotation, riverside/bank cultivation, increased frequency of weeding etc, Results reveal that farm size, farming experience, household size, and social organization (MEM COP were significant at 5%, sex was significant at 1% . Extension educational campaign should be intensified to increase the knowledge about climate change. Government should collaborate with meteorologists in forecasting about climate change and also in bringing about measures to control the adverse effect of climate change especially in agriculture.

  1. Systems to establish bioclimatic analogies to predict the area of adaptability of plant species to new environments: The case of Moringa oleifera Lam. in Chile

    Directory of Open Access Journals (Sweden)

    Fernando Santibañez

    2015-12-01

    Full Text Available Adaptability of a species to new territories is generally assessed by costly trial and error in situ experiments distributed throughout different agroclimatic environments. Nowadays climatic data are available to allow the construction of climatic maps based on data provided through world or local networks of climatic weather stations. The objective of this work was to establish a bioclimatic protocol, based on current and available sources of climate information, to make rapid surveys of suitability for plant species in a given environment. Moringa oleifera Lam. species, native from India, was chosen considering its rusticity and the increasing interest on this species due to its multiple uses, nutritional value, and medicinal properties. The first phase of this work was a compilation of data from climatic downscaling (WorldClim, University of East Anglia database (CRU, FAO database, and an historic datasets from Chilean meteorological stations. This information was used to test two different models to compare bioclimatic profiles, considering relevant climatic variables for plant adaptation: maximum and minimum temperatures, accumulated degree days, frost regime, and air humidity. The first approach, based on climatic analogy, was to compare each of these variables between Chilean and foreign localities, and the second, based on bioclimatic suitability, focus on the degree of meeting the minimum bioclimatic requirements by the species in each locality. This paper provides some tools to make this kind of comparisons. Both approaches were tested using M. oleifera as target. Both approaches were complementary and prove to be useful for identifying potential areas where the species could be cultivated. The use of these approaches suggested the existence of some bioclimatic suitability for this species in the coastal areas with mild winters and frosts, from 27° to 37° S lat.

  2. An integrated method for assessing climate-related risks and adaptation alternatives in urban areas

    OpenAIRE

    Yvonne Andersson-Sköld; Sofia Thorsson; David Rayner; Fredrik Lindberg; Sara Janhäll; Anna Jonsson; Ulf Moback; Ramona Bergman; Mikael Granberg

    2015-01-01

    The urban environment is a complex structure with interlinked social, ecological and technical structures. Global warming is expected to have a broad variety of impacts, which will add to the complexity. Climate changes will force adaptation, to reduce climate-related risks. Adaptation measures can address one aspect at the time, or aim for a holistic approach to avoid maladaptation. This paper presents a systematic, integrated approach for assessing alternatives for reducing the risks of hea...

  3. Economic analysis of climate change adaptation strategies in selected coastal areas in Indonesia, Philippines and Vietnam

    OpenAIRE

    Perez, M.L.; Sajise, A.J.U.; Ramirez, P.J.B.; Arias, J.K.B.; A. H. Purnomo; Dipasupil, S.R.; Regoniel, P.A.; Nguyen, K.A.T.; Zamora, G.J.

    2013-01-01

    Climate change with its attendant geophysical hazards is well studied. A great deal of attention has gone into analyzing climate change impacts as well as searching out possible mitigating adaptive strategies. These matters are very real concerns, especially for coastal communities. Such communities are often the most vulnerable to climate change, since their citizens frequently live in abject poverty and have limited capacity to adapt to geophysical hazards. Their situation is further compli...

  4. A real-time regional adaptive exposure method for saving dose-area product in x-ray fluoroscopy

    International Nuclear Information System (INIS)

    Purpose: Reduction of radiation dose in x-ray imaging has been recognized as a high priority in the medical community. Here the authors show that a regional adaptive exposure method can reduce dose-area product (DAP) in x-ray fluoroscopy. The authors' method is particularly geared toward providing dose savings for the pediatric population. Methods: The scanning beam digital x-ray system uses a large-area x-ray source with 8000 focal spots in combination with a small photon-counting detector. An imaging frame is obtained by acquiring and reconstructing up to 8000 detector images, each viewing only a small portion of the patient. Regional adaptive exposure was implemented by varying the exposure of the detector images depending on the local opacity of the object. A family of phantoms ranging in size from infant to obese adult was imaged in anteroposterior view with and without adaptive exposure. The DAP delivered to each phantom was measured in each case, and noise performance was compared by generating noise arrays to represent regional noise in the images. These noise arrays were generated by dividing the image into regions of about 6 mm2, calculating the relative noise in each region, and placing the relative noise value of each region in a one-dimensional array (noise array) sorted from highest to lowest. Dose-area product savings were calculated as the difference between the ratio of DAP with adaptive exposure to DAP without adaptive exposure. The authors modified this value by a correction factor that matches the noise arrays where relative noise is the highest to report a final dose-area product savings. Results: The average dose-area product saving across the phantom family was (42 ± 8)% with the highest dose-area product saving in the child-sized phantom (50%) and the lowest in the phantom mimicking an obese adult (23%). Conclusions: Phantom measurements indicate that a regional adaptive exposure method can produce large DAP savings without compromising the

  5. A real-time regional adaptive exposure method for saving dose-area product in x-ray fluoroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Burion, Steve; Funk, Tobias [Triple Ring Technologies, Inc., 39655 Eureka Drive, Newark, California 94560 (United States); Speidel, Michael A. [Department of Medical Physics, University of Wisconsin-Madison, Madison, Wisconsin 53705 (United States)

    2013-05-15

    Purpose: Reduction of radiation dose in x-ray imaging has been recognized as a high priority in the medical community. Here the authors show that a regional adaptive exposure method can reduce dose-area product (DAP) in x-ray fluoroscopy. The authors' method is particularly geared toward providing dose savings for the pediatric population. Methods: The scanning beam digital x-ray system uses a large-area x-ray source with 8000 focal spots in combination with a small photon-counting detector. An imaging frame is obtained by acquiring and reconstructing up to 8000 detector images, each viewing only a small portion of the patient. Regional adaptive exposure was implemented by varying the exposure of the detector images depending on the local opacity of the object. A family of phantoms ranging in size from infant to obese adult was imaged in anteroposterior view with and without adaptive exposure. The DAP delivered to each phantom was measured in each case, and noise performance was compared by generating noise arrays to represent regional noise in the images. These noise arrays were generated by dividing the image into regions of about 6 mm{sup 2}, calculating the relative noise in each region, and placing the relative noise value of each region in a one-dimensional array (noise array) sorted from highest to lowest. Dose-area product savings were calculated as the difference between the ratio of DAP with adaptive exposure to DAP without adaptive exposure. The authors modified this value by a correction factor that matches the noise arrays where relative noise is the highest to report a final dose-area product savings. Results: The average dose-area product saving across the phantom family was (42 {+-} 8)% with the highest dose-area product saving in the child-sized phantom (50%) and the lowest in the phantom mimicking an obese adult (23%). Conclusions: Phantom measurements indicate that a regional adaptive exposure method can produce large DAP savings without

  6. Development Of Protocols For Simultaneous Measurements Of Rn, Tn Using Nuclear Track Detectors And Trial Application In Mining Areas Of Vietnam

    International Nuclear Information System (INIS)

    Radioactive gases Radon (Rn) and Thoron (Tn) contribute of more than 50% of natural radiation dose. However, separate measurements of Rn and Tn have not been paid enough attention. An Intergovernmental Cooperation Project was conducted at the Institute for Nuclear Science and Technology with the help from Hungarian experts. The main tasks of the project were to finalize 02 protocols for simultaneous measurements of Rn and Tn using nuclear track detectors and to test these protocols in investigating the concentrations of Rn and Tn, calculating the natural dose due to Rn and Tn, and evaluating the increased radiation dose and radiation safety due to mining activities. Main results of the project include 02 protocols for simultaneous measurements of Rn and Tn and the test results in the mining areas. Rn and Tn concentrations inside the coal mining tunnels are in the average level of Vietnam and the world. Tn concentration inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant was found to be very high, up to 2931 Bq/m3. Based on annual effective dose calculation, workers inside the factory for separating Zircon at the Ha Tinh Zircon Processing Plant could receive an annual effective dose due to Rn and Tn of 4.890 mSv/year, and the increasing dose of 4.710 mSv/year is for higher than 1 mSv/year recommended by the IAEA. (author)

  7. Adapting to the European Higher Education Area a questionnaire on student opinion about the teaching of lecturers.

    OpenAIRE

    Lukas, José Francisco; Santiago, Karlos; Etxeberria, Juan; Lizasoain, Luis

    2014-01-01

    The aim of this work is to present the adaptation to the European Higher Education Area of a questionnaire on the opinions of University of the Basque Country students about their lecturers teaching process. This process undertaken at the University used a mixed methodology approach. After reviewing questionnaires from other universities, taking into account the theoretical framework of the new questionnaire, the transversal skills adopted by the University and the three dimensions set out by...

  8. Sustainable Energy and Environmental Management in a Solar Powered Adaptive Fuzzy Control Model for Ground Water Conservation in Suburban Areas

    OpenAIRE

    S. N. Singh,; Monika,; K. Pallavi Jha,; Madhu Bala

    2011-01-01

    In the present paper, a novel scheme of water level management of a storage tank, adaptive to varying water consumption by an end user, has been designed. This system proposes the control of water supply from a solar powered pump for the optimal use of ground water in suburban areas. It has been simulated and validated, for its satisfactory performance, by fuzzy control logic. The proposed system optimizes water consumption, leading to improvement in the ground-water life cycle and increasing...

  9. Project ADAPT: A Program to Assess Depression and Provide Proactive Treatment in Rural Areas

    Science.gov (United States)

    Luptak, Marilyn; Kaas, Merrie J.; Artz, Margaret; McCarthy, Teresa

    2008-01-01

    Purpose: We describe and evaluate a project designed to pilot test an evidence-based clinical intervention for assessing and treating depression in older adults in rural primary care clinics. Project ADAPT--Assuring Depression Assessment and Proactive Treatment--utilized existing primary care resources to overcome barriers to sustainability…

  10. FLOOD RISK FACTORS IN SUBURBAN AREA IN THE CONTEXT OF CLIMATE CHANGE ADAPTATION POLICIES – CASE STUDY OF WROCLAW, POLAND

    Directory of Open Access Journals (Sweden)

    Szymon Szewrański

    2015-02-01

    Full Text Available The uncontrolled sprawl of urban development exerts environmental impact in rural areas. The aim of this study is to identify areas vulnerable to climate change in the context of implementation of policies adapting to climate change at the local level. Such areas can be defined as those where the negative implication of flesh flood overlapping with soil sealing is observed. The study areas composed of municipalities which are influenced by the urban sprawl process of the city of Wroclaw, Poland. The analyses were performed using publicly available spatial data from aerial orthophotomaps from 2004–2012, the satellite images; archival and current land use maps. The database CORINE 1990, 2000, 2006; Urban Atlas and geodatabase of the European Environment Agency were also of an important usage for this study.

  11. A Review of Assessment and Adaptation Strategy to Climate Change Impacts on the Coastal Areas in South China

    Institute of Scientific and Technical Information of China (English)

    DU Yao-Dong; CHENG Xu-Hua; WANG Xian-Wei; AI Hui; DUAN Hai-Lai; HE Jian; WU Xiao-Xuan

    2013-01-01

    This paper reviews assessment of climate change impacts on economy, society and ecological environment in the coastal areas of South China based on published literatures;it also proposes suitable adaptation strategies and counter-measures. Review shows that climate change has resulted in sea level rise in the coastal areas of South China, increasing the occurrence and intensity of storm surges, aggravating the influence of saltwater intrusion, coastal erosion, urban drainage and flood control, threatening the coastal facility and infrastructures, inundating lowland areas, offsetting mudflat silting, and degrading mangroves and coral reef ecosystem. Therefore, in order to reduce the adverse effects of climate change and to support the sustainable development in the coastal areas of South China, it is critical to improve the monitoring and early warning system, enhance prevention criteria, fortify coastal protection engineering, strengthen salt tide prevention, and reinforce the ecological restoration and protection.

  12. SU-E-J-262: Variability in Texture Analysis of Gynecological Tumors in the Context of An 18F-FDG PET Adaptive Protocol

    International Nuclear Information System (INIS)

    Purpose: This study examines the effect on texture analysis due to variable reconstruction of PET images in the context of an adaptive FDG PET protocol for node positive gynecologic cancer patients. By measuring variability in texture features from baseline and intra-treatment PET-CT, we can isolate unreliable texture features due to large variation. Methods: A subset of seven patients with node positive gynecological cancers visible on PET was selected for this study. Prescribed dose varied between 45–50.4Gy, with a 55–70Gy boost to the PET positive nodes. A baseline and intratreatment (between 30–36Gy) PET-CT were obtained on a Siemens Biograph mCT. Each clinical PET image set was reconstructed 6 times using a TrueX+TOF algorithm with varying iterations and Gaussian filter. Baseline and intra-treatment primary GTVs were segmented using PET Edge (MIM Software Inc., Cleveland, OH), a semi-automatic gradient-based algorithm, on the clinical PET and transferred to the other reconstructed sets. Using an in-house MATLAB program, four 3D texture matrices describing relationships between voxel intensities in the GTV were generated: co-occurrence, run length, size zone, and neighborhood difference. From these, 39 textural features characterizing texture were calculated in addition to SUV histogram features. The percent variability among parameters was first calculated. Each reconstructed texture feature from baseline and intra-treatment per patient was normalized to the clinical baseline scan and compared using the Wilcoxon signed-rank test in order to isolate variations due to reconstruction parameters. Results: For the baseline scans, 13 texture features showed a mean range greater than 10%. For the intra scans, 28 texture features showed a mean range greater than 10%. Comparing baseline to intra scans, 25 texture features showed p <0.05. Conclusion: Variability due to different reconstruction parameters increased with treatment, however, the majority of texture

  13. Eco Bio Cultural Protocols for Preservation of Endangered Agrobiodiversity Areas from the Adjacent Regions of Danube and Danube Delta

    Directory of Open Access Journals (Sweden)

    Iudith Ipate

    2014-08-01

    Full Text Available Danube Strategy involves creating synergies between different sectors (tourism, environmental protection, agriculture and forestry, promoting solutions and contributing to the prosperity of social, economic and cultural sustainable development. It requires multiinterdisciplinary problem solving biodiversity conservation and environmental protection. Agrobiodiversity conservation and means must be assessed according to international risk categories, taking into account the culture, traditions and local lifestyle. Fundamental aspects of the protocols will be to assess species and breeds endangered and their influence on specific ecosystems of the Danube and Danube Delta to promote local tradition and cultural heritage. Our studies will have to reveal new interdependencies between socio- economic phenomena that occur in the context of regional sustainable development and identify viable solutions to ensure the conservation of agrobiodiversity as part of the natural and cultural heritage of the Danube Delta . Need of cooperation between Danube countries and between local authorities and research entities to conserve natural and cultural heritage that can be achieved based on eco-bio-diplomacy. Need of cooperation between Danube countries and between local authorities and research entities to conserve natural and cultural heritage that can be achieved based on eco-bio-diplomacy.

  14. Integrating Collaboration, Adaptive Management, and Scenario-Planning: Experiences at Las Cienegas National Conservation Area

    OpenAIRE

    Jeremy K. Caves; Gitanjali S. Bodner; Karen Simms; Larry A. Fisher; Tahnee Robertson

    2013-01-01

    There is growing recognition that public lands cannot be managed as islands; rather, land management must address the ecological, social, and temporal complexity that often spans jurisdictions and traditional planning horizons. Collaborative decision making and adaptive management (CAM) have been promoted as methods to reconcile competing societal demands and respond to complex ecosystem dynamics. We detail the experiences of land managers and stakeholders in using CAM at Las Cienegas Nationa...

  15. Adaptability of Paulownia tomentosa (thumb.) Sieb. et Zucc. on green areas in Belgrade

    OpenAIRE

    Stojičić Đurđa; Ocokoljić Mirjana; Obratov-Petković Dragica

    2010-01-01

    The taxa with the improved esthetical characteristics, increased or decreased productivity, higher resistance to diseases, insect attacks, air pollution, as well as with optimal adaptability in urban coenoses are of great importance to land­scape architecture, horticulture and forestry. The criteria for the selection of individual plants out of the number of many individuals depend on their future usage, but also on their esthetical features, morphology and physiology. One of the species that...

  16. Building adaptive capacity for flood proofing in urban areas through synergistic interventions

    NARCIS (Netherlands)

    Veerbeek, W.; Ashley, R.M.; Zevenbergen, C.; Rijke, J.S.; Gersonius, B.

    2010-01-01

    Few, if any urban areas are nowadays built in isolation from existing developments. Therefore, urban expansion and making existing urban areas more sustainable is a contemporary goal. There are major opportunities to do this through the ‘normal’ renewal of urban infrastructure and building stocks bo

  17. Systems to establish bioclimatic analogies to predict the area of adaptability of plant species to new environments: The case of Moringa oleifera Lam. in Chile

    OpenAIRE

    Fernando Santibañez; Javier Mendoza; Carlos Muñoz; Carolina Caroca; Paula Santibañez; Loreto Prat

    2015-01-01

    Adaptability of a species to new territories is generally assessed by costly trial and error in situ experiments distributed throughout different agroclimatic environments. Nowadays climatic data are available to allow the construction of climatic maps based on data provided through world or local networks of climatic weather stations. The objective of this work was to establish a bioclimatic protocol, based on current and available sources of climate information, to make rapid surveys of sui...

  18. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    OpenAIRE

    Tao Chen; Xinheng Wang; Laurie Hughes

    2012-01-01

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote managem...

  19. A study on immigration from rural to urban areas and the adaptation process of immigrants: Van example

    Directory of Open Access Journals (Sweden)

    Erol Etlan

    2009-10-01

    Full Text Available In this study, events terror which occurred in the region after 1980 and the migrations due to the effects of these events the socio-cultural and economic conditions of immigrants their adaptation to the city other problems was analyzed. Acceleration in the migrations from rural to urban areas in Van coincides with the years after 1980. The insecure environment and the broken economic balance has made rural are completely unpopular and repulsive. In this process, one of the cities which people leaving from rural areas chose to live first was Van.Screening method was used in the study. For this purpose a poll of 50 questions was prepared. The poll constituted with 4 parts for measuring the immigrants demographic, social-cultural and economic aspects and their adaptation process. The poll was applied to 290 subjects from 7 quarters where immigrants live intensely, and SPSS program was used in their evaluation.Immigrants usually come from the rural areas of Hakkari, Siirt, Bitlis and Van and are settled in sub-urban neighborhoods. The urban infrastructure problems which had already existed previously became much more complicated in the city with migrations. In addition, migrations caused many social-cultural an economic problem in the city. The immigrants who brought with themselves their own culture and lifestyles transformed the city into a village with the slums they constructed. Though they got rid of their rural habits, they still could not become accustomed to the civic environment.

  20. Building adaptive capacity for flood proofing in urban areas through synergistic interventions

    OpenAIRE

    Veerbeek, W.; Ashley, R.M.; Zevenbergen, C.; Rijke, J.S.; B. Gersonius

    2010-01-01

    Few, if any urban areas are nowadays built in isolation from existing developments. Therefore, urban expansion and making existing urban areas more sustainable is a contemporary goal. There are major opportunities to do this through the ‘normal’ renewal of urban infrastructure and building stocks both now and in the future. However, significant building renewal cycles occur every 30-50 years and major infrastructure renewal cycles at even longer timescales of more than 100 years. Despite this...

  1. eHealth Use Among First-Generation Immigrants From Pakistan in the Oslo Area, Norway, With Focus on Diabetes: Survey Protocol

    OpenAIRE

    Tatara, Naoe; Kjøllesdal, Marte Karoline Råberg; Mirkovic, Jelena; Andreassen, Hege Kristin

    2016-01-01

    Background A variety of eHealth services are available and commonly used by the general public. eHealth has the potential to engage and empower people with managing their health. The prerequisite is, however, that eHealth services are adapted to the sociocultural heterogeneity of the user base and are available in a language and with contents that fit the users’ preference, skills, and abilities. Pakistani immigrants in the Oslo area, Norway, have a much higher risk of Type-2 diabetes (T2D) t...

  2. Bromo volcano area as human-environment system: interaction of volcanic eruption, local knowledge, risk perception and adaptation strategy

    Science.gov (United States)

    Bachri, Syamsul; Stötter, Johann; Sartohadi, Junun

    2013-04-01

    People in the Bromo area (located within Tengger Caldera) have learn to live with the threat of volcanic hazard since this volcano is categorized as an active volcano in Indonesia. During 2010, the eruption intensity increased yielding heavy ash fall and glowing rock fragments. A significant risk is also presented by mass movement which reaches areas up to 25 km from the crater. As a result of the 2010 eruption, 12 houses were destroyed, 25 houses collapsed and there were severe also effects on agriculture and the livestock sector. This paper focuses on understanding the interaction of Bromo volcanic eruption processes and their social responses. The specific aims are to 1) identify the 2010 eruption of Bromo 2) examine the human-volcano relationship within Bromo area in general, and 3) investigate the local knowledge related to hazard, risk perception and their adaptation strategies in specific. In-depth interviews with 33 informants from four districts nearest to the crater included local people and authorities were carried out. The survey focused on farmers, key persons (dukun), students and teachers in order to understand how people respond to Bromo eruption. The results show that the eruption in 2010 was unusual as it took continued for nine months, the longest period in Bromo history. The type of eruption was phreatomagmatic producing material dominated by ash to fine sand. This kind of sediment typically belongs to Tengger mountain eruptions which had produced vast explosions in the past. Furthermore, two years after the eruption, the interviewed people explained that local knowledge and their experiences with volcanic activity do not influence their risk perception. Dealing with this eruption, people in the Bromo area applied 'lumbung desa' (traditional saving systems) and mutual aid activity for surviving the volcanic eruption. Keywords: Human-environment system, local knowledge, risk perception, adaptation strategies, Bromo Volcano Indonesia

  3. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  4. Application of Advanced Wide Area Early Warning Systems with Adaptive Protection

    Energy Technology Data Exchange (ETDEWEB)

    Blumstein, Carl [Univ. of California, Berkeley, CA (United States); Cibulka, Lloyd [Univ. of California, Berkeley, CA (United States); Thorp, James [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); Centeno, Virgilio [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States); King, Roger [Mississippi State Univ., Mississippi State, MS (United States); Reeves, Kari [Mississippi State Univ., Mississippi State, MS (United States); Ashrafi, Frank [Southern California Edison Co., Rosemead, CA (United States); Madani, Vahid [Pacific Gas & Electric Co., San Francisco, CA (United States)

    2014-09-30

    Recent blackouts of power systems in North America and throughout the world have shown how critical a reliable power system is to modern societies, and the enormous economic and societal damage a blackout can cause. It has been noted that unanticipated operation of protection systems can contribute to cascading phenomena and, ultimately, blackouts. This project developed and field-tested two methods of Adaptive Protection systems utilizing synchrophasor data. One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify relay response in real time to avoid false trips. The second method detects the possibility of false trips of impedance relays as stable system swings “encroach” on the relays’ impedance zones, and produces an early warning so that relay engineers can re-evaluate relay settings. In addition, real-time synchrophasor data produced by this project was used to develop advanced visualization techniques for display of synchrophasor data to utility operators and engineers.

