WorldWideScience

Sample records for broadcast mobile ad

  1. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  2. Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinfang Zhang

    2008-08-01

    Full Text Available A CDMA-based mobile Ad Hoc networks face two main design challenges. One is to periodically update connectivity information, namely, neighboring nodes and the codes used by neighboring nodes. The other is to guarantee that there is no code collision in two hops' distance. This paper proposes an enhanced time-spread broadcasting schedule for connectivity information update. Based on the connectivity information, a code assignment and potential code collision resolution scheme to solve hidden/exposed nodes problem is proposed. Simulation results demonstrate the efficiency and effectiveness of the proposed schemes.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  5. Next generation mobile broadcasting

    CERN Document Server

    Gómez-Barquero, David

    2013-01-01

    Next Generation Mobile Broadcasting provides an overview of the past, present, and future of mobile multimedia broadcasting. The first part of the book-Mobile Broadcasting Worldwide-summarizes next-generation mobile broadcasting technologies currently available. This part covers the evolutions of the Japanese mobile broadcasting standard ISDB-T One-Seg, ISDB-Tmm and ISDB-TSB; the evolution of the South Korean T-DMB mobile broadcasting technology AT-DMB; the American mobile broadcasting standard ATSC-M/H; the Chinese broadcasting technologies DTMB and CMMB; second-generation digital terrestrial

  6. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  7. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  8. 76 FR 71430 - Automatic Dependent Surveillance Broadcast (ADS-B)

    Science.gov (United States)

    2011-11-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Automatic Dependent Surveillance Broadcast (ADS-B) AGENCY: Department of.... FOR FURTHER INFORMATION CONTACT: Doug Arbuckle, Chief Scientist, Surveillance & Broadcast Services Pgm...

  9. Seamless Mobile Multimedia Broadcasting Using Adaptive Error Recovery

    Directory of Open Access Journals (Sweden)

    Carlos M. Lentisco

    2017-01-01

    Full Text Available Multimedia services over mobile networks present several challenges, such as ensuring a reliable delivery of multimedia content, avoiding undesired service disruptions, or reducing service latency. HTTP adaptive streaming addresses these problems for multimedia unicast services, but it is not efficient from the point of view of radio resource consumption. In Long-Term Evolution (LTE networks, multimedia broadcast services are provided over a common radio channel using a combination of forward error correction and unicast error recovery techniques at the application level. This paper discusses how to avoid service disruptions and reduce service latency for LTE multimedia broadcast services by adding dynamic adaptation capabilities to the unicast error recovery process. The proposed solution provides a seamless mobile multimedia broadcasting without compromising the quality of the service perceived by the users.

  10. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  11. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  12. ADS-B- Automatic Dependent Surveillance- Broadcast

    Directory of Open Access Journals (Sweden)

    Borivoj Galović

    2002-01-01

    Full Text Available The CU/Tent system of air traffic is facing many drawbacksand problems that restrict its further development and makes itdifficult to follow the trends of increase in the traffic volume.By means of their technology, the systems such as ADS-8create rhe basis for further building, upgrading, improving anddeveloping of a completely new concept of the air traffic system.Through their functions they fully fit into and support the basicfunctions of communication, navigation and swveillancewhich form the basis of the new concept that needs to be implementedas soon as possible.

  13. Mobile Broadcast DRM Based on User Identity Card

    Directory of Open Access Journals (Sweden)

    Byung-Rae Lee

    2007-11-01

    Full Text Available The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase. To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.

  14. 77 FR 12105 - 56th Meeting: RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2012-02-28

    ...--Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 186, Automatic Dependent Surveillance--Broadcast (ADS-B... 186, Automatic Dependent Surveillance--Broadcast (ADS-B) DATES: The meeting will be held March 20...

  15. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Surveillance--Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 186: Automatic Dependent Surveillance--Broadcast (ADS-B) meeting. SUMMARY: The FAA is... Surveillance--Broadcast (ADS-B). DATES: The meeting will be held May 3-5, 2011 from 9 a.m. to 5 p.m. ADDRESSES...

  16. 76 FR 63987 - Fifty-Fifth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-10-14

    ... Surveillance--Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 186: Automatic Dependent Surveillance Broadcast (ADS-B) meeting. SUMMARY: The FAA is... Surveillance--Broadcast (ADS-B). DATES: The meeting will be held October 28, 2011 from 8 a.m. to 5 p.m...

  17. 75 FR 54001 - Fifty-Second Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2010-09-02

    ... Surveillance--Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 186: Automatic Dependent Surveillance--Broadcast (ADS-B) meeting. SUMMARY: The FAA is... Surveillance--Broadcast (ADS-B). DATES: The meeting will be held September 20-24, 2010 from 8 a.m. on September...

  18. 76 FR 3932 - Fifty-Third Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-01-21

    ... Surveillance--Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 186: Automatic Dependent Surveillance--Broadcast (ADS-B) meeting. SUMMARY: The FAA is... Surveillance--Broadcast (ADS-B). DATES: The meeting will be held February 22-25, 2011 from 9 a.m. to 5 p.m...

  19. 77 FR 46147 - 57th Meeting: RTCA Special Committee 186, Automatic Dependent Surveillance Broadcast (ADS-B)

    Science.gov (United States)

    2012-08-02

    ... Special Committee 186, Automatic Dependent Surveillance Broadcast (ADS-B) AGENCY: Federal Aviation... 186, Automatic Dependent Surveillance Broadcast (ADS-B). SUMMARY: The FAA is issuing this notice to... Broadcast (ADS-B) DATES: The meeting will be held August 23, 2012, from 9 a.m.-5 p.m. ADDRESSES: The meeting...

  20. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  1. 78 FR 69929 - Fifty-Ninth Meeting: RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2013-11-21

    ... Surveillance-Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast... RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast (ADS-B) DATES: The meeting will...

  2. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  3. 78 FR 12136 - Fifty Eighth Meeting: RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2013-02-21

    ... Surveillance-Broadcast (ADS-B) AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 186, Automatic Dependent Surveillance-Broadcast... Surveillance and Broadcast Services (SBS) Program. Working Group Reports. Status of WG-4, Application Technical...

  4. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  5. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance ? Broadcast (ADS-B) into a...

  6. Radiofrequency Exposure Amongst Employees of Mobile Network Operators and Broadcasters.

    Science.gov (United States)

    Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom

    2017-06-15

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. © The Author 2016. Published by Oxford University Press.

  7. Wireless Multichannel Multipoint Broadcast Service for Mobile Stations

    Directory of Open Access Journals (Sweden)

    B. Homer Benny

    2013-01-01

    Full Text Available In wireless Multicast Broadcast Service (MBS, the common channel is used to multicast the MBS content to the Mobile Stations (MSs on the MBS calls within the coverage area of a Base Station (BS, which causes interference to the dedicated channels serving the traditional calls, and degrades the system capacity. The MBS zone technology is proposed in Mobile Communications Network (MCN standards to improve system capacity and reduce the handoff delay for the wireless MBS calls. In the MBS zone technology, a group of BSs form an MBS zone, where the macro diversity is applied in the MS, the BSs synchronize to transmit the MBS content on the same common channel, interference caused by the common channel is reduced, and the MBS MSs need not perform handoff while moving between the BSs in the same MBS zone. However, when there is no MBS MS in a BS with the MBS zone technology, the transmission on the common channel wastes the bandwidth of the BS. It is an important issue to determine the condition for the MBS Controller (MBSC to enable the MBS zone technology by considering the Quality of Services (QoS for traditional calls and MBS calls are used to reduce the dependency over the common channel and also it is going to reduce the delay over the network. By enabling Dynamic Channel Allocation (DCA and Enhance Dynamic Channel Allocation (EDCA we are going to overcome these problems.

  8. Mobile Offloading in Wireless Ad Hoc Networks

    OpenAIRE

    Kalejaiye, Gabriel B. T.; Rondina, João A. S. R.; Albuquerque, Leonardo V. V. L.; Pereira, Taís L.; Campos, Luiz F. O.; Melo, Raphael A. S.; Mascarenhas, Daniel S.; Carvalho, Marcelo M.

    2014-01-01

    This paper describes a strategy that was designed, implemented, and presented at the {\\it Mobile Ad Hoc Networking Interoperability and Cooperation (MANIAC) Challenge 2013}. The theme of the MANIAC Challenge 2013 was ``Mobile Data Offloading,'' and consisted on developing and comparatively evaluating strategies to offload infrastructure access points via customer ad hoc forwarding using handheld devices (e.g., tablets and smartphones). According to the challenge rules, a hop-by-hop bidding co...

  9. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  10. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    topology constraint. We allow continuous time stochastic behavior of processes running at network nodes, e.g. in order to be able to model randomized protocols. The introduction of group broadcast and an operator to help avoid flooding allows us to define a novel notion of broadcast abstraction. Finally......, we define a weak bisimulation congruence and apply our theory on an example of a leader election protocol....

  11. Automatic Dependent Surveillance Broadcast (ADS-B) System for Ownership and Traffic Situational Awareness

    Science.gov (United States)

    Arteaga, Ricardo A. (Inventor)

    2016-01-01

    The present invention proposes an automatic dependent surveillance broadcast (ADS-B) architecture and process, in which priority aircraft and ADS-B IN traffic information are included in the transmission of data through the telemetry communications to a remote ground control station. The present invention further proposes methods for displaying general aviation traffic information in three and/or four dimension trajectories using an industry standard Earth browser for increased situation awareness and enhanced visual acquisition of traffic for conflict detection. The present invention enable the applications of enhanced visual acquisition of traffic, traffic alerts, and en-route and terminal surveillance used to augment pilot situational awareness through ADS-B IN display and information in three or four dimensions for self-separation awareness.

  12. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    We show how to implement the random waypoint mobility model for ad-hoc networks without pausing, through a more efficient and reliable computer simulation, using MATrix LABoratory 7.5.0 (R2007b). Simulation results obtained verify the correctness of the model. Keywords : Stationary, random waypoint, simulation, ...

  13. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  14. Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kühnrich, Morten; Godskesen, Jens Christian

    2009-01-01

    We introduce a novel process calculus called DBSPI (distributed broadcast SPI-calculus) which models mobile ad hoc networks (MANET). The calculus is a cryptographic broadcast calculus with locations and migration. Communication and migration are limited to neighborhoods. Neighborhood definitions...... are explicitly part of the syntax allowing dynamic extension using bound identifiers. In this semantic setting we study authentication of agents in MANET protocols. A safety property dealing with authentication correspondence assertions is defined. Later a dependent type and effect system is given...... and it is shown to be sound, i.e. protocols which are typeable are also safe. This result is lifted to open systems which involves Dolev-Yao attackers. Our Dolev-Yao attacker may use public keys for encryption and can attack any neighborhood it wishes. Our technique is applied to the Mobile IP registration...

  15. An algorithm for generating data accessibility recommendations for flight deck Automatic Dependent Surveillance-Broadcast (ADS-B) applications

    Science.gov (United States)

    2014-09-09

    Automatic Dependent Surveillance-Broadcast (ADS-B) In technology supports the display of traffic data on Cockpit Displays of Traffic Information (CDTIs). The data are used by flightcrews to perform defined self-separation procedures, such as the in-t...

  16. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  17. Spontaneous Ad Hoc Mobile Cloud Computing Network

    Directory of Open Access Journals (Sweden)

    Raquel Lacuesta

    2014-01-01

    Full Text Available Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  18. INTELLIGENCE MOBILE AND DIGITAL BROADCASTING TECHNOLOGY TO SUPPORT LEARNING FOR DISABILITIES STUDENTS

    OpenAIRE

    Settachai Chaisanit; Chiraphorn Chomyim; Samphan Chandee

    2013-01-01

    Usage of mobile digital broadcasting technologies in education is the most important of required technologies to provide main goals in distance education. It offers learning and data accession opportunities to learners notwithstanding time and place. In academic education, it was found that one of the critical problem is the appreciate education tool for disabilities students. Students with special education have difficulties to develop cognitive abilities and acquire new knowledge. They coul...

  19. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  20. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  1. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each node

  2. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  3. Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)

    Science.gov (United States)

    Ram Srikumar, P.; Sumathy, S.

    2017-11-01

    Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.

  4. A Group Vehicular Mobility Model for Routing Protocol Analysis in Mobile Ad Hoc Network

    OpenAIRE

    Kulkarni, Shrirang Ambaji; Rao, G Raghavendra

    2010-01-01

    Performance of routing protocols in mobile ad-hoc networks is greatly affected by the dynamic nature of nodes, route failures, wireless channels with variable bandwidth and scalability issues. A mobility model imitates the real world movement of mobile nodes and is central component to simulation based studies. In this paper we consider mobility nodes which mimic the vehicular motion of nodes like Manhattan mobility model and City Section mobility model. We also propose a new Group Vehicular ...

  5. Demand Based Effective Energy Utilization in Mobile Ad Hoc Networks

    OpenAIRE

    Bhuvaneswari, R.; Viswanathan, M

    2012-01-01

    Mobile Ad Hoc Networks (MANET) are the collection of mobile nodes without any centralized infrastructure. The underlying assumption is that the intermediate nodes cooperate in forwarding packets. Mobile nodes collects the route information through overhearing and stores these information in route caches with the use of Dynamic Source Routing (DSR) Protocol. These nodes consume power unnecessarily due to overhearing the transmissions of their neighbors. Due to this, the network performance is ...

  6. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  7. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... existing literature and empirically tested through an experimental design survey, in which the experimental group is exposed to a mobile payment solution with VAS, including receipts, loyalty cards, and coupons, and the control group is exposed to a mobile payment solution without VAS. Our findings show...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  8. Automatic Dependent Surveillance Broadcast ADS-B Sense-and-Avoid System

    Science.gov (United States)

    Arteaga, Ricardo

    2016-01-01

    This presentation provides valuable results, benefits and compliance to the FAA mandate in order to have clear guidelines to show aircraft designers how to integrate ADS-B technology into future UAS vehicles.

  9. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. C. Dutta

    2013-06-01

    Full Text Available This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  10. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  11. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  12. Perancangan LNA untuk Radar Automatic Dependent Surveilance-Broadcast (ADS-B Pada Frekuensi 1090 MHz dengan Multistub Matching

    Directory of Open Access Journals (Sweden)

    Gunawan Wibisono

    2016-03-01

    Full Text Available Automatic Dependent Surveillance Broadcast (ADS-B adalah perlengkapan dari sistem radar untuk menjangkau daerah yang sulit. Untuk aplikasi radar, ADS-B memerlukan LNA dengan gain dan stabilitas yang tinggi serta noise figure (NF dan return loss yang rendah. Untuk menghasilkan LNA dengan spesifikasi yang baikpada penelitian ini akan dirancang LNA menggunakan FET transistor-NE3210S01 dengan DC bias, VDS = 2 V dan ID = 10 mA agar dapat mencapai gain yang tinggi dengan NF yang rendah. Rangkaian multi-stub impedance matching digunakan untuk menekan return loss dan VSWR. Rangkaian LNA yang dirancang dengan single-stub matching memiliki output gain (S21 = 39.726 dB, input return loss (S11 = -25.368 dB, bandwidtih = 20 MHz, NF = 0,808 dB, VSWR = 1.114 dan stability factor (K = 4.175. Sementara itu LNA yang dirancang dengan multi-stub matching memiliki keluaran yang lebih baik, gain (S21 = 41.744 dB, input return loss (S11 = -30.014 dB, bandwidtih = 20 MHz, NF = 0778 dB, VSWR = 1.065 and stability factor (K = 2.154.

  13. Mobile Advertisement in Vehicular Ad-Hoc Networks

    OpenAIRE

    Dobre, Ciprian; Tudor, George Cristian

    2012-01-01

    Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of WiFi access points that dynamically disseminate data to clients running on the car's smart device. The approach can be considered an alternative to the static advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on sp...

  14. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  15. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julián García Matesanz

    2011-03-01

    Full Text Available The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  17. Scenarios and business models for mobile network operators utilizing the hybrid use concept of the UHF broadcasting spectrum

    Directory of Open Access Journals (Sweden)

    S. Yrjölä

    2016-09-01

    Full Text Available This paper explores and presents scenarios and business models for mobile network operators (MNOs in the novel hybrid use spectrum sharing concept of the Ultra High Frequency broadcasting spectrum (470-790 MHz used for Digital Terrestrial TV (DTT and Mobile Broadband (MBB. More flexible use of the band could lead to higher efficiency in delivering fast growing and converging MBB, media and TV content to meet changing consumer needs. On one hand, this could be beneficial for broadcasters (BC, e.g., by preserving the spectrum, by providing additional revenues, or by lowering cost of the spectrum and, on the other hand, for MNOs to gain faster access to new potentially lower cost, licensed, below 1GHz spectrum to cope with booming data traffic. As a collaborative benefit, the concept opens up new business opportunities for delivering TV and media content using MBB network with means to introduce this flexibly. This paper highlights the importance of developing sound business models for the new spectrum use concept, as they need to provide clear benefits to the key stakeholders to be adopted in real life. The paper applies a future and action oriented approach to the MBB using the concept to derive scenarios and business models for MNOs for accessing hybrid UHF bands. In order to address the convergence and transformation coming with the concept, business models are first developed for the current situation with separate exclusive spectrum bands. Novel business scenarios are then developed for the introduction of the new flexible hybrid UHF spectrum concept. The created business model indicates that the MNOs could benefit significantly from the new UHF bands, which would enable them to cope with increasing data traffic asymmetry, and to offer differentiation through personalized broadcasting and new media services. Moreover, it could significantly re-shape the business ecosystem around both the broadcasting and the mobile broadband by introducing

  18. Status of women in Nigerian broadcasting media: a case for representation and upward mobility.

    Science.gov (United States)

    Pate, U A

    1994-06-01

    Questionnaires completed by 45 female employees from 8 broadcast stations in Nigeria revealed that, despite some growth in female employment in areas such as programming, the status of women in this sector reproduces women's subordinate status in the broader society. For every 1 woman employed in the state radio stations and state and federal television stations represented in the survey, there were 7 male employees. Although the 3 states covered have an aggregate population of 4.3 million women, only 231 represent them in broadcasting. Moreover, female journalists are concentrated in the lowest status positions and tend to be relegated to coverage of women's and social issues rather than news and current affairs. Respondents cited the following factors as responsible for the low representation of women in broadcasting: cultural factors (20 respondents), a late start (15), male chauvinism (5), and a lack of dedication (5). At the same time, 40 of the 45 respondents indicated they believed women have equal opportunities to men in the broadcast media, given ability and perseverance, and 35 ranked the prospects for the next generation of female journalists as wide open. Greater visibility of female broadcasters in the higher ranks of the industry and in news-oriented reporting positions is essential to undercut stereotypes of women as wives and mothers only. Urged is a conscious effort on the part of the Nigerian broadcasting industry to attract more women to the field and provide them with the training needed to career advancement.

  19. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Abdulaziz Al-Nahari

    Full Text Available Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV, which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  20. Performance Analysis of Synthetic Mobility Models and Mobile Ad Hoc Routing Protocols

    Directory of Open Access Journals (Sweden)

    Nisrine IBADAH

    2017-05-01

    Full Text Available Routing protocols heavily influenced by the node motion applied. Many performance analyses are already done with a lot of flaws. But, they do not look to all influenced constraints. Sometimes, they evaluate routing protocols without taken into consideration mobility models. They often analyze them using one routing protocol. Whereas, Simulation time employed is too short. It mainly impacts performance metrics of many mobility models. Or usually, simulation area used is small. It influences the number of packets received. In this study, we aim to summarize all these several parameters into 90 different scenarios with an average of 1350 simulated files. We will combine some well-known mobility models with the most prominent mobile Ad hoc routing protocols in order to analyze their accurate behaviors in one experimental synthesis paper. That shows results of three performance metrics combined with five mobile ad hoc routing protocols under three synthetic mobility models. All these parameters are applied to two dissimilar simulation areas, a small one with (220 m x 220 m and a large one with (1020 m x 1020 m. Basing on one exhaustive analysis with all these details like this paper; leads to well understand the accurate behaviors of routing protocols and mobility models used. By displaying the ability of every routing protocol to deal with some topology changes, as well as to ensure network performances.

  1. An Analysis Framework for Mobility Metrics in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Xu Sanlin

    2007-01-01

    Full Text Available Mobile ad hoc networks (MANETs have inherently dynamic topologies. Under these difficult circumstances, it is essential to have some dependable way of determining the reliability of communication paths. Mobility metrics are well suited to this purpose. Several mobility metrics have been proposed in the literature, including link persistence, link duration, link availability, link residual time, and their path equivalents. However, no method has been provided for their exact calculation. Instead, only statistical approximations have been given. In this paper, exact expressions are derived for each of the aforementioned metrics, applicable to both links and paths. We further show relationships between the different metrics, where they exist. Such exact expressions constitute precise mathematical relationships between network connectivity and node mobility. These expressions can, therefore, be employed in a number of ways to improve performance of MANETs such as in the development of efficient algorithms for routing, in route caching, proactive routing, and clustering schemes.

  2. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...... networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  3. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    acer

    traffic pattern file contains information such as packet type, data packet size, broadcast packet origination rate and the number of traffic flows. In all scenarios, each node is assumed to be equipped with a wireless transceiver operating on IEEE 802.11b wireless standard (1999). The physical radio characteristics of each ...

  4. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  5. ADAPTIVE SERVICE PROVISIONING FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Cynthia Jayapal

    2010-09-01

    Full Text Available Providing efficient and scalable service provisioning in Mobile Ad Hoc Network (MANET is a big research challenge. In adaptive service provisioning mechanism an adaptive election procedure is used to select a coordinator node. The role of a service coordinator is crucial in any distributed directory based service provisioning scheme. The existing coordinator election schemes use either the nodeID or a hash function to choose the coordinator. In these schemes, the leader changes are more frequent due to node mobility. We propose an adaptive scheme that makes use of an eligibility factor that is calculated based on the distance to the zone center, remaining battery power and average speed to elect a core node that change according to the network dynamics. We also retain the node with the second highest priority as a backup node. Our algorithm is compared with the existing solution by simulation and the result shows that the core node selected by us is more stable and hence reduces the number of handoffs. This in turn improves the service delivery performance by increasing the packet delivery ratio and decreasing the delay, the overhead and the forwarding cost.