  5. An Adaptive Sampling System for Sensor Nodes in Body Area Networks.

    Science.gov (United States)

    Rieger, R; Taylor, J

    2014-04-23

    The importance of body sensor networks to monitor patients over a prolonged period of time has increased with an advance in home healthcare applications. Sensor nodes need to operate with very low-power consumption and under the constraint of limited memory capacity. Therefore, it is wasteful to digitize the sensor signal at a constant sample rate, given that the frequency contents of the signals vary with time. Adaptive sampling is established as a practical method to reduce the sample data volume. In this paper a low-power analog system is proposed, which adjusts the converter clock rate to perform a peak-picking algorithm on the second derivative of the input signal. The presented implementation does not require an analog-to-digital converter or a digital processor in the sample selection process. The criteria for selecting a suitable detection threshold are discussed, so that the maximum sampling error can be limited. A circuit level implementation is presented. Measured results exhibit a significant reduction in the average sample frequency and data rate of over 50% and 38% respectively. PMID:24760918

  6. Kirtland's Warbler Annual Census - Seney National Wildlife Refuge (Kirtland's Warbler Wildlife Management Area)

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Adaptation of Kirtland's Warbler Recovery Team census protocol as applied to Seney National Wildlife Refuge and Kirtland's Warbler Wildlife Management Area

  7. Wind speed variability and adaptation strategies in coastal areas of the Pacific Northwest

    OpenAIRE

    Griffin, Bradford

    2010-01-01

    Overall, previous wind speed studies in the Pacific Northwest (PNW) present conflicting results for wind speed trends (both increasing and decreasing) in relation to climate drivers. This study fills a gap in the understanding of PNW wind behaviour by: determining if relationships exist between wind speed distributions, ocean/atmospheric climate indices, and monitoring station-specific attributes; assessing the robustness of relationships for forecasting wind speeds within the study area; and...

  8. Estimation of radiation dose and image quality of coronary 320-row area detector CT angiography by optimal prospective ECG-gated protocols for different heart rate

    International Nuclear Information System (INIS)

    The purpose of this study is to estimate radiation dose and image quality of electrocardiogram (ECG)-gated coronary 320-area detector CT (ADCT) angiography which was acquired using the protocols that were considered as optimal methods for different heart rates (HR) in 1031 consecutive patients (M/F =580/451, 65±12 yr) without arrhythmias. We set up 5 protocols for 320-ADCT based on the relationship among heart rates, temporal resolution, gantry rotation speed, optimal reconstruction phase and slow filling phase on 64-multidetector-row computed tomography (MDCT), id est (ie), 1) mid-diastolic (75% of risk ratio (RR)) 1 beat scan (moderate disability (MD) 1 beat, N=761 (73.8%)) for HR ≤60, 2) mid-diastolic (75% of RR) 2 beat scan (MD 2 beat, N=135) for 61≤ HR ≤65, 3) end-systolic and mid-diastolic (37-80% of RR) 2 beat scan (embryonic stem (ES)-MD 2 beat, N=92) for 66≤ HR ≤75, 4) end-systolic (R +280-430 ms) 2 beat scan (ES 2 beat, N=21) for 76≤ HR ≤80, and 5) end-systolic (R +250-400 ms) 3 beat scan (ES 3 beat, N=22) for 81≤ HR ≤105. Image quality was classified into 3 categories (excellent (3 points), acceptable (2 points), and unacceptable (1 point)). Scanning time, DLP.e and image quality score were 1.4±0.1 s, 220±59 mGy·cm, 3.0±0.2 points in MD 1 beat, 2.2±0.2 s, 434±118 mGy·cm, 2.9±0.3 points in MD 2 beat, 2.1±0.2 s, 729±229 mGy·cm, 2.7±0.5 points in ES-MD 2 beat, 1.9±0.1 s, 432±148 mGy·cm, 2.2±0.6 points in ES 2 beat, and 2.4±0.2 s, 669±152 mGy·cm, 2.3±0.6 points in ES 3 beat respectively. In conclusion, the prospective ECG-gated scan protocol for coronary 320-ADCT angiography in any HR group was considered reasonable and proper for image quality and radiation dose. (author)

  9. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  10. Adaptive method for quantifying uncertainty in discharge measurements using velocity-area method.

    Science.gov (United States)

    Despax, Aurélien; Favre, Anne-Catherine; Belleville, Arnaud

    2015-04-01

    Streamflow information provided by hydrometric services such as EDF-DTG allow real time monitoring of rivers, streamflow forecasting, paramount hydrological studies and engineering design. In open channels, the traditional approach to measure flow uses a rating curve, which is an indirect method to estimate the discharge in rivers based on water level and punctual discharge measurements. A large proportion of these discharge measurements are performed using the velocity-area method; it consists in integrating flow velocities and depths through the cross-section [1]. The velocity field is estimated by choosing a number m of verticals, distributed across the river, where vertical velocity profile is sampled by a current-meter at ni different depths. Uncertainties coming from several sources are related to the measurement process. To date, the framework for assessing uncertainty in velocity-area discharge measurements is the method presented in the ISO 748 standard [2] which follows the GUM [3] approach. The equation for the combined uncertainty in measured discharge u(Q), at 68% level of confidence, proposed by the ISO 748 standard is expressed as: Σ 2 2 2 -q2i[u2(Bi)+-u2(Di)+-u2p(Vi)+-(1ni) ×-[u2c(Vi)+-u2exp(Vi)

  11. Adaption strategies to the effect of climate change on a coastal area in Northwest Germany with different land management scenarios

    Science.gov (United States)

    Graeff, Thomas; Krause, Stefan; Maier, Martin; Oswald, Sascha

    2015-04-01

    Coastal areas are highly vulnerable to the impact of climate change and handling is difficult. Adaption to two different situations has to be taken into account. On the one hand, increasing global sea level in combination with increased precipitation and higher storm surge frequency has to be handled. On the other hand, in summer periods due to the increase of temperature, enhanced evapotranspiration and an increase of salty seawater intrusion into groundwater have to be managed. In this study we present different landuse management scenarios on a coastal area in Northwest Germany, East Frisia, and their effect on the hydrological response. Landuse is dominated by dairy farming and intensive crop farming. 30 percent of the area lies below sea level. A dense channel network in combination with several pumping stations allows permeant drainage. The soils are characterised by marsh soils and impermeable layers which prevent an interaction with the confined brackish aquifer. Observations in those areas indicate a high salinity with concentrations peaking during the summer period. The landuse strategies include a scenario that the technological level of the management will be adapted to rainfall and sea level but without additional drainage from the hinterland to reduce salt water concentration. A second scenario includes the adaptation to increasing precipitation and the sea level with a polder system and wetland areas designated as potential buffer for winter storm surges and inland floods and as freshwater storage for dry summer periods. Two scenarios use large polder areas in the future as potential buffer for winter storm surges and inland floods and as freshwater storage for dry summer periods, additional usage for nature conservation and as the storage of carbon sequestration or extensive farming are planned. Also, stakeholders have developed a system of several smaller polders in combination with an intensification of the water resource management, and this is

  12. HEH-BMAC: hybrid polling MAC protocol for WBANs operated by human energy harvesting

    OpenAIRE

    Ibarra, Ernesto; Antonopoulos, Angelos; KARTSAKLI, Elli; Verikoukis, Christos

    2015-01-01

    This paper introduces human energy harvesting medium access control (MAC) protocol (HEH-BMAC), a hybrid polling MAC suitable for wireless body area networks powered by human energy harvesting. The proposed protocol combines two different medium access methods, namely polling (ID-polling) and probabilistic contention access, to adapt its operation to the different energy and state (active/inactive) changes that the network nodes may experience due to their random nature and the time variation ...

  13. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    complementary access. Given the expanded responsibility under the additional protocol for the Agency to draw conclusions regarding the absence of undeclared nuclear material and activities, it has been important for Safeguards Department staff to broaden their outlook with respect to all other safeguards activities being conducted. This includes consideration of how the evaluation of all information available to the Agency affects the planning and prioritizing of future safeguards activities, for example in resolving questions or inconsistencies in the declared information or selecting locations for conducting complementary access. Beyond the verification of nuclear material, inspectors are being called upon to conduct a wider range of activities, with more emphasis on the observation of indicators of a State's nuclear-related activities and consideration of the consistency of the other information with a State's declarations. It has also led to a need to institutionally change the roles of many staff members in the various Safeguards Divisions and increase the interaction between the Divisions to most effectively draw State-level conclusions regarding the absence of undeclared nuclear material and activities. It is important that the Agency has the adequate infrastructure to effectively conduct the new activities provided for under the Additional Protocol, and assure that the conclusions drawn regarding a State are credible and made in a consistent manner for all States. This paper gives an overview of many of the areas where the Agency has had to develop, expand and adapt its procedures and mode of operation in order to implement most effectively additional protocols, and the challenges that have been encountered in the process. (author)

  14. The Learning About My Pain study protocol: Reducing disparities with literacy-adapted psychosocial treatments for chronic pain, a comparative behavioral trial.

    Science.gov (United States)

    Eyer, Joshua C; Thorn, Beverly E

    2016-09-01

    Chronic pain is a critical public health problem that affects over 100 million Americans. Medical pain treatments carry undesirable side effects, whereas low-risk psychosocial treatments offer notable benefits, in combination or in isolation. This report presents the protocol for the Learning About My Pain study, one of the first comparative-effectiveness trials funded by the Patient-Centered Outcomes Research Institute. Adhering to published standards for clinical trials (e.g. Standard Protocol Items: Recommendations for Intervention Trials), it provides an overview of the trial (n = 294), comparing cognitive-behavioral and education pain interventions to usual care, and a detailed description of how its methodology reduces the risks from bias. PMID:25712491

  15. Utilization Possibilities of Area Definition in User Space for User-Centric Pervasive-Adaptive Systems

    Science.gov (United States)

    Krejcar, Ondrej

    The ability to let a mobile device determine its location in an indoor environment supports the creation of a new range of mobile information system applications. The goal of my project is to complement the data networking capabilities of RF wireless LANs with accurate user location and tracking capabilities for user needed data prebuffering. I created a location based system enhancement for locating and tracking users of indoor information system. User position is used for data prebuffering and pushing information from a server to his mobile client. All server data is saved as artifacts (together) with its indoor position information. The area definition for artifacts selecting is described for current and predicted user position along with valuating options for artifacts ranging. Future trends are also discussed.

  16. Full on-chip and area-efficient CMOS LDO with zero to maximum load stability using adaptive frequency compensation

    International Nuclear Information System (INIS)

    A full on-chip and area-efficient low-dropout linear regulator (LDO) is presented. By using the proposed adaptive frequency compensation (AFC) technique, full on-chip integration is achieved without compromising the LDO's stability in the full output current range. Meanwhile, the use of a compact pass transistor (the compact pass transistor serves as the gain fast roll-off output stage in the AFC technique) has enabled the LDO to be very area-efficient. The proposed LDO is implemented in standard 0.35 μm CMOS technology and occupies an active area as small as 220 x 320 μm2, which is a reduction to 58% compared to state-of-the-art designs using technologies with the same feature size. Measurement results show that the LDO can deliver 0-60 mA output current with 54 μA quiescent current consumption and the regulated output voltage is 1.8 V with an input voltage range from 2 to 3.3 V. (semiconductor integrated circuits)

  17. Adaptation of the dynamic model for radiological assessment of nuclear accident in rural area under conditions of tropical climate

    International Nuclear Information System (INIS)

    Following an accidental release of radionuclides to the atmosphere that leads to the contamination of large areas, a detailed and fast methodology to assess the prognosis of public exposure is needed, in order to estimate radiological consequences and propose and optimize decisions related to the protection of the public. The model ECOSYS has been chosen to integrate the SIEM, the Integrated Emergency System developed by IRD/CNEN, to assess the doses at the short, medium and long term to the public after an accidental contamination of rural areas. The objective of this work is to perform the adaptation of the model ECOSYS to be used in Brazil to assess public exposure and support decision processes regarding the implementation of protective measures but also to guide the need for studies and research aiming to improve the adequacy of estimates to the actual Brazilian situation. The area select for reference to this work consists on the 50 km radius area surrounding the Brazilian nuclear power plants, located at Angra dos Reis County, in the state of Rio de Janeiro. The methodology included the definition of criteria to select agricultural cultures and animals to be simulated, taking into account both the availability of the production at the selected area and the relevance of the food to the population regional diet. Radionuclides included in this study were 137Cs, 90 Sr and 131 I. A large survey has been performed to gather data related to both agricultural practices and behavior of radionuclides in the selected agricultural-systems. The results of simulation indicated the relevance of the knowledge of local aspects on the estimated doses. Important factors included the kind of products produced, seasonality, agricultural practices, animals feed practices, kind of soil, and ingestion habits of the population. (author)

  18. Quality of Service Regulation in Secure Body Area Networks: System Modeling and Adaptation Methods

    Directory of Open Access Journals (Sweden)

    Bui FrancisMinhthang

    2011-01-01

    Full Text Available Body area network (BAN has recently emerged as a promising platform for future research and development. The applications are myriad and encompass a wide range of scenarios, including those in not only medicine but also in everyday activities. However, while the applicability and necessity of BAN have been firmly assured, the underlying technological platforms to practically realize these networks are still in the developmental stages, with many outstanding key problems to be addressed. Due to their envisioned domains of applicability, an important problem in BANs is security and user privacy. Providing security in a practical BAN configuration is challenging due to various conflicting resource constraints. In this paper, the focus is to study signal processing methods for delivering secure communications in BANs, particularly when using biometrics. An optimization framework is presented to aggregate various methods, enabling overall quality of service (QoS regulation in an integrated and flexible manner. In particular, this resource allocation approach is shown to be effective in managing security solutions for BANs.

  19. Adapted hydropower-driven water supply system: assessment of an underground application in an Indonesian karst area

    Science.gov (United States)

    Oberle, P.; Ikhwan, M.; Stoffel, D.; Nestmann, F.

    2016-06-01

    Populated karst landscapes can be found all over the world, although their natural boundary conditions mostly lead to distinct challenges regarding a sustainable water supply. Especially in developing and emerging countries, this situation aggravates since appropriate technologies and water management concepts are rarely available. Against this background, the interdisciplinary, German-Indonesian joint project "Integrated Water Resources Management (IWRM) Indonesia", funded by the German Federal Ministry of Education and Research (BMBF), focused on the development and exemplary implementation of adapted techniques to remedy the partly severe water scarcity in the region Gunung Sewu. This karst area, widely known as "Java's poorhouse", is located on the southern coast of Java Island and distinctly suffers from the mentioned constraints. Under the aegis of the Karlsruhe Institute of Technology (KIT), the conceptual and technical achievements of the "IWRM Indonesia" joint research project are characterized by a high potential for multiplication not only for karst areas but also for non-karst regions. One of the project's major accomplishments is the erection of an innovative hydropower-driven water supply facility located in a karst cave 100 m below ground and continuously supplying tens of thousands of people with fresh water. Referring to the plant's innovative character and the demanding conditions on-site, the implementation was a highly iterative process leading to today's autonomous operation by an Indonesian public authority. Based on the experiences gained during design, construction, operation and monitoring phase, this paper introduces an implementation approach for adapted technologies as well as a comprising technical and economical assessment of the plant's operation.

  20. Integrating Collaboration, Adaptive Management, and Scenario-Planning to Address Rapid Change: Experiences at Las Cienegas National Conservation Area

    Science.gov (United States)

    Caves, J. K.; Bodner, G.; Simms, K.; Fisher, L.; Robertson, T.

    2012-12-01

    There is growing recognition that public lands cannot be managed as islands; rather, land management must address the ecological, social, and temporal complexity that often spans jurisdictions and traditional planning horizons. Collaborative decision-making and adaptive management (CAM) have been promoted as methods to reconcile competing societal demands and respond to complex ecosystem dynamics. We present the experiences of land managers and stakeholders in using CAM at Las Cienegas National Conservation Area (LCNCA), a highly valued site under the jurisdiction of the Bureau of Land Management (BLM). The CAM process at Las Cienegas is marked by strong stakeholder engagement, with four core elements: 1) shared watershed goals with measurable resource objectives; 2) mechanisms to incorporate new information into decision-making; 3) efforts to make information increasingly relevant and reliable; and 4) shared learning to improve both the process and management actions. The combination of stakeholder engagement and adaptive management has led to agreement on contentious issues, more innovative solutions, and more effective land management. Yet the region is now experiencing rapid changes outside managers' control—including climate change, human population growth, and reduced federal budgets—with large but unpredictable impacts on natural resources. While CAM experience provides a strong foundation for making the difficult and contentious management decisions that such changes are likely to require, neither collaboration nor adaptive management provides a sufficient structure for addressing uncontrollable and unpredictable change. As a result, LCNCA is exploring two specific modifications to CAM that may better address emerging challenges, including: 1) Creating nested resource objectives to distinguish between those objectives which may be crucial from those which may hinder a flexible response to climate change, and 2) Incorporating scenario planning into CAM

  1. Models for dose assessments. Models adapted to the SFR-area, Sweden

    International Nuclear Information System (INIS)

    This report presents a model system created to be used to predict dose rates to the most exposed individuals in case of a long-term release of radionuclides from the Final repository for radioactive operational waste (SFR) in Forsmark, Sweden. The system accounts for an underground point source emitting radionuclides to the biosphere,their transport and distribution in various ecosystem types, their uptake by various biota, and calculation of doses to man from a multitude of exposure pathways. Long-term aspects include the consideration of processes at geological time scales, such as land uplift and conversion of marine sediments to arable land. Model parameters are whenever possible based on local conditions and recent literature. The system has been used for simulations based on geospheric releases varying over time of a mixture of radionuclides. Here, the models have been subjected to various test scenarios, including different radionuclide entry points and sorption properties. Radionuclides released from SFR are efficiently diluted to low concentrations in the water of the coastal model. A large fraction of the nuclides leave the Model Area quickly as a consequence of the rapid water turnover. The total amount of radionuclides in water is about the same independent of particle affinity (Kd ), and at most some percents of the amounts retained in the sediments for some time. The latter is also true for the lake model when releases of radionuclides to the water is simulated. The role of sediments as a radionuclide source seems of minor importance in lakes at least for long-term radiation doses. Modelling the sediments as a source of radionuclides most of the 'low Kd radionuclides' will leave the lake whereas the 'high Kd nuclides' are still present within the deeper sediments after 1 000 years. The amount of 'low Kd radionuclides' present in the water and on suspended matter are about 8x10-5 of the initial inventory in the sediments. For 'high Kd nuclides' this

  2. The Adaptation of Fishing Instruments by a Farmers' Community in the Thung Kula Area, in North Eastern Thailand

    Directory of Open Access Journals (Sweden)

    Worawan Ubonlert

    2009-01-01

    Full Text Available Problem statement: In a historical study of the ancient communities in the area of Thung Kula, it was revealed that there are important resources including rice, fish, salt and iron. Salt is used in making fermented fish (known locally as Pla Daek, a culinary culture which has been prevalent in the ethnic groups of Laos and Khmer. The availability of rice and fish in Thung Kula has continued to this day. Thung Kula farmers have extended their fishing sources from the government-owned places to their own fields or ponds. Approach: They use fishing instruments that had been developed out of folk wisdom in combination with the new technology in order to increase the fishing yields adequate for their own consumption and for commerce. The present research aimed to study the adaptation of fishing instruments of the farmers at Ban Ta Yuak, Thung Luang sub-district, Suwannaphum district, Roi-Et province. The studied area was Thung Kula in the North East of Thailand. The research method was qualitative. Data were collected from relevant documents and from field studies with 25 informants. Structured and unstructured interviews were conducted with local tradesmen, consumers, fishing-instrument shop owners. Results: The results were presented descriptively below. The adaptation of fishing instruments of Ban Ta Yuak farmers began with the increased population, the changing ecological systems as a result of the government’s construction of reservoirs, canals, public ponds and the market-oriented economy which had attracted the local fishing markets across the Thung Kula area. Ban Ta Yuak farmers have then adapted their fishing instruments to fit the available kinds of fish and the ecological systems of the local water sources. With assistance from the government, the farmers have their own fishing ponds. It was found that prior to the application of the national economic and social plan of 1962 these farmers created simple fishing instruments such as Sai (a

  3. Models for dose assessments. Models adapted to the SFR-area, Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Karlsson, Sara; Bergstroem, U.; Meili, M. [Studsvik Eco and Safety AB, Nykoeping (Sweden)

    2001-10-01

    This report presents a model system created to be used to predict dose rates to the most exposed individuals in case of a long-term release of radionuclides from the Final repository for radioactive operational waste (SFR) in Forsmark, Sweden. The system accounts for an underground point source emitting radionuclides to the biosphere,their transport and distribution in various ecosystem types, their uptake by various biota, and calculation of doses to man from a multitude of exposure pathways. Long-term aspects include the consideration of processes at geological time scales, such as land uplift and conversion of marine sediments to arable land. Model parameters are whenever possible based on local conditions and recent literature. The system has been used for simulations based on geospheric releases varying over time of a mixture of radionuclides. Here, the models have been subjected to various test scenarios, including different radionuclide entry points and sorption properties. Radionuclides released from SFR are efficiently diluted to low concentrations in the water of the coastal model. A large fraction of the nuclides leave the Model Area quickly as a consequence of the rapid water turnover. The total amount of radionuclides in water is about the same independent of particle affinity (K{sub d} ), and at most some percents of the amounts retained in the sediments for some time. The latter is also true for the lake model when releases of radionuclides to the water is simulated. The role of sediments as a radionuclide source seems of minor importance in lakes at least for long-term radiation doses. Modelling the sediments as a source of radionuclides most of the 'low K{sub d} radionuclides' will leave the lake whereas the 'high K{sub d} nuclides' are still present within the deeper sediments after 1 000 years. The amount of 'low K{sub d} radionuclides' present in the water and on suspended matter are about 8x10{sup -5} of the

  4. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  5. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches. PMID:26083228

  6. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the “transmit-whenever-appropriate” principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposed to ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency. PMID:23202224

  7. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  8. A father protocol for quantum broadcast channels

    OpenAIRE

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communica...

  9. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  10. Adapting to Climate Change: Reconsidering the Role of Protected Areas and Protected Organisms in Western North America

    Science.gov (United States)

    Graumlich, L. J.; Cross, M. S.; Hilty, J.; Berger, J.

    2007-12-01

    With the recent publication of the 2007 Fourth Assessment Report of the Intergovernmental Panel on Climate Change (IPCC), little doubt remains among scientists that the global climate system is changing due to human influence and that climate change will have far-reaching and fundamental impacts on ecosystems and biodiversity. Arguably the best-documented evidence linking 20th Century warming trends to changes in physical and biological systems comes from the mountains of western North America (e.g., Figure SPM1 in Summary of Working Group 11 Report). In the West, ecosystem impacts include changes in the distribution of species as well as changing functional linkages between species such as the synchrony between flower emergence and pollinating insects. These climate impacts, when combined with other environmental stressors (e.g., altered disturbance regimes, land-use change and habitat fragmentation) portend an amplification of species extinction rates. One of the great challenges in adapting to climate change is developing and implementing policies that enhance ecological resilience in the face of these change. Clearly, the current system of nature reserves in Western North America is a fundamental asset for maintaining biodiversity and ecosystem services. However, the fixed- boundary nature of these protected areas presents a problem as species' ranges shift with future climate change. The loss of species whose ranges move outside of fixed park boundaries and the arrival of other species that move into protected areas could lead to significant turnover of species diversity, new species assemblages, and altered functionality. In short, reserves that were designed to protect particular species or communities may no longer serve their intended purpose under a changing climate. In this talk, we use case studies from the Greater Yellowstone Ecosystem and the Sonoran Desert Ecosystem to define strategies for enhancing ecological resilience to climate change at

  11. Dynamic Adaptive Approach to Transportation-Infrastructure Planning for Climate Change: San-Francisco-Bay-Area Case Study

    NARCIS (Netherlands)

    Wall, T.A.; Walker, W.E.; Marchau, V.A.W.J.; Bertolini, L.

    2015-01-01

    Adaptation of existing infrastructure is a response to climate change that can ensure a viable, safe, and robust transportation network. However, deep uncertainties associated with climate change pose significant challenges to adaptation planning. Specifically, current transportation planning method

  12. Comprehensive small animal imaging strategies on a clinical 3 T dedicated head MR-scanner; adapted methods and sequence protocols in CNS pathologies.

    Directory of Open Access Journals (Sweden)

    Deepu R Pillai

    Full Text Available BACKGROUND: Small animal models of human diseases are an indispensable aspect of pre-clinical research. Being dynamic, most pathologies demand extensive longitudinal monitoring to understand disease mechanisms, drug efficacy and side effects. These considerations often demand the concomitant development of monitoring systems with sufficient temporal and spatial resolution. METHODOLOGY AND RESULTS: This study attempts to configure and optimize a clinical 3 Tesla magnetic resonance scanner to facilitate imaging of small animal central nervous system pathologies. The hardware of the scanner was complemented by a custom-built, 4-channel phased array coil system. Extensive modification of standard sequence protocols was carried out based on tissue relaxometric calculations. Proton density differences between the gray and white matter of the rodent spinal cord along with transverse relaxation due to magnetic susceptibility differences at the cortex and striatum of both rats and mice demonstrated statistically significant differences. The employed parallel imaging reconstruction algorithms had distinct properties dependent on the sequence type and in the presence of the contrast agent. The attempt to morphologically phenotype a normal healthy rat brain in multiple planes delineated a number of anatomical regions, and all the clinically relevant sequels following acute cerebral ischemia could be adequately characterized. Changes in blood-brain-barrier permeability following ischemia-reperfusion were also apparent at a later time. Typical characteristics of intra-cerebral haemorrhage at acute and chronic stages were also visualized up to one month. Two models of rodent spinal cord injury were adequately characterized and closely mimicked the results of histological studies. In the employed rodent animal handling system a mouse model of glioblastoma was also studied with unequivocal results. CONCLUSIONS: The implemented customizations including extensive

  13. A Study of Disaster Adaptation Behavior and Risk Communication for watershed Area Resident - the Case of Kaoping River Watershed in Taiwan

    Science.gov (United States)

    Te Pai, Jen; Chen, Yu-Yun; Huang, Kuan-Hua

    2016-04-01

    Along with the global climate change, the rainfall patterns become more centralized and cause natural disasters more frequently and heavily. Residents in river watersheds area are facing high risk of natural disasters and severe impacts, especially in Taiwan. From the experience of Typhoon Morakot in 2009, we learned that poor risk communication between the governments and the households and communities would lead to tremendous loss of property and life. Effective risk communication can trigger action to impending and current events. On the other hand, it can also build up knowledge on hazards and risks and encourage adaptation behaviors. Through the participation and cooperation of different stakeholders in disaster management, can reduce vulnerability, enhance adaptive capacity, improve the interaction between different stakeholders and also avoid conflicts. However, in Taiwan there are few studies about how households and communities perceive flood disaster risks, the process of risk communications between governments and households, or the relationship between risk communication and adaptation behaviors. Therefore, this study takes household and community of Kaoping River Watershed as study area. It aims to identify important factors in the process of disaster risk communication and find out the relationship between risk communication and adaptation behaviors. A framework of risk communication process was established to describe how to trigger adaptation behaviors and encourage adaptation behaviors with risk communication strategies. An ISM model was utilized to verify the framework by using household questionnaire survey. Moreover, a logit choice model was build to test the important factors for effective risk communication and adaption behavior. The result of this study would provide governments or relevant institutions suggestions about risk communication strategies and adaptation strategies to enhance the adaptive capacity of households and reduce the

  14. Adapting environmental function analysis for management of protected areas in small islands--case of Pico Island (the Azores).

    Science.gov (United States)

    Calado, Helena; Bragagnolo, Chiara; Silva, Susana; Vergílio, Marta

    2016-04-15

    Protected areas (PAs) are considered key priorities for ensuring long-term sustainability of small islands. The traditional approach of conservation versus development is currently being replaced by an approach of "win-win" relationships. During the last decades PAs have been increasingly requested to simultaneously ensure biodiversity conservation, mainstream ecosystem services into main development policies, and accounting for leisure-related revenues to sustain local and regional economies. Following this new paradigm, the Smartparks project (Planning and Management System for Small Islands Protected Areas), encompassing this study, aimed at an innovative approach for supporting the management of PAs in small islands. In this study, we propose a methodology based on Environmental Functional Analyses (EFA) to compare the potential for conservation and the potential for use of PAs that can be used not only on small islands but also in other territories. For this purpose, a set of environmental and socio-economic components was defined and selected indicators describing each component to calculate conservation and use/development functions of PAs were established. Pico Island, in the Azores archipelago (Portugal), was selected as the case study for testing the methodology. The EFA for all PAs of Pico Island was performed identifying those with more potential for conservation or for development of human activities, and also those with high levels of conflict. A total of 34 indicators was applied (assigning a value from 1 to 3) to the 22 PAs composing the INP of Pico Island: 44% were scored with a value of 1, in both ecological and social components; 22% and 29% were scored 3 in ecological and social components respectively. Social indicators were generally considered less important than environmental ones. In general, PAs presented higher values for conservation. The results further show that the potential for conservation and/or development was consistent with the

  15. BrAD-seq: Breath Adapter Directional sequencing: a streamlined, ultra-simple and fast library preparation protocol for strand specific mRNA library construction.

    Directory of Open Access Journals (Sweden)

    Brad Thomas Townsley

    2015-05-01

    Full Text Available Next Generation Sequencing (NGS is driving rapid advancement in biological understanding and RNA-sequencing (RNA-seq has become an indispensable tool for biology and medicine. There is a growing need for access to these technologies although preparation of NGS libraries remains a bottleneck to wider adoption. Here we report a novel method for the production of strand specific RNA-seq libraries utilizing inherent properties of double-stranded cDNA to capture and incorporate a sequencing adapter. Breath Adapter Directional sequencing (BrAD-seq reduces sample handling and requires far fewer enzymatic steps than most available methods to produce high quality strand-specific RNA-seq libraries. The method we present is optimized for 3-prime Digital Gene Expression (DGE libraries and can easily extend to full transcript coverage shotgun (SHO type strand-specific libraries and is modularized to accommodate a diversity of RNA and DNA input materials. BrAD-seq offers a highly streamlined and inexpensive option for RNA-seq libraries.

  16. Adapting to the European Higher Education Area a questionnaire on student opinion about the teaching of lecturers.

    Directory of Open Access Journals (Sweden)

    Lukas, José Francisco

    2014-10-01

    Full Text Available The aim of this work is to present the adaptation to the European Higher Education Area of a questionnaire on the opinions of University of the Basque Country students about their lecturers teaching process. This process undertaken at the University used a mixed methodology approach. After reviewing questionnaires from other universities, taking into account the theoretical framework of the new questionnaire, the transversal skills adopted by the University and the three dimensions set out by ANECA, a series of indicators and possible items deemed suitable to be included in the new questionnaire were drawn up. This theoretical framework, the indicators and the items were all compared and contrasted within various focus groups undertaken with experts in the topic, with lecturers from the different areas of the University, and with students. Based on this comparison, the pilot questionnaire, which had 18 items plus two more criterion-referenced items, was drawn up. This was applied to a sample of almost one thousand students. The analyses carried out to compare the efficacy of the items, as well as the reliability and the validity of the test, show that the questionnaire rigorously complies with the standards required by this type of instrument. Finally, in the discussion of the results, certain controversial aspects, or those relating to improving the evaluation of the university teaching staff, are presented. Indicated amongst these aspects, is the need to incorporate the questionnaire into a more wider-ranging evaluation plan, such as DOCENTIA, the possibility of creating banks of items, the inclusion of open items and the exigency of undertaking on-line applications of the questionnaire.

  17. Sustainable Energy and Environmental Management in a Solar Powered Adaptive Fuzzy Control Model for Ground Water Conservation in Suburban Areas

    Directory of Open Access Journals (Sweden)

    S. N. Singh,

    2011-05-01

    Full Text Available In the present paper, a novel scheme of water level management of a storage tank, adaptive to varying water consumption by an end user, has been designed. This system proposes the control of water supply from a solar powered pump for the optimal use of ground water in suburban areas. It has been simulated and validated, for its satisfactory performance, by fuzzy control logic. The proposed system optimizes water consumption, leading to improvement in the ground-water life cycle and increasing the life of submersible pumps and bore wells. Moreover, it reduces water wastage, maintains the water table and avoids damaging conditions for pump due to muddy water, without any inconvenience to the user. In the proposed system, keeping in view the poor grid availability in suburban areas, a solar-powered submersible pump raises ground water to an overhead storage water tank which is also connected to a reservoir water tank. The reservoir regularly supplies water in time schedule to the storage tank to fulfill the demand for water. In the absence of the reservoir, or when the supply from the reservoir is insufficient tomeet the demand, a submersible pump, operating on PV energy, acts as a supplementary system. It pumps water to the storage tank in accordance to the demand/consumption of water. This has been achieved with a fuzzy controller, which senses the varying level of water in the storage tank and the end user requirement, and fills up the storage tank from the reservoir tank and/or the submersible pump accordingly.

  18. An extended modeling approach to assess climate change impacts on groundwater recharge and adaptation in arid areas

    Directory of Open Access Journals (Sweden)

    H. Hashemi

    2014-10-01

    Full Text Available The impact of future climate scenarios on surface and groundwater resources was simulated using a modeling approach for an artificial recharge area in arid southern Iran. Future climate data for the periods of 2010–2030 and 2030–2050 were acquired from the Canadian Global Coupled Model (CGCM 3.1 for scenarios A1B, A2, and B1. These scenarios were adapted to the studied region using the delta-change method. The modified version of the HBV model (Qbox was used to simulate runoff in a flash flood prone catchment. The model was calibrated and validated for the period 2002–2011 using daily discharge data. The projected climate variables were used to simulate future runoff. The rainfall–runoff model was then coupled to a calibrated groundwater flow and recharge model (MODFLOW to simulate future recharge and groundwater hydraulic head. The results of the rainfall–runoff modeling showed that under the B1 scenario the number of floods might increase in the area. This in turn calls for a proper management, as this is the only source of fresh water supply in the studied region. The results of the groundwater recharge modeling showed no significant difference between present and future recharge for all scenarios. Owing to that, four abstraction and recharge scenarios were assumed to simulate the groundwater level and recharged water in the studied aquifer. The results showed that the abstraction scenarios have the most substantial effect on the groundwater level and the continuation of current pumping rate would lead to a groundwater decline by 18 m up to 2050.

  19. Evaluating farmers’ adaptation strategies to climate change: A case study of Kaou local government area, Tahoua State, Niger Republic

    Directory of Open Access Journals (Sweden)

    A. Moussa Tabbo

    2016-03-01

    Full Text Available The study discusses local farmers’ strategies of coping with and building resilience against the negative impact of climate change. Information for the discussion was from data collected using a set of structured questionnaires from interviews scheduled with 128 farmers. The questionnaire was based on previous literature and direct reconnaissance interview with farmers, which culminated in 13 strategies used for the study being reported. For each question, respondents were asked to choose their best and worst strategies. Thus, the difference between the best and worst strategies consistent with random utility theory has been used for the modelling. Results show that semi-transhumance, various handicrafts making, rural migration, small-scale vegetable production and small-scale river exploitation were the most important strategies identified, whilst water transport and vending, shifting cultivation, gypsum mining, gathering and trading of wild fruits and edible plants as well as cattle and sheep fattening were the least appreciated strategies identified amongst the farmers facing climate change. These findings are therefore imperative for planning farmers’ capacity-building and resilience against climate change projects to ensure sustainability in the study area.Keywords: Farmers’ adaptation strategies; Climate change resilience; Kaou

  20. Grazing game: a learning tool for adaptive management in response to climate variability in semiarid areas of Ghana

    Directory of Open Access Journals (Sweden)

    Grace B. Villamor

    2016-03-01

    Full Text Available In West Africa, the most extreme predicted effects of climate change are expected to occur in desert and grassland areas. It is crucial for local populations in this region to better understand what such projections signify to them to identify sound adaptation policies and interventions. We developed a game, called the "grazing game," and conducted trials with local farmers at multiple study sites as a learning tool to better understand their behavior in response to climate variability under semiarid conditions in West Africa and to facilitate social learning. The grazing game was designed to reveal the processes that lead to overgrazing and desertification based on the players' interactions with environmental conditions and their resulting decisions. We conducted a total of 23 game trials around the Vea catchment of the Upper East Region of Ghana involving 243 individual farmers. From the games, local farmers exhibited a very positive response to how the game replicated rainfall fluctuations that they currently experience and led to the identification of coping strategies, such as selling cows, seeking government assistance, and engaging in alternative livelihood means. Participating farmers tended to avoid uncertain situations and sought to simplify their decisions, and the game provided insight into the rich local ecological knowledge of environmental indicators. Based on the game trial results, we found that the game facilitated instrumental and communicative learning among the players and facilitators. Further, the game served as a platform where players could share their views, knowledge, and perceptions of climate-related issues.

  1. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons....... We have implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single......; benchmarks show that the approach is practical....

  2. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  3. Effects of recreational aerobics on adaptation of female first-year students from urban area and rural area to conditions of higher school education.

    Science.gov (United States)

    Panikhina, A V; Kolesnikova, O B

    2012-02-01

    Experiments proved beneficial effects of additional classes for recreational aerobics on the realization of morphophysiological mechanisms of adaptation to the education in Higher School in female first-year students. PMID:22803115

  4. Adaptación a un esquema de entrenamiento físico en pacientes con enfermedad pulmonar obstructiva crónica avanzada ADAPTATION TO A PHYSICAL TRAINING PROTOCOL OF SEVERE CHRONIC OBSTRUCTIVE PULMONARY DISEASE PATIENTS

    Directory of Open Access Journals (Sweden)

    RAMÓN PINOCHET U.

    2002-07-01

    Full Text Available RESUMEN El ejercicio físico es un elemento básico en la rehabilitación en pacientes con EPOC. Sin embargo, los resultados son variables, lo que puede deberse a las diferentes estrategias de entrenamiento utilizadas. En 22 pacientes con EPOC avanzada (VEF1 35,6 ± 15,7%; edad 63 ± 15 años; x ± DS evaluamos su adaptación a un esquema de entrenamiento (E en bicicleta ergométrica que consistió en aplicar inicialmente una carga inicial de 30% de la máxima previamente determinada (CM y aumentarla en 15 a 20% en las sesiones siguientes cuando el paciente era capaz de mantenerla por 45 minutos, hasta alcanzar la meta de 75% de la CM. La intensidad del E se midió en watts calculando el área bajo la curva de la relación entre las cargas aplicadas y el número de sesiones de entrenamiento. El efecto del E se evaluó a través de los cambios en la carga y el vO2 máximos, la duración de un ejercicio submáximo, la frecuencia cardíaca, (FC, disnea, fatiga de las extremidades inferiores y lactato sanguíneo para una misma carga y tiempo de ejercicio. La CM de E fue 61 ± 23% (x ± DS del máximo. Seis pacientes no fueron capaces de alcanzar la carga establecida como meta. En los restantes ésta se alcanzó en un número variable de sesiones (12 ± 7. La intensidad del entrenamiento fue de 952 ± 325 watt. El E produjo un aumento de la CM (p Exercise training is an important component of pulmonary rehabilitation in COPD. Clinical studies show highly variable results, probably due to the use of different training strategies. Our aim was to evaluate the adaptation of 22 severe COPD patients (FEV1: 36 ± 16% Pred; 63 ± 15 years of age; x ± SD to a training protocol: a Target load 75% of maximal workload (WRmax, b an initial load of 30% WRmax and c 15 to 20% increments of the load at the time the patients were able to sustain the previous load for 45 min. Training intensity was calculated by measuring the area under the workload times the number

  5. Specification of a Collision-Free CSMA MAC Protocol for Wireless LANs: the CANlike protocol

    OpenAIRE

    Juanole, Guy; Nguyen, Xuan Hung; Mouney, Gérard

    2013-01-01

    Collision-free Medium Access Control (MAC) protocols based on Carrier Sense Multiple Access (CSMA) and priorities associated to the frames are interesting solutions in considering real-time traffic in a wireless context.We have already presented such a protocol using priorities represented by the BlackBurst technique [1]. The goal of this paper is, at first and mainly, to specify another such protocol, named CANlike, which is an adaptation of the wired CAN bus protocol to the wireless context...

  6. Adaptive management of invasive pests in natural protected areas: the case of Matsucoccus feytaudi in Central Italy.

    Science.gov (United States)

    Sciarretta, A; Marziali, L; Squarcini, M; Marianelli, L; Benassai, D; Logli, F; Roversi, P F

    2016-02-01

    Invasive species are a significant threat to affected ecosystems, having serious environmental, economic and social impacts. The maritime pine bast scale, Matsucoccus feytaudi Ducasse (Hemiptera: Matsucoccidae), causes serious damage to Pinus pinaster forests in SE France, Corsica and Italy where it has been introduced. This study illustrates the adaptive management plan implemented in the Migliarino, San Rossore, Massaciuccoli Regional Natural Park in Tuscany, Italy, where M. feytaudi arrived in 2004, leading to the decay of local P. pinaster stands. The management programme, aimed at slowing the establishment and growth of M. feytaudi, was carried out in the main sector of the park, Tenuta di San Rossore, to retard the destruction of the P. pinaster coastal strip protecting the more internal woodland from sea salt and to allow replacement of P. pinaster trees with a more stable broad-leaved wood. The combined use of mass trapping and silvicultural interventions, applied in a targeted manner according to distribution maps of pest captures and damage, helped to delay forest destruction compared with a nearby unmanaged area of the park Tenuta di Tombolo. Although M. feytaudi continued to spread during the management period, the populations remained at low levels for 6 years, showing a marked increase in 2012. During this period, the P. pinaster stands were reduced from 320 to 249 ha. The final result of this ongoing gradual conversion process will be transformation of the P. pinaster forest into Holm oak woods and Mediterranean shrub land, while P. pinaster will survive as clusters or blocks of trees. PMID:26521882

  7. Formal Verification of Quantum Protocols

    CERN Document Server

    Nagarajan, R; Nagarajan, Rajagopal; Gay, Simon

    2002-01-01

    We propose to analyse quantum protocols by applying formal verification techniques developed in classical computing for the analysis of communicating concurrent systems. One area of successful application of these techniques is that of classical security protocols, exemplified by Lowe's discovery and fix of a flaw in the well-known Needham-Schroeder authentication protocol. Secure quantum cryptographic protocols are also notoriously difficult to design. Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing scenarios. The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. We present a model of the protocol in the process calculus CCS and the results of some initial analyses using the Concurrency Workbench of the New Century (CWB-NC).