  6. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  7. Data management issues in mobile ad hoc networks

    Science.gov (United States)

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  8. Mobile Communication Networks and Digital Television Broadcasting Systems in the Same Frequency Bands – Advanced Co-Existence Scenarios

    Directory of Open Access Journals (Sweden)

    L. Polak

    2014-04-01

    Full Text Available The increasing demand for wireless multimedia services provided by modern communication systems with stable services is a key feature of advanced markets. On the other hand, these systems can many times operate in a neighboring or in the same frequency bands. Therefore, numerous unwanted co-existence scenarios can occur. The aim of this paper is to summarize our results which were achieved during exploration and measurement of the co-existences between still used and upcoming mobile networks (from GSM to LTE and digital terrestrial television broadcasting (DVB systems. For all of these measurements and their evaluation universal measurement testbed has been proposed and used. Results presented in this paper are a significant part of our activities in work package WP5 in the ENIAC JU project “Agile RF Transceivers and Front-Ends for Future Smart Multi-Standard Communications Applications (ARTEMOS”.

  9. On mobile wireless ad hoc IP video transports

    Science.gov (United States)

    Kazantzidis, Matheos

    2006-05-01

    Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.

  10. LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    OpenAIRE

    Senthil Murugan Tamilarasan; Kannan Eswariah

    2013-01-01

    Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access point. The MANET protocols can be classified as proactive and reactive routing protocol. The proactive routing protocols, all nodes which participated in network have routing table. This table updated periodically and is used to find the path between source and destination. The reactive routing protocol, nodes are initiate route discovery proc...

  11. The effect of mobility on local service discovery in the Ahoy ad-hoc network system

    NARCIS (Netherlands)

    Goering, P.T.H.; Heijenk, Geert; Haverkort, Boudewijn R.H.M.; Haarman, Robbert

    2007-01-01

    Ahoy, a protocol to perform local service discovery in ad-hoc networks is described in this paper. The protocol has been implemented in a discreteevent simulator to study its performance in case of a multihop mobile ad-hoc network. Especially the effect of mobility on the network load and the

  12. A survey of message diffusion portocols in mobile ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Ibrahim, M.; Simon, V.; Varga, E.; Carreras, I.

    2008-01-01

    For the last twenty years, mobile communications have experienced an explosive growth. In particular, one area of mobile communication, the Mobile Ad hoc Networks (MANETs), has attracted significant attention due to its multiple applications and its challenging research problems. On the other hand,

  13. Click Fraud Detection In Mobile Ads Served In Programmatic Exchanges

    Directory of Open Access Journals (Sweden)

    Anup Badhe

    2015-08-01

    Full Text Available Programmatic inventory auction or Real Time Bidding is the latest buzz in the mobile advertisement industry. This concept refers to a real time auction held for mobile advertisement spots and bidders bidding for that spot to show their advertisement. For a programmatic exchange that conducts these auctions detecting advertisements that auto click becomes very important since click fraud can quickly degrade the quality of supply for the exchange. Click fraud robs advertisers of their connection to unique users potential customers they might acquire. Click fraud nowadays is achieved with scripts to make it more legitimate and convincing.

  14. Credible Mobile and Ad Hoc Network Simulation-Based Studies

    Science.gov (United States)

    2006-10-26

    once duplicate (orange) Received the same packet twice 2-duplicates ( pink ) Received the same packet at least three times 4-duplicates (red) Received...mobility tool generators in NS-2 simulator. Version 1.0, beta, 2004. [6] S. Bajaj, L. Breslau, D. Estrin, K. Fall, S. Floyd , P. Haldar, M. Hand- ley, A

  15. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  16. Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Shah, Rutuja; Subramaniam, Sumathy; Lekala Dasarathan, Dhinesh Babu

    2016-01-01

    Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination...

  17. Decentralized Network-level Synchronization in Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    Voulgaris, Spyros; Dobson, Matthew; van Steen, Martinus Richardus

    Energy is the scarcest resource in ad hoc wireless networks, particularly in wireless sensor networks requiring a long lifetime. Intermittently switching the radio on and off is widely adopted as the most effective way to keep energy consumption low. This, however, prevents the very goal of

  18. A novel approach for the fast detection of black holes in mobile ad hoc networks

    OpenAIRE

    SERRAT OLMOS, MANUEL DAVID; Hernández Orallo, Enrique; Cano Escribá, Juan Carlos; Tavares De Araujo Cesariny Calafate, Carlos Miguel; Manzoni, Pietro

    2013-01-01

    Mobile ad hoc networks are infrastructure-less wireless networks that rely on node cooperation to properly work. In this kind of networks, attack detection and reaction is a key issue to the whole network. The most common threat in mobile ad hoc network scenarios consists in the presence of a certain percentage of selfish nodes, which try to reduce the consumption of their own resources to prolong their battery lifetime. Those nodes do not collaborate on forwarding activities, therefore affec...

  19. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  20. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  1. A Simplified Mobile Ad Hoc Network Structure for Helicopter Communication

    Directory of Open Access Journals (Sweden)

    Abdeldime Mohamed Salih Abdelgader

    2016-01-01

    Full Text Available There are a number of volunteer and statutory organizations who are capable of conducting an emergency response using helicopters. Rescue operations require a rapidly deployable high bandwidth network to coordinate necessary relief efforts between rescue teams on the ground and helicopters. Due to massive destruction and loss of services, ordinary communication infrastructures may collapse in these situations. Consequently, information exchange becomes one of the major challenges in these circumstances. Helicopters can be also employed for providing many services in rugged environments, military applications, and aerial photography. Ad hoc network can be used to provide alternative communication link between a set of helicopters, particularly in case of significant amount of data required to be shared. This paper addresses the ability of using ad hoc networks to support the communication between a set of helicopters. A simplified network structure model is presented and extensively discussed. Furthermore, a streamlined routing algorithm is proposed. Comprehensive simulations are conducted to evaluate the proposed routing algorithm.

  2. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...

  3. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    , thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...... issues in MANETs e.g. mobility and unreliable connections. Specially speaking, 1. We first propose a discrete probabilistic process calculus with which we can model in an MANET that the wireless connection is not reliable, and the network topology may undergo changes. We equip each wireless connection...

  4. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  5. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  6. Performance Analysis of Reuse Distance in Cooperative Broadcasting

    Directory of Open Access Journals (Sweden)

    Jimmi Grönkvist

    2016-01-01

    Full Text Available Cooperative broadcasting is a promising technique for robust broadcast with low overhead and delay in mobile ad hoc networks. The technique is attractive for mission-oriented mobile communication, where a majority of the traffic is of broadcast nature. In cooperative broadcasting, all nodes simultaneously retransmit packets. The receiver utilizes cooperative diversity in the simultaneously received signals. The retransmissions continue until all nodes are reached. After the packet has traveled a specific number of hops out from the source, denoted as reuse distance, the source node transmits a new broadcast packet in the time slot used for the previous broadcast packet. If the reuse distance is too small, interference causes packet loss in intermediate nodes. In the literature, a reuse distance of three is common. With an analysis based on a realistic interference model and real terrain data, we show that a reuse distance of at least four is necessary to avoid packet loss in sparsely connected networks, especially for high spectral efficiencies. For frequency hopping, widely used in military systems, we propose a novel method. This method almost eliminates interference for a reuse distance of three, increasing the throughput by 33% compared to systems with a reuse distance of four.

  7. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  8. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  9. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  10. Distributed geolocation algorithm in mobile ad hoc networks using received signal strength differences

    Science.gov (United States)

    Guo, Shanzeng; Tang, Helen

    2012-05-01

    Future military wireless communication in a battlefield will be mobile ad hoc in nature. The ability to geolocate and track both friendly forces and enemies is very important in military command and control operations. However, current mobile ad hoc networks (MANET) have no capabilities to geolocate radio emitters that belong to enemy mobile ad hoc networks. This paper presents a distributed geolocation algorithm using received signal strength differences to geolocate enemy radio emitters by leveraging friendly force MANET infrastructure, and proposes a communication protocol for radio emitter geolocation applications. An enemy's radio emitter signal is detected, and its signal strength is measured by the nodes in a friendly mobile ad hoc network. The identity of the enemy radio emitter is extracted from the decoded message header of the medium access control layer. By correlating and associating the enemy's radio emitter identity with its received signal strength, the enemy radio emitter is identified. The enemy's radio emitter identity and its received signal strength are distributed and shared among friendly mobile ad hoc nodes. Using received signal strength differences, a master friendly node can calculate the enemy's radio emitter geolocation, and build a recognized MANET picture (RMP). This MANET picture is then distributed to all friendly nodes for effective command and control operations. An advantage of this method is that mobile ad hoc nodes do not need special RF antennas to geolocate the enemy radio emitter as conventional electronic warfare techniques do. MATLAB-based simulations are presented to evaluate the accuracy and reliability of the proposed distributed geolocation algorithm under different MANET placements.

  11. Capability of a Mobile Monitoring System to Provide Real-Time Data Broadcasting and Near Real-Time Source Attribution

    Science.gov (United States)

    Erickson, M.; Olaguer, J.; Wijesinghe, A.; Colvin, J.; Neish, B.; Williams, J.

    2014-12-01

    It is becoming increasingly important to understand the emissions and health effects of industrial facilities. Many areas have no or limited sustained monitoring capabilities, making it difficult to quantify the major pollution sources affecting human health, especially in fence line communities. Developments in real-time monitoring and micro-scale modeling offer unique ways to tackle these complex issues. This presentation will demonstrate the capability of coupling real-time observations with micro-scale modeling to provide real-time information and near real-time source attribution. The Houston Advanced Research Center constructed the Mobile Acquisition of Real-time Concentrations (MARC) laboratory. MARC consists of a Ford E-350 passenger van outfitted with a Proton Transfer Reaction Mass Spectrometer (PTR-MS) and meteorological equipment. This allows for the fast measurement of various VOCs important to air quality. The data recorded from the van is uploaded to an off-site database and the information is broadcast to a website in real-time. This provides for off-site monitoring of MARC's observations, which allows off-site personnel to provide immediate input to the MARC operators on how to best achieve project objectives. The information stored in the database can also be used to provide near real-time source attribution. An inverse model has been used to ascertain the amount, location, and timing of emissions based on MARC measurements in the vicinity of industrial sites. The inverse model is based on a 3D micro-scale Eulerian forward and adjoint air quality model known as the HARC model. The HARC model uses output from the Quick Urban and Industrial Complex (QUIC) wind model and requires a 3D digital model of the monitored facility based on lidar or industrial permit data. MARC is one of the instrument platforms deployed during the 2014 Benzene and other Toxics Exposure Study (BEE-TEX) in Houston, TX. The main goal of the study is to quantify and explain the

  12. A Mobility and Traffic Generation Framework for Modeling and Simulating Ad Hoc Communication Networks

    Directory of Open Access Journals (Sweden)

    Chris Barrett

    2004-01-01

    Full Text Available We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad~hoc networks. Three components of this framework, namely a mobility data generator (MDG, a graph structure generator (GSG and an occlusion modification tool (OMT allow a variety of mobility models to be incorporated into the tool. The MDG module generates positions of transceivers at specified time instants. The GSG module constructs the graph corresponding to the ad hoc network from the mobility data provided by MDG. The OMT module modifies the connectivity of the graph produced by GSG to allow for occlusion effects. With two other modules, namely an activity data generator (ADG which generates packet transmission activities for transceivers and a packet activity simulator (PAS which simulates the movement and interaction of packets among the transceivers, the framework allows the modeling and simulation of ad hoc communication networks. The design of the framework allows a user to incorporate various realistic parameters crucial in the simulation. We illustrate the utility of our framework through a comparative study of three mobility models. Two of these are synthetic models (random waypoint and exponentially correlated mobility proposed in the literature. The third model is based on an urban population mobility modeling tool (TRANSIMS developed at the Los Alamos National Laboratory. This tool is capable of providing comprehensive information about the demographics, mobility and interactions of members of a large urban population. A comparison of these models is carried out by computing a variety of parameters associated with the graph structures generated by the models. There has recently been interest in the structural properties of graphs that arise in real world systems. We examine two aspects of this for the graphs created by the mobility models: change associated with power control (range of

  13. Broadcasting house

    DEFF Research Database (Denmark)

    Sattrup, Peter Andreas

    2008-01-01

    Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change.......Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change....

  14. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast) Technology.

    Science.gov (United States)

    Álvarez de Toledo, Santiago; Anguera, Aurea; Barreiro, José M; Lara, Juan A; Lizcano, David

    2017-01-19

    Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p) learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment) are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  15. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast Technology

    Directory of Open Access Journals (Sweden)

    Santiago Álvarez de Toledo

    2017-01-01

    Full Text Available Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  16. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    core network in assigning network address prefixes to gateways in mobile ad-hoc networks. This paper focuses on how CP-nets and the CPN computer tools have been applied in the development of ERDP. A CPN model has been constructed that constitutes a formal executable specification of ERDP. Simulation...

  17. Bridging Context Management Systems in the ad hoc and mobile environments

    NARCIS (Netherlands)

    Pawar, P.; Boros, Hanga; Liu, F.; Heijenk, Geert; van Beijnum, Bernhard J.F.

    The pervasive computing world in which the context-aware applications are aimed at is constituted of multiple network environments, e.g. ad hoc, mobile and fixed. There exist specialized Context Management Systems (CMSs) addressing context management needs of every network environment and the

  18. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Rafsanjani Marjan Kuchaki

    2016-01-01

    Full Text Available Mobile ad hoc networks (MANETs are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.

  19. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  20. Mobility based key management technique for multicast security in mobile ad hoc networks.

    Science.gov (United States)

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  1. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  2. An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. M. Reshmi

    2006-01-01

    Full Text Available Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

  3. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  4. Evolution of broadcast content distribution

    CERN Document Server

    Beutler, Roland

    2017-01-01

    This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer. Outlines the shift in broadcast content distribution paradigms and related strategic issues Provides an overview of the new broadcasting ecosystem encompassing new types of content, user habits, expectations, and devices Discusses complementary usage of different distribution technologies and platforms.

  5. Global Consistency Management Methods Based on Escrow Approaches in Mobile ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Takahiro Hara

    2010-01-01

    Full Text Available In a mobile ad hoc network, consistency management of data operations on replicas is a crucial issue for system performance. In our previous work, we classified several primitive consistency levels according to the requirements from applications and provided protocols to realize them. In this paper, we assume special types of applications in which the instances of each data item can be partitioned and propose two consistency management protocols which are combinations of an escrow method and our previously proposed protocols. We also report simulation results to investigate the characteristics of these protocols in a mobile ad hoc network. From the simulation results, we confirm that the protocols proposed in this paper drastically improve data availability and reduce the traffic for data operations while maintaining the global consistency in the entire network.

  6. A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks

    OpenAIRE

    Chettibi, Saloua

    2009-01-01

    S. Chettibi, M. Benmohammed, "A comprehensive study of a new multipath energy aware routing protocol for mobile ad-hoc networks"; International Conference on Systems and Information Processing, ICSIP'09, May 02 – 04, 2009, Guelma, Algeria; Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in criti...

  7. From Broadcast to Podcast

    DEFF Research Database (Denmark)

    Fibiger, Bo

    2007-01-01

    This paper will present the development from broadcasted educational television up to the actual use of streaming video and mobile units in eLearning. The paper will discuss the following topics: what can we learn from history? – and what are the new challenges and possibilities in mobile...... technologies? What we can learn from history is that new technologies provide new didactic possibilities. On the other hand, most of the uses are based on remediation of former formats. Despite the possibilities for interaction and integration, most video in the screen are formatted as traditional broadcasted...... television. Today the new video technologies can be labelled the three P’s: production, portability, and panorama/3D. The challenge is how to develop new formats and new didactics for the integration of the new technology in learning environments....

  8. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking

    OpenAIRE

    Papadimitratos, Panagiotis; Poturalski, Marcin; Schaller, Patrick; Lafourcade, Pascal; Basin, David; Capkun, Srdjan; Hubaux, Jean-Pierre

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND) — the discovery of devices directly reachable for communication or in physical proximity — becomes a fundamental requirement and building block for various applications. However, the very nature of wire...

  9. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda, Ronald; Flechais, Ivan; Roscoe, A.W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  10. Building hierarchical public key infrastructures in mobile ad-hoc networks

    OpenAIRE

    Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R.

    2006-01-01

    Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is temporarily unreachable because there can be multiple paths between two entities but certification path discovery is difficult since all the options do not lead to the target entity. On the contrary, in hierarchical PKIs, there is only one path between two entities and certificat...

  11. Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures

    OpenAIRE

    V Anitha; Akilandeswari, Dr. J.

    2011-01-01

    The emerging need for mobile ad hoc networks and secured data transmission phase is of crucial importance depending upon the environments like military. In this paper, a new way to improve the reliability of message transmission is presented. In the open collaborative MANET environment, any node can maliciously or selfishly disrupt and deny communication of other nodes. Dynamic changing topology makes it hard to determine the adversary nodes that affect the communication in MANET. An SMT prot...

  12. Efficient data transfer in mobile ad-hoc network using OPSM for disaster response applications

    OpenAIRE

    Bhanumathi, V.; R. Dhanasekaran

    2015-01-01

    The nodes in mobile ad-hoc network depend on battery for its power. Therefore, effective utilization of energy is necessary for efficient transfer of data between the persons involved in rescue without connection termination in disaster situation. An Optimal Path Selection Model (OPSM) is proposed to achieve this. First, routes are identified with the links having high power ratio and link duration. The path selection aims at reducing the number of node failures which in turn obtains energy s...

  13. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  14. Satellite broadcasting

    Science.gov (United States)

    Gregory, D.; Rainger, P.; Harvey, R. V.; Jennings, A.

    Questions related to direct broadcasting satellites are addressed with attention given to celestial mechanics, synchronous orbits, propagation, international plans, domestic installation, related laws and system costs. The role of the World Administrative Planning Conference (WARC) organization is discussed and contrasted with that of the regional administrative radio conference. Topics related to the field of law include coverage and overspill, regulation and control, copyrights and international organizations. Alternative ways of estimating direct broadcasting system costs are presented with consideration given to satellite costs as a function of mass, launch costs and system costs as a function of power.

  15. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  16. Broadcast Stylebook.

    Science.gov (United States)

    United Press International, New York, NY.

    This booklet deals with the unique problem of writing and preparing news for the electronic media where it will be presented orally. The contents of this monograph include "The United Press International Broadcast Newswire,""The United Press International Audio Network,""Broadcast…

  17. Using Apriori algorithm to prevent black hole attack in mobile Ad hoc networks

    Directory of Open Access Journals (Sweden)

    Seyed Javad Mirabedini

    2013-01-01

    Full Text Available A mobile ad hoc network (MANET is considered as an autonomous network, which consists of mobile nodes, which communicate with each other over wireless links. When there is no fixed infrastructure, nodes have to cooperate in order to incorporate the necessary network functionality. Ad hoc on Demand Distance Vector (AODV protocol is one of the primary principal routing protocols implemented in Ad hoc networks. The security of the AODV protocol is threaded by a specific kind of attack called ‘Black Hole’ attack. This paper presents a technique to prevent the Black hole attack by implementing negotiation with neighbors who claim to maintain a route to destination. Negotiation process is strengthen by apriori method to judge about suspicious node. Apriori algorithm is an effective association rule mining method with relatively low complexity, which is proper for MANETs. To achieve more improvement, fuzzy version of ADOV is used. The simulation results indicate that the proposed protocol provides more securable routing and also more efficiency in terms of packet delivery, overhead and detection rate than the conventional AODV and fuzzy AODV in the presence of Black hole attacks.

  18. Security of Mobile ad-hoc Wireless Networks. A Brief Survey

    Directory of Open Access Journals (Sweden)

    TILIUTE, D. E.

    2007-11-01

    Full Text Available One of the most present issues of computer wireless networks is the security. Comparing with their wired counterpart, the wireless networks not only accentuate some of the well-known security vulnerabilities but they are subject of new and specific ones. Among the existing wireless networks the ad hoc ones are the most exposed to attacks and collusions due to the absence of any centralized control. The most efficient way to ensure the communication secrecy, inclusively for ad hoc wireless networks, is the cryptography. From many reasons, following from specific operating conditions, the employment of asymmetric key techniques and Public Key Infrastructure is not a realistic choice. In the networks with a large number of nodes, as wireless sensor networks, a large number of secret keys are involved in order to ensure the communication secrecy. While dynamicity is one of the essential features of mobile wireless networks, when nodes may leave or join the network and in the absence of a centralized control entity, the management of secret keys is crucial. The paper presents the main aspects of mobile wireless networks security and focuses on the key management issue in ad-hoc wireless networks.

  19. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  20. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  1. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  2. Simulation and performance analysis of the AD HOC On-Demand Distance Vector Routing Protocol for tactical mobile ad hoc networks

    OpenAIRE

    Theriot, Tyrone P.

    2000-01-01

    This thesis presents a simulation and analysis of the Ad Hoc On- Demand Distance Vector Routing Protocol (AODV) for mobile ad hoc network (MANET) environments using the Network Simulator 2 (NS2) tool. AODV is being suggested for possible implementation in the Joint Tactical Radio System (JTRS) for the United States military. Utilizing an AODV model resident in NS2, the simulation focuses on key performance parameters that include the packet delivery fraction, routing loss, buffer loss, total ...

  3. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    ) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications......Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  4. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis

    Directory of Open Access Journals (Sweden)

    Joshi Deepti

    2005-01-01

    Full Text Available Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing "fully distributed certificate authority" scheme for ad hoc networks. In the proposed modification, redundancy is introduced by allocating more than one share to each node in order to increase the probability of creating the certificate for a node in a highly mobile network. A probabilistic analysis is carried out to analyze the trade-offs between the ease of certificate creation and the security provided by the proposed scheme. The analysis carried out from the intruder's perspective suggests that in the worst-case scenario, the intruder is just "one node" away from a legitimate node in compromising the certificate. The analysis also outlines the parameter selection criteria for a legitimate node to maintain a margin of advantage over an intruder in creating the certificate.

  5. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  6. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  7. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  8. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    Science.gov (United States)

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  9. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  10. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ramesh Sekaran

    2014-01-01

    Full Text Available The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET. The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  11. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  12. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Directory of Open Access Journals (Sweden)

    Maha Abdelhaq

    Full Text Available A mobile ad hoc network (MANET is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  13. Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mieso K. Denko

    2006-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this dynamic network environment. Caching and replica allocation within the network can improve data accessibility by storing the data and accessing them locally. However, maintaining data consistency among replicas becomes a challenging problem. Hence, balancing data accessibility and consistency is an important step toward data management in MANETs. In this paper, we propose a replica-based data-storage mechanism and undelivered-message queue schemes to provide reliable data storage and dissemination. We also propose replica update strategies to maintain data consistency while improving data accessibility. These solutions are based on a clustered MANET where nodes in the network are divided into small groups that are suitable for localized data management. The goal is to reduce communication overhead, support localized computation, and enhance scalability. A simulation environment was built using an NS-2 network simulator to evaluate the performance of the proposed schemes. The results show that our schemes distribute replicas effectively, provide high data accessibility rates and maintain consistency.