  8. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  9. A Service-differentiated Based Adaptive MAC Protocol for Cognitive Radio Networks%认知无线网络中基于业务区分的自适应MAC协议*

    Institute of Scientific and Technical Information of China (English)

    江帆; 卢光跃

    2013-01-01

      为了提高认知用户的接入效率,同时兼顾其QoS需求,提出了一种应用于认知无线网络的基于业务区分的自适应MAC协议。对不同业务采取不同的最优频谱检测时间,实时业务(RT)以最小化接入时延为目的确定最优的频谱检测时间,而非实时用户( NRT)则以最大化吞吐率为目标确定最佳的频谱检测时间。根据所确定出的最佳频谱检测时间,结合当前的业务到达速率和调度策略,不同业务以时隙Aloha的方式接入空闲频谱。理论分析和仿真表明,所提出的自适应MAC协议能够自适应地为认知用户的不同业务确定最优频谱检测时间,从而有效地提高频谱使用效率,保证不同业务的QoS需求。%To improve the access efficiency of secondary users(SU)and consider their QoS requirements at the same time,a service-differentiated based adaptive Media Access Control(MAC)protocol is proposed for cognitive radio networks. Specifically,real time services determine the best spectrum sensing time aiming at minimizing the spectrum access time,while users with non-real time services select proper spectrum sensing time to obtain maximum throughput. Combined with service arriving rate and scheduling policy,different services adopt slotted Aloha for medium access. Theoretical analysis and simulation results demonstrate that the proposed MAC proto-col can adaptively adjust optimal spectrum sensing time for different type of services,so as to achieve higher spectrum utilization rate and ensure user′s Quality of Service(QoS)as well.

  10. Formal Support for Standardizing Protocols with State

    OpenAIRE

    Guttman, Joshua D.; Liskov, Moses D.; Ramsdell, John D.; Rowe, Paul D.

    2015-01-01

    Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions. We adapt one of these tools, {\\cpsa}, to provide automated support for reasoning about state. We us...

  11. Use of a hydrological model to evaluate the effects of climate change on adaptative capacity of a maize and fennel cultivation in an area of Southern Italy.

    Science.gov (United States)

    Bonfante, Antonello; Basile, Angelo; de Lorenzi, Francesca; Riggi, Ezio; Avola, Giovanni; Menenti, Massimo

    2010-05-01

    Crop production depends significantly on the pedoclimatic conditions. The evolution of climate may thus endanger not only yield (IPCC, 2007), but, more significantly, the sustainability of the cultivation of current varieties. Adaptation of current production systems may be feasible, but requires a timely evaluation of weather adaptation to climate evolution might be limited to improving crop and soil management or should involve replacement of varieties or species altogether. This study addressed this question by evaluating the adaptive capacity of a flat area of 22.000 ha "Destra Sele" (Campania Region, Southern Italy) where the main crops are is maize for livestock and fennel. Two climate scenarios have been considered at + 5 and + 30 years, generated by a regional climate model applied to Europe and the Mediterranean Basin. For each climate scenario the hydro-thermal regime of the soils of the selected study area has been calculated by means of a simulation model of the soil-water-atmosphere system (SWAP). Synthetic indicators of the regimes (e.g., crop water stress index, available water content, soil temperature) have been calculated and compared with the thermal and water requirements of a set of maize and fennel varieties, including the ones currently cultivated in the area. The hydrological model SWAP was applied to the representative soils of the entire area (20 soil units): their soil hydraulic properties were derived applying the pedo-transfer function HYPRES which reliability was tested and validated on three soils of the same area. Upper boundary conditions were derived from the regional climate scenarios. Unit gradient in soil water potential was set as lower boundary condition. Crop-specific input data and model parameters were estimated on the basis of literature and assumed to be generically representative of the species. This applies to Leaf Area Index (LAI), crop coefficient (Kc) and the root water uptake function parameters. From the comparison

  12. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  13. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  14. Adaptation to the Impacts of Climate Extremes in Central Europe: A Case Study in a Rural Area in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Robert Stojanov

    2015-09-01

    Full Text Available The primary objective of this paper is to analyse households’ adaptation measures to the impacts of repeated extreme weather events, specifically floods, which belong amongst the most serious manifestation of ongoing climate change in Europe. The case study focuses on a rural area in the north-east part of the Czech Republic, in the catchment basin of the Bečva River. A total of 605 households were addressed within the framework of the questionnaire survey. On the basis of the conducted research, we determined that the total amount of adaptation measures adopted by those dwelling in residential homes within the investigated catchment area was relatively low. In contrast, however, one of the most important adaptation measures—house elevation—was applied by 46.94% of the houses (up to 1 m and by 21.16% houses (elevated more than 1 m respectively. We also found that the amount and scope of adaptation measures realized by households were influenced by certain socio-demographic factors of the inhabitants. The most statistically significant factors included households with more residents or families with more children living in the household, as well as those with a higher level of education. Flood experience, the level of damage, and individual flood risk perception also played an important role.

  15. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  16. Adaptation to the Impacts of Climate Extremes in Central Europe: A Case Study in Rural Area in the Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Stojanov, R.; Duží, Barbora; Daněk, T.; Němec, D.; Procházka, D.

    2015-01-01

    Roč. 7, č. 3 (2015), s. 12758-12786. ISSN 2071-1050 Institutional support: RVO:68145535 Keywords : household * floods * adaptation Subject RIV: DE - Earth Magnetism, Geodesy, Geography Impact factor: 0.942, year: 2014 http://www.mdpi.com/2071-1050/7/9/12758/htm

  17. Climate-proof planning for flood-prone areas : assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    van den Brink, Margo; Meijerink, Sander; Termeer, Catrien; Gupta, Joyeeta

    2014-01-01

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses proble

  18. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    Brink, van den M.A.; Meijerink, S.; Termeer, C.J.A.M.; Gupta, J.

    2014-01-01

    It is generally acknowledged that adapting lowlying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses problem

  19. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    M. van den Brink; S. Meijerink; C. Termeer; J. Gupta

    2013-01-01

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses proble

  20. Modelling of adaptation to climate change and decision-makers behaviours for the Veluwe forest area in the Netherlands

    DEFF Research Database (Denmark)

    Yousefpour, Rasoul; Didion, Markus; Jacobsen, Jette Bredahl; Meilby, Henrik; Hengeveld, Geerten M.; Schelhaas, Mart-Jan; Thorsen, Bo Jellesmark

    2015-01-01

    We apply Bayesian updating theory to model how decision-makers may gradually learn about climate change and make use of this information in making adaptive forest management decisions. We develop modelling steps to i) simulate observation of a multi-dimensional climate system, ii) apply updating ...

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Adapting ski area operations to a warmer climate in the Swiss Alps through snowmaking investments and efficiency improvements

    OpenAIRE

    Gonseth, Camille

    2008-01-01

    Economic consequences of climate change for the Swiss winter tourism have been assessed in two studies. Though estimates of the potential annual costs highly differ between them, they however agree on two points. On the one hand, winter tourism will be one of the most affected economic sectors. On the other hand, impacts of climate change on this sector will be very disruptive. In this context, adaptation strategies must play an important role in the Swiss winter tourism sector in order to al...

  3. Adapting ski area operations to a warmer climate in the Swiss Alps through snowmaking investments and efficiency improvements

    OpenAIRE

    Gonseth, Camille; Thalmann, Philippe

    2009-01-01

    Economic consequences of climate change for the Swiss winter tourism have been assessed in two studies. Though estimates of the potential annual costs highly differ between them, they however agree on two points. On the one hand, winter tourism will be one of the most affected economic sectors. On the other hand, impacts of climate change on this sector will be very disruptive. In this context, adaptation strategies must play an important role in the Swiss winter tourism sector in order to al...

  4. The Role of Biodiversity, Traditional Knowledge and Participatory Plant Breeding in Climate Change Adaptation in Karst Mountain Areas in SW China

    Energy Technology Data Exchange (ETDEWEB)

    Song, Yiching; Li, Jingsong [Center for Chinese Agricultural Policy (China)

    2011-07-15

    This is a report of a country case study on the impacts of climate change and local people's adaptation. The research sites are located in the karst mountainous region in 3 SW China provinces - Guangxi, Guizhou and Yunnan – an area inhabited by 33 ethnic groups of small farmers and the poor, with rich Plant Genetic Resources (PGR) and culture. Climate change is exacerbating already harsh natural conditions and impacting on biodiversity of remote farmers living in extreme poverty, with very limited arable land. Genetic diversity has also suffered from the adoption of high yielding hybrids. Yet traditional varieties, related TK and Participatory Plant Breeding (PPB) for maize and rice are showing real potential for resilience and adaptation.

  5. Security Protocol Verification: Symbolic and Computational Models

    OpenAIRE

    Blanchet, Bruno

    2012-01-01

    Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.

  6. Adaptive Slope Filtering of Airborne LiDAR Data in Urban Areas for Digital Terrain Model (DTM Generation

    Directory of Open Access Journals (Sweden)

    Junichi Susaki

    2012-06-01

    Full Text Available A filtering algorithm is proposed that accurately extracts ground data from airborne light detection and ranging (LiDAR measurements and generates an estimated digital terrain model (DTM. The proposed algorithm utilizes planar surface features and connectivity with locally lowest points to improve the extraction of ground points (GPs. A slope parameter used in the proposed algorithm is updated after an initial estimation of the DTM, and thus local terrain information can be included. As a result, the proposed algorithm can extract GPs from areas where different degrees of slope variation are interspersed. Specifically, along roads and streets, GPs were extracted from urban areas, from hilly areas such as forests, and from flat area such as riverbanks. Validation using reference data showed that, compared with commercial filtering software, the proposed algorithm extracts GPs with higher accuracy. Therefore, the proposed filtering algorithm effectively generates DTMs, even for dense urban areas, from airborne LiDAR data.

  7. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  8. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  9. Perceptions of Australian marine protected area managers regarding the role, importance, and achievability of adaptation for managing the risks of climate change

    Directory of Open Access Journals (Sweden)

    Christopher Cvitanovic

    2014-12-01

    Full Text Available The rapid development of adaptation as a mainstream strategy for managing the risks of climate change has led to the emergence of a broad range of adaptation policies and management strategies globally. However, the success of such policies or management interventions depends on the effective integration of new scientific research into the decision-making process. Ineffective communication between scientists and environmental decision makers represents one of the key barriers limiting the integration of science into the decision-making process in many areas of natural resource management. This can be overcome by understanding the perceptions of end users, so as to identify knowledge gaps and develop improved and targeted strategies for communication and engagement. We assessed what one group of environmental decision makers, Australian marine protected area (MPA managers, viewed as the major risks associated with climate change, and their perceptions regarding the role, importance, and achievability of adaptation for managing these risks. We also assessed what these managers perceived as the role of science in managing the risks from climate change, and identified the factors that increased their trust in scientific information. We do so by quantitatively surveying 30 MPA managers across 3 Australian management agencies. We found that although MPA managers have a very strong awareness of the range and severity of risks posed by climate change, their understanding of adaptation as an option for managing these risks is less comprehensive. We also found that although MPA managers view science as a critical source of information for informing the decision-making process, it should be considered in context with other knowledge types such as community and cultural knowledge, and be impartial, evidence based, and pragmatic in outlining policy and management recommendations that are realistically achievable.

  10. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...

  11. 'A SPECT/T.D.M.? He will never fit under the camera' SPECT/T.D.M. osseous protocol adapted to the diagnostic emergency of the acute spondylodiscitis; 'Une TEMP/TDM? Il ne tiendra jamais sous la camera' Protocole TEMP/TDM osseux adapte a l'urgence diagnostique de la spondylodiscite aigue

    Energy Technology Data Exchange (ETDEWEB)

    Girma, A.; Ramadan, A.; Paycha, F. [Unite de medecine nucleaire, CHU Louis-Mourier, Colombes, (France); Manceron, V.; Vinceneux, P. [service de medecine interne, CHU Louis-Mourier, Colombes, (France); Baccar, L.S.; Dion, E. [service de radiologie, CHU Louis-Mourier, Colombes, (France); Fihman, V.; Branger, C. [service de microbiologie, CHU Louis- Mourier, Colombes, (France)

    2009-05-15

    This file illustrates the possibility to realize a skeleton SPECT/T.D.M. of first intention for a restless or algesic patient by reducing the acquisition time and by targeting the field on the painful area in whole- body scanning in order to precise a diagnosis of spondylodiscitis or any other therapy emergency of the skeleton. (N.C.)

  12. Perturbation of the left inferior frontal gyrus triggers adaptive plasticity in the right homologous area during speech production

    OpenAIRE

    Hartwigsen, Gesa; Saur, Dorothee; Price, Cathy J; Ulmer, Stephan; Baumgaertner, Annette; Siebner, Hartwig R.

    2013-01-01

    The role of the right hemisphere in aphasia recovery is unclear. We demonstrate that a virtual lesion of left inferior frontal gyrus (IFG) decreased activity in the targeted area and increased activity in the contralateral homologous area during pseudoword repetition. This was associated with a stronger facilitatory drive from the right IFG to the left IFG. Importantly, responses became faster with increased influence of the right IFG on the left IFG. Our results shed new light on the dynamic...

  13. Local area networks and protocols of data transmission in electric power systems: current status and tendencies; Redes locales y protocolos de transmision de datos en sistemas electricos de potencia: estado actual y tendencias

    Energy Technology Data Exchange (ETDEWEB)

    Pellizzoni, Rodolfo [TRANSBA S.A., Empresa de Transporte de Energia Electrica por Distribucion Troncal de la Provincia de Buenos Aires (Argentina); Vignoni, Roberto [Universidad Nacional de La Plata (UNLP), Ciudad de La Plata, Buenos Aires (Argentina)

    2001-07-01

    In electric power systems, overcome the stage of the remote system (SCADA) implementation, the current tendency is the automation and use of open architectures. That tendency is reflected in the use of standardized local area networks of industrial use and adoption of data transmission protocols which are based in international standards. The result is the connectivity and operationalization among the local devices and terminals usually called IED. In this document it is presented a summary of the standardized data transmission protocols, which have been used in electric power substations currently, based on a architecture which defines three layers of the OSI/ISO reference pattern. Based on the tendency increase of automation in substations, some ways of communication have been analyzed, they mean: local area networks such as the Ethernet pattern and some industrial ones and others such as Profibus and its respective implementation in electric power systems. It also is analyzed the tasks which have supported IEC and EPRI for defining a standardization and a model for the open communications in electric power substations.

  14. Adaptation to the Impacts of Climate Extremes in Central Europe: A Case Study in a Rural Area in the Czech Republic

    OpenAIRE

    Robert Stojanov; Barbora Duží; Tomáš Daněk; Daniel Němec; David Procházka

    2015-01-01

    The primary objective of this paper is to analyse households’ adaptation measures to the impacts of repeated extreme weather events, specifically floods, which belong amongst the most serious manifestation of ongoing climate change in Europe. The case study focuses on a rural area in the north-east part of the Czech Republic, in the catchment basin of the Bečva River. A total of 605 households were addressed within the framework of the questionnaire survey. On the basis of the conducted resea...

  15. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  16. Performance Evaluation of the WSN Routing Protocols Scalability

    Directory of Open Access Journals (Sweden)

    L. Alazzawi

    2008-01-01

    Full Text Available Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs. A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.

  17. The Invasion of Coastal Areas in South China by Ipomoea cairica May Be Accelerated by the Ecotype Being More Locally Adapted to Salt Stress.

    Science.gov (United States)

    Liu, Gang; Gao, Yang; Huang, Fang-Fang; Yuan, Ming-Yue; Peng, Shao-Lin

    2016-01-01

    Local adaptation and phenotypic plasticity are two alternative mechanisms used by invasive plants for range expansion. We conducted a series of experiments to investigate the role of these mechanisms in the recent expansion of the invasive Ipomoea cairica from non-saline to salt-stressed coastal habitats. A comparison of the plant's photosynthetic traits and construction costs across habitats was conducted through a field survey. Meanwhile, a full factorial greenhouse experiment was conducted with two ecotypes (non-saline and coastal) of I. cairica and two salinity gradients (water and 4 g L-1 NaCl solution) to evaluate the roles of the two strategies by comparing their main traits. The results revealed that the construction cost and Amax of I. cairica did not change with the habitat type. The ecotype and saline treatments, however, significantly influenced the plant growth. The non-saline ecotype (NE) generally showed higher or equal plasticity of biomass-allocation and functional traits compared to the coastal ecotype (CE). However, the fitness and biomass of the NE significantly decreased with salinity, whereas those aspects of the CE did not change. Our results indicate that the recent expansion of I. cairica into coastal areas may be accelerated by the local adaptation of the CE to salt stress. Additionally, in South China, the CE will most likely evolve adaptations to both saline and non-saline environments, which will further broaden the invasion range of I. cairica in the future. PMID:26867222

  18. Satellite-Friendly Protocols and Standards

    Science.gov (United States)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  19. An emergency-adaptive routing scheme for wireless sensor networks for building fire hazard monitoring.

    Science.gov (United States)

    Zeng, Yuanyuan; Sreenan, Cormac J; Sitanayah, Lanny; Xiong, Naixue; Park, Jong Hyuk; Zheng, Guilin

    2011-01-01

    Fire hazard monitoring and evacuation for building environments is a novel application area for the deployment of wireless sensor networks. In this context, adaptive routing is essential in order to ensure safe and timely data delivery in building evacuation and fire fighting resource applications. Existing routing mechanisms for wireless sensor networks are not well suited for building fires, especially as they do not consider critical and dynamic network scenarios. In this paper, an emergency-adaptive, real-time and robust routing protocol is presented for emergency situations such as building fire hazard applications. The protocol adapts to handle dynamic emergency scenarios and works well with the routing hole problem. Theoretical analysis and simulation results indicate that our protocol provides a real-time routing mechanism that is well suited for dynamic emergency scenarios in building fires when compared with other related work. PMID:22163774

  20. An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring

    Directory of Open Access Journals (Sweden)

    Guilin Zheng

    2011-03-01

    Full Text Available Fire hazard monitoring and evacuation for building environments is a novel application area for the deployment of wireless sensor networks. In this context, adaptive routing is essential in order to ensure safe and timely data delivery in building evacuation and fire fighting resource applications. Existing routing mechanisms for wireless sensor networks are not well suited for building fires, especially as they do not consider critical and dynamic network scenarios. In this paper, an emergency-adaptive, real-time and robust routing protocol is presented for emergency situations such as building fire hazard applications. The protocol adapts to handle dynamic emergency scenarios and works well with the routing hole problem. Theoretical analysis and simulation results indicate that our protocol provides a real-time routing mechanism that is well suited for dynamic emergency scenarios in building fires when compared with other related work.

  1. An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zeng

    2010-06-01

    Full Text Available Fire hazard monitoring and evacuation for building environments is a novel application area for the deployment of wireless sensor networks. In this context, adaptive routing is essential in order to ensure safe and timely data delivery in building evacuation and fire fighting resource applications. Existing routing mechanisms for wireless sensor networks are not well suited for building fires, especially as they do not consider critical and dynamic network scenarios. In this paper, an emergency-adaptive, real-time and robust routing protocol is presented for emergency situations such as building fire hazard applications. The protocol adapts to handle dynamic emergency scenarios and works well with the routing hole problem. Theoretical analysis and simulation results indicate that our protocol provides a real-time routing mechanism that is well suited for dynamic emergency scenarios in building fires when compared with other related work.

  2. Resilience as strategy for climate adaptation under uncertainty. Case study on the area outside the dike of Rotterdam

    International Nuclear Information System (INIS)

    This study has two aims; (1) to obtain insight in the concepts resilience and uncertainty; to gain insight in how a resilience oriented approach deals with uncertainties about the future; and (2) putting the resilience oriented approach into operation in a case: the area outside the dike of Rotterdam, the Netherlands, which is designated for new buildings

  3. Myocardial area at risk and salvage measured by T2-weighted cardiovascular magnetic resonance: reproducibility and comparison of two T2-weighted protocols

    DEFF Research Database (Denmark)

    Lønborg, Jacob; Vejlstrup, Niels; Mathiasen, Anders B;

    2011-01-01

    Late gadolinium enhancement (LGE) and T2-weighted cardiovascular magnetic resonance (CMR) provides a means to measure myocardial area at risk (AAR) and salvage. Several T2-weighted CMR sequences are in use, but there is no consensus in terms of which sequence to be the preferred. Therefore, the aim...

  4. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  5. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  6. Mobile phone intervention for increasing adherence to treatment for type 2 diabetes in an urban area of Bangladesh: protocol for a randomized controlled trial

    OpenAIRE

    Mohammed Shariful ISLAM; Lechner, Andreas; Ferrari, Uta; Froeschl, Guenter; Alam, Dewan Shamsul; Holle, Rolf; Seissler, Jochen; Louis W. Niessen

    2014-01-01

    Background Mobile phone technologies including SMS (short message service) have been used to improve the delivery of health services in many countries. However, data on the effects of mobile health technology on patient outcomes in resource-limited settings are limited. The aim of this study therefore is to measure the impact of a mobile phone SMS service on treatment success of newly diagnosed type 2 diabetes in an urban area of Bangladesh. Methods/design This is a single-centred randomized ...

  7. Mind the gap in SEA: An institutional perspective on why assessment of synergies amongst climate change mitigation, adaptation and other policy areas are missing

    International Nuclear Information System (INIS)

    This article takes its point of departure in two approaches to integrating climate change into Strategic Environmental Assessment (SEA): Mitigation and adaptation, and in the fact that these, as well as the synergies between them and other policy areas, are needed as part of an integrated assessment and policy response. First, the article makes a review of how positive and negative synergies between a) climate change mitigation and adaptation and b) climate change and other environmental concerns are integrated into Danish SEA practice. Then, the article discusses the implications of not addressing synergies. Finally, the article explores institutional explanations as to why synergies are not addressed in SEA practice. A document analysis of 149 Danish SEA reports shows that only one report comprises the assessment of synergies between mitigation and adaptation, whilst 9,4% of the reports assess the synergies between climate change and other environmental concerns. The consequences of separation are both the risk of trade-offs and missed opportunities for enhancing positive synergies. In order to propose explanations for the lacking integration, the institutional background is analysed and discussed, mainly based on Scott's theory of institutions. The institutional analysis highlights a regulatory element, since the assessment of climate change synergies is underpinned by legislation, but not by guidance. This means that great focus is on normative elements such as the local interpretation of legislation and of climate change mitigation and adaptation. The analysis also focuses on how the fragmentation of the organisation in which climate change and SEA are embedded has bearings on both normative and cultural–cognitive elements. This makes the assessment of synergies challenging. The evidence gathered and presented in the article points to a need for developing the SEA process and methodology in Denmark with the aim to include climate change in the assessments in

  8. Universal protocol for alopecia areata clinical studies.

    Science.gov (United States)

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  9. Secure E-payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  10. Laboratory and quality assurance protocols for the analysis of herbicides in ground water from the Management Systems Evaluation Area, Princeton, Minnesota

    Science.gov (United States)

    Larson, S.J.; Capel, P.D.; VanderLoop, A.G.

    1996-01-01

    Laboratory and quality assurance procedures for the analysis of ground-water samples for herbicides at the Management Systems Evaluation Area near Princeton, Minnesota are described. The target herbicides include atrazine, de-ethylatrazine, de-isopropylatrazine, metribuzin, alachlor, 2,6-diethylaniline, and metolachlor. The analytical techniques used are solid-phase extraction, and analysis by gas chromatography with mass-selective detection. Descriptions of cleaning procedures, preparation of standard solutions, isolation of analytes from water, sample transfer methods, instrumental analysis, and data analysis are included.

  11. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  12. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  14. Development of mathematical models to elaborate strategies, select alternatives and development of plans for adaptation of communities to climate change in different geographical areas including costs to implement it

    Science.gov (United States)

    Anton, J. M.; Grau, J. B.; Tarquis, A. M.; Andina, D.; Cisneros, J. M.

    2012-04-01

    There is evidence that the climate changes and that now, the change is influenced and accelerated by the CO2 augmentation in atmosphere due to combustion by humans. Such "Climate change" is on the policy agenda at the global level, with the aim of understanding and reducing its causes and to mitigate its consequences. In most countries and international organisms UNO (e.g. Rio de Janeiro 1992), OECD, EC, etc … the efforts and debates have been directed to know the possible causes, to predict the future evolution of some variable conditioners, and trying to make studies to fight against the effects or to delay the negative evolution of such. The Protocol of Kyoto 1997 set international efforts about CO2 emissions, but it was partial and not followed e.g. by USA and China …, and in Durban 2011 the ineffectiveness of humanity on such global real challenges was set as evident. Among all that, the elaboration of a global model was not boarded that can help to choose the best alternative between the feasible ones, to elaborate the strategies and to evaluate the costs, and the authors propose to enter in that frame for study. As in all natural, technological and social changes, the best-prepared countries will have the best bear and the more rapid recover. In all the geographic areas the alternative will not be the same one, but the model must help us to make the appropriated decision. It is essential to know those areas that are more sensitive to the negative effects of climate change, the parameters to take into account for its evaluation, and comprehensive plans to deal with it. The objective of this paper is to elaborate a mathematical model support of decisions, which will allow to develop and to evaluate alternatives of adaptation to the climatic change of different communities in Europe and Latin-America, mainly in especially vulnerable areas to the climatic change, considering in them all the intervening factors. The models will consider criteria of physical

  15. Perturbation of the left inferior frontal gyrus triggers adaptive plasticity in the right homologous area during speech production

    DEFF Research Database (Denmark)

    Hartwigsen, Gesa; Saur, Dorothee; Price, Cathy J; Ulmer, Stephan; Baumgaertner, Annette; Siebner, Hartwig R

    2013-01-01

    (IFG) in healthy volunteers, then used functional MRI to investigate acute changes in effective connectivity between the left and right hemispheres during repetition of auditory and visual words and pseudowords. In separate sessions, we applied cTBS over the left anterior IFG (aIFG) or posterior IFG (p......IFG) to test the anatomic specificity of the effects of cTBS on speech processing. Compared with cTBS over the aIFG, cTBS over the pIFG suppressed activity in the left pIFG and increased activity in the right pIFG during pseudoword vs. word repetition in both modalities. This effect was associated with a...... hemisphere lesion. Our findings lend further support to the notion that increased activation of homologous right hemisphere areas supports aphasia recovery after left hemisphere damage....

  16. CNEN-NN 6.04 standard adaptation in Brazil for industrial radiographic work in occupied areas or public roads

    International Nuclear Information System (INIS)

    The industrial radiographic work that uses mobile equipment in Brazil must be in compliance with the National Commission of Nuclear Energy (CNEN) Regulation CNEN-NN 6.04. It states that every works that employs radiographic equipment in occupied areas or public roads requires a specific radiation protection procedure. This procedure must be approved by the CNEN at least fifteen days before starting the job. It is not always possible to the users to get their licensing work at time, because the industrial radiography jobs need immediate actions. Furthermore, the CNEN-NN 6.04 Regulation does not specify what type of information the procedures should involve, so that some important information had been often missed, causing a delaying in the licensing procedures. The corrective and preventive actions taken by the CNEN to optimize this kind of jobs and to overcome bureaucratic difficulties are described. A standard radiation protection procedure is also presented. (authors). 2 refs., 2 tabs

  17. Leak test adapter for containers

    Science.gov (United States)

    Hallett, Brian H.; Hartley, Michael S.

    1996-01-01

    An adapter is provided for facilitating the charging of containers and leak testing penetration areas. The adapter comprises an adapter body and stem which are secured to the container's penetration areas. The container is then pressurized with a tracer gas. Manipulating the adapter stem installs a penetration plug allowing the adapter to be removed and the penetration to be leak tested with a mass spectrometer. Additionally, a method is provided for using the adapter.

  18. Reclaimed water as a main resource to enhance the adaptive capacity to climate change in semi-arid Mediterranean agricultural areas using Earth Observation products

    Science.gov (United States)

    Pavia Rico, Ana; Lopez-Baeza, Ernesto; Matieu, Pierre-Philippe; Hernandez Sancho, Francesc; Loarte, Edwin

    Lack of water is being a big problem in semi-arid areas to make agricultural profits. Most of Mediterranean countries like Spain, Italy, Greece or Cyprus and other countries like Morocco, the Arab United Emirates, South-American countries or China are starting to reuse wastewater as adaptation to climate change water scarcity. Drought areas are nowadays increasing, thus making fertile areas unproductive. For this reason, the European trend is to work on reusing wastewater as a solution to water scarcity in agriculture. Moreover, since population is growing fast, wastewater production is increasing as well as drinkable water demand, thus making reclaimed water as the water guarantee for irrigation and better agricultural management. This work represents a preliminary initiative to check, analyse and monitor the land by using remote sensing techniques to identify and determine the potential lands that used to be productive in the past, are now abandoned, and we want to recuperate to obtain socio-economic benefits. On top of this, this initiative will clearly enhance the adaption capacity of rural/agricultural lands to climate change. Alternatively to reclaimed water, greenhouses, desalination plants or transboarding water do not really eliminate the problem but only offer a temporary solution, make spending plenty of money and always provoking irreversible damages to the environment. The pilot area to first develop this research is the Valencia and Murcia Autonomous Communities located in the Spanish Mediterranean Coastline. An added value of this work will be to develop a methodology transferable to other potential countries with similar climatic characteristics and difficulties for irrigation, by using remote sensing methods and techniques. The remote sensing products obtained provide full information about the current state of the potential lands to grow crops. Potential areas are then being selected to carry out a socio-economic analysis leading to: (i

  19. What is the impact on fish recruitment of anthropogenic physical and structural habitat change in shallow nearshore areas in temperate systems? A systematic review protocol

    DEFF Research Database (Denmark)

    MacUra, B.; Lönnstedt, O.M.; Byström, P.;

    2016-01-01

    Background: Shallow nearshore marine ecosystems are changing at an increasing rate due to a range of human activities such as urbanisation and commercial development. The growing numbers of constructions and other physical and structural alterations of the shoreline often take place in nursery and...... fish recruitment and which these effects are. Methods: The review will examine how various physical and structural anthropogenic changes of nearshore fish habitats affect fish recruitment. Relevant studies include small- and large-scale field studies in marine and brackish systems or large lakes in...... temperate regions of the Northern and Southern hemispheres. Relevant studies may be based on comparisons between undisturbed and disturbed areas, before and after disturbance, or both. Relevant outcomes include measures of recruitment defined as abundance of juveniles of nearshore fish communities. Searches...

  20. Adaptive thresholding with inverted triangular area for real-time detection of the heart rate from photoplethysmogram traces on a smartphone.

    Science.gov (United States)

    Jiang, Wen Jun; Wittek, Peter; Zhao, Li; Gao, Shi Chao

    2014-01-01

    Photoplethysmogram (PPG) signals acquired by smartphone cameras are weaker than those acquired by dedicated pulse oximeters. Furthermore, the signals have lower sampling rates, have notches in the waveform and are more severely affected by baseline drift, leading to specific morphological characteristics. This paper introduces a new feature, the inverted triangular area, to address these specific characteristics. The new feature enables real-time adaptive waveform detection using an algorithm of linear time complexity. It can also recognize notches in the waveform and it is inherently robust to baseline drift. An implementation of the algorithm on Android is available for free download. We collected data from 24 volunteers and compared our algorithm in peak detection with two competing algorithms designed for PPG signals, Incremental-Merge Segmentation (IMS) and Adaptive Thresholding (ADT). A sensitivity of 98.0% and a positive predictive value of 98.8% were obtained, which were 7.7% higher than the IMS algorithm in sensitivity, and 8.3% higher than the ADT algorithm in positive predictive value. The experimental results confirmed the applicability of the proposed method. PMID:25570674

  1. Climate Change Adaptation Strategies through Indigenous Knowledge System: Aspect on Agro-Crop Production in the Flood Prone Areas of Bangladesh

    Directory of Open Access Journals (Sweden)

    Md Abdullah Al Mamun

    2014-01-01

    Full Text Available This study explores the climate change adaptation strategies for agro crop production and assesses the financial suitability through indigenous knowledge in flood prone areas of Bangladesh. However, for this purpose two types of experiments have conducted with selected eight agro crop species. Firstly, the seven treatments have been experimented in a Tub (an earthen pot. In this case, Tomato (Lycoperscion esculeatum is more beneficial among these seven treatments and average benefit-cost ratio of this treatment was 3.54. Thereafter, the seven treatments also have been experimenting in Tukri (a bamboo basket. Likewise, Tomato (Lycoperscion esculeatum is more beneficial in the second experiment and average benefit-cost ratio in this treatment is 3.52 because the soil and the cow dung mixture have been used as a potting medium. On the contrary, Long coriander (Eryngium foetidum is more beneficial and average benefit-cost ratio in this treatment is 4.74 after using the soil and water hyacinth mixture as a potting medium. According to indigenous knowledge, these results could be developed from different climate change adaptation strategies in farming system for production of common agro crops as well as their financial suitability by the flood affected people of Bangladesh to harness the effect of climate change.

  2. Spatial Analysis of Soil Subsidence in Peat Meadow Areas in Friesland in Relation to Land and Water Management, Climate Change, and Adaptation

    Science.gov (United States)

    Brouns, Karlijn; Eikelboom, Tessa; Jansen, Peter C.; Janssen, Ron; Kwakernaak, Cees; van den Akker, Jan J. H.; Verhoeven, Jos T. A.

    2015-02-01

    Dutch peatlands have been subsiding due to peat decomposition, shrinkage and compression, since their reclamation in the 11th century. Currently, subsidence amounts to 1-2 cm/year. Water management in these areas is complex and costly, greenhouse gases are being emitted, and surface water quality is relatively poor. Regional and local authorities and landowners responsible for peatland management have recognized these problems. In addition, the Netherlands Royal Meteorological Institute predicts higher temperatures and drier summers, which both are expected to enhance peat decomposition. Stakeholder workshops have been organized in three case study areas in the province of Friesland to exchange knowledge on subsidence and explore future subsidence rates and the effects of land use and management changes on subsidence rates. Subsidence rates were up to 3 cm/year in deeply drained parcels and increased when we included climate change in the modeling exercises. This means that the relatively thin peat layers in this province (ca 1 m) would shrink or even disappear by the end of the century when current practices continue. Adaptation measures were explored, such as extensive dairy farming and the production of new crops in wetter conditions, but little experience has been gained on best practices. The workshops have resulted in useful exchange of ideas on possible measures and their consequences for land use and water management in the three case study areas. The province and the regional water board will use the results to develop land use and water management policies for the next decades.

  3. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  4. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier;

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  5. Traffic Engineering With Traditional IP Routing Protocols

    OpenAIRE

    Fortz, Bernard; Rexford, Jennifer; Thorup, Mikkel

    2002-01-01

    Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base of Interior Gateway Protocols (IGPs), such as Open Shortest Path First (OSPF) and Intermediate System-Intermediate System (IS-IS). We explain how to adapt the configuration of link weights, based on a ...

  6. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  7. Adaptation of the dynamic model for radiological assessment of nuclear accident in rural area under conditions of tropical climate; Adaptacao do modelo dinamico para avaliacao radiologica de acidente nuclear em area rural nas condicoes de clima tropical

    Energy Technology Data Exchange (ETDEWEB)

    Vinhas, Denise Martins

    2004-07-01

    Following an accidental release of radionuclides to the atmosphere that leads to the contamination of large areas, a detailed and fast methodology to assess the prognosis of public exposure is needed, in order to estimate radiological consequences and propose and optimize decisions related to the protection of the public. The model ECOSYS has been chosen to integrate the SIEM, the Integrated Emergency System developed by IRD/CNEN, to assess the doses at the short, medium and long term to the public after an accidental contamination of rural areas. The objective of this work is to perform the adaptation of the model ECOSYS to be used in Brazil to assess public exposure and support decision processes regarding the implementation of protective measures but also to guide the need for studies and research aiming to improve the adequacy of estimates to the actual Brazilian situation. The area select for reference to this work consists on the 50 km radius area surrounding the Brazilian nuclear power plants, located at Angra dos Reis County, in the state of Rio de Janeiro. The methodology included the definition of criteria to select agricultural cultures and animals to be simulated, taking into account both the availability of the production at the selected area and the relevance of the food to the population regional diet. Radionuclides included in this study were {sup 137}Cs, {sup 90} Sr and {sup 131} I. A large survey has been performed to gather data related to both agricultural practices and behavior of radionuclides in the selected agricultural-systems. The results of simulation indicated the relevance of the knowledge of local aspects on the estimated doses. Important factors included the kind of products produced, seasonality, agricultural practices, animals feed practices, kind of soil, and ingestion habits of the population. (author)

  8. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  9. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  10. Adaptation to climate change, Vulnerability and Micro- Insurance Business: A Study on Forest Dependent Communities in Drought prone areas of West Bengal, India

    OpenAIRE

    Jyotish Prakash Basu

    2011-01-01

    There are two main responses to climate change. One is adaptation and other is mitigation. The adaptation process includes three essential stages i.e. vulnerability assessment, capacity building and implementation of adaptation measures. The fundamental goal of adaptation strategies is the reduction of the vulnerabilities to climate-induced change. In India 700 million rural populations directly depend on climate-sensitive sectors like agriculture, forest and fisheries and natural resources s...

  11. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  12. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  13. Examining the Specific Effects of Context on Adaptive Behavior and Achievement in a Rural African Community: Six Case Studies from Rural Areas of Southern Province, Zambia

    Science.gov (United States)

    Tan, Mei; Reich, Jodi; Hart, Lesley; Thuma, Philip E.; Grigorenko, Elena L.

    2014-01-01

    Generally accepted as universal, the construct of adaptive behavior differs in its manifestations across different cultures and settings. The Vineland-II (Sparrow et al. in "Vineland Adaptive Behavior Scales, Second edn." AGS Publishing, Circle Pines, MN, 2005) was translated into Chitonga and adapted to the setting of rural Southern…

  14. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...

  15. TCP Reno over Adaptive CSMA

    OpenAIRE

    Chen, Wei; Wang, Yue; Chen, Minghua; Liew, Soung Chang

    2010-01-01

    An interesting distributed adaptive CSMA MAC protocol, called adaptive CSMA, was proposed recently to schedule any strictly feasible achievable rates inside the capacity region. Of particular interest is the fact that the adaptive CSMA can achieve a system utility arbitrarily close to that is achievable under a central scheduler. However, a specially designed transport-layer rate controller is needed for this result. An outstanding question is whether the widely-installed TCP Reno is compatib...

  16. Energy Efficient (EECP) Clustered Protocol for Heterogeneous Wireless Sensor Network

    OpenAIRE

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Energy Conservation and prolonging the life of Wireless Sensor Network is one of the major issues in the wireless sensor network as sensor nodes are highly energy constrained devices. Many routing protocols have been proposed for sensor network, especially cluster based routing protocols. Cluster based routing protocols are best known for its energy efficiency, network stability and for increasing the life time of the sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of ...

  17. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  18. Efficient decentralized consensus protocols

    Science.gov (United States)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  19. Power Control Protocols in VANET

    OpenAIRE

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  20. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  1. Changes of water demand - possible adaptation of agricultural crops and management options to improve water use efficiency in the Marchfeld area

    Science.gov (United States)

    Thaler, S.; Eitzinger, J.; Dubrovsky, M.; Trnka, M.

    2009-04-01

    The main objective of this study was to determine the vulnerability of current agricultural cropping systems in the Marchfeld region to climate change. The investigation area Marchfeld is located in the north-eastern (NE) part of Austria and is characterized by a semi-arid climate with low annual rainfall. It is one of the driest regions in the country, but also one of the main field crop production areas. The soil conditions in Marchfeld demonstrate a significant spatial variability, which include soils with low to moderate water-storage capacities. Higher temperatures in the next decades imply higher evaporation and consequently higher water demand for the crops. The phenological development rates of the cultivars will accelerate and an increase of heat stress as well as drought stress can be expected. These points influence intense the water balance and subsequently the yield of the crops in the investigation area. In order to improve water use efficiency under those changing conditions, a shift of average sowing dates and an adjustment of tillage were analyzed. The DSSAT cropping system model was applied for winter wheat and spring barley to assess potential yield under climate scenarios for NE Austria. The scenarios were carried out with ECHAM5, HadCM3 and NCAR PCM global circulation models (GCMs) for present conditions (reference period 1961-1990) and 2035's (2021-2050), based on SRES-A1B emission scenarios. Yield model simulations were done for all defined scenarios (climate, management, crop) and different soil classes. The simulations contain the CO2 fertilizing effect, rain fed farming, adapted sowing date and contemporary crops without consideration of potential profit cuts caused by pest or diseases. Simulation results indicate that climate change will force a delay of the sowing date for winter wheat of maximal 14 days in October. In case of spring barley, climate change allows an earlier sowing date in spring (up to 14 days). Both crops show a

  2. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  3. Security of RFID protocols

    OpenAIRE

    van Deursen, Ton

    2011-01-01

    Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceab...

  4. "Counterfactual" quantum protocols

    OpenAIRE

    Vaidman, Lev

    2016-01-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of `counterfactuality' is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named `counterfactual', while proposed "counterfactual" measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols...

  5. Social Protocols for Agile Virtual Teams

    CERN Document Server

    Picard, Willy

    2011-01-01

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  6. Social Protocols for Agile Virtual Teams

    Science.gov (United States)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  7. SPION: Secure Protocols in OSI Networks

    OpenAIRE

    Ahlgren, Bengt; Lindgren, Per; Sirotkin, Teet

    1989-01-01

    SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such a...

  8. An Anonymous Secure Routing Using OLSR Protocol

    OpenAIRE

    Osiers Gyamfuah Grace; Dr. John Rajan

    2013-01-01

    Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS) device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated int...

  9. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  10. Secure Key Management Protocol in WIMAX

    OpenAIRE

    Noudjoud Kahya; Nacira Ghoualmi; Pascal Lafourcade

    2012-01-01

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. ...

  11. Commemoration of Montreal Protocol

    OpenAIRE

    CUCULEANU Georgeta

    2008-01-01

    The paper presents the main provisions of the Convention from Vienna for the Protection of the Ozone Layer, the 1987 Montreal Protocol on Substances that deplete the Ozone Layer and its Amendments. The restricting and banning programmes of these substances, some consequences on the environment of the absence of the Protocol and some alternative substances are also presented.

  12. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two...

  13. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  14. Local agency, adaptation and the shadow system: The institutional architecture of social learning in rural areas of the UK and India

    OpenAIRE

    High, Chris; Pelling, Mark; Rengasamy, S.

    2004-01-01

    Rural communities across the world face at times a range of environmental, social and economic pressures that threaten their viability in their current form. The ability of local actors to exercise agency in response to potential and emerging threats is of key interest in understanding their capacity to adapt. This paper argues that top-down narratives which focus on canonical organisations and formal institutions are at best a partial account of rural adaptation. More attention needs to b...

  15. Energy Efficient MAC Protocols for Wireless Sensor Network: A Survey

    Directory of Open Access Journals (Sweden)

    Eleazar Chukwuka

    2013-08-01

    Full Text Available Wireless Sensor Network (WSN is an attractive choice for a variety of applications as no wiredinfrastructure is needed. Other wireless networks are not as energy constrained as WSNs, because theymay be plugged into the mains supply or equipped with batteries that are rechargeable and replaceable.Among others, one of the main sources of energy depletion in WSN is communications controlled by theMedium Access Control (MAC protocols. An extensive survey of energy efficient MAC protocols ispresented in this article. We categorise WSN MAC protocols in the following categories: controlled access(CA, random access (RA, slotted protocols (SP and hybrid protocols (HP. We further discuss howenergy efficient MAC protocols have developed from fixed sleep/wake cycles through adaptive to dynamiccycles, thus becoming more responsive to traffic load variations. Finally we present open researchquestions on MAC layer design for WSNs in terms of energy efficiency.