  14. Self-organization of nodes in mobile ad hoc networks using evolutionary games and genetic algorithms

    Directory of Open Access Journals (Sweden)

    Janusz Kusyk

    2011-07-01

    Full Text Available In this paper, we present a distributed and scalable evolutionary game played by autonomous mobile ad hoc network (MANET nodes to place themselves uniformly over a dynamically changing environment without a centralized controller. A node spreading evolutionary game, called NSEG, runs at each mobile node, autonomously makes movement decisions based on localized data while the movement probabilities of possible next locations are assigned by a forced-based genetic algorithm (FGA. Because FGA takes only into account the current position of the neighboring nodes, our NSEG, combining FGA with game theory, can find better locations. In NSEG, autonomous node movement decisions are based on the outcome of the locally run FGA and the spatial game set up among it and the nodes in its neighborhood. NSEG is a good candidate for the node spreading class of applications used in both military tasks and commercial applications. We present a formal analysis of our NSEG to prove that an evolutionary stable state is its convergence point. Simulation experiments demonstrate that NSEG performs well with respect to network area coverage, uniform distribution of mobile nodes, and convergence speed.

  15. Blackboard Rules for Coordinating Context-aware Applications in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jean-Marie Jacquet

    2012-08-01

    Full Text Available Thanks to improvements in wireless communication technologies and increasing computing power in hand-held devices, mobile ad hoc networks are becoming an ever-more present reality. Coordination languages are expected to become important means in supporting this type of interaction. To this extent we argue the interest of the Bach coordination language as a middleware that can handle and react to context changes as well as cope with unpredictable physical interruptions that occur in opportunistic network connections. More concretely, our proposal is based on blackboard rules that model declaratively the actions to be taken once the blackboard content reaches a predefined state, but also that manage the engagement and disengagement of hosts and transient sharing of blackboards. The idea of reactiveness has already been introduced in previous work, but as will be appreciated by the reader, this article presents a new perspective, more focused on a declarative setting.

  16. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  17. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  18. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  19. Optimization of ATSC Mobile Handheld Service Capacity

    Directory of Open Access Journals (Sweden)

    Omneya Issa

    2013-01-01

    Full Text Available Mobile TV has become a reality offered on several mobile delivery systems. Among them is the Advanced Television System Committee (ATSC system for mobile and handheld digital television services, known as ATSC Mobile DTV or ATSC M/H, which has moved from standardization to implementation. As the North American broadcast industry is preparing to provide Mobile DTV service to consumers, this work discusses important technical parameters that affect the TV service quality and capacity. Since additional error correction mechanisms were added to overcome mobile transmission problems, the available payload for M/H services is limited. This creates a need to efficiently use the available M/H bandwidth. The paper aims to optimize the Mobile DTV service capacity while maintaining an acceptable perceived quality. It presents tradeoffs between several factors affecting service capacity and signal robustness, which is prominent for designing Mobile TV broadcasting scenarios.

  20. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  1. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  2. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Friedlander David

    2003-01-01

    Full Text Available Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  3. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  4. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  5. A Rough Penalty Genetic Algorithm for Multicast Routing in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chih-Hao Lin

    2013-01-01

    Full Text Available Multicast routing is an effective way to transmit messages to multiple hosts in a network. However, it is vulnerable to intermittent connectivity property in mobile ad hoc network (MANET especially for multimedia applications, which have some quality of service (QoS requirements. The goal of QoS provisioning is to well organize network resources to satisfy the QoS requirement and achieve good network delivery services. However, there remains a challenge to provide QoS solutions and maintain end-to-end QoS with user mobility. In this paper, a novel penalty adjustment method based on the rough set theory is proposed to deal with path-delay constraints for multicast routing problems in MANETs. We formulate the problem as a constrained optimization problem, where the objective function is to minimize the total cost of the multicast tree subject to QoS constraints. The RPGA is evaluated on three multicast scenarios and compared with two state-of-the-art methods in terms of cost, success rate, and time complexity. The performance analyses show that this approach is a self-adaptive method for penalty adjustment. Remarkably, the method can address a variety of constrained multicast routing problems even though the initial routes do not satisfy all QoS requirements.

  6. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  7. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  8. Automatic Dependent Surveillance - Broadcast Verification and Validation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automatic Dependent Surveillance ? Broadcast (ADS-B) is an emerging Communications, Navigation, and Surveillance (CNS) technology that will vastly expand the state...

  9. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available agents, the Keep Alive Server [5], [7], and the Brokering Service [2], [5], [7]. This architecture has several limitations, one of which being the inadequate consideration for the mobility of the mobile agents. Tasks are indiscriminately aborted... result in a higher task abortion rate. Minimizing the Negative Effects of Device Mobility in Cell-based Ad-hoc Wireless Computational Grids P. Mudali1, M.O. Adigun2, and J.O. Emuoyibofarhe3 Department of Computer Science, University of Zululand...

  10. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  11. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  12. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  13. A Dynamic Probabilistic Based Broadcasting Scheme for MANETs

    Directory of Open Access Journals (Sweden)

    Kannan Shanmugam

    2016-01-01

    Full Text Available MANET is commonly known as Mobile Ad Hoc Network in which cluster of mobile nodes can communicate with each other without having any basic infrastructure. The basic characteristic of MANET is dynamic topology. Due to the dynamic behavior nature, the topology of the network changes very frequently, and this will lead to the failure of the valid route repeatedly. Thus, the process of finding the valid route leads to notable drop in the throughput of the network. To identify a new valid path to the targeted mobile node, available proactive routing protocols use simple broadcasting method known as simple flooding. The simple flooding method broadcasts the RREQ packet from the source to the rest of the nodes in mobile network. But the problem with this method is disproportionate repetitive retransmission of RREQ packet which could result in high contention on the available channel and packet collision due to extreme traffic in the network. A reasonable number of routing algorithms have been suggested for reducing the lethal impact of flooding the RREQ packets. However, most of the algorithms have resulted in considerable amount of complexity and deduce the throughput by depending on special hardware components and maintaining complex information which will be less frequently used. By considering routing complexity with the goal of increasing the throughput of the network, in this paper, we have introduced a new approach called Dynamic Probabilistic Route (DPR discovery. The Node’s Forwarding Probability (NFP is dynamically calculated by the DPR mobile nodes using Probability Function (PF which depends on density of local neighbor nodes and the cumulative number of its broadcast covered neighbors.

  14. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  15. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  16. Efficient data transfer in mobile ad-hoc network using OPSM for disaster response applications

    Directory of Open Access Journals (Sweden)

    V. Bhanumathi

    2015-06-01

    Full Text Available The nodes in mobile ad-hoc network depend on battery for its power. Therefore, effective utilization of energy is necessary for efficient transfer of data between the persons involved in rescue without connection termination in disaster situation. An Optimal Path Selection Model (OPSM is proposed to achieve this. First, routes are identified with the links having high power ratio and link duration. The path selection aims at reducing the number of node failures which in turn obtains energy saving. Then, the source will select a node-disjoint path based on energy and hop for data transfer and store the remaining paths in cache. Priority based path maintenance is also proposed for the selection of routes from cache based on remaining energy if the primary selection fails. Path selection and maintenance extend the network lifetime by reducing the energy usage in transmission. Simulation results revealed that OPSM achieves 64% and 50% reduction in energy consumption compared to Dynamic Source Routing (DSR and Multipath DSR (MDSR. The number of path breakages is also 11 times and 5.5 times lesser than DSR and MDSR. Thus, it can be said that OPSM is a better choice for optimal path selection for performance enhancement by saving energy and improving lifetime.

  17. Pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Tan, Xuezhi

    2007-11-01

    By analyzing all kinds of address configuration algorithms, this paper provides a new pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks. Based on PRDAC, the first node that initials this network randomly chooses a nonlinear shift register that can generates an m-sequence. When another node joins this network, the initial node will act as an IP address configuration sever to compute an IP address according to this nonlinear shift register, and then allocates this address and tell the generator polynomial of this shift register to this new node. By this means, when other node joins this network, any node that has obtained an IP address can act as a server to allocate address to this new node. PRDAC can also efficiently avoid IP conflicts and deal with network partition and merge as same as prophet address (PA) allocation and dynamic configuration and distribution protocol (DCDP). Furthermore, PRDAC has less algorithm complexity, less computational complexity and more sufficient assumption than PA. In addition, PRDAC radically avoids address conflicts and maximizes the utilization rate of IP addresses. Analysis and simulation results show that PRDAC has rapid convergence, low overhead and immune from topological structures.

  18. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  19. An Optimal Spectrum Handoff Scheme for Cognitive Radio Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    DUAN, J.

    2011-08-01

    Full Text Available Spectrum handoff procedures occur when the primary users appear in the licensed band temporary occupied by the cognitive radio (CR users and aim to help the CR users to vacate the spectrum rapidly and find available channel to resume the transmission. However, a spectrum handoff scheme that comprehensively considers channel selection, handoff decision as well as space domain handoff is yet undeveloped. In this paper we present a complete optimal spectrum handoff scheme for cognitive radio mobile ad hoc networks. First, we design a spectrum selection mechanism to allow CR users optimally choose the appropriate channel. The spectrum idleness prediction algorithm is utilized based on developing a cooperative spectrum searching approach. Through combining the estimated transmission time, the PU appearance probability and the mean spectrum availability time are integrated to develop the optimal spectrum handoff scheme. Moreover, as one part of the proposed scheme, a geo-location approach is utilized to deal with the space domain handoff. The complete scheme is evaluated through a comprehensive simulation study, and results reveal significant improvements in handoff times and transmission efficiency over conventional approaches.

  20. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  1. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  2. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  3. An artificial immune system for securing mobile ad hoc networks against intrusion attacks

    Science.gov (United States)

    Hortos, William S.

    2003-08-01

    To mitigate the problem of intrusion attacks by malicious nodes in mobile ad hoc networks (MANETs), security attributes and quantifiable trust levels, unique to the MANET's transient, self-organizing topology, augment or replace traditional protocol metrics of throughput, packet delay and hop-count in the ad hoc route discovery procedures. The new features are unique to the candidate security protocol, which views security as a quality metric to improve the relevance of the routes discovered by established reactive ad hoc routing protocols. Attributes of a secure route are identified in order to define the appropriate metrics to quantify the "level of security" associated with the protocol messaging and the detection of malicious activities by some intrusive nodes. A state vector of features and metrics based on the published Secure Routing Protocol (SRP) for MANETs is constructed to encode network security characteristics. This route discovery protocol mitigates the detrimental effects of various malicious behaviors to provide trustworthy connectivity information. The protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach the querying source node. In this paper, the pattern of values, taken by the state vector of the SRP features in the route request, discovery and reply operations, are analyzed to detect evidence of intrusion attacks by malicious nodes that could lead to denial of service and network shutdown. The pattern analysis applies a technique based on negative selection found in natural immune systems that can detect extraneous patterns in the (nonself) space that is the complement of vector values associated with correct route discovery and route maintenance. The immune system is well-suited to the distributed nature of the MANET. It does not rely on a central controller, but instead uses a distributed detection and response mechanism in order to respond to foreign invaders, mirroring the

  4. Emergency Broadcast System Based On GIS

    Science.gov (United States)

    Junfeng, Kang; Baoyu, Wang; Xueying, Jiang; Xiaosheng, Liu

    2017-02-01

    Nowadays, disaster occurs more and more frequently, which brings huge losses to the society. Presented a GIS based emergency broadcast system (GIS-EBS), to provide rapid, accurate information to the public, can reduce the people’s losses maximum. Different from the traditional radio data system (RDS), by adding broadcasting terminal control instruction on the FM signal, GIS-EBS extended the RDS protocol, which can control each radio terminal’s state. And through the extended RDS protocol, GIS-EBS can broadcast and release the emergency information to the right place and the people most in need in the shortest time.

  5. Broadcasting in Mexico.

    Science.gov (United States)

    de Noriega, Luis Antonio; Leach, Frances

    This monograph traces the growth of Mexico's broadcasting services against the background of that country's geographical, cultural, demographic, economic, and political structures. Specific areas dealt with within the six chapters of the monograph are: (1) the national environment for broadcasting; (2) the advent and development of broadcasting in…

  6. Applied Anthropology in Broadcasting

    Science.gov (United States)

    Eiselein, E. B.

    1976-01-01

    Three different applied media anthropology projects are described. These projects stem from the broadcasters' legal need to know about the community (community ascertainment), the broadcasters' need to know about the station audience (audience profile), and the broadcasters' desire to change a community (action projects). (Author)

  7. Blocking probabilities in mobile communications networks with time-varying rates ad redialing subscribers

    NARCIS (Netherlands)

    Abdalla, Nadra; Boucherie, Richardus J.

    Call-blocking probabilities are among the key performance measures in mobile communications networks. For their analysis, mobile networks can be modelled as networks of Erlang loss queues with common capacity restrictions dictated by the allocation of frequencies to the cells of the network.

  8. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  9. Cold temperature improves mobility and survival in Drosophila models of autosomal-dominant hereditary spastic paraplegia (AD-HSP

    Directory of Open Access Journals (Sweden)

    Sally L. Baxter

    2014-08-01

    Full Text Available Autosomal-dominant hereditary spastic paraplegia (AD-HSP is a crippling neurodegenerative disease for which effective treatment or cure remains unknown. Victims experience progressive mobility loss due to degeneration of the longest axons in the spinal cord. Over half of AD-HSP cases arise from loss-of-function mutations in spastin, which encodes a microtubule-severing AAA ATPase. In Drosophila models of AD-HSP, larvae lacking Spastin exhibit abnormal motor neuron morphology and function, and most die as pupae. Adult survivors display impaired mobility, reminiscent of the human disease. Here, we show that rearing pupae or adults at reduced temperature (18°C, compared with the standard temperature of 24°C, improves the survival and mobility of adult spastin mutants but leaves wild-type flies unaffected. Flies expressing human spastin with pathogenic mutations are similarly rescued. Additionally, larval cooling partially rescues the larval synaptic phenotype. Cooling thus alleviates known spastin phenotypes for each developmental stage at which it is administered and, notably, is effective even in mature adults. We find further that cold treatment rescues larval synaptic defects in flies with mutations in Flower (a protein with no known relation to Spastin and mobility defects in flies lacking Kat60-L1, another microtubule-severing protein enriched in the CNS. Together, these data support the hypothesis that the beneficial effects of cold extend beyond specific alleviation of Spastin dysfunction, to at least a subset of cellular and behavioral neuronal defects. Mild hypothermia, a common neuroprotective technique in clinical treatment of acute anoxia, might thus hold additional promise as a therapeutic approach for AD-HSP and, potentially, for other neurodegenerative diseases.

  10. Cold temperature improves mobility and survival in Drosophila models of autosomal-dominant hereditary spastic paraplegia (AD-HSP).

    Science.gov (United States)

    Baxter, Sally L; Allard, Denise E; Crowl, Christopher; Sherwood, Nina Tang

    2014-08-01

    Autosomal-dominant hereditary spastic paraplegia (AD-HSP) is a crippling neurodegenerative disease for which effective treatment or cure remains unknown. Victims experience progressive mobility loss due to degeneration of the longest axons in the spinal cord. Over half of AD-HSP cases arise from loss-of-function mutations in spastin, which encodes a microtubule-severing AAA ATPase. In Drosophila models of AD-HSP, larvae lacking Spastin exhibit abnormal motor neuron morphology and function, and most die as pupae. Adult survivors display impaired mobility, reminiscent of the human disease. Here, we show that rearing pupae or adults at reduced temperature (18°C), compared with the standard temperature of 24°C, improves the survival and mobility of adult spastin mutants but leaves wild-type flies unaffected. Flies expressing human spastin with pathogenic mutations are similarly rescued. Additionally, larval cooling partially rescues the larval synaptic phenotype. Cooling thus alleviates known spastin phenotypes for each developmental stage at which it is administered and, notably, is effective even in mature adults. We find further that cold treatment rescues larval synaptic defects in flies with mutations in Flower (a protein with no known relation to Spastin) and mobility defects in flies lacking Kat60-L1, another microtubule-severing protein enriched in the CNS. Together, these data support the hypothesis that the beneficial effects of cold extend beyond specific alleviation of Spastin dysfunction, to at least a subset of cellular and behavioral neuronal defects. Mild hypothermia, a common neuroprotective technique in clinical treatment of acute anoxia, might thus hold additional promise as a therapeutic approach for AD-HSP and, potentially, for other neurodegenerative diseases. © 2014. Published by The Company of Biologists Ltd.

  11. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wu Jieyi

    2005-01-01

    Full Text Available Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF to address these problems by exploiting the cross-layer information. CRDF solves the above problems efficiently and enables a new technique: routing strategy automation (RoSAuto. RoSAuto refers to the technique that each source node automatically decides the routing strategy based on the application requirements and each intermediate node further adapts the routing strategy so that the network resource usage can be optimized. To demonstrate the effectiveness and the efficiency of CRDF, we design and evaluate a macrobian route discovery strategy under CRDF.

  12. Preemptive plerixafor injection added to pegfilgrastim after chemotherapy in non-Hodgkin lymphoma patients mobilizing poorly.

    Science.gov (United States)

    Partanen, A; Valtola, J; Ropponen, A; Vasala, K; Penttilä, K; Ågren, L; Pyörälä, M; Nousiainen, T; Selander, T; Mäntymaa, P; Pelkonen, J; Varmavuo, V; Jantunen, E

    2017-11-01

    Filgrastim is usually combined with chemotherapy to mobilize hematopoietic progenitor cells in non-Hodgkin lymphoma (NHL) patients. Limited information is available on the efficacy of a preemptive plerixafor (PLER) injection in poor mobilizers after chemotherapy and pegfilgrastim. In this prospective study, 72 patients with NHL received chemotherapy plus pegfilgrastim, and 25 hard-to-mobilize patients received also PLER. The usefulness and efficacy of our previously developed algorithm for PLER use in pegfilgrastim-containing mobilization regimen were evaluated as well as the graft cellular composition, hematological recovery, and outcome after autologous stem cell transplantation (auto-SCT) according to the PLER use. A median 3.4-fold increase in blood CD34+ cell counts was achieved after the first PLER dose. The minimum collection target was achieved in the first mobilization attempt in 66/72 patients (92%) and 68 patients (94%) proceeded to auto-SCT. An algorithm for PLER use was fulfilled in 76% of the poor mobilizers. Absolute numbers of T-lymphocytes and NK cells were significantly higher in the PLER group, whereas the number of CD34+ cells collected was significantly lower. Early neutrophil engraftment was slower in the PLER group, otherwise hematological recovery was comparable within 12 months from auto-SCT. No difference was observed in survival according to the PLER use. Chemotherapy plus pegfilgrastim combined with preemptive PLER injection is an effective and convenient approach to minimize collection failures in NHL patients intended for auto-SCT. A significant effect of PLER on the graft cellular composition was observed, but no difference in outcome after auto-SCT was detected.

  13. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architecture...... and protocols. The main contributions of the LightPeers framework are: a mobile P2P framework including a specialized robust messaging protocol resilient to changes in the network topology, an developers API, and a suite of LightPeers applications supporting nomadic learning prototyping key features of LightPeers....

  14. Radio broadcasting via satellite

    Science.gov (United States)

    Helm, Neil R.; Pritchard, Wilbur L.

    1990-10-01

    Market areas offering potential for future narrowband broadcast satellites are examined, including international public diplomacy, government- and advertising-supported, and business-application usages. Technical issues such as frequency allocation, spacecraft types, transmission parameters, and radio receiver characteristics are outlined. Service and system requirements, advertising revenue, and business communications services are among the economic issues discussed. The institutional framework required to provide an operational radio broadcast service is studied, and new initiatives in direct broadcast audio radio systems, encompassing studies, tests, in-orbit demonstrations of, and proposals for national and international commercial broadcast services are considered.

  15. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  16. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  17. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    Science.gov (United States)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  18. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  19. 47 CFR 74.601 - Classes of TV broadcast auxiliary stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Classes of TV broadcast auxiliary stations. 74... Television Broadcast Auxiliary Stations § 74.601 Classes of TV broadcast auxiliary stations. (a) TV pickup stations. A land mobile station used for the transmission of TV program material and related communications...

  20. Low Cost Antennas for Direct Broadcast Satellite Radio

    Science.gov (United States)

    Wu, T. K.; Huang, J.

    1994-01-01

    Two omni-directional and circularly polarized low gain antennas (the crossed drooping dipole and the TM(sub 21) mode circular patch antenna)are developed for direct broadcast satellite radio (DBSR) outdoor mobile terminal applications.

  1. Educational Broadcasting--Radio.

    Science.gov (United States)

    Ahamed, Uvais; Grimmett, George

    This manual is intended for those who must conduct educational radio broadcasting training courses in Asia-Pacific countries without the resources of experienced personnel, as well as for individuals to use in self-learning situations. The selection of material has been influenced by the need to use broadcasting resources effectively in programs…

  2. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  3. 1972 Broadcasting Yearbook.

    Science.gov (United States)

    Broadcasting Publications, Inc., Washington, DC.

    The 1972 broadcasting yearbook provides complete information about the broadcast industry. An opening section offers a television (TV) directory, various TV statistics, such as demographics, distributions, sales, and rankings, which can be used for market strategies, and other useful information for those involved in communications. A section on…

  4. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  5. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  6. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  7. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Jørgensen, Rasmus Nyholm; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  8. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  9. Implications of Internet on Broadcasting

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    One of the main challenges within broadcasting research in the recent years has been to understand the evolution from traditional broadcasting to digital broadcasting. The aim of this paper is to step further and give an analysis of Internet’s influence on traditional broadcasting services...

  10. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  11. Hadamard quantum broadcast channels

    Science.gov (United States)

    Wang, Qingle; Das, Siddhartha; Wilde, Mark M.

    2017-10-01

    We consider three different communication tasks for quantum broadcast channels, and we determine the capacity region of a Hadamard broadcast channel for these various tasks. We define a Hadamard broadcast channel to be such that the channel from the sender to one of the receivers is entanglement-breaking and the channel from the sender to the other receiver is complementary to this one. As such, this channel is a quantum generalization of a degraded broadcast channel, which is well known in classical information theory. The first communication task we consider is classical communication to both receivers, the second is quantum communication to the stronger receiver and classical communication to other, and the third is entanglement-assisted classical communication to the stronger receiver and unassisted classical communication to the other. The structure of a Hadamard broadcast channel plays a critical role in our analysis: The channel to the weaker receiver can be simulated by performing a measurement channel on the stronger receiver's system, followed by a preparation channel. As such, we can incorporate the classical output of the measurement channel as an auxiliary variable and solve all three of the above capacities for Hadamard broadcast channels, in this way avoiding known difficulties associated with quantum auxiliary variables.