  16. Routing Protocol Performance Issues and Evaluation Considerations in MANET

    Directory of Open Access Journals (Sweden)

    P.Venkata Maheswara,

    2013-07-01

    Full Text Available Mobile nodes in Wire less a d-hoc networ k need to operate as routers in or d er to maintain the informa tion ab out network connectivity as there is no centralized infrastructure. Therefore,Routing Protocols are required which could adapt dynamically to the changing topologies and works at low data rates. As are sult, there arises a need for the compreh ensive performance evaluation of the ad-doc routing protocols in same frame work to under stand their comparative merits and suitability for deployment in different scenarios. In this paper the protocols suite selected for comparison are AODV, DSR, TORA and OLSR ad- hoc routing protocols, as these were the most promising from all other protocols. The performance of these protocols is evaluated through exhaustive simulations using the OPNET Model network simulator under different parameters like routing over head, delay , throughput and network load under varying the mobile nodes .

  17. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  18. A Performance Comparison of Two Real Time WLAN MAC Protocols

    Institute of Scientific and Technical Information of China (English)

    CAO Chun-sheng; LI Feng; ZHANG Wei-dong

    2007-01-01

    By modifying the IEEE 802.11 wireless local area network (WLAN) medium access protocol (MAC), a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications. Both protocols can ensure the real time frame only need to wait a determinable bounded time. These two protocols are introduced briefly and a performance comparison between them is made. Simulation results show that each protocol has advantage over the others in certain network condition.

  19. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  20. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  1. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  2. A Review of Fair Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

  3. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Abdul Razaque; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  4. Kyoto protocol and cogeneration in rural areas: institutional and organizational configuration and perspectives; Protocolo de Kyoto e co-geracao no meio rural: configuracao institucional e organizacional e perspectivas

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Zilmar Jose de; Azevedo, Paulo Furquim de [Fundacao Getulio Vargas (EESP/FGV), Sao Paulo, SP (Brazil). Escola de Economia de Sao Paulo], e-mails: zilmar.souza@energiasdobrasil.com.br, pfa@fgvsp.br

    2006-07-01

    This article presents a brief historical record concerning the Brazilian institutional arrangement given to the Kyoto Protocol and, based on the Brazilian emissions profile, discusses general perspectives to the use of the CDM, mainly in projects involving co-generation in the agricultural sector. It is observed high uncertainty about the liquidity and development of the carbon credit market, above all, with reference to the definition of the second period of the Kyoto Protocol commitments. Even so, with the consolidation of the institutional environment, the carbon credit market must become favorable to the projects of co-generation in agricultural sector, especially in countries as Brazil. (author)

  5. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  6. Village Level Protocol

    OpenAIRE

    Ankur Dumka

    2014-01-01

    Here in this paper we have proposed for a protocol to be implemented at the village level. As at the village level as there are few agencies to be contacted at village level so this uses a local label addressing of 4 bits to support 16 agencies with 3 bits Time to live header which checks weather a packet is reached or not. Thus being small packet size this protocol is faster and able to support fast network service at village level.

  7. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  8. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  9. PERFORMANCE EVALUATION OF VANETS ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Abduladhim Ashtaiwi

    2014-11-01

    Full Text Available Lately, the concept of VANETs (Vehicular Ad hoc Networks has gotten a huge attention as more wireless communication technologies becoming available. Such networkis expected to be one of the most valuable technology for improving efficiency and safety of the future transportation. Vehicular networks are characterized by high mobility nodes which pose many communication challenging problems. In vehicular networks, routing Collision Avoidance Messages (CAMs among vehicles is a key communication problem.Failure in routing CAMs to their intended destination within the time constraint can render these messages useless. Many routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced Distance Vector, AODV (Ad-hoc On demand Distance Vector, and DSR (Dynamic Source Routing. This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim and network simulator(NS2. The obtained results at different vehicular densities, speeds, road obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges DSR tends to have better performance than AODV and DSDV protocols.

  10. Acquisition of Adaptation Knowledge for Breast Cancer Treatment Decision Support

    OpenAIRE

    Lieber, Jean; D'Aquin, Mathieu; Bey, Pierre; Napoli, Amedeo; Rios, Maria; Sauvagnac, Catherine

    2003-01-01

    The elaboration of a treatment in cancerology depends on the particular practice of decision protocols. These protocols are often adapted rather than used straightforwardly. This paper deals with the acquisition of the knowledge exploited during protocol adaptations. It shows that this knowledge acquisition process can be based on similarity paths, that are used for representing the matchings between decision problems (e.g., source and target problems within a case-based reasoning process).

  11. Adaptation to climate change in the biosphere reserves: a case study of Katunskiy Biosphere Reserve, Russia. eco.mont (Journal on Protected Mountain Areas Research)|eco.mont Vol. 3 No. 1 3 1|

    OpenAIRE

    Yashina, Tatjana

    2011-01-01

    Climate change is increasingly recognized as the driver of biodiversity change. In recent years, the issues related to climate change have left the purely scientific realm and got on the agenda of many international organizations, programmes, conventions and initiatives seeking ways to mitigate and adapt to this phenomenon. Protected areas and biosphere reserves (BRs) in particular, focused as they are on the conservation of ecosystem services and on fostering sustainable regional development...

  12. Adaptive Lighting

    OpenAIRE

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive LightingAdaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled i...

  13. A simulation study of TaMAC protocol using network simulator 2.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-10-01

    A Wireless Body Area Network (WBAN) is expected to play a significant role in future healthcare system. It interconnects low-cost and intelligent sensor nodes in, on, or around a human body to serve a variety of medical applications. It can be used to diagnose and treat patients with chronic diseases such as hypertensions, diabetes, and cardiovascular diseases. The lightweight sensor nodes integrated in WBAN require low-power operation, which can be achieved using different optimization techniques. We introduce a Traffic-adaptive MAC protocol (TaMAC) for WBAN that supports dual wakeup mechanisms for normal, emergency, and on-demand traffic. In this letter, the TaMAC protocol is simulated using a well-known Network Simulator 2 (NS-2). The problem of multiple emergency nodes is solved using both wakeup radio and CSMA/CA protocol. The power consumption, delay, and throughput performance are closely compared with beacon-enabled IEEE 802.15.4 MAC protocol using extensive simulations. PMID:21863319

  14. 一种自适应功率控制的信道预约多址接入协议%Channel reservation MAC protocol with adaptive power control mechanism carrier sensing

    Institute of Scientific and Technical Information of China (English)

    袁韵洁; 李波; 闫中江

    2013-01-01

    提出了一种动态调整发送功率和载波侦听门限的信道预约多址接入协议(PC-CRM).该协议将功率控制技术应用于信道预约机制,通过对预约节点发送功率的优化设定和载波侦听门限的动态调整,使得相邻节点可以同时复用信道,从而在增强预约稳定性的基础上,提升了网络容量,降低了节点能耗.仿真结果显示,与IEEE 802.11 DCF和基本信道预约协议相比,PC-CRM协议在网络吞吐率、能量消耗效率和分组延迟抖动方面均有明显优势.%vA channel reservation MAC protocol with the adjustable transmission power and carrier sensing threshold, called PC-CRM, is proposed. PC-CRM solves the problems of poor transmission quality, low network capacity and high energy consumption, which are caused by the distributed contention based channel access scheme in Ad Hoc networks. By employing power control into the channel reservation schemes, PC-CRM adjusts the transmission power and carrier sensing threshold to the optimum values, such that the channel is multiplexed in space. Additionally, PC-CRM is also capable of stabilizing the channel reservation, improving the network capacity, and reducing the energy cost. Simulation results show that, compared with IEEE 802. 11DCF and the basic channel reservation scheme, PC-CRM performs better in terms of the throughput, energy efficiency and delay jitter.

  15. Chain-Chain Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Samia A Ali

    2011-05-01

    Full Text Available Wireless sensor network (WSN is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and security monitoring systems where minimum delay is desirable. Number of protocols has been proposed in the literature for routing. One of such protocols is the cluster based routing protocol LEACH (low energy adaptive clustering hierarchy. LEACH protocol organizes WSN into a set of clusters and a periodic voting for cluster head is performed in order to be evenly distributed among all the sensors of the WSN. This periodical cluster head voting in LEACH, however, consumes an amount of non-negligible energy and other resources. For energy conservation, PEGASIS (power efficient gathering in sensor information systems a near optimal chain-based protocol has been proposed, however, it is faced with the challenge of long delay for the transmitted data. Another routing protocol called CCM (Chain-Cluster based Mixed routing, which is mainly a hybrid of LEACH and PEGASIS is proposed, the consumed energy increases as network size increases. In this paper, we propose an efficient routing protocol called CCBRP (Chain-Chain based routing protocol, it achieves both minimum energy consumption and minimum delay. The CCBRP protocol mainly divides a WSN into a number of chains (Greedy algorithm is used to form each chain as in PEGSIS protocol and runs in two phases. In the first phase, sensor nodes in each chain transmit data to their chain leader nodes in parallel. In the second phase, all chain leader nodes form a chain (also, using Greedy algorithm and choose randomly a leader node then all chain leader nodes send their data to this chosen leader node. This chosen leader node

  16. IMPLEMENTATION OF HTTP LIVE STREAMING PROTOCOL IN JAVA

    OpenAIRE

    Rehar, Anže

    2012-01-01

    In this thesis we discuss protocols for streaming to mobile devices. Tremendous growth of smartphone and tablet sales numbers over the past few years push content providers to seek new ways to offer video content. However, these devices have some limitations that make the implementation of video streaming a complex project. Most depends on the streaming protocol selection. There is a set of HTTP based technologies but there are no standards for adaptive streaming to mobile devices. In thesis ...

  17. Implementation and Experimental Evaluation of Wireless Ad hoc Routing Protocols

    OpenAIRE

    Lundgren, Henrik

    2005-01-01

    A wireless ad hoc network consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. New routing protocols that can adapt to the frequent topology changes induced by node mobility and varying link qualities are needed. During the last decade dozens of different ad hoc routing protocols have been proposed, optimized and partially compared, mainly through simulation studies. This thesis takes an experimental approach to the evaluation of ad hoc routing pro...

  18. Evaluation of Handover Protocols in Wireless ATM Networks

    OpenAIRE

    Jamila Bhar; Ridha Ouni; Abdelhamid Helali; Salem Nasri

    2007-01-01

    The extension of the ATM infrastructure with wireless access and mobility offer a great service advantages and high traffic performances. Allowing the Wireless ATM network in order to maintain the already QoS of ATM networks, some protocols of wireline architecture should be updated. The adaptation of the existing protocols to wireless requires integrating radio access functionalities and terminal mobility management. This last is an important factor in provisioning multimedia applications ov...

  19. Addressing Mobility in Wireless Sensor Media Access Protocol

    OpenAIRE

    Huan Pham; Sanjay Jha

    2005-01-01

    Handling mobility in wireless sensor networks presents several new challenges. Techniques developed for other mobile networks, such as mobile phone or mobile adhoc networks can not be applicable, as in these networks energy is not a very critical resource. This paper presents a new adaptive Mobility-aware Sensor MAC protocol (MS-MAC) for mobile sensor applications. In MS-MAC protocol, a node detects its neighbor's mobility based on a change in its received signal level from the neighbor, or a...

  20. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  1. Debunking myths of protocol registration

    OpenAIRE

    Chang Stephanie M; Slutsky Jean

    2012-01-01

    Abstract Developing and registering protocols may seem like an added burden to systematic review investigators. This paper discusses benefits of protocol registration and debunks common misperceptions on the barriers of protocol registration. Protocol registration is easy to do, reduces duplication of effort and benefits the review team by preventing later confusion.

  2. Comments on five smart card based password authentication protocols

    Directory of Open Access Journals (Sweden)

    Yalin Chen

    2010-05-01

    Full Text Available In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al., Hsiang et al., Kim et al., and Li et al. all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected to an insider impersonation attack.

  3. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  4. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that...... the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and...

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  7. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  8. Protocol for secure quantum machine learning at a distant place

    Science.gov (United States)

    Bang, Jeongho; Lee, Seung-Woo; Jeong, Hyunseok

    2015-10-01

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  9. Dynamic Routing Protocol for Computer Networks with Clustering Topology

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.

  10. Adaptive skills

    OpenAIRE

    Staša Stropnik; Jana Kodrič

    2013-01-01

    Adaptive skills are defined as a collection of conceptual, social and practical skills that are learned by people in order to function in their everyday lives. They include an individual's ability to adapt to and manage her or his surroundings to effectively function and meet social or community expectations. Good adaptive skills promote individual's independence in different environments, whereas poorly developed adaptive skills are connected to individual's dependency and with g...

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  12. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  13. Adaptive Communication Techniques for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Du

    2013-03-01

    Full Text Available The vision for the Internet of Things (IoT demands that material objects acquire communications and computation capabilities and become able to automatically identify themselves through standard protocols and open systems, using the Internet as their foundation. Yet, several challenges still must be addressed for this vision to become a reality. A core ingredient in such development is the ability of heterogeneous devices to communicate adaptively so as to make the best of limited spectrum availability and cope with competition which is inevitable as more and more objects connect to the system. This survey provides an overview of current developments in this area, placing emphasis on wireless sensor networks that can provide IoT capabilities for material objects and techniques that can be used in the context of systems employing low-power versions of the Internet Protocol (IP stack. The survey introduces a conceptual model that facilitates the identification of opportunities for adaptation in each layer of the network stack. After a detailed discussion of specific approaches applicable to particular layers, we consider how sharing information across layers can facilitate further adaptation. We conclude with a discussion of future research directions.

  14. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    OpenAIRE

    V.Nivedhitha; B.Baranidharan; B. Santhi

    2013-01-01

    Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  15. Adaptive Lighting

    DEFF Research Database (Denmark)

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... distributed differently into an architectural body. We also examine what might occur when light is dynamic and able to change colour, intensity and direction, and when it is adaptive and can be brought into interaction with its surroundings. In short, what happens to an architectural space when artificial...

  16. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  17. High dynamic adaptive mobility network model and performance analysis

    Institute of Scientific and Technical Information of China (English)

    LIU Hui; ZHANG Jun

    2008-01-01

    Since mobile networks are not currently deployed on a large scale, research in this area is mostly by simulation. Among other simulation parameters, the mobility model plays a very important role in determining the protocol performance in MANET. Based on random direction mobility model, a high dynamic adaptive mo-bility network model is proposed in the paper. The algorithms and modeling are mainly studied and explained in detail. The technique keystone is that normal dis-tribution is combined with uniform distribution and inertial feedback control is combined with kinematics, through the adaptive control on nodes speed and pre-diction tracking on nodes routes, an adaptive model is designed, which can be used in simulations to produce realistic and dynamic network scenarios. It is the adaptability that nodes mobile parameters can be adjusted randomly in three-dimensional space. As a whole, colony mobility can show some rules. Such ran-dom movement processes as varied speed and dwells are simulated realistically. Such problems as sharp turns and urgent stops are smoothed well. The model can be adapted to not only common dynamic scenarios, but also high dynamic sce-narios. Finally, the mobility model performance is analyzed and validated based on random dynamic scenarios simulations.

  18. Robust Adaptive Control

    Science.gov (United States)

    Narendra, K. S.; Annaswamy, A. M.

    1985-01-01

    Several concepts and results in robust adaptive control are are discussed and is organized in three parts. The first part surveys existing algorithms. Different formulations of the problem and theoretical solutions that have been suggested are reviewed here. The second part contains new results related to the role of persistent excitation in robust adaptive systems and the use of hybrid control to improve robustness. In the third part promising new areas for future research are suggested which combine different approaches currently known.

  19. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  20. Adaptive network countermeasures.

    Energy Technology Data Exchange (ETDEWEB)

    McClelland-Bane, Randy; Van Randwyk, Jamie A.; Carathimas, Anthony G.; Thomas, Eric D.

    2003-10-01

    This report describes the results of a two-year LDRD funded by the Differentiating Technologies investment area. The project investigated the use of countermeasures in protecting computer networks as well as how current countermeasures could be changed in order to adapt with both evolving networks and evolving attackers. The work involved collaboration between Sandia employees and students in the Sandia - California Center for Cyber Defenders (CCD) program. We include an explanation of the need for adaptive countermeasures, a description of the architecture we designed to provide adaptive countermeasures, and evaluations of the system.

  1. Network Coding-Based Congestion Control at Network Layer: Protocol Design and Evaluation

    Directory of Open Access Journals (Sweden)

    Zsuzsanna Ilona Kiss

    2011-01-01

    Full Text Available The paper proposes a congestion control protocol based on Network Coding (NC operations for thebutterfly topology. The proposed protocol defines XOR-based coding and decoding algorithms adapted tostreams having different rates and characteristics, as well as a signalling protocol required for dynamicactivation and deactivation of NC operations. Some general principles related to the integration of NCoperations into data transmission protocols are also discussed. The congestion control protocol proposedwas simulated in OMNeT++ and implemented in a real network to demonstrate its feasibility and to testthe functioning of the proposed coding and signalling algorithm in different scenarios.

  2. Evaluate Dynamic Source Routing Protocol Performance in Wireless MANET

    Directory of Open Access Journals (Sweden)

    Ashwin Perti

    2014-03-01

    Full Text Available Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth. In my research paper I have analyzed a routing protocol called Dynamic Source Routing (DSR. At the ed of my Research paper result of its unique design, the protocol adapts quickly to routing changes when node movement is frequent, yet requires little or no overhead during periods in which nodes move less frequently. By graphical form a detailed analysis of DSR’s behaviour in a variety of situations, this paper generalizes the lessons learned from DSR so that they can be applied to the many other new routing protocols that have adopted the basic DSR framework. In the DSR protocol, a backup route will be initiated to transfer data (in route cache when the initial route is broken. However, a backup route affects the overall network performance such as end-to-end delay, etc. In this paper, I showed the simulation results of the dynamic source routing protocol based on it’s throughput, pause time, packet received, drop packet ratio, end to end delay, packet delivery fraction, and routing overhead. This results shows that dynamic source routing protocol is an efficient protocol to be used in Ad Hoc network.

  3. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  4. An Anonymous Secure Routing Using OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Osiers Gyamfuah Grace

    2013-01-01

    Full Text Available Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET. Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated into the existing Optimized Link State Routing protocol (OLSR, it is expected that security services such as authentication, data integrity, privacy and confidentiality will be provided. This work proposes to protect the network against active attacks such as impersonation and modification.

  5. Do we know how to reconcile preservation of landscapes with adaptation of agriculture to climate change? A case-study in a hilly area in Southern Italy

    Science.gov (United States)

    Menenti, Massimo; Alfieri, Silvia; Basile, Angelo; Bonfante, Antonello; Monaco, Eugenia; Riccardi, Maria; De Lorenzi, Francesca

    2013-04-01

    Limited impacts of climate change on agricultural yields are unlikely to induce any significant changes in current landscapes. Larger impacts, unacceptable on economic or social ground, are likely to trigger interventions towards adaptation of agricultural production systems by reducing or removing vulnerabilities to climate variability and change. Such interventions may require a transition to a different production system, i.e. complete substitution of current crops, or displacement of current crops at their current location towards other locations, e.g. at higher elevations within the landscape. We have assessed the impacts of climate change and evaluated options for adaptation of a valley in Southern Italy, dominated by vine and olive orchards with a significant presence of wheat. We have first estimated the climatic requirements of several varieties for each dominant species. Next, to identify options for adaptation we have evaluated the compatibility of such requirements with indicators of a reference (current) climate and of future climate. This climate - compatibility assessment was done for each soil unit within the valley, leading to maps of locations where each crop is expected to be compatible with climate. This leads to identify both potential crop substitutions within the entire valley and crop displacements from one location to another within the valley. Two climate scenarios were considered: reference (1961-90) and future (2021-2050) climate, the former from climatic statistics, and the latter from statistical downscaling of general circulation models (AOGCM). Climatic data consists of daily time series of maximum and minimum temperature, and daily rainfall on a grid with a spatial resolution of 35 km. We evaluated the adaptive capacity of the "Valle Telesina" (Campania Region, Southern Italy). A mechanistic model of water flow in the soil-plant-atmosphere system (SWAP) was used to describe the hydrological conditions in response to climate for each

  6. Organisms adaptable concrete. Eco-concrete for fresh water area; Seibutsu to kyoseisuru eco-concrete. Tansuiiki taiogata eco-concrete

    Energy Technology Data Exchange (ETDEWEB)

    Sakai, k. [Hokkaido Development Bureau, Hokkaido Development Agency, Sapporo (Japan); Shindo, K. [Kyowa Concrete Industry Co. Ltd., Sapporo (Japan)

    1998-03-01

    Described herein are the current statuses of organisms in fresh water and organisms adaptable concrete for fresh water use, and results of the tests in which cylindrical blocks of porous concrete are placed in fresh water to follow types of organisms clinging to them and temporal changes in their numbers. These tests have confirmed that porous concrete can be used as the one compatible with the environment, because large quantities of aqueous insects and algae are found to cling to these blocks. The major findings are: larger quantities of aqueous insects cling to porous concrete than to ordinary one, and sometimes than to natural river floors; no effect of concrete composition on algae clinging thereto is observed; types of algae clinging to porous concrete are diversified with time; and it is possible to minimize changes in natural environments by replacing ordinary concrete by porous one. 6 refs., 10 figs.

  7. Adaptive Lighting

    DEFF Research Database (Denmark)

    Petersen, Kjell Yngve; Søndergaard, Karin; Kongshaug, Jesper

    2015-01-01

    Adaptive Lighting Adaptive lighting is based on a partial automation of the possibilities to adjust the colour tone and brightness levels of light in order to adapt to people’s needs and desires. IT support is key to the technical developments that afford adaptive control systems. The possibilities...... offered by adaptive lighting control are created by the ways that the system components, the network and data flow can be coordinated through software so that the dynamic variations are controlled in ways that meaningfully adapt according to people’s situations and design intentions. This book discusses...... the investigations of lighting scenarios carried out in two test installations: White Cube and White Box. The test installations are discussed as large-scale experiential instruments. In these test installations we examine what could potentially occur when light using LED technology is integrated and...

  8. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  9. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  10. Protocols for Microcontrollers Networks

    OpenAIRE

    López, Ricardo A.

    2011-01-01

    The microcontrollers are embedded in our way of life and are found in many devices. The ability of Very High Scale Integration (VLSI) - with almost exponential growth in recent years makes these devices every day contain functions previously unthinkable. Therefore, a grouping of these networked devices creates a very powerful system, which equipped with a standard protocol that allows interconnection to the Internet gives you a virtually unlimited range of scalability. For these reasons, t...