  12. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  13. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  14. On-the-fly Packet Error Recovery in a Cooperative Cluster of Mobile Devices

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Heide, Janus; Pedersen, Morten Videbæk

    2011-01-01

    This paper investigates the possibility of packet error recovery in a cooperative cluster of mobile devices. We assume that these devices receive data from a broadcast transmission on their primary network interface (e.g. LTE network), and they are using a secondary network interface (e.g. ad hoc...

  15. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  16. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  17. Radio Broadcast Technology

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 7; Issue 1. Radio Broadcast Technology. Harsh Vardhan. General Article Volume 7 Issue 1 January 2002 pp 53-63. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/007/01/0053-0063. Keywords. Hertzian ...

  18. Virtue Broadcasting - directorate change

    CERN Multimedia

    2003-01-01

    The Board of Virtue Broadcasting Plc ("Virtue") have announced the appointment of Mr. Klaus Ackerstaff as the CEO of the main Board. He began his professional career at CERN, where he was responsible for the IT infrastructure of the OPAL (particle physics) project (1/2 page).

  19. 47 CFR 73.1700 - Broadcast day.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast day. 73.1700 Section 73.1700 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1700 Broadcast day. The term broadcast day means that...

  20. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong

    2015-12-06

    The flexibility of radio access network facilitated by 5G networks opens the gateway of deploying dynamic strategies for broadcasting TV channels in an efficient way. Currently, spectrum efficiency and bandwidth efficiency are the two common metrics measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we introduce a novel measurement approach, called broadcast efficiency which considers the mobile user as a main reference. Broadcast efficiency is calculated as the number of served audiences per unit of radio resource. From numerical analysis, we show that broadcasting unpopular TV channels dramatically decreases the broadcast efficiency. This finding is evaluated by employing multiple distributions on the size of audience among TV channels. Furthermore, by conducting a real-life simulation, we discover that a high broadcast efficiency may result in a low percentage of served audiences if the audiences of TV channels are quite evenly distributed.

  1. The Extended-OPQ Method for User-Centered Quality of Experience Evaluation: A Study for Mobile 3D Video Broadcasting over DVB-H

    Directory of Open Access Journals (Sweden)

    Jumisko-Pyykkö Satu

    2011-01-01

    Full Text Available Abstract The Open Profiling of Quality (OPQ is a mixed methods approach combining a conventional quantitative psychoperceptual evaluation and qualitative descriptive quality evaluation based on naïve participants' individual vocabulary. The method targets evaluation of heterogeneous and multimodal stimulus material. The current OPQ data collection procedure provides a rich pool of data, but full benefit of it has neither been taken in the analysis to build up completeness in understanding the phenomenon under the study nor has the procedure in the analysis been probed with alternative methods. The goal of this paper is to extend the original OPQ method with advanced research methods that have become popular in related research and the component model to be able to generalize individual attributes into a terminology of Quality of Experience. We conduct an extensive subjective quality evaluation study for 3D video on mobile device with heterogeneous stimuli. We vary factors on content, media (coding, concealments, and slice modes, and transmission levels (channel loss rate. The results showed that advanced procedures in the analysis cannot only complement each other but also draw deeper understanding on Quality of Experience.

  2. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  3. Broadcast sound technology

    CERN Document Server

    Talbot-Smith, Michael

    1990-01-01

    Broadcast Sound Technology provides an explanation of the underlying principles of modern audio technology. Organized into 21 chapters, the book first describes the basic sound; behavior of sound waves; aspects of hearing, harming, and charming the ear; room acoustics; reverberation; microphones; phantom power; loudspeakers; basic stereo; and monitoring of audio signal. Subsequent chapters explore the processing of audio signal, sockets, sound desks, and digital audio. Analogue and digital tape recording and reproduction, as well as noise reduction, are also explained.

  4. Financing Public Service Broadcasting

    DEFF Research Database (Denmark)

    Berg, Christian Edelvold; Lund, Anker Brink

    2012-01-01

    Recently several European countries have abolished the traditional public service licence fee system, replacing it with direct public funding. But except for Iceland, the Nordic countries have not followed suit. The article discusses this development within a comparative framework of Public Service...... Broadcasting (PSB) financing regimes in Europe, concluding that Denmark, Finland, Iceland, Norway, and Sweden may still be considered conventional, licence fee PSB countries, but with some interesting differences in relation to competitive and market oriented alternatives of resource provision...

  5. 47 CFR 73.1217 - Broadcast hoaxes.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast hoaxes. 73.1217 Section 73.1217 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1217 Broadcast hoaxes. No licensee or permittee of any...

  6. Broadcasting children's music

    OpenAIRE

    Bignell, Jonathan

    2017-01-01

    Broadcasting children’s music on television and radio is motivated by, and aims to serve, adults’ perceptions of children’s wants and needs. Children’s music in general is shaped by the understanding of what ‘childhood’ means and, in turn, supports adults’ assumptions about childhood. This article develops these ideas in an analysis of examples from the history of British radio and television, beginning in the 1920s and continuing until the growing penetration of online interactive media chal...

  7. Data broadcasting: merging digital broadcasting with the Internet

    DEFF Research Database (Denmark)

    2001-01-01

    This fully revised and updated edition of Data Broadcasting presents an exhaustive overview of the specific data broadcasting and bordering technologies concerned. Answering a wealth of questions, it describes this new technology in detail, examining how it differs from established technologies, ...

  8. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  9. Bluetooth Broadcasting : How far can we go? An experimental study

    NARCIS (Netherlands)

    Aiello, Marco; Jong, Remko de; Nes, Joel de

    2009-01-01

    Bluetooth is a wireless communication technology to build small networks of devices. It was designed as a cable replacement technology. Given its widespread adoption, especially in mobile devices, new uses are possible today. For instance, one can broadcast messages to nomadic users based on their

  10. Flight Extraction and Phase Identification for Large Automatic Dependent Surveillance–Broadcast Datasets

    NARCIS (Netherlands)

    Sun, J.; Ellerbroek, J.; Hoekstra, J.M.

    2017-01-01

    AUTOMATIC dependent surveillance–broadcast (ADS-B) [1,2] is widely implemented in modern commercial aircraft and will become mandatory equipment in 2020. Flight state information such as position, velocity, and vertical rate are broadcast by tens of thousands of aircraft around the world constantly

  11. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  12. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  13. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  14. Broadcasting, Reacting, Engaging

    DEFF Research Database (Denmark)

    Etter, Michael

    2014-01-01

    Purpose - Symmetric communication and relationship building are core principles of public relations, which have been highlighted for CSR communication. In this paper three different communication strategies for CSR communication in Twitter are developed, of which each contributes differently...... to the ideals of symmetric communication and relationship building. The framework is then applied to analyze how companies use the micro-blogging service Twitter for CSR communication. Design/methodology/approach - Social network analysis is used to identify the 30 most central corporate accounts in a CSR...... Twitter-Network. From these accounts over 40´000 tweets are extracted and manually coded. Anova is applied to investigate differences in the weighting of CSR topics between the different strategies. Findings - The analysis reveals that corporations adhere to a broadcasting strategy or a reactive strategy...

  15. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    Computing, The Computer Journal, Security and Network Communications, and International Journal on Artificial Intelligence Tools. He is a member of the IEEE and ACM. ...applications in wireless networks such as military battlefields, emergency response, mobile commerce, online gaming, and collaborative work are based on the...transition T_RK. As we use GDH for rekeying, Tcm can be calculated by Cleave,i divided by BW, the wireless network bandwidth (Mbps) in the MANET. A(mc

  16. Mobilities

    DEFF Research Database (Denmark)

    to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion......, consumption, surveillance and mobilities history to mention some of the many themes covered by this reference work. This new title will focus on the academic contributions to this understanding by primarily focusing on works and publications in the aftermath of the seminal book and landmark text ‘Sociology...

  17. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  18. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  19. 47 CFR 73.1692 - Broadcast station construction near or installation on an AM broadcast tower.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast station construction near or installation on an AM broadcast tower. 73.1692 Section 73.1692 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast...

  20. Unified broadcast in sensor networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Jurdak, Raja; Kusy, Branislav

    2011-01-01

    Complex sensor network applications include multiple services such as collection, dissemination, time synchronization, and failure detection protocols. Many of these protocols require local state maintenance through periodic broadcasts which leads to high control overhead. Recent attempts...

  1. The evolution of television sports broadcasting through new technologies: football as a paradigm in Spain

    Directory of Open Access Journals (Sweden)

    Vanessa ROGER MONZÓ

    2015-06-01

    Full Text Available Sports broadcasts on television are events that take place outside the premises of program production centers, but are issued by the broadcaster through the coverage of a mobile unit. The first broadcasts of football matches in Spain were conducted with three cameras. Since then, developments in the planning of these sporting events has been marked by the introduction of new technologies. The objective of this research is to describe how these innovations have influenced the conduct and narrative structure of broadcasts of football. To do this, there has been a literature review to distinguish four stages in carrying broadcasts of football in Spain, from the birth of television to the present.

  2. Effect of adding a mobile health intervention to a multimodal antimicrobial stewardship programme across three teaching hospitals: an interrupted time series study

    Science.gov (United States)

    Gharbi, M.; Moore, L. S. P.; Castro-Sanchéz, E.; Lawson, W.; Gilchrist, M.; Holmes, A. H.

    2017-01-01

    Objectives: To evaluate the impact of adding a mobile health (mHealth) decision support system for antibiotic prescribing to an established antimicrobial stewardship programme (ASP). Methods: In August 2011, the antimicrobial prescribing policy was converted into a mobile application (app). A segmented regression analysis of interrupted time series was used to assess the impact of the app on prescribing indicators, using data (2008–14) from a biannual point prevalence survey of medical and surgical wards. There were six data points pre-implementation and six data points post-implementation. Results: There was an increase in compliance with policy (e.g. compliance with empirical therapy or expert advice) in the two specialties of medicine (6.48%, 95% CI = −1.25 to 14.20) and surgery (6.63%, 95% CI = 0.15–13.10) in the implementation period, with a significant sudden change in level in surgery (P antimicrobial policy on a digital platform, e.g. the reach and access to the policy, should be measured using indicators more sensitive to mHealth interventions. PMID:28333297

  3. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  4. Broadcasting Children’s Music

    Directory of Open Access Journals (Sweden)

    Jonathan Bignell

    2017-09-01

    Full Text Available Broadcasting children’s music on television and radio is motivated by, and aims to serve, adults’ perceptions of children’s wants and needs. Children’s music in general is shaped by the understanding of what ‘childhood’ means and, in turn, supports adults’ assumptions about childhood. This article develops these ideas in an analysis of examples from the history of British radio and television, beginning in the 1920s and continuing until the growing penetration of online interactive media challenged the status of broadcasting in the early 21st century. The article discusses examples of different kinds of children’s music in a broadcast context, including the broadcast of commercial recordings of music for children, such as versions of traditional songs and nursery rhymes as well as pop music aimed at children. It also considers the significance of signature tunes and repeated musical sequences from long-lived and well-loved children’s programmes, because they play key roles in differentiating children’s programmes from each other and distinguishing children’s music from music aimed at adults. Broadcast programmes frequently include music that does not play a central role, when it is used as an accompaniment to drama, entertainment performance or animation. But such music contributes to programmes’ tone and shapes their mode of address to an imagined child audience. Entertainment shows or magazine programmes include music performances alongside non-musical sequences and can use music to, for example, mark an occasion for sing-along activities or accompany games. The social function of broadcasting for children watching or listening at home or at school, usually with an adult or other children, is constituted in part by these varied forms of children’s music. These forms of music shape conceptions of childhood through particular kinds of listening practices and ways of belonging to an audience.

  5. Broadcast and Aggregation in BBC

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kiilerich Pratas, Nuno

    2015-01-01

    In this paper we introduce a process calculus BBC that has both forms of communication. For both many-to-one and one-to-many communication, it is often a natural assumption that communication is bounded; this reflects two distinct aspects of the limitations of a medium. In the case of broadcast......, the bound limits the number of possible recipients of a message. In the case of collection, the bound limits the number of messages that can be received. For this reason, BBC uses a notion of bounded broadcast and collection. Moreover, the syntax of the calculus introduces an explicit notion of connectivity...

  6. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a messag....... It is possible to have weak bisimular networks which have different probabilistic connectivity information. We also examine the relation between our weak bisimulation and a minor variant of PCTL*. Finally we apply our calculus on a small example called the ZeroConf protocol....

  7. Cable Television and Satellite Broadcasting

    Science.gov (United States)

    1990-05-31

    homes by the end teevision per week. However, accorigtthIne op that de a ay anthr 4 million hoesby - tohoe pendent Broadcast Authority’s (IBA...France to create a leisure desire to buy cable TV. park and a production studio for cartoons. 8 The Role of Public Service Providers In the Next Decade

  8. Hybridisation of Slovene public broadcasting

    OpenAIRE

    Volčič, Zala; Zajc, Melita

    2015-01-01

    Public broadcasting institutions have existed as central and publicly funded national institutions, providing services in the public interest. The coincidence of technological, political and economic circumstances in the last 20 years or so, however, has challenged their monopoly position. Technological developments - specifically digitalisation - have expanded spectrum availability. In some cases, public television has been commercialised, privatised or marginalised by the introduction of co...

  9. Performance Evaluation with Different Mobility Models for Dynamic Probabilistic Flooding in MANETs

    Directory of Open Access Journals (Sweden)

    Abdalla M. Hanashi

    2009-01-01

    Full Text Available Broadcasting is an essential and effective data propagation mechanism, with several of important applications such as route discovery, address resolution, as well as many other network services. As data broadcasting has many advantages, also causing a lot of contention, collision, and congestion, which induces what is known as "broadcast storm problems". Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with high number of rebroadcast messages until the messages reach to all network nodes. A good probabilistic broadcasting protocol can achieve higher saved rebroadcast, low collisions and less number of relays. In this paper, we propose a dynamic probabilistic approach that dynamically fine-tunes the rebroadcasting probability according to the number of neighbour's nodes distributed in the ad hoc network for routing request packets (RREQs. The performance of the proposed approach is investigated and compared with the simple AODVand fixed probabilistic schemes using the GloMoSim network simulator under different mobility models. The performance results reveal that the improved approach is able to achieve higher saved rebroadcast and low collision as well as low number of relays than the fixed probabilistic scheme and simple AODV.

  10. Derived Weather State Information via ADS-B Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Innovation Laboratory, Inc, proposes to use Automatic Dependent Surveillance – Broadcast (ADS-B) information as the basis of atmospheric wave and turbulence...

  11. Direct Broadcast Satellite: Radio Program

    Science.gov (United States)

    Hollansworth, James E.

    1992-01-01

    NASA is committed to providing technology development that leads to the introduction of new commercial applications for communications satellites. The Direct Broadcast Satellite-Radio (DBS-R) Program is a joint effort between The National Aeronautics and Space Administration (NASA) and The United States Information Agency/Voice of America (USIA/VOA) directed at this objective. The purpose of this program is to define the service and develop the technology for a direct-to-listener satellite sound broadcasting system. The DBS-R Program, as structured by NASA and VOA, is now a three-phase program designed to help the U.S. commercial communications satellite and receiver industry bring about this new communications service. Major efforts are being directed towards frequency planning hardware and service development, service demonstration, and experimentation with new satellite and receiver technology.

  12. Vehicle density based forwarding protocol for safety message broadcast in VANET.

    Science.gov (United States)

    Huang, Jiawei; Huang, Yi; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay.

  13. Radio broadcasting: an attractive way of broadcasting astronomy

    Science.gov (United States)

    Mosoia, C.

    2008-06-01

    Astronomy is full of beautiful skyscapes, shining stars and huge planets. The vast majority of them can be transformed into tactile images and complemented by audio descriptions. These translations of visual information into raised lines, shapes and textures can be felt with the fingertips instead of viewed with the eyes. In this way, the beauties of the Universe enter the universe of blind and visually impaired people. Happily, we all have radio broadcasting as an important source of information and entertainment. Science radio programmes can bring the real music of the spheres (as Pythagoras once suggested) to the audience.

  14. 47 CFR 73.1206 - Broadcast of telephone conversations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast of telephone conversations. 73.1206 Section 73.1206 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1206 Broadcast of telephone...

  15. 47 CFR 73.24 - Broadcast facilities; showing required.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast facilities; showing required. 73.24 Section 73.24 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES AM Broadcast Stations § 73.24 Broadcast facilities; showing required. An...

  16. 47 CFR 73.4091 - Direct broadcast satellites.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Direct broadcast satellites. 73.4091 Section 73.4091 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4091 Direct broadcast satellites. (a) See...

  17. 47 CFR 73.6011 - Protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of TV broadcast stations. 73.6011 Section 73.6011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6011 Protection of TV broadcast...

  18. 47 CFR 73.624 - Digital television broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital television broadcast stations. 73.624... RADIO BROADCAST SERVICES Television Broadcast Stations § 73.624 Digital television broadcast stations. (a) Digital television (“DTV”) broadcast stations are assigned channels 6 MHz wide. Initial...

  19. 47 CFR 73.1211 - Broadcast of lottery information.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast of lottery information. 73.1211... RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1211 Broadcast of lottery... paragraph (c) of this section, shall broadcast any advertisement of or information concerning any lottery...

  20. Broadcast copies reveal the quantumness of correlations.

    Science.gov (United States)

    Piani, M; Christandl, M; Mora, C E; Horodecki, P

    2009-06-26

    We study the quantumness of bipartite correlations by proposing a quantity that combines a measure of total correlations-mutual information-with the notion of broadcast copies-i.e., generally nonfactorized copies-of bipartite states. By analyzing how our quantity increases with the number of broadcast copies, we are able to classify classical, separable, and entangled states. This motivates the definition of the broadcast regularization of mutual information, the asymptotic minimal mutual information per broadcast copy, which we show to have many properties of an entanglement measure.

  1. 76 FR 55817 - Broadcast Applications and Proceedings; Fairness Doctrine and Digital Broadcast Television...

    Science.gov (United States)

    2011-09-09

    ... COMMISSION 47 CFR Parts 1, 73 and 76 Broadcast Applications and Proceedings; Fairness Doctrine and Digital Broadcast Television Redistribution Control; Fairness Doctrine, Personal Attacks, Political Editorials and... legal effect and are obsolete. The deleted rules include ] the fairness doctrine, broadcast flag rules...

  2. 47 CFR 1.4000 - Restrictions impairing reception of television broadcast signals, direct broadcast satellite...

    Science.gov (United States)

    2010-10-01

    ... any commercial non-broadcast communications signals transmitted via wireless technology to and/or from... Transmit Fixed Wireless Communications Signals § 1.4000 Restrictions impairing reception of television... broadcast signals, direct broadcast satellite services or multichannel multipoint distribution services. 1...

  3. Lossless Compression of Broadcast Video

    DEFF Research Database (Denmark)

    Martins, Bo; Eriksen, N.; Faber, E.

    1998-01-01

    We investigate several techniques for lossless and near-lossless compression of broadcast video.The emphasis is placed on the emerging international standard for compression of continous-tone still images, JPEG-LS, due to its excellent compression performance and moderatecomplexity. Except for one...... artificial sequence containing uncompressible data all the 4:2:2, 8-bit test video material easily compresses losslessly to a rate below 125 Mbit/s. At this rate, video plus overhead can be contained in a single telecom 4th order PDH channel or a single STM-1 channel. Difficult 4:2:2, 10-bit test material...

  4. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  5. Real Time Synchronization of Live Broadcast Streams with User Generated Content and Social Network Streams

    NARCIS (Netherlands)

    Stokking, H.M.; Kaptein, A.M.; Veenhuizen, A.T.; Spitters4, M.M.; Niamut, O.A.

    2013-01-01

    This paper describes the work in the FP7 STEER project on augmenting a live broadcast with live user generated content. This user generated content consists of both video content, captured with mobile devices, and social network content, such as Facebook or Twitter messages. To enable multi-source

  6. Real-Time Radio Wave Propagation for Mobile Ad-Hoc Network Emulation and Simulation Using General Purpose Graphics Processing Units (GPGPUs)

    Science.gov (United States)

    2014-05-01

    real-time calculations with stochastic models (3). When calculations are performed off-line it is assumed that the node mobility is known apriori . This...these capabilities with GPUs the wireless node mobility and path loss needed to either be computed apriori or use a large number of (i.e., 10,000) CPU

  7. History of Satellite TV Broadcasting and Satellite Broadcasting Market in Turkey

    Directory of Open Access Journals (Sweden)

    Mihalis KUYUCU

    2015-09-01

    Full Text Available The present study analyses the satellite broadcasting that is the first important development that emerged as a result of digitalization in communication technologies and its reflections in Turkey. As the first milestone in the globalization of television broadcasting, satellite broadcasting provided substantial contribution towards the development of the media. Satellite bro adcasting both increased the broadcasting quality and geographical coverage of the television media. A conceptual study was carried out in the first part of the study in connection with the history of satellite broadcasting in Turkey and across the world. In the research part of the study, an analysis was performed on 160 television channels that broadcast in Turkey via Turksat Satellite. Economic structure of the television channels broadcasting in Turkey via satellite was studied and an analysis was perfo rmed on the operational structure of the channels. As a result of the study, it was emphasized that the television channels broadcasting via satellite platform also use other platforms for the purpose of spreading their broadcasts and television channel ow ners make investments in different branches of the media, too. Capital owners invest in different business areas other than the media although television channels broadcasting via Turksat mostly focus on thematic broadcasting and make effort to generate ec onomic income from advertisements. Delays are encountered in the course of the convergence between the new media and television channels that broadcast only from the satellite platform and such television channels experience more economic problems than the other channels. New media and many TV broadcasting platforms emerged as a result of the developments in the communication technologies. In television broadcasting, satellite platform is not an effective platform on its own. Channels make effort to reach t o more people by using other platforms in addition to

  8. Equilibria in a Random Viewer Model of Television Broadcasting

    DEFF Research Database (Denmark)

    Olai Hansen, Bodil; Keiding, Hans

    2014-01-01

    The authors considered a model of commercial television market with advertising with probabilistic viewer choice of channel, where private broadcasters may coexist with a public television broadcaster. The broadcasters influence the probability of getting viewer attention through the amount...