  11. Seismic protocol urges sensitivity

    International Nuclear Information System (INIS)

    This paper is a preliminary summary of a protocol manual for conducting seismic surveys in various topographic and geographic situations to minimize environmental impacts. The manual aims at addressing unique issues for six different types of ecological environments in such a way as to enhance contractors' overall awareness of the types of environmental issues they may encounter, along with some common sense methods of dealing with them. Those six environments are marine, coastal, rain forest, arctic, semi-level terrains, and mountainous

  12. 都市密集区的气候风险与适应性建设——以上海为例%Climate Risk and Adaptation Strategies in Metropolis Dense Areas: A Case Study of Shanghai

    Institute of Scientific and Technical Information of China (English)

    宋蕾

    2012-01-01

    Frequent extreme climate events are increasing climate risk and challenging adaptive capabilities in metropolis dense areas. The vulnerability assessment and the demands for adaptive capabilities are the crux of climate risk management and policy-making decisions. This research had emphasis on the specific characteristics of climate risk as well as the impact factors of vulnerabilities. Furthermore, grounded on the approach of participatory analysis, the case studies in Shanghai had been carried out, which reflected how different the stakeholders had the perception of climate risk and the demands of adaptation. The main hazard factors of climate change in Shanghai focused on the typhoons, rain storms and heat waves, which had impacts on social and economic development including the transportations, energy supply, agricultural development and urban waterlogging. The participatory stakeholder analysis in Shanghai depicted the different adaption demands. The communities in Shanghai emphasized the adaptation demands for heat weaves. The meteorologists paid more attention on the agricultural climate adaptation. Compared with the formers, Shanghai municipal managers would rather pay more concern on flood risk management. The research outcomes discussed the force driving factors of metropolitan climate risk including coastal geographic location, the population vulnerabilities (aging and high-density population), ecological vulnerabilities (the degraded ecological bearing capacities and resilience) and the vulnerabilities of economic structures. All in all, the metropolitan areas should build more incremental adaptive capabilities. In Shanghai' case, it should highlight adaptive capabilities building in communicates and ecological environments.%频繁发生的极端气候灾害正在挑战都市密集区的气候风险管理能力.气候脆弱性评价和适应性建设需求是气候风险管理及政策制定的关键.研究着重探讨都市密集区

  13. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  14. Adaptive skills

    Directory of Open Access Journals (Sweden)

    Staša Stropnik

    2013-02-01

    Full Text Available Adaptive skills are defined as a collection of conceptual, social and practical skills that are learned by people in order to function in their everyday lives. They include an individual's ability to adapt to and manage her or his surroundings to effectively function and meet social or community expectations. Good adaptive skills promote individual's independence in different environments, whereas poorly developed adaptive skills are connected to individual's dependency and with greater need for control and help with everyday tasks. Assessment of adaptive skills is often connected to assessment of intellectual disability, due to the reason that the diagnosis of intellectual disability includes lower levels of achievements on standardized tests of intellectual abilities as well as important deficits in adaptive skills. Assessment of adaptive behavior is a part of standard assessment battery with children and adults with different problems, disorders or disabilities that affect their everyday functioning. This contribution also presents psychometric tools most regularly used for assessment of adaptive skills and characteristics of adaptive skills with individual clinical groups.

  15. ADAPT Dataset

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced Diagnostics and Prognostics Testbed (ADAPT) Project Lead: Scott Poll Subject Fault diagnosis in electrical power systems Description The Advanced...

  16. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  17. Reliability and validity of the Chinese version Appropriateness Evaluation Protocol

    NARCIS (Netherlands)

    Liu, W. (Wenwei); Yuan, S. (Suwei); Wei, F. (Fengqing); Yang, J. (Jing); Zhang, Z. (Zhe); Zhu, C. (Changbin); Ma, J. (Jin)

    2015-01-01

    textabstractObjective: To adapt the Appropriateness Evaluation Protocol (AEP) to the specific settings of health care in China and to validate the Chinese version AEP (C-AEP). Methods: Forward and backward translations were carried out to the original criteria. Twenty experts participated in the con

  18. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. Given the expanded capability under the additional protocol for the Agency to draw conclusions regarding the absence of undeclared nuclear material and activities, Safeguards Department staff have had to broaden their outlook with respect to all safeguards activities being conducted. Beyond verification of nuclear material, inspectors are being called upon to conduct a wider range of activities, with more emphasis on observation of indicators of a State's nuclear-related activities and consideration of the consistency of the other information with a State's declarations. This includes consideration of how the evaluation of all information available to the Agency affects the planning and prioritizing of future safeguards activities, for example in resolving questions or inconsistencies in the declared information or selecting locations for conducting complementary access. The implementation of strengthened safeguards and the additional protocol has led to a need to institutionally change the roles of many staff members in the various Safeguards Divisions and increase the interaction between the Divisions to most effectively draw State-level conclusions regarding the absence of undeclared nuclear material and activities. This paper focuses on the significant changes in the roles of safeguards inspectors, in particular facility officers and country officers, in the implementation of strengthened safeguards. It outlines the nature of the changes, and some of the challenges being faced in order to adapt to these roles, including changes in the nature of interaction between the Operations and Support Divisions

  19. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  20. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    Energy Technology Data Exchange (ETDEWEB)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong, E-mail: wangyao220597@yahoo.com.cn [RFIC Laboratory CICS, School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731 (China)

    2011-05-15

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under {+-}4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 {mu}W with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 {mu}m CMOS technology and the chip size is 880 x 880 {mu}m{sup 2}. (semiconductor integrated circuits)

  1. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    International Nuclear Information System (INIS)

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under ±4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 μW with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 μm CMOS technology and the chip size is 880 x 880 μm2. (semiconductor integrated circuits)

  2. RESEARCH ON SECURITY PROTOCOL FOR COLLABORATING MOBILE AGENTS IN NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Olumide Simeon Ogunnusi

    2013-01-01

    Full Text Available Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the field of intrusion detection, can be harnessed. Such properties include: adaptability, autonomous nature, low bandwidth utilization, latency eradication, mobility and intelligence. A number of protocols have been developed by researchers for different key distribution techniques to enhance their performance and to protect communicating entities against malicious attacks that can hinder their activities. However, they do not take into account the availability and fault tolerance of the protocols in case of any possible attack despite the authentication methods offered by encryption. This study therefore, proposes a fault-tolerant key distribution protocol for distributed mobile agents (communicating entities in network intrusion detection system to facilitate hitch-free collaboration geared towards intrusive packets detection in Wireless Local Area Network (WLAN.

  3. COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hatem S. A. Hamatta

    2016-04-01

    Full Text Available Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the last decade. it surrounded by much challenges that should be solved the improve establishment of such networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc Networks (MANETs. As this type of networks does not require any pre-exist hardware. As well as, every node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the network internal structure will be unpredictably changed frequently according to continuous activities between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are designed for mobile ad-hoc networks by describing their structures, operations, features and then comparing their various characteristics.

  4. Adapting to a changing world: unraveling the role of man-made habitats as alternative feeding areas for slender-billed gull (Chroicocephalus genei.

    Directory of Open Access Journals (Sweden)

    Francisco Ramírez

    Full Text Available Current rates of wildlife habitat loss have placed increasing demands on managers to develop, validate and implement tools aimed at improving our ability to evaluate such impacts on wildlife. Here, we present a case study conducted at the Natural Area of Doñana (SW Spain where remote sensing and stable isotope (δ(13C, δ(15N analyses of individuals were combined to unravel (1 the effect of variations in availability of natural food resources (i.e. from natural marshes on reproductive performance of a Slender-billed Gull (Chroicocephalus genei population, and (2 the role of two adjacent, artificial systems (a fish farm and saltmines as alternate anthropogenic feeding areas. Based on long-term (1983-2004 remote-sensing, we inferred the average extent of flooded area at the marshland (a proxy to natural resource availability annually. Estimated flooded areas (ranging from extreme drought [ca. 151 ha, 1995] to high moisture [15,049 ha, 2004] were positively related to reproductive success of gulls (estimated for the 1993-2004 period, and ranging from ca. 0 to 1.7 fledglings per breeding pairs, suggesting that habitat availability played a role in determining their reproductive performance. Based on blood δ(13C and δ(15N values of fledglings, 2001-2004, and a Bayesian isotopic mixing model, we conclude that saltmines acted as the main alternative foraging habitat for gulls, with relative contributions increasing as the extent of marshland decreased. Although adjacent, anthropogenic systems have been established as the preferred breeding sites for this gull population, dietary switches towards exploitation of alternative (anthropogenic food resources negatively affected the reproductive output of this species, thus challenging the perception that these man-made systems are necessarily a reliable buffer against loss of natural feeding habitats. The methodology and results derived from this study could be extended to a large suite of threatened

  5. Prognostic Value of Adaptive Textural Features–The Effect of Standardizing Nuclear First-Order Gray Level Statistics and Mixing Information from Nuclei Having Different Area

    OpenAIRE

    Nielsen, Birgitte; Danielsen, Håvard E

    2006-01-01

    Background: Nuclear texture analysis is a useful method to obtain quantitative information for use in prognosis of cancer. The first-order gray level statistics of a digitized light microscopic nuclear image may be influenced by variations in the image input conditions. Therefore, we have previously standardized the nuclear gray level mean value and standard deviation. However, there is a clear relation between nuclear DNA content, area, first-order statistics, and texture. For nuclei with ap...

  6. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Sarah G. [Royal Surrey County Hospital, Department of Radiology, Surrey (United Kingdom); Calder, Alistair D. [Great Ormond Street Hospital for Children, NHS Foundation Trust, Department of Radiology, London (United Kingdom); Offiah, Amaka C. [Sheffield Children' s NHS Foundation Trust, The University of Sheffield Academic Unit of Child Health, Sheffield (United Kingdom); Negus, Samantha [St George' s Hospital, Department of Radiology, London (United Kingdom)

    2015-11-15

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  7. Rate Compatible Protocol for Information Reconciliation: An application to QKD

    CERN Document Server

    Elkouss, David; Lancho, Daniel; Martin, Vicente

    2010-01-01

    Information Reconciliation is a mechanism that allows to weed out the discrepancies between two correlated variables. It is an essential component in every key agreement protocol where the key has to be transmitted through a noisy channel. The typical case is in the satellite scenario described by Maurer in the early 90's. Recently the need has arisen in relation with Quantum Key Distribution (QKD) protocols, where it is very important not to reveal unnecessary information in order to maximize the shared key length. In this paper we present an information reconciliation protocol based on a rate compatible construction of Low Density Parity Check codes. Our protocol improves the efficiency of the reconciliation for the whole range of error rates in the discrete variable QKD context. Its adaptability together with its low interactivity makes it specially well suited for QKD reconciliation.

  8. Adaptive Group Key Management Protocol for Wireless Communications

    OpenAIRE

    Gharout, Saïd; Bouabdallah, Abdelmadjid; Challal, Yacine; Achemlal, Mohamed

    2012-01-01

    Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an important building bloc in securing group communication, has received a particularattention in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, videoconferencing, collaborative work. The key management concerns the distribution and updates of the key...

  9. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  10. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  11. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  12. Provenance Query Protocol

    OpenAIRE

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  13. Transfusion protocol in trauma

    Directory of Open Access Journals (Sweden)

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  14. Adapting to sea-level rise in the US Southeast: The influence of built infrastructure and biophysical factors on the inundation of coastal areas

    Energy Technology Data Exchange (ETDEWEB)

    Daniels, R.C. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center]|[Oak Ridge National Lab., TN (United States); Gornitz, V.M. [National Aeronautics and Space Administration, New York, NY (United States). Goddard Inst. for Space Studies; Mehta, A.J.; Lee, Saychong [Florida Univ., Gainesville, FL (United States). Dept. of Coastal and Oceanographic Engineering; Cushman, R.M. [Oak Ridge National Lab., TN (United States)

    1992-11-01

    The earth` s global mean surface air temperature has increased by 0.5{degrees}C over the past 100 years. This warming trend has occurred concurrently with increases in the concentration and number of greenhouse gases in the atmosphere. These gases may cause this trend to accelerate in the future and result in a net increase in the earth`s global mean surface air temperature of 1.5 to 4.5{degrees}C by the year 2100. An increase of this magnitude could cause sea surface temperatures to increase would cause sea levels to rise -from thermal expansion of the sea, and the addition of melt waters from alpine glaciers and continental ice sheets. To allow for the cost-effective analysis of the impacts that sea-level rise may have on the US Southeast, a method is needed that will allow sites that are potentially at risk to be identified for study. Previously, no objective method was available to identify such sites. This project addresses this problem by using a geographic data base with information on both physical and climatological factors to identify coastal areas of the US Southeast that are at risk to inundation or accelerated erosion due to sea-level rise. The following six areas were selected for further study from the many identified as being at high risk: Galveston, Texas; Caminada Pass, Louisiana; Bradenton Beach, Florida; Daytona Beach, Florida; McClellanville, South Carolina; and Nags Head, North Carolina. For each study area the amount of land, by land use type, in danger from inundation from three sea-level-rise scenarios was calculated. The calculated values were based on elevation alone.

  15. Adapting to sea-level rise in the US Southeast: The influence of built infrastructure and biophysical factors on the inundation of coastal areas

    Energy Technology Data Exchange (ETDEWEB)

    Daniels, R. C. [Tennessee Univ., Knoxville, TN (United States). Energy, Environment and Resources Center Oak Ridge National Lab., TN (United States); Gornitz, V. M. [National Aeronautics and Space Administration, New York, NY (United States). Goddard Inst. for Space Studies; Mehta, A. J.; Lee, Saychong [Florida Univ., Gainesville, FL (United States). Dept. of Coastal and Oceanographic Engineering

    1992-11-01

    The earth' s global mean surface air temperature has increased by 0.5°C over the past 100 years. This warming trend has occurred concurrently with increases in the concentration and number of greenhouse gases in the atmosphere. These gases may cause this trend to accelerate in the future and result in a net increase in the earth's global mean surface air temperature of 1.5 to 4.5°C by the year 2100. An increase of this magnitude could cause sea surface temperatures to increase would cause sea levels to rise -from thermal expansion of the sea, and the addition of melt waters from alpine glaciers and continental ice sheets. To allow for the cost-effective analysis of the impacts that sea-level rise may have on the US Southeast, a method is needed that will allow sites that are potentially at risk to be identified for study. Previously, no objective method was available to identify such sites. This project addresses this problem by using a geographic data base with information on both physical and climatological factors to identify coastal areas of the US Southeast that are at risk to inundation or accelerated erosion due to sea-level rise. The following six areas were selected for further study from the many identified as being at high risk: Galveston, Texas; Caminada Pass, Louisiana; Bradenton Beach, Florida; Daytona Beach, Florida; McClellanville, South Carolina; and Nags Head, North Carolina. For each study area the amount of land, by land use type, in danger from inundation from three sea-level-rise scenarios was calculated. The calculated values were based on elevation alone.

  16. Adaptable data management for systems biology investigations

    Directory of Open Access Journals (Sweden)

    Burdick David

    2009-03-01

    Full Text Available Abstract Background Within research each experiment is different, the focus changes and the data is generated from a continually evolving barrage of technologies. There is a continual introduction of new techniques whose usage ranges from in-house protocols through to high-throughput instrumentation. To support these requirements data management systems are needed that can be rapidly built and readily adapted for new usage. Results The adaptable data management system discussed is designed to support the seamless mining and analysis of biological experiment data that is commonly used in systems biology (e.g. ChIP-chip, gene expression, proteomics, imaging, flow cytometry. We use different content graphs to represent different views upon the data. These views are designed for different roles: equipment specific views are used to gather instrumentation information; data processing oriented views are provided to enable the rapid development of analysis applications; and research project specific views are used to organize information for individual research experiments. This management system allows for both the rapid introduction of new types of information and the evolution of the knowledge it represents. Conclusion Data management is an important aspect of any research enterprise. It is the foundation on which most applications are built, and must be easily extended to serve new functionality for new scientific areas. We have found that adopting a three-tier architecture for data management, built around distributed standardized content repositories, allows us to rapidly develop new applications to support a diverse user community.

  17. Analyzing environmental and structural charactersitics of concrete for carbon mitigation and climate adaptation in urban areas: A case study in Rajkot, India

    Science.gov (United States)

    Solis, Andrea Valdez

    Increasing temperatures, varying rain events accompanied with flooding or droughts coupled with increasing water demands, and decreasing air quality are just some examples of stresses that urban systems face with the onset of climate change and rapid urbanization. Literature suggests that greenhouse gases are a leading cause of climate change and are of a result of anthropogenic activities such as infrastructure development. Infrastructure development is heavily dependent on the production of concrete. Yet, concrete can contribute up to 7% of total CO29 emissions globally from cement manufacturing alone. The goal of this dissertation was to evaluate current concrete technologies that could contribute to carbon mitigation and climate adaptation in cities. The objectives used to reach the goal of the study included (1) applying a material flow and life cycle analysis (MFA-LCA) to determine the environmental impacts of pervious and high volume fly ash (HVFA) concrete compared to ordinary portland cement (OPC) concrete in a developing country; (2) performing a comparative assessment of pervious concrete mixture designs for structural and environmental benefits across the U.S. and India; and (3) Determining structural and durability benefits from HVFA concrete mixtures when subjected to extreme hot weather conditions (a likely element of climate change). The study revealed that cities have a choice in reducing emissions, improving stormwater issues, and developing infrastructure that can sustain higher temperatures. Pervious and HVFA concrete mixtures reduce emissions by 21% and 47%, respectively, compared to OPC mixtures. A pervious concrete demonstration in Rajkot, India showed improvements in water quality (i.e. lower levels of nitrogen by as much as 68% from initial readings), and a reduction in material costs by 25%. HVFA and OPC concrete mixtures maintained compressive strengths above a design strength of 27.6 MPa (4000 psi), achieved low to moderate permeability

  18. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  19. A Study of MAC Protocols for WBANs

    OpenAIRE

    Sana Ullah; Bin Shen; S. M. Riazul Islam; Pervez Khan; Shahnaz Saleem; Kyung Sup Kwak

    2009-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to s...

  20. A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol

    OpenAIRE

    R Padmavathy; Chakravarthy Bhagvati

    2011-01-01

    Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas. Recently Chang and Chang proposed a novel three party simple key exchange protocol and claimed the protocol is secure, efficient and practical. Unless their claim, a key recovery attack is proposed on the above protocol by recovering the ephemeral keys. One way of recovering the ephemeral key is to solve the mathematical hard Discrete Logarithm Problem (DLP). The DLP is s...

  1. Ambiguous Adaptation

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Lyngsie, Jacob

    We investigate why some exchange relationships terminate prematurely. We argue that investments in informal governance structures induce premature termination in relationships already governed by formal contracts. The formalized adaptive behavior of formal governance structures and the flexible and...... reciprocal adaptation of informal governance structure create ambiguity in situations of contingencies, which, subsequently, increases the likelihood of premature relationship termination. Using a large sample of exchange relationships in the global service provider industry, we find support for a hypothesis...

  2. Strategic Adaptation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul

    2015-01-01

    This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation...

  3. Classifying climate change adaptation frameworks

    Science.gov (United States)

    Armstrong, Jennifer

    2014-05-01

    Complex socio-ecological demographics are factors that must be considered when addressing adaptation to the potential effects of climate change. As such, a suite of deployable climate change adaptation frameworks is necessary. Multiple frameworks that are required to communicate the risks of climate change and facilitate adaptation. Three principal adaptation frameworks have emerged from the literature; Scenario - Led (SL), Vulnerability - Led (VL) and Decision - Centric (DC). This study aims to identify to what extent these adaptation frameworks; either, planned or deployed are used in a neighbourhood vulnerable to climate change. This work presents a criterion that may be used as a tool for identifying the hallmarks of adaptation frameworks and thus enabling categorisation of projects. The study focussed on the coastal zone surrounding the Sizewell nuclear power plant in Suffolk in the UK. An online survey was conducted identifying climate change adaptation projects operating in the study area. This inventory was analysed to identify the hallmarks of each adaptation project; Levels of dependency on climate model information, Metrics/units of analysis utilised, Level of demographic knowledge, Level of stakeholder engagement, Adaptation implementation strategies and Scale of adaptation implementation. The study found that climate change adaptation projects could be categorised, based on the hallmarks identified, in accordance with the published literature. As such, the criterion may be used to establish the matrix of adaptation frameworks present in a given area. A comprehensive summary of the nature of adaptation frameworks in operation in a locality provides a platform for further comparative analysis. Such analysis, enabled by the criterion, may aid the selection of appropriate frameworks enhancing the efficacy of climate change adaptation.

  4. On Invertible Sampling and Adaptive Security

    DEFF Research Database (Denmark)

    Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio;

    2011-01-01

    Secure multiparty computation (MPC) is one of the most general and well studied problems in cryptography. We focus on MPC protocols that are required to be secure even when the adversary can adaptively corrupt parties during the protocol, and under the assumption that honest parties cannot reliably...... erase their secrets prior to corruption. Previous feasibility results for adaptively secure MPC in this setting applied either to deterministic functionalities or to randomized functionalities which satisfy a certain technical requirement. The question whether adaptive security is possible for all...... functionalities was left open. We provide the first convincing evidence that the answer to this question is negative, namely that some (randomized) functionalities cannot be realized with adaptive security. We obtain this result by studying the following related invertible sampling problem: given an efficient...

  5. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  6. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  7. A Study of MAC Protocols for WBANs

    Directory of Open Access Journals (Sweden)

    Sana Ullah

    2009-12-01

    Full Text Available The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN. A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements.

  8. A study of MAC protocols for WBANs.

    Science.gov (United States)

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  9. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  10. Is adaptation. Truly an adaptation? Is adaptation. Truly an adaptation?