  9. Live broadcast from the Globe

    CERN Multimedia

    La tête au carréTuesday, 17 June 2008 between 2.00 and 3.00 p.m.“La tête au carré”, a France Inter radio programme devoted to science, will set up its sound booth at CERN for a special broadcast on the LHC.The journalist Mathieu Vidard will interview the following guests: - Pierre Van Hove, an experimental physicist working on CMS. He is a CNRS research scientist from the Institut Hubert Curien in Strasbourg, France.- Abdelhak Djouadi is a theoretical physicist. He is a research director at the CNRS’s Laboratoire de physique théorique at Orsay, France and holder of the CNRS silver medal.- Magali Gruwe, one of the engineers in charge of LHC operations at CERN.» To take part in this live broadcast, which is open to the public, come to the Globe at 1:30 p.m. The number of places is limited.» No specialist knowledge required.» See the programme's homepage

  10. Language Choice in Transnational Radio Broadcasting.

    Science.gov (United States)

    Wood, Richard E.

    1979-01-01

    Discusses the comparative strength of language use as measured by languages used in transnational radio broadcasting. Findings indicate that politics and Christian evangelism are the two major concerns dominating broadcasting and that language selection policy influences political, social, and cultural change. (JMF)

  11. Attitude of Programme Presenters towards Broadcasting of ...

    African Journals Online (AJOL)

    The study assessed the attitude of programme presenters towards broadcasting of agricultural programme on electronic media in Kwara state. A two-stage sampling technique was used in selecting a total of 120 respondents from the broadcasting stations in Kwara state. Frequency counts, percentages, means, standard ...

  12. Method of providing data broadcast/multicast

    NARCIS (Netherlands)

    Bosch, H.G.P.; Galonska, Johann; Mullender, Sape J.

    2006-01-01

    In one embodiment, a dedicated channel (e.g., is a coded composite transport channel) is configured for each user equipment in a broadcast group based on a first spreading code and a second spreading code. A same first spreading code is assigned to each user equipment in the broadcast group, and the

  13. Broadcast Media in Breton: Dawn at Last?

    Science.gov (United States)

    Moal, Stefan

    2000-01-01

    Discusses to what extent the broadcast media in the Breton language has acted as a vital link to language maintenance in Brittany. Highlights the background context of the Breton language, reasons for its decline, and what the broadcast media can do to help reverse language shift. (Author/VWL)

  14. Broadcast Network Coverage with Multicell Cooperation

    Directory of Open Access Journals (Sweden)

    Hongxiang Li

    2010-01-01

    Full Text Available Multicell cooperation has been identified as one of the underlying principles for future wireless communication systems. This paper studies the benefits of multicell cooperation in broadcast TV network from an information theoretical perspective. We define outage capacity as the figure of merit and derive the broadcast coverage area to evaluate such system. Specifically, we calculate the broadcast coverage area with given common information rate and outage probabilities when multiple base stations collaboratively transmit the broadcast signals. For the general MIMO case where receivers have multiple antennas, we provide simulation results to illustrate the expanded coverage area. In all cases, our results show that the coverage of a TV broadcast network can be significantly improved by multicell cooperation.

  15. Independence between Korean Government and Broadcasting Industry

    Directory of Open Access Journals (Sweden)

    Yi-Chih Huang

    2015-01-01

    Full Text Available The recent success of Hallyu (Korean Wave first driven by the spread of TV dramas received academic attention for its effective national policies. However, little is known about how national policy is implemented and local industry capacity is maintained even after market opening. Therefore, the aim of this paper attempts to explore how and why state governs broadcasting industry effectively. Historical institutionalism has been used to explain the way that Korean governments had taken to collaborate with the broadcasting industry. The relation between governments and broadcasting industry, the changes of broadcasting policies and authorities responsible for regulating TV industry are involved. Results of this study showed that strong state intervention in Korea did lead to oligopoly, and the governments dominated the industry by designing the market structure. To conclude, this study may be of importance in explaining the governed independence between Korean governments and broadcasting industry, as well as how it contributed to the stable productivity and export competitiveness.

  16. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  17. Random broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [ICSI/BERKELEY; Sauerwald, Tomas [ICSI/BERKELEY

    2009-01-01

    In this work, we consider the random broadcast time on random geometric graphs (RGGs). The classic random broadcast model, also known as push algorithm, is defined as: starting with one informed node, in each succeeding round every informed node chooses one of its neighbors uniformly at random and informs it. We consider the random broadcast time on RGGs, when with high probability: (i) RGG is connected, (ii) when there exists the giant component in RGG. We show that the random broadcast time is bounded by {Omicron}({radical} n + diam(component)), where diam(component) is a diameter of the entire graph, or the giant component, for the regimes (i), or (ii), respectively. In other words, for both regimes, we derive the broadcast time to be {Theta}(diam(G)), which is asymptotically optimal.

  18. Now Broadcasting in Planck Definition

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, Craig [Fermilab

    2013-07-08

    If reality has finite information content, space has finite fidelity. The quantum wave function that encodes spatial relationships may be limited to information that can be transmitted in a "Planck broadcast", with a bandwidth given by the inverse of the Planck time, about $2\\times 10^{43}$ bits per second. Such a quantum system can resemble classical space-time on large scales, but locality emerges only gradually and imperfectly. Massive bodies are never perfectly at rest, but very slightly and slowly fluctuate in transverse position, with a spectrum of variation given by the Planck time. This distinctive new kind of noise associated with quantum geometry would not have been noticed up to now, but may be detectable in a new kind of experiment.

  19. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  20. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  1. Synchronous Design and Test of Distributed Passive Radar Systems Based on Digital Broadcasting and Television

    Directory of Open Access Journals (Sweden)

    Wan Xianrong

    2017-02-01

    Full Text Available Digital broadcasting and television are important classes of illuminators of opportunity for passive radars. Distributed and multistatic structure are the development trends for passive radars. Most modern digital broadcasting and television systems work on a network, which not only provides a natural condition to distributed passive radar but also puts forward higher requirements on the design of passive radar systems. Among those requirements, precise synchronization among the receivers and transmitters as well as among multiple receiving stations, which mainly involves frequency and time synchronization, is the first to be solved. To satisfy the synchronization requirements of distributed passive radars, a synchronization scheme based on GPS is presented in this paper. Moreover, an effective scheme based on the China Mobile Multimedia Broadcasting signal is proposed to test the system synchronization performance. Finally, the reliability of the synchronization design is verified via the distributed multistatic passive radar experiments.

  2. 47 CFR 74.705 - TV broadcast analog station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV broadcast analog station protection. 74.705... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.705 TV broadcast analog station protection. (a) The TV broadcast...

  3. 47 CFR 73.4280 - Character evaluation of broadcast applicants.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Character evaluation of broadcast applicants. 73.4280 Section 73.4280 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4280 Character...

  4. 47 CFR 73.4102 - FAA communications, broadcast of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FAA communications, broadcast of. 73.4102 Section 73.4102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4102 FAA communications...

  5. 47 CFR 73.1660 - Acceptability of broadcast transmitters.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Acceptability of broadcast transmitters. 73.1660 Section 73.1660 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1660 Acceptability of...

  6. 47 CFR 15.117 - TV broadcast receivers.

    Science.gov (United States)

    2010-10-01

    ... portion of a TV broadcast receiver, tuning aids of the same type and comparable capability and quality... 47 Telecommunication 1 2010-10-01 2010-10-01 false TV broadcast receivers. 15.117 Section 15.117... TV broadcast receivers. (a) All TV broadcast receivers shipped in interstate commerce or imported...

  7. Adaptive Data Broadcast in Hybrid Networks

    National Research Council Canada - National Science Library

    Stathatos, Konstantinos; Roussopoulos, Nick; Baras, John S

    1997-01-01

    .... The goal is to build highly scalable systems with small response time. In this paper, we describe a technique that continuously adapts the broadcast content to match the hot-spot of the workload...

  8. The Digital Dividend of Terrestrial Broadcasting

    CERN Document Server

    Beutler, Roland

    2012-01-01

    The “digital revolution” of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications—audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a “digital dividend” of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the “dividend” itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any...

  9. Injection molded optical backplane for broadcast architecture

    Science.gov (United States)

    Rosenberg, Paul; Mathai, Sagi; Sorin, Wayne V.; McLaren, Moray; Straznicky, Joseph; Panotopoulos, Georgios; Warren, David; Morris, Terry; Tan, Michael R. T.

    2012-01-01

    A low cost, blind mate, injection molded optical backplane is presented. The optical backplane is comprised of 12 channel optical broadcast buses, operating at 10Gbps/channel with six blindmate optical output ports spaced 1U apart.

  10. 8 CFR 204.13 - How can the International Broadcasting Bureau of the United States Broadcasting Board of...

    Science.gov (United States)

    2010-01-01

    ... description of the job to be performed; and (ii) The broadcasting expertise held by the alien, including how... the BBG, may petition for an alien (and the alien's accompanying spouse and children) to work as a... broadcasts; hosts for news broadcasts, news analysis, editorial and other broadcast features; or a news...

  11. Farm broadcasters call for regional network.

    Science.gov (United States)

    1989-03-01

    The United Nations Economic and Social Commission for Asia and the Pacific (ESCAP) laid the groundwork for a 5 day symposium on farm broadcasting in Bangkok in November 1988. ESCAP Executive Secretary S.A.M.S. Kibria discussed in his statement the idea of a regional rural broadcasting network for Asia and the Pacific. Several other pertinent points stated the following: Government funding was needed to support rural broadcasting; special funding and attention needs to be devoted to disadvantaged groups and marginal farmers; broadcasting should play a more significant role in South Pacific islands where it would not educate but also bring the people together. It was suggested that a proposed training manual for basic radio operation be printed in the local languages. Since 1980, there have 14 seminar-training programs held throughout Asia and the Pacific. Workshops open dialogue on ways to coordinate government support and rural interests in radio programming. As well, rural broadcasters learn how to sharpen their skills and keep audiences interested. Correctly implemented and adequately funded, agricultural broadcast programs could improve the lives of millions in the Pacific and Asia.

  12. Three-dimensional television: a broadcaster's perspective

    Science.gov (United States)

    Jolly, S. J. E.; Armstrong, M.; Salmon, R. A.

    2009-02-01

    The recent resurgence of interest in the stereoscopic cinema and the increasing availability to the consumer of stereoscopic televisions and computer displays are leading broadcasters to consider, once again, the feasibility of stereoscopic broadcasting. High Definition Television is now widely deployed, and the R&D departments of broadcasters and consumer electronics manufacturers are starting to plan future enhancements to the experience of television. Improving the perception of depth via stereoscopy is a strong candidate technology. In this paper we will consider the challenges associated with the production, transmission and display of different forms of "three-dimensional" television. We will explore options available to a broadcaster wishing to start a 3D service using the technologies available at the present time, and consider how they could be improved to enable many more television programmes to be recorded and transmitted in a 3D-compatible form, paying particular attention to scenarios such as live broadcasting, where the workflows developed for the stereoscopic cinema are inapplicable. We will also consider the opportunities available for broadcasters to reach audiences with "three-dimensional" content via other media in the near future: for example, distributing content via the existing stereoscopic cinema network, or over the Internet to owners of stereoscopic computer displays.

  13. Effective link quality estimation as a means to improved end-to-end packet delivery in high traffic mobile ad hoc networks☆

    Directory of Open Access Journals (Sweden)

    Syed Rehan Afzal

    2017-08-01

    Full Text Available Accurate link quality estimation is a fundamental building block in quality aware multi hop routing. In an inherently lossy, unreliable and dynamic medium such as wireless, the task of accurate estimation becomes very challenging. Over the years ETX has been widely used as a reliable link quality estimation metric. However, more recently it has been established that under heavy traffic loads ETX performance gets significantly worse. We examine the ETX metric's behavior in detail with respect to the MAC layer and UDP data; and identify the causes of its unreliability. Motivated by the observations made in our analysis, we present the design and implementation of our link quality measurement metric xDDR – a variation of ETX. This article extends xDDR to support network mobility. Our experiments show that xDDR substantially outperforms minimum hop count, ETX and HETX in terms of end-to-end packet delivery ratio in static as well as mobile scenarios.

  14. An Intelligent Broadcasting Algorithm for Early Warning Message Dissemination in VANETs

    Directory of Open Access Journals (Sweden)

    Ihn-Han Bae

    2015-01-01

    Full Text Available Vehicular ad hoc network (VANET has gained much attention recently to improve road safety, reduce traffic congestion, and enable efficient traffic management because of its many important applications in transportation. In this paper, an early warning intelligence broadcasting algorithm is proposed, EW-ICAST, to disseminate a safety message for VANETs. The proposed EW-ICAST uses not only the early warning system on the basis of time to collision (TTC but also the intelligent broadcasting algorithm on the basis of fuzzy logic. Thus, the EW-ICAST resolves effectively broadcast storm problem and meets time-critical requirement. The performance of EW-ICAST is evaluated through simulation and compared with that of other alert message dissemination algorithms. From the simulation results, we know that EW-ICAST is superior to Simple, P-persistence, and EDB algorithms.

  15. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  16. Can broadcasting make a difference?

    Science.gov (United States)

    Lozare, B V

    1989-01-01

    Communication has untapped potential as a catalyst for community power in developing countries. Greater clarity is needed, however, on the channels of communication that will best integrate the contributions of diverse private and public agencies to meeting development needs. Also needed is a greater emphasis on strategic rather than technical aspects of communication. Most studies of communication have focused on the individual radio listener or television viewer, thereby ignoring the influence of broader forces. A concern for psychological determinants of decision making has led to a neglect of systemic factors. Another major error has been the failure to design longitudinal studies, or at least to collect information at 2 points in time. All of these observations point to a need to study power (economic, political, and social) as a crucial variable in understanding development. Moreover, there is a need for more attention to the role and impact of broadcasting on conflict management--an approach that requires abandoning traditional consensus models of communication. Yet another problem has been blind acceptance of the assumption that development communication and development support communication are unitary concepts that are universally applicable in all countries, all social and cultural contexts, and all development conditions. This unitary approach leads to the false conclusion that there is a grand model of development, and all communication personnel have to do is to see how radio and television fit into this conceptual framework. Finally, there has been a failure to appreciate fully the magnitude of poverty. If true development (defined as the capability of a people to go from where they are to where they want to be) is to occur, these strategic issues must be given serious attention.

  17. Kajian implementasi radio siaran digital di Indonesia [Study of digital radio broadcasting implementation in Indonesia

    Directory of Open Access Journals (Sweden)

    Amry Daulat Gultom

    2015-12-01

    significant developments related to the implementation, so it is necessary to review potential of digital broadcast radio, the readiness of government, operator, public, and obstacles that faced and to formulate strategies to overcome them. Analytical method used are qualitative SWOT and TOWS from interviews and literature studies data. The results shows that radio station is ready for digitization of radio broadcasting, government has not been so ready because of the absence of digital radio standards supporting regulations, and the public is also not ready due to lack of socialization and digital radio broadcast receiver in market. The integration of digital radio receivers in automobiles and mobile phones can increase the existence of digital radio broadcast receiver devices.

  18. Proceedings of the Fourth International Mobile Satellite Conference (IMSC 1995)

    Science.gov (United States)

    Rigley, Jack R. (Compiler); Estabrook, Polly (Compiler); Reekie, D. Hugh M. (Editor)

    1995-01-01

    The theme to the 1995 International Mobile Satellite Conference was 'Mobile Satcom Comes of Age'. The sessions included Modulation, Coding, and Multiple Access; Hybrid Networks - 1; Spacecraft Technology; propagation; Applications and Experiments - 1; Advanced System Concepts and Analysis; Aeronautical Mobile Satellite Communications; Mobile Terminal Antennas; Mobile Terminal Technology; Current and Planned Systems; Direct Broadcast Satellite; The Use of CDMA for LEO and ICO Mobile Satellite Systems; Hybrid Networks - 2; and Applications and Experiments - 2.

  19. Adaptive Security of Broadcast Encryption, Revisited

    Directory of Open Access Journals (Sweden)

    Bingxin Zhu

    2017-01-01

    Full Text Available We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security, where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge. The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is the maximum number of encryption queries. In order to construct tighter MA-secure broadcast encryptions, we investigate Gentry and Water’s transformation and show that their transformation can preserve MA-security at the price of reduction loss on the advantage of the underlying symmetric key encryption. Furthermore, we remove the q-type assumption in Gentry and Water’s semistatically secure broadcast encryption by using Hofheinz-Koch-Striecks techniques. The resulting scheme instantiated in a composite order group is MA-secure with constant-size ciphertext header.

  20. Direct/community broadcast projects using space satellites

    Science.gov (United States)

    Frutkin, A. W.

    1975-01-01

    A review is presented of direct/community broadcast projects which are currently in preparation in India, Canada, and Japan. It is shown that the satellite broadcast experiments involved are conducted for practical domestic reasons. The broadcast activities in all three projects will not reach other countries' TV receivers unless those countries take deliberate steps to enable themselves to receive such broadcasts. It is pointed out that for technological reasons problems of intrusion and interference connected with the use of satellites in broadcast operations may be much easier to handle than similar problems related to conventional radio broadcasting.

  1. Adding Ajax

    CERN Document Server

    Powers, Shelley

    2007-01-01

    Ajax can bring many advantages to an existing web application without forcing you to redo the whole thing. This book explains how you can add Ajax to enhance, rather than replace, the way your application works. For instance, if you have a traditional web application based on submitting a form to update a table, you can enhance it by adding the capability to update the table with changes to the form fields, without actually having to submit the form. That's just one example.Adding Ajax is for those of you more interested in extending existing applications than in creating Rich Internet Applica

  2. Optimizing T-Learning Course Scheduling Based on Genetic Algorithm in Benefit-Oriented Data Broadcast Environments

    Science.gov (United States)

    Huang, Yong-Ming; Chen, Chao-Chun; Wang, Ding-Chau

    2012-01-01

    Ubiquitous learning receives much attention in these few years due to its wide spectrum of applications, such as the T-learning application. The learner can use mobile devices to watch the digital TV based course content, and thus, the T-learning provides the ubiquitous learning environment. However, in real-world data broadcast environments, the…

  3. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  4. Mobility Tolerant Firework Routing for Improving Reachability in MANETs

    Directory of Open Access Journals (Sweden)

    Gen Motoyoshi

    2014-03-01

    Full Text Available In this paper, we investigate our mobility-assisted and adaptive broadcast routing mechanism, called Mobility Tolerant Firework Routing (MTFR, which utilizes the concept of potentials for routing and improves node reachability, especially in situations with high mobility, by including a broadcast mechanism. We perform detailed evaluations by simulations in a mobile environment and demonstrate the advantages of MTFR over conventional potential-based routing. In particular, we show that MTFR produces better reachability in many aspects at the expense of a small additional transmission delay and intermediate traffic overhead, making MTFR a promising routing protocol and feasible for future mobile Internet infrastructures.

  5. Transmission Quality Measurements in DAB+ Broadcast System

    Directory of Open Access Journals (Sweden)

    Gilski Przemysław

    2017-12-01

    Full Text Available In the age of digital media, delivering broadcast content to customers at an acceptable level of quality is one of the most challenging tasks. The most important factor is the efficient use of available resources, including bandwidth. An appropriate way of managing the digital multiplex is essential for both the economic and technical issues. In this paper we describe transmission quality measurements in the DAB+ broadcast system. We provide a methodology for analysing parameters and factors related with the efficiency and reliability of a digital radio link. We describe a laboratory stand that can be used for transmission quality assessment on a regional and national level.

  6. The Use of Television Format Adaptation in Denmark: Public Service Broadcasters Compared to Commercial Broadcasters

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    , a quantitative analysis of PSB and commercial schedules in Denmark is presented to establish the extent to which PSBs have employed formats between 2000 and 2012, and how this compares with commercial broadcasters. Secondly, a qualitative analysis looks into genre and the nature of the individual formats...... employed to assess any important differences between the formats in the two sectors. Most formats fall within entertainment and is well suited to providing the consumption friendly environment that commercial broadcasters seek to offer their advertising clients (Brennan 2012). Broadcasters also favour...

  7. Satellite sound broadcast propagation measurements

    Science.gov (United States)

    Vogel, Wolfhard J.; Torrence, Geoffrey W.

    1991-07-01

    Power transmitted from atop a 17.9 m tower in simulation of a satellite signal, emitted by a tone generator sweeping from 700 to 1800 MHz, was received using a 90 deg beamwidth linearly scanning antenna at many locations inside six buildings of solid brick, corrugated sheet-metal, wood-frame, mobile home, and concrete wall construction. The signal levels are found to have much structure in the spatial and frequency domain but were relatively stable in time. Typically, people moving nearby produced less than 0.5 dB variations, whereas a person blocking the transmission path produces 6 to 10 dB fades. Losses, which at an average position in a room increased from 6 to 12 dB over 750 to 1750 MHz, could be mitigated to 2 to 6 dB by moving the antenna typically less than 30 cm. Severe losses (17.5 dB, mitigated to 12.5 dB) were observed in a concrete wall building, which also exhibited the longest multipath delays (greater than 100 ns). Losses inside a mobile home were even larger (greater than 20 dB) and independent of antenna orientation. The losses showed a clear frequency dependence.

  8. 76 FR 42573 - Radio Broadcasting Services; Oklahoma and Texas

    Science.gov (United States)

    2011-07-19

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Oklahoma and Texas AGENCY: Federal Communications... Review filed by Rawhide Radio, LLC, Capstar TX Limited Partnership, Clear Channel Broadcasting Licenses...

  9. 76 FR 67375 - Radio Broadcasting Services; Various Locations

    Science.gov (United States)

    2011-11-01

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Various Locations AGENCY: Federal Communications..., Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division... the new application procedures for radio stations to change their communities of license. However...

  10. 76 FR 3875 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-01-21

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  11. 76 FR 5290 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2011-01-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications... Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  12. 76 FR 5120 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-01-28

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  13. 75 FR 67077 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2010-11-01

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  14. 76 FR 13966 - Television Broadcasting Services; Topeka, KS

    Science.gov (United States)

    2011-03-15

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Topeka, KS AGENCY: Federal Communications... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  15. 76 FR 54188 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-08-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  16. 75 FR 3695 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-01-22

    ... COMMISSION 47 CFR Part 73 Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications... Alabama Educational Television Commission (``AETC''), the licensee of noncommercial educational station... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  17. 76 FR 76337 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2011-12-07

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications... 73 Television, Television broadcasting. Federal Communications Commission Barbara A. Kreisman, Chief...

  18. 78 FR 266 - Radio Broadcasting Services; Maysville, GA

    Science.gov (United States)

    2013-01-03

    ...-270; RM-11676; DA 12-2024] Radio Broadcasting Services; Maysville, GA AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Appalachian Broadcasting... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting...

  19. 75 FR 63431 - Radio Broadcasting Services; Willow Creek, CA

    Science.gov (United States)

    2010-10-15

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Willow Creek, CA AGENCY: Federal Communications... 47 CFR Part 73 Radio, Radio broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 1. The...

  20. 77 FR 58799 - Radio Broadcasting Services; Roaring Springs, TX

    Science.gov (United States)

    2012-09-24

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Roaring Springs, TX AGENCY: Federal Communications... 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant... Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 1. The...

  1. 78 FR 71557 - Radio Broadcasting Services; Tohatchi, New Mexico

    Science.gov (United States)

    2013-11-29

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Tohatchi, New Mexico AGENCY: Federal Communications... Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio... proposes to amend 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation...

  2. 76 FR 67397 - Radio Broadcasting Services; Llano, Texas

    Science.gov (United States)

    2011-11-01

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Llano, Texas AGENCY: Federal Communications Commission... 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant... Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 1. The...

  3. 78 FR 25591 - Radio Broadcasting Services; Crownpoint, New Mexico

    Science.gov (United States)

    2013-05-02

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Crownpoint, New Mexico AGENCY: Federal Communications... Act, see U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR part 73 Radio, Radio broadcasting. Federal...--RADIO BROADCAST SERVICES 0 1. The authority citation for Part 73 continues to read as follows: Authority...

  4. 77 FR 50630 - Radio Broadcasting Services; Westfield, NY

    Science.gov (United States)

    2012-08-22

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Westfield, NY AGENCY: Federal Communications... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting...: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part 73 continues to read as follows...

  5. 75 FR 62690 - Radio Broadcasting Services; Grants Pass, Oregon

    Science.gov (United States)

    2010-10-13

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Grants Pass, Oregon AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Three Rivers Broadcasting LLC...(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed...

  6. 77 FR 32900 - Radio Broadcasting Services; Llano, TX

    Science.gov (United States)

    2012-06-04

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Llano, TX AGENCY: Federal Communications Commission... Congressional Review Act, see U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting...: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part 73 continues to read as follows...

  7. 75 FR 76293 - Radio Broadcasting Services; Peach Springs, AZ

    Science.gov (United States)

    2010-12-08

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Peach Springs, AZ AGENCY: Federal Communications... CFR Part 73 Radio, Radio broadcasting. 0 As stated in the preamble, the Federal Communications Commission amends 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation...

  8. 78 FR 32 - Radio Broadcasting Services; Westley, CA

    Science.gov (United States)

    2013-01-02

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Westley, CA AGENCY: Federal Communications Commission.... 8. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission... Federal Communications Commission amends 47 CFR Part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1...

  9. 47 CFR 76.1506 - Carriage of television broadcast signals.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Carriage of television broadcast signals. 76.1506 Section 76.1506 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO... television broadcast signals. (a) The provisions of Subpart D shall apply to open video systems in accordance...

  10. 46 CFR 121.506 - Emergency broadcast placard.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Emergency broadcast placard. 121.506 Section 121.506... MISCELLANEOUS SYSTEMS AND EQUIPMENT Radio § 121.506 Emergency broadcast placard. A durable placard must be posted next to all radiotelephone installations with the emergency broadcast instructions and information...

  11. 46 CFR 121.510 - Recommended emergency broadcast instructions.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Recommended emergency broadcast instructions. 121.510... CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Radio § 121.510 Recommended emergency broadcast instructions. The following emergency broadcast instructions, when placed on a placard, will satisfy the...

  12. 47 CFR 74.102 - Uses of experimental broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Uses of experimental broadcast stations. 74.102 Section 74.102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Experimental...

  13. 47 CFR 1.502 - Emergency Broadcast Authorizations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Emergency Broadcast Authorizations. 1.502 Section 1.502 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Broadcast Applications and Proceedings § 1.502 Emergency Broadcast Authorizations. See § 73.913. General Filing...

  14. 47 CFR 74.101 - Experimental broadcast station.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Experimental broadcast station. 74.101 Section 74.101 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Experimental...

  15. 47 CFR 101.1403 - Broadcast carriage requirements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Broadcast carriage requirements. 101.1403... GHz Band § 101.1403 Broadcast carriage requirements. MVDDS licensees are not required to provide all... must-carry rules, nor the local signal carriage requirements of the Rural Local Broadcast Signal Act...

  16. 77 FR 73461 - Commission Seeks Comment on Broadcast Ownership Report

    Science.gov (United States)

    2012-12-10

    ... COMMISSION Commission Seeks Comment on Broadcast Ownership Report AGENCY: Federal Communications Commission... the Media Bureau's recently released report on the ownership of commercial broadcast stations, which... contained in the Media Bureau's recently released report on the ownership of commercial broadcast stations...

  17. 78 FR 25861 - Radio Broadcasting Services; Peach Springs, Arizona

    Science.gov (United States)

    2013-05-03

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Peach Springs, Arizona AGENCY: Federal Communications....S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal...--RADIO BROADCAST SERVICES 0 1. The authority citation for Part 73 continues to read as follows: Authority...

  18. 78 FR 40402 - Radio Broadcasting Services; Roaring Springs, Texas

    Science.gov (United States)

    2013-07-05

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Roaring Springs, Texas AGENCY: Federal Communications... Table of Allotments and Changes of Community of License in the Radio Broadcast Services, 71 FR 76208, published December 20, 2006. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal...

  19. 76 FR 36384 - Radio Broadcasting Services; Brackettville, TX

    Science.gov (United States)

    2011-06-22

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Brackettville, TX AGENCY: Federal Communications..., see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal...--RADIO BROADCAST SERVICES 0 1. The authority citation for part 73 continues to read as follows: Authority...

  20. 78 FR 36683 - Radio Broadcasting Services; Summit, Mississippi

    Science.gov (United States)

    2013-06-19

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Summit, Mississippi AGENCY: Federal Communications... U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal... Broadcasting, allots FM Channel 228A ] as a first local service at Summit, Mississippi. To accommodate that...

  1. 77 FR 58800 - Radio Broadcasting Services; Knox City, TX

    Science.gov (United States)

    2012-09-24

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Knox City, TX AGENCY: Federal Communications....415 and 1.420. ] List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications... Commission requests comment on a petition filed by Big Cat Broadcasting, LLC, proposing to amend the Table of...

  2. 75 FR 41123 - Radio Broadcasting Services; Gearhart, OR

    Science.gov (United States)

    2010-07-15

    ... COMMISSION 47 CFR Part 73 . Radio Broadcasting Services; Gearhart, OR AGENCY: Federal Communications... Radio, Radio broadcasting. For the reasons discussed in the preamble, the Federal Communications... comment on a petition filed by Black Hills Broadcasting, L.P. proposing the allotment of FM Channel 243A...

  3. 76 FR 13524 - Radio Broadcasting Services; Willow Creek, CA

    Science.gov (United States)

    2011-03-14

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Willow Creek, CA AGENCY: Federal Communications... Congressional Review Act, see U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting... as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part 73 continues to...

  4. 75 FR 76294 - Radio Broadcasting Services; Fairbanks, AK

    Science.gov (United States)

    2010-12-08

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Fairbanks, AK AGENCY: Federal Communications... Review Act, see U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For... follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for Part 73 continues to read as...

  5. 76 FR 37049 - Radio Broadcasting Services; Bastrop, LA

    Science.gov (United States)

    2011-06-24

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Bastrop, LA AGENCY: Federal Communications Commission... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez... Communications Commission proposes to amend 47 CFR Part 73 as follows: Part 73--Radio Broadcast Services 1. The...

  6. 78 FR 37474 - Radio Broadcasting Services; Dove Creek, Colorado

    Science.gov (United States)

    2013-06-21

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Dove Creek, Colorado AGENCY: Federal Communications... CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Chief, Audio... amends 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for Part...

  7. 78 FR 26739 - Radio Broadcasting Services; Ehrenberg, Arizona

    Science.gov (United States)

    2013-05-08

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Ehrenberg, Arizona AGENCY: Federal Communications... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez... filed by S and H Broadcasting, LLC, proposing the substitution of Channel 228C2 for vacant Channel 286C2...

  8. 77 FR 23203 - Radio Broadcasting Services; Summit, MS

    Science.gov (United States)

    2012-04-18

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Summit, MS AGENCY: Federal Communications Commission... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez.... The Commission requests comment on a petition filed by Bowen Broadcasting, proposing to amend the...

  9. 77 FR 75946 - Radio Broadcasting Services; Dove Creek, CO

    Science.gov (United States)

    2012-12-26

    ... COMMISSION 47 CFR Part 73 . Radio Broadcasting Services; Dove Creek, CO AGENCY: Federal Communications... 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant... Communications Commission proposes to amend 47 CFR Part 73 as follows: PART 73--RADIO BROADCAST SERVICES 1. The...

  10. 77 FR 64758 - Radio Broadcasting Services; Randsburg, CA

    Science.gov (United States)

    2012-10-23

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Randsburg, CA AGENCY: Federal Communications... Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio... amends 47 CFR Part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part...

  11. 77 FR 50053 - Radio Broadcasting Services; Westley, CA

    Science.gov (United States)

    2012-08-20

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Westley, CA AGENCY: Federal Communications Commission... 73 Radio, Radio broadcasting. Federal Communications Commission. Peter H. Doyle, Chief, Audio... amends 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part...

  12. 78 FR 4078 - Radio Broadcasting Services; Hebbronville, TX

    Science.gov (United States)

    2013-01-18

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Hebbronville, TX AGENCY: Federal Communications... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting...: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part 73 continues to read as follows...

  13. 75 FR 82279 - Radio Broadcasting Services; Various Locations

    Science.gov (United States)

    2010-12-30

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Various Locations AGENCY: Federal Communications... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 As stated in the preamble, the Federal Communications Commission amends 47 CFR part 73 as follows: PART 73--RADIO BROADCASTING SERVICES 0 1. The...

  14. Religious Broadcasting in the Middle East : Content Analysis of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will allow the Arab Media Project at Cambridge, United Kingdom, to map out and conduct a content analysis of the religious broadcasting scene in the Middle East with a view to identifying the issues covered and values advocated in religious broadcasts. Since religious broadcasting is not limited to Islamic ...

  15. The practice of participation in broadcasting for development ...

    African Journals Online (AJOL)

    Key words: development communication, development broadcasting, development, journalism, participatory broadcasting, educational broadcasting, radio for development. Journal of Social Development in Africa Vol.20(1) 2005: 77-105. http://dx.doi.org/10.4314/jsda.v20i1.23895 · AJOL African Journals Online. HOW TO ...

  16. The 1977 WARC on broadcasting satellites - Spectrum management aspects and implications

    Science.gov (United States)

    Gould, R. G.; Reinhart, E. E.

    1977-01-01

    Broadcasting satellites are allocated as a primary service in the band 11.7-12.2 GHz (11.7-12.5 GHz in Europe, Africa, and the USSR), but the band is also allocated on a primary basis (equal sharing) to other services - fixed, mobile, broadcasting, and fixed satellite. Presented with these difficult sharing situations, delegates from over 100 countries met at an ITU World Administrative Radio Conference in 1977 to develop a plan for broadcasting satellites. Many nations wanted a plan that would assign to them now, reserved orbital locations and channel asignments for their future use. Other countries wanted a plan adopted now for future broadcasting satellites which assigned specific channels to specific areas on the ground so that they could use the remaining frequencies to provide terrestrial service right away. This paper describes the 'Plan' developed at the conference and points out how the principles of spectrum management were employed. It also discusses the implications for future international management of the spectrum growing out of this meeting.

  17. Broadcast Journalism Education and the Capstone Experience

    Science.gov (United States)

    Tanner, Andrea; Forde, Kathy Roberts; Besley, John C.; Weir, Tom

    2012-01-01

    This study assesses the current state of the television news capstone experience in accredited journalism and mass communication programs in the United States. Specifically, the authors employed a mixed-methods approach, interviewing 20 television news capstone instructors and conducting an analysis of broadcast journalism curriculum information…

  18. Digital Broadcasting in Hawaii: The Aloha System

    Science.gov (United States)

    Abramson, Norman

    1974-01-01

    A look at the ALOHA SYSTEM research project at the University of Hawaii, which developed and built a computer-communication network based upon the use of UHF radio broadcast channels for console to computer and computer to computer communication. (Author)

  19. Crisis of Public Broadcasting Japan's Case.

    Science.gov (United States)

    Kabira, Chosei

    The public broadcasting service in Japan, the NHK, is a nongovernmental, noncommercial, and nonprofit making organization that is financed solely by fees collected from viewing households. At present, 80% of the total number of households in Japan have a contract with NHK and 96.5% of these households have actually paid the receiving fee to NHK.…

  20. A special broadcast of CERN's Video news

    CERN Multimedia

    2003-01-01

    A special edition of CERN's video news giving a complete update on the LHC project is to be broadcast in the Main Auditorium. After your lunch make a small detour to the Main Auditorium, where you see the big picture. On 14, 15 and 16 May, between 12:30 and 14:00, a special edition of CERN's video news bulletin will be broadcast in the Main Auditorium. You will have the chance get up-to-date on the LHC project and its experiments. With four years to go before the first collisions in the LHC, the LHC Project Leader Lyn Evans will present a status report on the construction of the accelerator. The spokesmen of the five LHC experiments (ALICE, ATLAS, CMS, LHCb and TOTEM) will explain how the work is going and what the state of play will be in four years' time. This special video news broadcast is the result of collaboration between the CERN Audiovisual Service, the Photo Service and the External communication section. The broadcast will begin with a brand-new programme title sequence. And just as in the real c...

  1. Eleanor Roosevelt's Radio Broadcasts in France

    NARCIS (Netherlands)

    Luscombe, Anya|info:eu-repo/dai/nl/339641428

    2017-01-01

    Eleanor Roosevelt wrote books, thousands of newspaper and magazine articles and was a regular broadcaster. Among the radio programs she hosted, and appeared on, were several for the Voice of America. While she was a US delegate to the United Nations in Paris in 1951 and 1952, Mrs. Roosevelt

  2. Video Broadcasting Using Queue Proportional Scheduling

    Directory of Open Access Journals (Sweden)

    Dimitris Toumpakaris

    2007-01-01

    using a Markov Chain approach leading to a method for approximating the packet delay distribution. Based on the resulting distribution, it is discussed how the video encoding rate can be chosen in order to reduce the expected distortion of streams transmitted through Broadcast Channels.

  3. A Stochastic Broadcast Pi-Calculus

    DEFF Research Database (Denmark)

    Song, Lei; Nielson, Flemming; Nielsen, Bo Friis

    2011-01-01

    In this paper we propose a stochastic broadcast PI-calculus which can be used to model server-client based systems where synchronization is always governed by only one participant. Therefore, there is no need to determine the joint synchronization rates. We also take immediate transitions...

  4. Global and Local Features in Romanian Commercials broadcast at Christmas Time

    OpenAIRE

    Mădălina MORARU (BUGA)

    2011-01-01

    This article aims to research how global and local brands managed their image according to traditions and values shared by Romanian target during the Christmas Holiday, a special time for everyone all over the world. Our research focuses on TV ads broadcast (40 spots) in Romania in December 2010, namely winter campaigns developed before Christmas and dedicated to the Christmas spirit. The questions we will answer in the following study regard some important aspects such as: which product cate...

  5. Irish language broadcast media: the interaction of state language policy, broadcasters and their audiences

    OpenAIRE

    Ó hIfearnáin, Tadhg

    2000-01-01

    peer-reviewed The position of Irish on the airwaves now and through recent history has always been closely linked to the strength of the language in society, its position in public opinion and national language policy and the place of the state-owned broadcaster and its subsidiary channels within the broadcasting domain. Government legislation regulates the private and voluntary sectors, which may also receive indirect state subsidies for Irish language programming. It is therefore impos...

  6. A Broadcast Channel Assignment Mechanism based on The Broadcast Tree for Multi-radio Multi-channel Wireless Mesh Networks

    Science.gov (United States)

    Xia, Yan; Zeng, Yingzhi

    2016-02-01

    This paper proposed a broadcast Channel Assignment Mechanism on base of optimized Broadcast Tree for wireless Mesh network (WMN), which is created by Branch and Bound Method. The simulations show that our algorithm not only reduces the broadcast redundancy but also avoids the potential channel interferences produced by unnecessary relay nodes.

  7. 47 CFR 0.434 - Data bases and lists of authorized broadcast stations and pending broadcast applications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Data bases and lists of authorized broadcast... Commission § 0.434 Data bases and lists of authorized broadcast stations and pending broadcast applications. Periodically the FCC makes available copies of its data bases and lists containing information about authorized...

  8. 47 CFR 73.3572 - Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster applications. 73.3572 Section 73.3572... Rules Applicable to All Broadcast Stations § 73.3572 Processing of TV broadcast, Class A TV broadcast...

  9. Modeling aircraft performance parameters with open ADS-B data

    NARCIS (Netherlands)

    Sun, J.; Ellerbroek, J.; Hoekstra, J.M.

    2017-01-01

    Open access to flight data from ADS-B (Automatic Dependent Surveillance Broadcast) has provided researchers more insights for air traffic management than aircraft tracking alone. With large quantities of trajectory data collected from a wide range of different aircraft types, it is possible to

  10. Media and Politics: Re-Thinking the Indonesian Broadcasting System

    Directory of Open Access Journals (Sweden)

    Masduki Masduki

    2017-10-01

    Full Text Available The emergence of the policy of broadcasting liberalization in the established democracies of Europe and North America, which is indicated by the absence of state intervention to broadcasting governance has been influencing broadcasting policy in the new democracies, including Indonesia. Is it true that Indonesia adopts a liberal broadcasting policy? This paper outlines two issues. First, the academic debate surrounding broadcasting system in the world. Second, discussion as stated by scholars on a thesis of the enactment of the liberal media system in Indonesia that is primarily based on the broadcasting policies after Suharto’s reign of power, among others Law 32/2002 on Broadcasting. Based on the intensive literature review, it can be concluded that the broadcasting system prevailing in Indonesia is not purely liberal, but a mix of liberal and authoritarian model, a unique character that also occurs in the post-communist and post-authoritarian states in Asia, Africa and Eastern Europe. This mix is indicated within the last fifteen years through the adoption of public and community broadcasters and the establishment of Komisi Penyiaran Indonesia (KPI as an independent regulator that were accompanied with the existing control of the ruling government to public broadcasters (RRI & TVRI; the weak mandate of KPI and the omission of commercial broadcasting domination.

  11. Modification of Prim’s algorithm on complete broadcasting graph

    Science.gov (United States)

    Dairina; Arif, Salmawaty; Munzir, Said; Halfiani, Vera; Ramli, Marwan

    2017-09-01

    Broadcasting is an information dissemination from one object to another object through communication between two objects in a network. Broadcasting for n objects can be solved by n - 1 communications and minimum time unit defined by ⌈2log n⌉ In this paper, weighted graph broadcasting is considered. The minimum weight of a complete broadcasting graph will be determined. Broadcasting graph is said to be complete if every vertex is connected. Thus to determine the minimum weight of complete broadcasting graph is equivalent to determine the minimum spanning tree of a complete graph. The Kruskal’s and Prim’s algorithm will be used to determine the minimum weight of a complete broadcasting graph regardless the minimum time unit ⌈2log n⌉ and modified Prim’s algorithm for the problems of the minimum time unit ⌈2log n⌉ is done. As an example case, here, the training of trainer problem is solved using these algorithms.

  12. Analysis and Implement of Broadcast Program Monitoring Data

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available With the rapid development of the radio and TV industry and the implementation of INT (the integration of telecommunications networks, cable TV networks and the Internet, the contents of programs and advertisements is showing massive, live and interactive trends. In order to meet the security of radio and television, the broadcast of information have to be controlled and administered. In order to master the latest information of public opinion trends through radio and television network, it is necessary research the specific industry applications of broadcast program monitoring. In this paper, the importance of broadcast monitoring in public opinion analysis is firstly analysed. The monitoring radio and television programs broadcast system architecture is proposed combining with the practice, focusing on the technical requirements and implementation process of program broadcast, advertisement broadcast and TV station broadcast monitoring. The more efficient information is generated through statistical analysis, which provides data analysis for radio and television public opinion analysis.

  13. MUSICAL ARRANGEMENT OF MEDIA ADS

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2015-01-01

    Full Text Available The music-compositional principles of commercial and political advertising and also the self-promotion of electronic media (radio, television, Internet are considered in this mediatext: from the elementary beeps, symbolic functions, emblems/logos and musical brands to the sound engineering technology to underscore the product's name and the complex synthesis between music and intra movements and color-light design of frames. Simultaneously examines, how the musical arrangement of ethereal advertising is involved in creation the emotional drama or bravado which reach the level of explicit or associative counterpoint 'music with the advertised object or subject' and which extend to expression of cultural image of all the broadcast channel. The article explores the works of the next genres like infomercial, teleshopping, film-ad, and autonomous commercials that have been produced in European countries or USA.

  14. Direct-to-Consumer Broadcast Advertisements for Pharmaceuticals: Off-Label Promotion and Adherence to FDA Guidelines.

    Science.gov (United States)

    Klara, Kristina; Kim, Jeanie; Ross, Joseph S

    2018-02-26

    Direct-to-consumer (DTC) advertisements for prescription drugs in the United States are regulated by the Food and Drug Administration (FDA). Off-label promotion, or the advertisement of a drug for an indication not approved by the FDA, is prohibited. Our objective was to examine the presence of off-label promotion in broadcast DTC ads and to assess their adherence to FDA guidelines mandating fair balance in presentation of risks and benefits and prohibiting misleading advertisement claims. All English-language broadcast DTC ads for prescription drugs that aired in the United States from January 2015 to July 2016 were obtained from AdPharm, an online collection of healthcare advertisements. Ad length was measured and adherence to FDA guidelines was assessed for several categories: key regulatory items, indicators of false or misleading ads, and indicators of fair balance in presentation of risks and benefits. Our sample included 97 unique DTC ads, representing 60 unique drugs and 67 unique drug-indication combinations. No ads described drug risks quantitatively, whereas drug efficacy was presented quantitatively in 25 (26%) ads. Thirteen (13%) ads, all for diabetes medications, suggested off-label uses for weight loss and blood pressure reduction. The most commonly advertised drugs were indicated for the treatment of inflammatory conditions (n = 12; 18%), diabetes or diabetic neuropathy (n = 11; 16%), bowel or bladder dysfunction (n = 6; 9%), and infections or allergic reaction (n = 6; 9%). More than three-quarters (n = 51; 76%) advertised drugs to treat chronic conditions. Few broadcast DTC ads were fully compliant with FDA guidelines. The overall quality of information provided in ads was low, and suggestions of off-label promotion were common for diabetes medications. The impact of current DTC ads and off-label marketing on patient and prescriber decisions merits further scrutiny.