    Directory of Open Access Journals (Sweden)

    Thais Flores Nogueira Diniz

    2008-04-01

    Full Text Available The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition, joined with the study of recycling, remaking, and every form of retelling. The film deals with the attempt by the scriptwriter Charles Kaufman, cast by Nicholas Cage, to adapt/translate a non-fictional book to the cinema, but ends up with a kind of film which is by no means what it intended to be: a film of action in the model of Hollywood productions. During the process of creation, Charles and his twin brother, Donald, undergo a series of adventures involving some real persons from the world of film, the author and the protagonist of the book, all of them turning into fictional characters in the film. In the film, adaptation then signifies something different from itstraditional meaning. The article begins by historicizing film adaptation from the arrival of cinema, pointing out the many theoretical approaches under which the process has been seen: from the concept of “the same story told in a different medium” to a comprehensible definition such as “the process through which works can be transformed, forming an intersection of textual surfaces, quotations, conflations and inversions of other texts”. To illustrate this new concept, the article discusses Spike Jonze’s film Adaptation. according to James Naremore’s proposal which considers the study of adaptation as part of a general theory of repetition

  11. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  12. Mobile Multilayer IPsec protocol

    Directory of Open Access Journals (Sweden)

    T.Gayathri

    2009-08-01

    Full Text Available A mobile user moves around and switches between wireless cells, subnets and domains, it needs to maintain the session continuity. At the same time security of signaling and transport media should not be compromised. A multi-layer security framework involving user authentication, packet based encryption and access control mechanism can provide the desired level of security to the mobile users. Supporting streaming traffic in a mobile wireless Internet is faced with several challenges due to continuous handoff experienced by a mobile user. These challenges include dynamic binding, location management, quality of service and end-to-end security for signaling and transport. Mobile users will use heterogeneous radio access networking technologies. Mobile multilayer IPsec protocol (MML IPSec extends ML-IPSec to deal with mobility and make it suitable for wireless networks. MML-IPSec is integration of ML-IPSec and mobile IP.

  13. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  14. Energy-efficient adaptive wireless network design

    OpenAIRE

    Havinga, Paul J. M.; Smit, Gerard J.M.; Bos, Martinus

    2000-01-01

    Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an energy-efficient highly adaptive architecture of a network interface and novel data link layer protocol for wireless networks that provides quality of service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations are necessary to achieve energy efficiency and an acceptable quality of service. The paper provides a review of ideas and...

  15. Compiling and securing cryptographic protocols

    CERN Document Server

    Chevalier, Yannick

    2009-01-01

    Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations.

  16. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.; Nielson, Hanne Riis; Nielson, Flemming

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  17. Coastal Climate Change Education, Mitigation, and Adaptation in the Natural and Built Environments: Progress of the Coastal Areas Climate Change Education Partnership

    Science.gov (United States)

    Feldman, A.; Herman, B.; Vernaza-Hernández, V.; Ryan, J. G.; Muller-Karger, F. E.; Gilbes, F.

    2011-12-01

    The Coastal Area Climate Change Education (CACCE) Partnership, funded by the National Science Foundation, seeks to develop new ways to educate citizens about global climate change. The core themes are sea level rise and impacts of climate change in the southeastern United States and the Caribbean Sea. CACCE focuses on helping partners, educators, students, and the general public gain a fundamental and working understanding of the interrelation among the natural environment, built environment, and social aspects in the context of climate change in coastal regions. To this end, CACCE's objectives reported here include: 1) defining the current state of awareness, perceptions, and literacy about the impacts of climate change; and 2) testing a model of transdisciplinary research and learning as a means of training a new generation of climate professionals. Objective one is met in part by CACCE survey efforts that reveal Florida and Puerto Rico secondary science teachers hold many non-scientific views about climate change and climate change science and provide inadequate instruction about climate change. Associated with objective two are five Multiple Outcome Interdisciplinary Research and Learning (MOIRL) pilot projects underway in schools in Florida and Puerto Rico. In the CACCE Partnership the stakeholders include: students (K-16 and graduate); teachers and education researchers; informal science educators; scientists and engineers; business and industry; policy makers; and community members. CACCE combines interdisciplinary research with action research and community-based participatory research in a way that is best described as "transdisciplinary". Learning occurs in all spheres of interactions among stakeholders as they engage in scientific, educational, community and business activities through their legitimate peripheral participation in research communities of practice. We will describe the process of seeking and building partnerships, and call for a dialogue

  18. Domestic magnetic fields. Protocols, measurements and results

    International Nuclear Information System (INIS)

    The quantification of magnetic field exposure has been the subject of considerable debate. A number of surrogates have been used including, spot measurements, wire coding and 24 hour averages. The quantification of domestic magnetic fields including the identification of sources is important if any mitigation is required. The State Electricity Commission of Victoria has developed recording instrumentation and measurement protocols for the survey of domestic magnetic field strengths in the Melbourne area. A range of domestic locations in the Melbourne metropolitan area is chosen to test the influence of external installations and the effect of appliance usage and energy consumption on the domestic magnetic field environment. (author)

  19. 论壮族地区的水稻种植与环境适应的关系%Relationship between Rice Planting and Environmental Adaptation in the Zhuang Area

    Institute of Scientific and Technical Information of China (English)

    刘祥学

    2013-01-01

    The Zhuang is a typical rice planting nationality in China. Rice planting in the Zhuang area is characterized by its strong adaptation to the environment. In different geomorphic regions, the Zhuang people have been fully aware of the profound influence of natural geographical environment, climate and soil on rice planting. In order to adapt their planting to the natural geographical environment and achieve maximum production efficiency, the Zhuang people who live in mountain area always choose to plant Japonica rice which grows for a longer growth period and is cold-resistant and infertility-endurable, while those who live in river valley and hilly area always choose to plant indica rice which grows for a shorter period . In Karst mountain areas suffering from water deficiency and drought, the local Zhuang people usually plant upland rice. However, as the upland rice tastes poor and the relation between people and land is changing from comfortable to tight, the upland rice planting status is falling in Zhuang’s planting structure. In addition, the position of the rice used in Zhuang’s life also affects the selection and planting of rice varieties.%水稻种植过程中,常具有浓厚的环境适应的特征。分布在不同地貌区的壮族是典型的稻作民族,已充分意识到所在地区气候、土壤等自然地理环境对水稻种植的深刻影响。为适应自然地理环境,发挥最大的生产效益,山居壮族多选择种植生长期较长、耐寒、耐肥的粳稻为主;在平原丘陵地区的壮族则以种植生长期短的籼稻居多;为适应岩溶山区干旱少水、不利于灌溉的环境,当地壮族则多种陆稻,但由于陆稻口感不佳以及所在地区人地关系由宽趋紧,导致陆稻在壮族种植结构中的地位不断下降。此外,壮族在生活中对水稻用途的定位,也影响到水稻品种的选择与种植。

  20. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  1. Intestinal mucosal adaptation

    Institute of Scientific and Technical Information of China (English)

    Laurie Drozdowski; Alan BR Thomson

    2006-01-01

    Intestinal failure is a condition characterized by malnutrition and/or dehydration as a result of the inadequate digestion and absorption of nutrients. The most common cause of intestinal failure is short bowel syndrome, which occurs when the functional gut mass is reduced below the level necessary for adequate nutrient and water absorption. This condition may be congenital, or may be acquired as a result of a massive resection of the small bowel. Following resection, the intestine is capable of adaptation in response to enteral nutrients as well as other trophic stimuli. Identifying factors that may enhance the process of intestinal adaptation is an exciting area of research with important potential clinical applications.

  2. MAC Protocols for Optimal Information Retrieval Pattern in Sensor Networks with Mobile Access

    Directory of Open Access Journals (Sweden)

    Yang Zhiyu

    2005-01-01

    Full Text Available In signal field reconstruction applications of sensor network, the locations where the measurements are retrieved from affect the reconstruction performance. In this paper, we consider the design of medium access control (MAC protocols in sensor networks with mobile access for the desirable information retrieval pattern to minimize the reconstruction distortion. Taking both performance and implementation complexity into consideration, besides the optimal centralized scheduler, we propose three decentralized MAC protocols, namely, decentralized scheduling through carrier sensing, Aloha scheduling, and adaptive Aloha scheduling. Design parameters for the proposed protocols are optimized. Finally, performance comparison among these protocols is provided via simulations.

  3. 内蒙古典型地区牧户气候变化感知与适应的实证研究%Herdsmen's perceptions and adaptation of climate change in typical areas of Inner Mongolia

    Institute of Scientific and Technical Information of China (English)

    侯向阳; 韩颖

    2011-01-01

    我国北方草原地区是气候变化影响的脆弱和敏感地区。研究北方草原地区牧户对气候变化的感知和适应,对于提高牧区气候变化的适应能力,促进草原地区可持续发展意义重大。本文利用问卷调查的实证分析方法,研究了内蒙古草甸草原、荒漠草原、荒漠生态区牧户对气候变化趋势和极端气候灾害事件的感知和适应的现状与行为特征。结果表明:过去30年内蒙古草原地区气候基本呈暖湿化趋势,近10年极端气候灾害事件有所增加,其中大雪和干旱分别是东、西部草原地区最主要的极端气候灾害;牧户能够正确感知变暖趋势,但无法正确判断降水情况;东部牧户对大雪事件的感知度较高,西部牧户对干旱的记忆最深刻,并分别针对大雪和干旱采取有差别的应对措施;当前,牧户应对措施相对缺失,需要进一步探求更为积极、高效的应对行为,以便更好更快地适应气候变化。%Temperate steppe of northern China is very vulnerable and sensitive to climate change.It is significant to study herdsmen's perception and adaptation of climate change to enhance adaptive capacity and sustainable development of grassland area.Using a household survey based on questionnaire,this study analyzes the current status and behavior characters of herdsmen's perception and adaptation to climate change and extreme climate events in meadow steppe,desert steppe and desert respectively.The results showed that the climate became warmer and wetter in the last 30 years.There was more heavy snow in the east but more droughts in the west,and extreme climate disasters occurred more frequently in the last 10 years in the grassland area of Inner Mongolia.Although most herdsmen correctly perceived the change of temperature,they gave wrong judge to precipitation.Herdsmen in the east were more impressible to heavy snow and their counterparts in the west more impressible to droughts

  4. Adaptive filtering and change detection

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    Adaptive filtering is a classical branch of digital signal processing (DSP). Industrial interest in adaptive filtering grows continuously with the increase in computer performance that allows ever more conplex algorithms to be run in real-time. Change detection is a type of adaptive filtering for non-stationary signals and is also the basic tool in fault detection and diagnosis. Often considered as separate subjects Adaptive Filtering and Change Detection bridges a gap in the literature with a unified treatment of these areas, emphasizing that change detection is a natural extensi

  5. General characterisation of study area and definition of experimental protocols. WP 1 in the project 'Effect of industrial pollution on the distribution dynamics of radionuclides in boreal understorey ecosystems'

    International Nuclear Information System (INIS)

    The research project EPORA (Effects of Industrial Pollution on the Distribution Dynamics of Radionuclides in Boreal Understorey Ecosystems) is part of the EU Nuclear Fission Safety Programme 1994 - 1998. The main purpose of EPORA is to study the influence of strong chemical pollution on the behaviour of artificial radionuclides (137Cs,90Sr, 239,240Pu) in a northern boreal ecosystem and subsequently to assess the significance of the findings to the radiation exposure of the population in such areas. The present report is a documentation of the selection of study areas based on the assessment of available information on pollution in the Kola Peninsula and Northern Fennoscandia and of sampling and analysing methods. (orig.)

  6. General characterisation of study area and definition of experimental protocols. WP 1 in the project 'Effect of industrial pollution on the distribution dynamics of radionuclides in boreal understorey ecosystems'

    Energy Technology Data Exchange (ETDEWEB)

    Rahola, T. [Radiation and Nuclear Safety Authority, Helsinki (Finland); Albers, B. [National Research Center for Environmental and Health (Georgia); Bergman, R. [National Defence Research Establishment (Germany)] [and others

    1999-08-01

    The research project EPORA (Effects of Industrial Pollution on the Distribution Dynamics of Radionuclides in Boreal Understorey Ecosystems) is part of the EU Nuclear Fission Safety Programme 1994 - 1998. The main purpose of EPORA is to study the influence of strong chemical pollution on the behaviour of artificial radionuclides ({sup 137}Cs,{sup 90}Sr, {sup 239},{sup 240}{sub Pu}) in a northern boreal ecosystem and subsequently to assess the significance of the findings to the radiation exposure of the population in such areas. The present report is a documentation of the selection of study areas based on the assessment of available information on pollution in the Kola Peninsula and Northern Fennoscandia and of sampling and analysing methods. (orig.)

  7. Bayesian Adaptive Exploration

    CERN Document Server

    Loredo, T J

    2004-01-01

    I describe a framework for adaptive scientific exploration based on iterating an Observation--Inference--Design cycle that allows adjustment of hypotheses and observing protocols in response to the results of observation on-the-fly, as data are gathered. The framework uses a unified Bayesian methodology for the inference and design stages: Bayesian inference to quantify what we have learned from the available data and predict future data, and Bayesian decision theory to identify which new observations would teach us the most. When the goal of the experiment is simply to make inferences, the framework identifies a computationally efficient iterative ``maximum entropy sampling'' strategy as the optimal strategy in settings where the noise statistics are independent of signal properties. Results of applying the method to two ``toy'' problems with simulated data--measuring the orbit of an extrasolar planet, and locating a hidden one-dimensional object--show the approach can significantly improve observational eff...

  8. Formal Models and Techniques for Analyzing Security Protocols

    CERN Document Server

    Cortier, V

    2011-01-01

    Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro

  9. Performance enhancement of OSPF protocol in the private network

    Science.gov (United States)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    The private network serves as an information exchange platform to support the integrated services via microwave channels and accordingly selects the open shortest path first (OSPF) as the IP routing protocol. But the existing OSPF can't fit the private network very well for its special characteristics. This paper presents our modifications to the standard protocol in such aspects as the single-area scheme, link state advertisement (LSA) types and formats, OSPF packet formats, important state machines, setting of protocol parameters and link flap damping. Finally simulations are performed in various scenarios and the results indicate that our modifications can enhance the OSPF performance in the private network effectively.

  10. A Recovery Method for Greedy Routing Protocols in Web Communications

    Directory of Open Access Journals (Sweden)

    Sheetal Kaushik

    2012-01-01

    Full Text Available Greedy Perimeter Stateless Routing (GPSR protocol is an appropriate and the most well-known routing protocol for high mobile vehicular ad-hoc networks. The protocol includes two routing modes, the greedy mode and the recovery mode, and utilizes a neighbor list to make a route decision. However, not only does the neighbor list in the protocol involve stale neighbor information, but also the stale nodes inherit a higher selection priority in the greedy mode according to the routing policy; besides, the useful redundant route information can be eliminated during planarization in the recovery mode. To overcome those problems, we propose a new recovery mode, named as Greedy Border Superiority Routing (GBSR, along with an Adaptive Neighbor list Management (ANM scheme. A node generates aborder superior graph instead of generating a planar graph whenthe node faces the local maximum. Packets in the recovery modecan escape from the recovery mode as fast as possible using thegraph. Here, GBSR protocol has the same assumption as that ofGPSR, and does not require any additional information. With anetwork simulator, GBSR and ANM are evaluated using two vehicle mobility scenarios. GBSR shows higher network performance in comparison with GPSR protocol. In addition, we accomplish a nearly stale-free neighbor list using the ANM scheme.

  11. Adaptive test

    DEFF Research Database (Denmark)

    Kjeldsen, Lars Peter; Eriksen, Mette Rose

    2010-01-01

    Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale.......Artikelen er en evaluering af de adaptive tests, som blev indført i folkeskolen. Artiklen sætter særligt fokus på evaluering i folkeskolen, herunder bidrager den med vejledning til evaluering, evalueringsværktøjer og fagspecifkt evalueringsmateriale....

  12. The Role of Additional Pulses in Electropermeabilization Protocols

    OpenAIRE

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. H...

  13. Forests and the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Goetze, D.C. [Environment Canada, Ottawa, ON (Canada)

    2001-07-01

    This PowerPoint presentation referred to carbon sinks in the Clean Development Mechanism (CDM) as specified in the Kyoto Protocol. Policy issues, opportunities and challenges were discussed. The slides summarized the environmental potential of carbon sink projects, the current status of carbon sinks in the CDM, and strategies towards a CDM carbon sink. The Nyakach, Kenya biomass enhancement case study was presented, along with the Colombian Andean biodiversity corridor reforestation project. Potential sink projects were described as those resulting in direct reduction of emissions. These include reducing deforestation by protecting forests from being converted to agriculture, by protecting forests from the impacts of human activities, and by substituting biomass energy sources for fossil fuels. Indirect reduction of emissions via sequestration involves restoring natural forests in deforested or degraded areas and expanding agroforests and plantations. The co-benefits of carbon sink projects are biodiversity and socio-economic benefits. Under the Bonn Agreement, afforestation and reforestation projects are eligible under the CDM. Credits are limited to 1 per cent of Annex 1 party's base year emissions per year. The important elements of the Marrakech Accord are the prompt start of the CDM, as well as modalities and procedures.

  14. The use of a hydrological physically based model to evaluate the vine adaptability to future climate: the case study of a Protected Designation of Origin area (DOC and DOCG) of Southern Italy

    Science.gov (United States)

    Bonfante, Antonello; Basile, Angelo; Menenti, Massimo; Monaco, Eugenia; Alfieri, Silvia Maria; Manna, Piero; Langella, Giuliano; De Lorenzi, Francesca

    2013-04-01

    The quality of grape and wine is variety-specific and depends significantly on the pedoclimatic conditions, thus from the terroir characteristics. In viticulture the concept of terroir is known to be very complex. At present some changes are occurring in the studies of terroir. Their spatial analysis is improving by means of studies that account for the spatial distribution of solar radiation and of bioclimatic indexes. Moreover, simulation models are used to study the water flow in the soil-plant-atmosphere system in order to determine the water balance of vines as a function of i) soil physical properties, ii) climatic regime and iii) agro-ecosystems characteristics. The future climate evolution may endanger not only yield production (IPCC, 2007), but also its quality. The effects on quality may be relevant for grape production, since they can affect the sustainability of the cultivation of grape varieties in the areas where they are currently grown. This study addresses this question by evaluating the adaptive capacity of grape's cultivars in a 20000 ha viticultural area in the "Valle Telesina" (Campania Region, Southern Italy). This area has a long tradition in the production of high quality wines (DOC and DOCG) and it is characterized by a complex geomorphology with a large variability of soils and micro-climate. Two climate scenarios were considered: "past" (1961-1990) and "future" (2021-2050), the latter constructed applying statistical downscaling to GCMs scenarios. For each climate scenario the moisture regime of the soils of the study area was calculated by means of a simulation model of the soil-water-atmosphere system (SWAP). The hydrological model SWAP was applied to the representative soils of the entire area (47 soil units); the soil hydraulic properties were estimated (by means of pedo-transfer function HYPRES) and measured. Upper boundary conditions were derived from the climate scenarios. Unit gradient in soil water potential was set as lower

  15. Adaptive cancellation techniques

    Science.gov (United States)

    1983-11-01

    An adaptive signal canceller has been evaluated for the enhancement of pulse signal reception during the transmission of a high power ECM jamming signal. The canceller design is based on the use of DRFM(Digital RF Memory) technology as part of an adaptive multiple tapped delay line. The study includes analysis of relationship of tap spacing and waveform bandwidth, survey of related documents in areas of sidelobe cancellers, transversal equalizers, and adaptive filters, and derivation of control equations and corresponding control processes. The simulation of overall processes included geometric analysis of the multibeam transmitting antenna, multiple reflection sources and the receiving antenna; waveforms, tap spacings and bandwidths; and alternate control algorithms. Conclusions are provided regarding practical system control algorithms, design characteristics and limitations.

  16. Planning and costing agriculture's adaptation to climate change

    Energy Technology Data Exchange (ETDEWEB)

    Chambwera, Muyeye; Downing, Tom; Venton, Courtenay Cabot; Dyszynski, Jillian; Crawford, Victoria; Butterfield, Ruth; Kaur, Nanki; Birch, Tom; Loga, Denise

    2011-11-15

    Changing climate will have adverse effects on food production, food distribution, infrastructure, land availability for agriculture, and livelihood assets and opportunities in rural and urban areas. Adapting food systems to both enhance food security for the poor and to prevent the future negative impacts of climate change will require attention to more than just agricultural production. Food security can only be ensured and enhanced through a range of interventions across different agricultural systems and along the associated value chains, from production to distribution and allocation. The current efforts to get agriculture into the global climate policy framework after the expiry of the Kyoto Protocol emphasises mitigation. Adaptation is an equally important objective in a world that cannot avoid climate change any more because of already accumulated greenhouse gases. In developing countries, adaptation is the primary concern due to their vulnerability to climate change and high dependence on weather-dependent agricultural systems. A complete response to climate change that integrates agriculture should therefore pursue both agricultural mitigation and adaptation. In order to plan for adaptation effectively, policy makers need reliable information from developing countries on the nature of adaptation, its costs and how these are related to ongoing efforts to develop the agriculture sector and food systems of developing countries. This study set out to inform climate policy development by analysing agricultural adaptation in developing countries using a combination of desk studies and country case studies to provide a framework, areas to focus on when planning agricultural adaptation and the likely costs. It followed key steps for bringing together global and local perspectives for the benefit of both global stakeholders and developing countries.

  17. Correlation among adaptability and stability methodologies for soybean genotypes in regions of degraded areas = Correlação entre metodologias de adaptabilidade e estabilidade para genótipos de soja em regiões de áreas degradadas

    OpenAIRE

    Thadeu Teixeira Júnior; Joênes Mucci Peluzio; Aurélio Vaz de Melo; Eliane Regina Archangelo; Flavio Sergio Afferri

    2015-01-01

    Abstract: Comparison of methods of adaptability and stability has raised interest, and there are SOME studies dealing on the subject; with that, this study aimed to estimate the correlation coefficient for adaptability and stability parameters in regions of degraded areas for grain yield, using competition experiments of soybean genotypes in the agricultural years of 2009-2010 and 2010-2011 in the municipalities of Gurupi and Palmas – State of Tocantins-TO, Brazil. The association among th...

  18. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  19. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  20. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.