  15. Research in Mobile Database Query Optimization and Processing

    Directory of Open Access Journals (Sweden)

    Agustinus Borgy Waluyo

    2005-01-01

    Full Text Available The emergence of mobile computing provides the ability to access information at any time and place. However, as mobile computing environments have inherent factors like power, storage, asymmetric communication cost, and bandwidth limitations, efficient query processing and minimum query response time are definitely of great interest. This survey groups a variety of query optimization and processing mechanisms in mobile databases into two main categories, namely: (i query processing strategy, and (ii caching management strategy. Query processing includes both pull and push operations (broadcast mechanisms. We further classify push operation into on-demand broadcast and periodic broadcast. Push operation (on-demand broadcast relates to designing techniques that enable the server to accommodate multiple requests so that the request can be processed efficiently. Push operation (periodic broadcast corresponds to data dissemination strategies. In this scheme, several techniques to improve the query performance by broadcasting data to a population of mobile users are described. A caching management strategy defines a number of methods for maintaining cached data items in clients' local storage. This strategy considers critical caching issues such as caching granularity, caching coherence strategy and caching replacement policy. Finally, this survey concludes with several open issues relating to mobile query optimization and processing strategy.

  16. Performance Evaluation and Parameter Optimization of SoftCast Wireless Video Broadcast

    Directory of Open Access Journals (Sweden)

    Dongxue Yang

    2015-08-01

    Full Text Available Wireless video broadcast plays an imp ortant role in multimedia communication with the emergence of mobile video applications. However, conventional video broadcast designs suffer from a cliff effect due to separated source and channel encoding. The newly prop osed SoftCast scheme employs a cross-layer design, whose reconstructed video quality is prop ortional to the channel condition. In this pap er, we provide the p erformance evaluation and the parameter optimization of the SoftCast system. Optimization principles on parameter selection are suggested to obtain a b etter video quality, o ccupy less bandwidth and/or utilize lower complexity. In addition, we compare SoftCast with H.264 in the LTE EPA scenario. The simulation results show that SoftCast provides a b etter p erformance in the scalability to channel conditions and the robustness to packet losses.

  17. Automatic Dialect Detection in Arabic Broadcast Speech

    OpenAIRE

    Ali, Ahmed; Bell, Peter; Renals, Steve

    2015-01-01

    We investigate different approaches for dialect identification in Arabic broadcast speech, using phonetic, lexical features obtained from a speech recognition system, and acoustic features using the i-vector framework. We studied both generative and discriminate classifiers, and we combined these featuresusing a multi-class Support Vector Machine (SVM).We validated our results on an Arabic/English language identification task, with an accuracy of 100%. We used these features in a binary class...

  18. Automatic Dialect Detection in Arabic Broadcast Speech

    OpenAIRE

    Ali, Ahmed; Dehak, Najim; Cardinal, Patrick; Khurana, Sameer; Yella, Sree Harsha; Glass, James; Bell, Peter; Renals, Steve

    2016-01-01

    In this paper, we investigate different approaches for dialect identification in Arabic broadcast speech. These methods are based on phonetic and lexical features obtained from a speech recognition system, and bottleneck features using the i-vector framework. We studied both generative and discriminative classifiers, and we combined these features using a multi-class Support Vector Machine (SVM). We validated our results on an Arabic/English language identification task, with an accuracy of 1...

  19. Metadata for the description of broadcast assets

    DEFF Research Database (Denmark)

    Efthimiadis, Efthimis N.; Mai, Jens Erik; Burrows, Paul E.

    2003-01-01

    and media companies to deal with the creationand maintenance of metadata, indexing and controlled vocabularies required for effective Media Asset Management of broadcasts. Panelist will provide perspectives of their organization or project, for example, the CPB's PB Core metadata element set, which...... is currently under development; the Disney Nomenclature Registry at Disney Corporation; and the ViDe (video access group) MPEG-7 and Dublin Core mapping....

  20. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  1. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  2. Buryat Ethnic Mentality and National Broadcasting

    Directory of Open Access Journals (Sweden)

    Dagbaev E.D.

    2016-01-01

    Full Text Available The article focuses on ways the national (in a regional aspect broadcasting impacts ethnic mind formation and its further development, the latter issues being under a main focus of Buryat State University scholars as well. They set an objective to investigate the issue from different angles, for this reason gathering within scientific projects into scholars’groups took place. In this case the group of educators, philologists and sociologists have focused on media which construct ethnic mind via interiorizing and cultivating ethnic-related ideas and images for five years. Providing a general outlook of the world, National Broadcasting (NB is a proper institutional mechanism that helps a person identify himself / herself among different ethnic groups. Ethnic identity and self-consciousness are manifested in various social and intercultural communications. This allows a person to become aware of the peculiarities of his / her and others’ ethnic communities. The outcomes of a sociological research held by the authors verify the significance of both the posed problems and the TV role. One may find theoretical and empirical data in Zandeeva, S.K. (2012, Dagbaeva, N.Zh.(2012, Dagbaev (2014, Dashinimaeva, P.P., et al (2015. Generally, national programs do contribute to integrating people of the same ethnicity into a common community, to shaping such moral qualities as humanity, love to motherland, respect for the elders and other ethnic nationalities. All these characteristics form proper rules of living in a tolerant community. At the same time, they contribute to strengthening of the feeling of ethnic unity. Beyond any doubt, NB needs a relevant assessment and interest to promote and advance its function in a modern society. On the one hand, telecommunications markets liberalize. On the other hand, broadcasting technologies have developed to a highest extent, leading to the increase of international competition [14]. Anyway, both directions force

  3. Stochastic dynamics of genetic broadcasting networks

    Science.gov (United States)

    Potoyan, Davit A.; Wolynes, Peter G.

    2017-11-01

    The complex genetic programs of eukaryotic cells are often regulated by key transcription factors occupying or clearing out of a large number of genomic locations. Orchestrating the residence times of these factors is therefore important for the well organized functioning of a large network. The classic models of genetic switches sidestep this timing issue by assuming the binding of transcription factors to be governed entirely by thermodynamic protein-DNA affinities. Here we show that relying on passive thermodynamics and random release times can lead to a "time-scale crisis" for master genes that broadcast their signals to a large number of binding sites. We demonstrate that this time-scale crisis for clearance in a large broadcasting network can be resolved by actively regulating residence times through molecular stripping. We illustrate these ideas by studying a model of the stochastic dynamics of the genetic network of the central eukaryotic master regulator NFκ B which broadcasts its signals to many downstream genes that regulate immune response, apoptosis, etc.

  4. Fundamental limitation on quantum broadcast networks

    Science.gov (United States)

    Bäuml, Stefan; Azuma, Koji

    2017-06-01

    The ability to distribute entanglement over complex quantum networks is an important step towards a quantum internet. Recently, there has been significant theoretical effort, mainly focusing on the distribution of bipartite entanglement via a simple quantum network composed only of bipartite quantum channels. There are, however, a number of quantum information processing protocols based on multipartite rather than bipartite entanglement. Whereas multipartite entanglement can be distributed by means of a network of such bipartite channels, a more natural way is to use a more general network, that is, a quantum broadcast network including quantum broadcast channels. In this work, we present a general framework for deriving upper bounds on the rates at which GHZ states or multipartite private states can be distributed among a number of different parties over an arbitrary quantum broadcast network. Our upper bounds are written in terms of the multipartite squashed entanglement, corresponding to a generalisation of recently derived bounds (Azuma et al, (2016), Nat. Commun. 7 13523). We also discuss how lower bounds can be obtained by combining a generalisation of an aggregated quantum repeater protocol with graph theoretic concepts.

  5. Emergency department visits during an Olympic gold medal television broadcast.

    Science.gov (United States)

    Redelmeier, Donald A; Vermeulen, Marian J

    2011-01-01

    Practice pattern variations are often attributed to physician decision-making with no accounting for patient preferences. To test whether a mass media television broadcast unrelated to health was associated with changes in the rate and characteristics of visits for acute emergency care. Time-series analysis of emergency department visits for any reason. Population-based sample of all patients seeking emergency care in Ontario, Canada. The broadcast day was defined as the Olympic men's gold medal ice hockey game final. The control days were defined as the 6 Sundays before and after the broadcast day. A total of 99 447 visits occurred over the 7 Sundays, of which 13 990 occurred on the broadcast day. Comparing the broadcast day with control days, we found no significant difference in the hourly rate of visits before the broadcast (544 vs 537, p = 0.41) or after the broadcast (647 vs 639, p = 0.55). In contrast, we observed a significant reduction in hourly rate of visits during the broadcast (647 vs 783, p broadcast was particularly large for adult men with low triage severity. The greatest reductions were for patients with abdominal, musculoskeletal or traumatic disorders. Mass media television broadcasts can influence patient preferences and thereby lead to a decrease in emergency department visits.

  6. Reliable multihop broadcast protocol with a low-overhead link quality assessment for ITS based on VANETs in highway scenarios.

    Science.gov (United States)

    Galaviz-Mosqueda, Alejandro; Villarreal-Reyes, Salvador; Galeana-Zapién, Hiram; Rubio-Loyola, Javier; Covarrubias-Rosales, David H

    2014-01-01

    Vehicular ad hoc networks (VANETs) have been identified as a key technology to enable intelligent transport systems (ITS), which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB) protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay.

  7. Reliable Multihop Broadcast Protocol with a Low-Overhead Link Quality Assessment for ITS Based on VANETs in Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Alejandro Galaviz-Mosqueda

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs have been identified as a key technology to enable intelligent transport systems (ITS, which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay.

  8. Realtime multiprocessor for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    T. Jungeblut

    2008-05-01

    Full Text Available This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC. The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  9. Using MPEG- at the Consumer Terminal in Broadcasting

    Directory of Open Access Journals (Sweden)

    Lalmas Mounia

    2002-01-01

    Full Text Available The European Union IST research programme SAMBITS (System for Advanced Multimedia Broadcast and IT Services project is using Digital Video Broadcasting (DVB, the DVB Multimedia Home Platform (MHP standard, MPEG- and MPEG- in a studio production and multimedia terminal system to integrate broadcast data and Internet data. This involves using data delivery over multiple paths and the use of a back channel for interaction. MPEG- is being used to identify programme content and to construct queries to allow users to identify and retrieve interesting related content. Searching for content is being carried out using the HySpirit search engine. The paper deals with terminal design issues, the use of MPEG- for broadcasting applications and using a consumer broadcasting terminal for searching for material related to a broadcast.

  10. Norwegian Radio Broadcasting : from public monopoly to competitive homogeneity?

    OpenAIRE

    Foros, Øystein; Kind, Hans Jarle; Østbye, Helge

    2006-01-01

    The present article discusses whether competition in radio broadcasting creates diversity. We start out by giving a brief overview of the development of competition within the European broadcasting markets. However, our main focus will be the market for commercial radio in Norway, partly because this represents a very interesting case from a regulatory point of view. We argue that the claimed lack of diversity in Norwegian radio broadcasting is a consequence of both the regulatory policy and ...

  11. 47 CFR 73.201 - Numerical designation of FM broadcast channels.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Numerical designation of FM broadcast channels. 73.201 Section 73.201 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES FM Broadcast Stations § 73.201 Numerical designation of FM broadcast...

  12. 47 CFR 73.23 - AM broadcast station applications affected by international agreements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false AM broadcast station applications affected by international agreements. 73.23 Section 73.23 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES AM Broadcast Stations § 73.23 AM broadcast station...

  13. 47 CFR 73.801 - Broadcast regulations applicable to LPFM stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast regulations applicable to LPFM stations. 73.801 Section 73.801 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Low Power FM Broadcast Stations (LPFM) § 73.801 Broadcast...

  14. 47 CFR 73.4157 - Network signals which adversely affect affiliate broadcast service.

    Science.gov (United States)

    2010-10-01

    ... affiliate broadcast service. 73.4157 Section 73.4157 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4157 Network signals which adversely affect affiliate broadcast service. See Public Notice, FCC 79-387...

  15. 47 CFR 73.4107 - FM broadcast assignments, increasing availability of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FM broadcast assignments, increasing...) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4107 FM broadcast assignments, increasing availability of. (a) See, First Report and Order MM Docket 84-231, FCC 84...

  16. 47 CFR 73.1208 - Broadcast of taped, filmed, or recorded material.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast of taped, filmed, or recorded material. 73.1208 Section 73.1208 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.1208 Broadcast...

  17. 47 CFR 73.4185 - Political broadcasting and telecasting, the law of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political broadcasting and telecasting, the law of. 73.4185 Section 73.4185 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4185 Political broadcasting and telecasting, the law of. (...

  18. Histories of Public Service Broadcasters on the Web

    DEFF Research Database (Denmark)

    This edited volume details multiple and dynamic histories of relations between public service broadcasters and the World Wide Web. What does it mean to be a national broadcaster in a global communications environment? What are the commercial and public service pressures that were brought to bear...... when public service broadcasters implemented web services? How did “one- to-many” broadcasters adapt to the “many-to-many” medium of the internet? The thematic or- ganisation of this collection addresses such major issues, while each chapter offers a particular historical account of relations between...

  19. A broadcast engineering tutorial for non-engineers

    CERN Document Server

    Pizzi, Skip

    2014-01-01

    A Broadcast Engineering Tutorial for Non-Engineers is the leading publication on the basics of broadcast technology. Whether you are new to the industry or do not have an engineering background, this book will give you a comprehensive primer of television, radio, and digital media relating to broadcast-it is your guide to understanding the technical world of radio and television broadcast engineering. It covers all the important topics such as DTV, IBOC, HD, standards, video servers, editing, electronic newsrooms, and more.

  20. Scheduling Broadcasts in a Network of Timelines

    KAUST Repository

    Manzoor, Emaad A.

    2015-05-12

    Broadcasts and timelines are the primary mechanism of information exchange in online social platforms today. Services like Facebook, Twitter and Instagram have enabled ordinary people to reach large audiences spanning cultures and countries, while their massive popularity has created increasingly competitive marketplaces of attention. Timing broadcasts to capture the attention of such geographically diverse audiences has sparked interest from many startups and social marketing gurus. However, formal study is lacking on both the timing and frequency problems. In this thesis, we introduce, motivate and solve the broadcast scheduling problem of specifying the timing and frequency of publishing content to maximise the attention received. We validate and quantify three interacting behavioural phenomena to parametrise social platform users: information overload, bursty circadian rhythms and monotony aversion, which is defined here for the first time. Our analysis of the influence of monotony refutes the common assumption that posts on social network timelines are consumed piecemeal independently. Instead, we reveal that posts are consumed in chunks, which has important consequences for any future work considering human behaviour over social network timelines. Our quantification of monotony aversion is also novel, and has applications to problems in various domains such as recommender list diversification, user satiation and variety-seeking consumer behaviour. Having studied the underlying behavioural phenomena, we link schedules, timelines, attention and behaviour by formalising a timeline information exchange process. Our formulation gives rise to a natural objective function that quantifies the expected collective attention an arrangement of posts on a timeline will receive. We apply this formulation as a case-study on real-data from Twitter, where we estimate behavioural parameters, calculate the attention potential for different scheduling strategies and, using the

  1. Digital terrestrial television broadcasting technology and system

    CERN Document Server

    2015-01-01

    Now under massive deployment worldwide, digital terrestrial television broadcasting (DTTB) offers one of the most attractive ways to deliver digital TV over the VHF/UHF band. Written by a team of experts for specialists and non-specialists alike, this book serves as a comprehensive guide to DTTB. It covers the fundamentals of channel coding and modulation technologies used in DTTB, as well as receiver technology for synchronization, channel estimation, and equalization. It also covers the recently introduced Chinese DTTB standard, using the SFN network in Hong Kong as an example.

  2. Anomaly Detection Techniques for Ad Hoc Networks

    Science.gov (United States)

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  3. Internet broadcast of hockey: a scale prototype

    Science.gov (United States)

    Boyd, Jeffrey E.; Sayles, Maxwell; Olsen, Luke; Tarjan, Paul

    2003-12-01

    We present a system for the broadcast of hockey games over the internet. The system allows users to experience the hockey game while it is in progress. Our system uses generic content description servers that acquire information from an external source, process it, and serve the processed data to client systems. Dynamic configuration of the servers allows us to use them in a variety of roles. For example, video information servers, like an MPEG-7 camera, produce XML documents that describe the motion of objects in the scene in addition to unprocessed video. Unlike an MPEG-7 camera, our video information servers interact with client systems, and can change their behavior through dynamic configuration. In an alternate configuration, a content description server acts as a game server in our hockey broadcast system. The game server forms an environment model that encapsulates the state of the hockey game and serves data from the model to clients. We developed and tested our system using a 1/32-scale model of a hockey rink. Early results using data acquired at a real rink indicate that the system performs as expected.

  4. Reliable Delay Constrained Multihop Broadcasting in VANETs

    Directory of Open Access Journals (Sweden)

    Koubek Martin

    2010-01-01

    Full Text Available Vehicular communication is regarded as a major innovative feature for in-car technology. While improving road safety is unanimously considered the major driving factor for the deployment of Intelligent Vehicle Safety Systems, the challenges relating to reliable multi-hop broadcasting are exigent in vehicular networking. In fact, safety applications must rely on very accurate and up-to-date information about the surrounding environment, which in turn requires the use of accurate positioning systems and smart communication protocols for exchanging information. Communications protocols for VANETs must guarantee fast and reliable delivery of information to all vehicles in the neighbourhood, where the wireless communication medium is shared and highly unreliable with limited bandwidth. In this paper, we focus on mechanisms that improve the reliability of broadcasting protocols, where the emphasis is on satisfying the delay requirements for safety applications. We present the Pseudoacknowledgments (PACKs scheme and compare this with existing methods over varying vehicle densities in an urban scenario using the network simulator OPNET.

  5. Structuring Broadcast Audio for Information Access

    Science.gov (United States)

    Gauvain, Jean-Luc; Lamel, Lori

    2003-12-01

    One rapidly expanding application area for state-of-the-art speech recognition technology is the automatic processing of broadcast audiovisual data for information access. Since much of the linguistic information is found in the audio channel, speech recognition is a key enabling technology which, when combined with information retrieval techniques, can be used for searching large audiovisual document collections. Audio indexing must take into account the specificities of audio data such as needing to deal with the continuous data stream and an imperfect word transcription. Other important considerations are dealing with language specificities and facilitating language portability. At Laboratoire d'Informatique pour la Mécanique et les Sciences de l'Ingénieur (LIMSI), broadcast news transcription systems have been developed for seven languages: English, French, German, Mandarin, Portuguese, Spanish, and Arabic. The transcription systems have been integrated into prototype demonstrators for several application areas such as audio data mining, structuring audiovisual archives, selective dissemination of information, and topic tracking for media monitoring. As examples, this paper addresses the spoken document retrieval and topic tracking tasks.

  6. 77 FR 33098 - Unlicensed Operation in the TV Broadcast Band

    Science.gov (United States)

    2012-06-05

    ... COMMISSION 47 CFR Part 15 Unlicensed Operation in the TV Broadcast Band AGENCY: Federal Communications... Memorandum Opinion and Order, in the matter of ``Unlicensed Operation in the TV Broadcast Band Approval... final regulations that are the subject of this correction relate to ``Unlicensed Operation in the TV...

  7. 77 FR 25112 - Radio Broadcasting Services; Centerville and Midway, TX

    Science.gov (United States)

    2012-04-27

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Centerville and Midway, TX AGENCY: Federal... filing procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division...

  8. 75 FR 3694 - Radio Broadcasting Services, Peach Springs, Arizona

    Science.gov (United States)

    2010-01-22

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services, Peach Springs, Arizona AGENCY: Federal Communications... procedures for comments, see 47 CFR 1.4125 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission proposes to...

  9. 76 FR 69222 - Radio Broadcasting Services; Altamont, OR

    Science.gov (United States)

    2011-11-08

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Altamont, OR AGENCY: Federal Communications Commission... 47 CFR Part 73 Radio. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio... Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 1. The authority...

  10. 77 FR 62481 - Radio Broadcasting Services; Crownpoint, NM

    Science.gov (United States)

    2012-10-15

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Crownpoint, NM AGENCY: Federal Communications....415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications... preamble, the Federal Communications Commission proposes to amend 47 CFR Part 73 as follows: PART 73--RADIO...

  11. 78 FR 12622 - Radio Broadcasting Services; Greenup, IL

    Science.gov (United States)

    2013-02-25

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Greenup, IL AGENCY: Federal Communications Commission... 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. ] Federal... a first and/or second NCE radio service to 67.5 percent (21,149 persons) of the total population of...

  12. 77 FR 16800 - Radio Broadcasting Services; Westfield, NY

    Science.gov (United States)

    2012-03-22

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Westfield, NY AGENCY: Federal Communications... filing procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division...

  13. 75 FR 52649 - Radio Broadcasting Services; DeBeque, Colorado

    Science.gov (United States)

    2010-08-27

    ... COMMISSION 47 CFR Part 73 . Radio Broadcasting Services; DeBeque, Colorado AGENCY: Federal Communications... Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 As stated in the preamble, the Federal Communications Commission amends 47 CFR part 73 as...

  14. 78 FR 12010 - Radio Broadcasting Services; Pearsall, Texas

    Science.gov (United States)

    2013-02-21

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Pearsall, Texas AGENCY: Federal Communications....415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications... preamble, the Federal Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO...

  15. RSBP: a reliable slotted broadcast protocol in wireless sensor networks.

    Science.gov (United States)

    Vinh, Phan Van; Oh, Hoon

    2012-10-31

    In wireless sensor networks for monitoring and control applications, a sink node needs to disseminate messages to all nodes to acquire monitoring data or to control the operation of sensor nodes. The basic flooding protocol suffers from low transmission reliability in broadcasting messages due to the hidden terminal problem. Besides, it can cause the broadcast storm problem by having many nodes rebroadcast the received message simultaneously. In order to resolve these problems while minimizing energy consumption in delivery of broadcast messages, we propose a reliable slotted broadcast protocol (RSBP) that allocates broadcast time slots to nodes based on their slot demands and then allows every node to transmit its broadcast message within the allocated slots. Then, every node can broadcast messages safely in a contention-free manner. Moreover, RSBP can be deployed easily since it does not have any specific requirements such as GPS, multi-channels and directional antennas that may not be always available in real scenarios. We show by experimental study that RSBP significantly outperforms other broadcast protocols in terms of safety-critical packet delivery and energy consumption.

  16. 47 CFR 76.66 - Satellite broadcast signal carriage.

    Science.gov (United States)

    2010-10-01

    ... digital signals of each television broadcast station that is located in a local market in Alaska or Hawaii... reasonable digital compression techniques in the carriage of local television stations. (2) Satellite... MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Carriage of Television Broadcast Signals § 76.66 Satellite...

  17. 78 FR 42700 - Radio Broadcasting Services; Matagorda, Texas

    Science.gov (United States)

    2013-07-17

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Matagorda, Texas AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Tejas Broadcasting Ltd., LLP... the Congressional Review Act, see U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR part 73 Radio, Radio...

  18. 78 FR 42700 - Radio Broadcasting Services; Various Locations

    Science.gov (United States)

    2013-07-17

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Various Locations AGENCY: Federal Communications...), because these allotments were previously reported. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division, Media Bureau...

  19. 77 FR 64792 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-10-23

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications....415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications... preamble, the Federal Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO...

  20. Radio Broadcasting for Adult Nonformal Environmental Education in Botswana.

    Science.gov (United States)

    Nyirenda, Juma E.

    1995-01-01

    Radio broadcasting is used in Botswana to inform, teach, and persuade adults about issues in agriculture, health, wildlife, conservation, and other areas. However, open broadcasting is not an effective nonformal education tool. Active and guided group listening to radio enables discussion and feedback. (SK)

  1. 76 FR 79113 - Radio Broadcasting Services; Bastrop, LA

    Science.gov (United States)

    2011-12-21

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Bastrop, LA AGENCY: Federal Communications Commission... Part 73 Radio. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division, Media... amends 47 CFR part 73 as follows: PART 73--RADIO BROADCAST SERVICES 0 1. The authority citation for part...

  2. 77 FR 43216 - Radio Broadcasting Services; Randsburg, CA

    Science.gov (United States)

    2012-07-24

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Randsburg, CA AGENCY: Federal Communications....415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications... preamble, the Federal Communications Commission proposes to amend 47 CFR part 73 as follows: PART 73--RADIO...

  3. 78 FR 73793 - Radio Broadcasting Services; Evart and Ludington, Michigan

    Science.gov (United States)

    2013-12-09

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Evart and Ludington, Michigan AGENCY: Federal... filing procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. Federal Communications Commission. Nazifa Sawez, Assistant Chief, Audio Division...

  4. 76 FR 13579 - Radio Broadcasting Services; Hebbronville, TX

    Science.gov (United States)

    2011-03-14

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Hebbronville, TX AGENCY: Federal Communications... filing procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Radio, Radio broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  5. Depression Radio Broadcast Dramas in the Canadian History Classroom.

    Science.gov (United States)

    Chilcoat, George W.; And Others

    1990-01-01

    Provides a lesson plan on the Great Depression in which students examine the social, economic, and political events of the period through a study of radio broadcasting. Describes an activity in which students research the era and create a radio broadcast. Outlines activity guidelines, radio language, and evaluation methods. (RW)

  6. 75 FR 71044 - Radio Broadcasting Services; Onekama, MI

    Science.gov (United States)

    2010-11-22

    ... COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Onekama, MI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Northern Radio of Michigan, Inc., in... CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  7. Canal + Spain & Live Football Broadcasts: A Whole Different Game

    NARCIS (Netherlands)

    Rodríguez Ortega, Vicente; Romero Santos, Rubén

    2017-01-01

    textabstractIn 1988 the Law for Private Television Broadcasting was approved by Spanish parliament. Three licenses were initially awarded. Soon thereafter, in 1990, three channels started broadcasting: Antena 3, Berlusconi-related Tele 5 and, against all odds, a pay channel, Canal + Spain. This

  8. Religious Broadcasting in the Middle East : Content Analysis of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Religious Broadcasting in the Middle East : Content Analysis of Selected Channels and Programs. Over the past decade, television broadcasting has become central in shaping public attitudes in the Middle East. Against a backdrop of authoritarian governments, political instability, war and pervasive foreign military ...

  9. 46 CFR 184.506 - Emergency broadcast placard.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Emergency broadcast placard. 184.506 Section 184.506 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) VESSEL CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Radio § 184.506 Emergency broadcast...

  10. 75 FR 9859 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-03-04

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications... 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons...

  11. 76 FR 35831 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-06-20

    ...; DA 11-1034] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications... Gray Television Licensee, LLC (``Gray''), the licensee of station WEAU-TV, channel 13, Eau Claire... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. Federal...

  12. 75 FR 10692 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-03-09

    ... COMMISSION 47 CFR Part 73 Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications... Alabama Educational Television Commission, the licensee of noncommercial educational station WBIQ(TV... CFR Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the...

  13. 75 FR 5015 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-02-01

    ... COMMISSION 47 CFR Part 73 Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  14. 76 FR 9991 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-02-23

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the...

  15. 77 FR 64946 - Radio Broadcasting Services; Maysville, Georgia

    Science.gov (United States)

    2012-10-24

    ... filed by Appalachian Broadcasting Company, Inc., proposing the allotment of Channel 265A at Maysville... Broadcasting Company, Post Office Drawer E, 233 Big A Road, Toccoa, Georgia 30577. FOR FURTHER INFORMATION... released September 28, 2012. The full text of this Commission decision is available for inspection and...

  16. Broadcast, Denial-of-Service, and Secure Communication

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    A main challenge in the design of wireless-based Cyber-Physical Systems consists in balancing the need for security and the effect of broadcast communication with the limited capabilities and reliability of sensor nodes. We present a calculus of broadcasting processes that enables to reason about...

  17. Team Automata for Security Analysis of Multicast/Broadcast Communication

    NARCIS (Netherlands)

    ter Beek, Maurice; Lenzini, Gabriele; Petrocchi, Marinella; Busi, N.; Gorrieri, R.; Martinelli, F.

    We show that team automata (TeA) are well suited to model secure multicast/broadcast communication with possible packet loss. This is a consequence of the natural way in which one-to-many (one-to-all) transmissions typical of multicast (broadcast) sessions can be modelled as communications between

  18. Listenership of Radio Agricultural Broadcasts in Southwestern Nigeria

    Science.gov (United States)

    Emmanuel, Adekoya Adegbenga; Olabode, Badiru Idris

    2012-01-01

    Agricultural broadcasts on radio play a major role in agricultural extension and rural development in Nigeria due to the low ratio of extension agents in relation to the farming population. The broadcasts have been on air for some time and therefore there is a need to investigate their acceptance among the rural dwellers in Southwestern Nigeria.…

  19. Public and Private Activity in Commercial TV Broadcasting

    DEFF Research Database (Denmark)

    Olai Hansen, Bodil; Keiding, Hans

    2006-01-01

    We consider a model of commercial television market, where private broadcasters coexist with a public television broadcaster. Assuming that the public TV station follows a policy of Ramsey pricing whereas the private stations are profit maximizers, we consider the equilibria in this market...

  20. Private Sponsorship of Rural Development Broadcasts on Radio in ...

    African Journals Online (AJOL)

    Increased brand awareness was the most important reason (46.7%) that propelled sponsors to support broadcasts. Most sponsors (66.7%) would be willing to support RDBs on radio. Sponsors' characteristics were not significantly related to their willingness to sponsor RDBs. Stakeholders in rural development broadcasting ...

  1. Method and apparatus for scheduling broadcasts in social networks

    KAUST Repository

    Manzoor, Emaad Ahmed

    2016-08-25

    A method, apparatus, and computer readable medium are provided for maximizing consumption of broadcasts by a producer. An example method includes receiving selection of a total number of time slots to use for scheduling broadcasts, and receiving information regarding the producer\\'s followers. The example method further 5 includes identifying, by a processor and based on the received information, discount factors associated with the producer\\'s followers, and calculating, by the processor and based on the received information, a predicted number of competitor broadcasts during each time slot of the total number of time slots. Finally, the example method includes determining, by the processor and based on the discount factors and the predicted 10 number of competitor broadcasts during each time slot, a number of broadcasts for the producer to transmit in each time slot of the total number of time slots.

  2. Acoustic characteristics of male commercial and public radio broadcast voices.

    Science.gov (United States)

    Warhurst, Samantha; McCabe, Patricia; Yiu, Edwin; Heard, Robert; Madill, Catherine

    2013-09-01

    Radio broadcasters need to have a voice that suits the station, which employs them. The aim of this study was to determine whether there are any acoustic measures that reflect differences between male broadcasters, who use their voices on commercial and public radio stations, and nonbroadcasting, male controls. Male commercial (n = 4) and public (n = 11) broadcasters and two groups of male, age-matched controls were recorded while reading the "Rainbow Passage" as if presenting on radio. Reading productions were analyzed for equivalent sound level (L(eq)), two measures of the long-term average spectrum and two measures of cepstral peak prominence. A two-group (ie, commercial vs public) by two-paired (broadcaster/matching control) analysis of variance was performed for each measure. An interaction effect was observed such that commercial broadcasters had a higher peak in speaker's formant (SF) region and lower alpha ratio (AR) (lower level difference between 0 and 1 k Hz and 1 and 4 kHz ranges) than public broadcasters and controls. Post hoc discriminant function analyses showed that AR could predict whether a radio performer worked on commercial or public radio network to 81% accuracy (R(2) = 0.810, P broadcasters have a more prominent peak in the SF region and smaller AR than public broadcasters and controls, similar to levels documented in actors. Given these features were not found in the public broadcasters and either control group, these results indicate that voice quality requirements for broadcasters may distinctly differ based on their station of employment. Further research with a larger sample size is required to validate this hypothesis. Copyright © 2013 The Voice Foundation. Published by Mosby, Inc. All rights reserved.

  3. The impact of emotional tone, message, and broadcast parameters in youth anti-smoking advertisements.

    Science.gov (United States)

    Biener, Lois; Ji, Ming; Gilpin, Elizabeth A; Albers, Alison B

    2004-01-01

    In the context of controversy regarding the optimal characteristics of anti-smoking advertisements for youth, this study examines the impact on recall and perceived effectiveness of variations in the message, emotional tone, reach and frequency of broadcast, remoteness of broadcast, and characteristics of the adolescent audience such as changes in smoking behavior, ownership of cigarette promotional items, and demographic variables. A two-wave longitudinal survey of a population-based sample of 618 Massachusetts youth 12 to 15 years old was carried out in 1993 and 1997. A Generalized Estimating Equation (GEE) approach was used to model the recall and perceived effectiveness of eight advertisements as a function of viewer and ad characteristics. Advertisements featuring messages about serious health consequences which had been independently rated as high in negative emotion were more likely to be recalled and were perceived as more effective by youth survey respondents than ads featuring messages about normative behavior for teens or ads relying on humor. Advertising intensity, while contributing to recall, was negatively related to perceived effectiveness. This study supports mounting evidence that negative emotion in anti-smoking advertisements is effective with youth audiences.

  4. Evaluating slurry broadcasting and injection to ley for phosphorus losses and fecal microorganisms in surface runoff.

    Science.gov (United States)

    Uusi-Kämppä, Jaana; Heinonen-Tanski, Helvi

    2008-01-01

    The recent growth in the size of dairy cattle farms and the concentration of farms into smaller areas in Finland may increase local water pollution due to increased manure production and slurry application to grass. Therefore, a field study was conducted to monitor losses of total phosphorus (TP), dissolved reactive phosphorus (DRP), and fecal microorganisms in surface runoff from a perennial ley. Cattle slurry was added once a year in June 1996-1997 (Study I) and biannually in June and October 1998-2000 (Study II). The slurry was surface broadcast or injected into the clay soil. The field had a slope of 0.9 to 1.7%. Mineral fertilizer was applied on control plots. Biannual slurry broadcasting increased DRP (p microorganisms in surface runoff waters. The highest losses of TP (2.7 kg ha(-1) yr(-1)) and DRP (2.2 kg ha(-1) yr(-1)) and the highest numbers of fecal coliforms (880 colony-forming units [CFU] per 100 mL) and somatic coliphages (2700 plaque-forming units [PFU] per 100 mL) were measured after broadcasting slurry to wet soil followed by rainfall in fall 1998. Injection reduced the TP and DRP losses in surface runoff by 79 and 86%, respectively, compared with broadcasting (17 Oct. 1998-27 Oct. 1999). Corresponding numbers for fecal coliforms were 350 CFU (100 mL)(-1) and for somatic coliphages were 110 PFU (100 mL)(-1) in surface runoff after injection in October 1998. Slurry injection should be favored when spreading slurry amendments to grassland to avoid losses of P and fecal microorganisms in runoff to surface waters.

  5. A content analysis of health-related advertisements in Islamic Republic of Iran broadcasting (IRIB)

    Science.gov (United States)

    Etemad, Koorosh; Ebrahimi, Parvin; Azimi, Hassan; Lotfi, Mansoureh; Nojomi, Marzieh

    2016-01-01

    Background: Media advertisements especially radio and TV are one of the most important and effective ways for health promotion and consumption of healthy productions worldwide. Ministry of Health and some other ministries in Iran agreed to control and restrict the advertising of unhealthy products and services. Therefore, adequate supervision and monitoring should be done in this field. A content analysis of Health-related Advertisements was done in Islamic Republic of Iran Broadcasting (IRIB) Methods: This study was a cross-sectional research and collecting of data was carried out in 2012. Ten selected TV and radio channels were recorded from 6 a.m. to 12 p.m. for two successive months in the special weekdays. Broadcasted advertisements data were extracted by the trained observers according to a checklist and analyzed using SPSS 18 software and described with descriptive statistics. Results: The percentage of different types of advertising were including 73.9% unrelated to health, 21.9% harmless health related, 2.9% less healthy, 1.3% harmful or harmful with a probability of abuse. Non-harmful to health advertisements included 95.86% of total advertisements out of ten TV and radio channels; and the remained advertisements (4.14%) were related to the harmful, less healthy foodstuff and detrimental services and products. Also, 0.8% of the advertisements were shown during children programs. Conclusion: The main findings of the current study revealed that majority of the advertisements of Islamic Republic Broadcasting were unrelated to health. It seems advertising of harmful for health in IRIB was less than 5%, and the levels of these type ads were less than the other countries. Even so, the policymakers need to pass and enforce some executive and governing law for the prevention of broadcasting unhealthy advertisements to increase the society health level and prevent the diseases resulted from unhealthy products causing the considerable damages in a long time. PMID

  6. A content analysis of health-related advertisements in Islamic Republic of Iran broadcasting (IRIB).

    Science.gov (United States)

    Etemad, Koorosh; Ebrahimi, Parvin; Azimi, Hassan; Lotfi, Mansoureh; Nojomi, Marzieh

    2016-01-01

    Media advertisements especially radio and TV are one of the most important and effective ways for health promotion and consumption of healthy productions worldwide. Ministry of Health and some other ministries in Iran agreed to control and restrict the advertising of unhealthy products and services. Therefore, adequate supervision and monitoring should be done in this field. A content analysis of Health-related Advertisements was done in Islamic Republic of Iran Broadcasting (IRIB) Methods: This study was a cross-sectional research and collecting of data was carried out in 2012. Ten selected TV and radio channels were recorded from 6 a.m. to 12 p.m. for two successive months in the special weekdays. Broadcasted advertisements data were extracted by the trained observers according to a checklist and analyzed using SPSS 18 software and described with descriptive statistics. The percentage of different types of advertising were including 73.9% unrelated to health, 21.9% harmless health related, 2.9% less healthy, 1.3% harmful or harmful with a probability of abuse. Non-harmful to health advertisements included 95.86% of total advertisements out of ten TV and radio channels; and the remained advertisements (4.14%) were related to the harmful, less healthy foodstuff and detrimental services and products. Also, 0.8% of the advertisements were shown during children programs. The main findings of the current study revealed that majority of the advertisements of Islamic Republic Broadcasting were unrelated to health. It seems advertising of harmful for health in IRIB was less than 5%, and the levels of these type ads were less than the other countries. Even so, the policymakers need to pass and enforce some executive and governing law for the prevention of broadcasting unhealthy advertisements to increase the society health level and prevent the diseases resulted from unhealthy products causing the considerable damages in a long time.

  7. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  8. User innovation in public service broadcasts

    DEFF Research Database (Denmark)

    Khajeheian, Datis; Tadayoni, Reza

    2016-01-01

    This research aims to understand how public service media can encourage media entrepreneurship in the society to enrich user innovations as a source of ideas, products, contents, talent and creativity. The assumption is that media entrepreneurs turn users into sources of external creativity...... and develop user innovations into professional content. This study follows a qualitative approach with a document study of Denmark's public service broadcast and two interviews. Findings indicate that the commitment to quality and professional content prevents managers of PSBs from outsourcing...... their production to media entrepreneurs, but they trust large media companies as external producers. This research contributes to the field by proposing that public service media can foster media entrepreneurship in a society indirectly and by creating demand for external sources of creativity. Large media...

  9. Sales plan generation problem on TV broadcasting

    Directory of Open Access Journals (Sweden)

    Özlem Cosgun

    2016-07-01

    Full Text Available Major advertisers and/or advertisement agencies purchase hundreds of slots during a given broadcast period. Deterministic optimization approaches have been well developed for the problem of meeting client requests. The challenging task for the academic research currently is to address optimization problem under uncertainty. This paper is concerned with the sales plan generation problem when the audience levels of advertisement slots are random variables with known probability distributions. There are several constraints the TV networks must meet including client budget, product category and demographic information, plan weighting by week, program mix requirements, and the lengths of advertisement slots desired by the client. We formulate the problem as a chance constrained goal program and we demonstrate that it provides a robust solution with a user specified level of reliability.

  10. Strategy and Space for Broadcasting Facilities

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2006-01-01

    The paper is based on results from an ongoing research project on space strategies and building values, which in-cludes a major case study of the development of facilities for the Danish Broadcasting Corporation over time. The focus is to identify, how different space strategies have been...... implemented in different periods and how these strate-gies can be related to the general conditions of the corporation. Based on theories from Martha O’Mara’s book on Space and Strategy (Free Press, 1999) development in the strategic uncertainty of the corporation is investigated as a main determining factor...... for changes in space strategy. The paper will also explain how space strategies in different periods deals with the need for adaptability and how adaptability is interpreted differently in various periods. The conclusions include relations between value-based space strategies and the presence of visionary...

  11. Efficient broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [INTERNATIONAL COMPUTER SCI.; Sauerwald, Thomas [INTERNATIONAL COMPUTER SCI.

    2009-01-01

    A Randon Geometric Graph (RGG) is constructed by distributing n nodes uniformly at random in the unit square and connecting two nodes if their Euclidean distance is at most r, for some prescribed r. They analyze the following randomized broadcast algorithm on RGGs. At the beginning, there is only one informed node. Then in each round, each informed node chooses a neighbor uniformly at random and informs it. They prove that this algorithm informs every node in the largest component of a RGG in {Omicron}({radical}n/r) rounds with high probability. This holds for any value of r larger than the critical value for the emergence of a giant component. In particular, the result implies that the diameter of the giant component is {Theta}({radical}n/r).

  12. Broadcast Communication by System Frequency Modulation

    DEFF Research Database (Denmark)

    Douglass, Philip James; You, Shi; Heussen, Kai

    2012-01-01

    Load controllers available today can measure AC system frequency and react to frequency deviations. A system operator can communicate to frequency sensitive loads by changing the set-points of the system’s dispatchable frequency regulation resources. Explicitly signaling system state by generating...... off-nominal system frequency values is a novel narrowband broadcast communications channel between system operators and frequency sensitive distributed energy resources (FS-DER). The feasibility of the proposed system is evaluated on an existing island power system in Denmark. This study shows...... these constraints, the proposed system would allow operators to dispatch FS-DER in a robust manner, without using an external digital control channel. By dispatching FS-DER, their well known role as a power balancing resource can be expanded to include energy balancing services....

  13. Axion wormholes in AdS compactifications

    Science.gov (United States)

    Hertog, Thomas; Trigiante, Mario; Van Riet, Thomas

    2017-06-01

    We find regular axionic Euclidean wormhole solutions in Type IIB string theory compactified on {AdS}_5× {S}^5/{Z}_k . AdS/CFT enables a precise derivation of the axion content of the Euclidean theory, placing the string theory embedding of the wormholes on firm footing. This further sharpens the paradox posed by these solutions.

  14. National association of broadcasters engineering handbook NAB engineering handbook

    CERN Document Server

    Jones, Graham A; Osenkowsky, Thomas G; Williams, Edmund A

    2013-01-01

    The NAB Engineering Handbook provides detailed information on virtually every aspect of the broadcast chain, from news gathering, program production and postproduction through master control and distribution links to transmission, antennas, RF propagation, cable and satellite. Hot topics covered include HD Radio, HDTV, 2 GHz broadcast auxiliary services, EAS, workflow, metadata, digital asset management, advanced video and audio compression, audio and video over IP, and Internet broadcasting. A wide range of related topics that engineers and managers need to understand are also covered, includ

  15. Direct broadcast of a sporting event as televisual cultural form

    Directory of Open Access Journals (Sweden)

    Jože Vogrinc

    2012-07-01

    Full Text Available Direct TV broadcasting of sport events is undoubtedly the focal point of interest of sport fans in sports media as well as of sponsors and investors responsible for the global mediatisation of popular sports. In this article, the centrality of direct TV broadcasts in the televisual coverage of sports, as well as in the presence of sports in new media in general is explained in the context of the impact of the mediatisation of sports upon cultural forms of TV coverage of sports. The complexity of these forms and its main features (the role of the commentator, the rules of editing, dramatisation and narrativisation in direct broadcasts are analysed.

  16. Direct broadcasting by satellite for the United Kingdom

    Science.gov (United States)

    Rainger, P.; Phillips, G. J.

    1980-09-01

    The 1977 ITU broadcast allocations provide five frequency channels on the 12 GHz microwave band to each of its European member countries. The paper discusses the economic considerations and engineering aspects of implementing Direct Broadcasting Satellite (DBS) services by 1985-1987. A 1984 Ariane-3 launch will lift a package into geosynchronous orbit for the purpose of conducting satellite broadcasting demonstrations and pre-operational testing. Two DBS program services have been proposed by the BBC - subscription television and a national program, UK1 - with the IBA and the BBC sharing regulatory authority

  17. The Two-User Gaussian Fading Broadcast Channel

    CERN Document Server

    Jafarian, Amin

    2011-01-01

    This paper presents outerbounds for the two-user Gaussian fading broadcast channel. These outerbounds are based on Costa's entropy power inequality (Costa-EPI) and are formulated mathematically as a feasibility problem. For classes of the two-user Gaussian fading broadcast channel where the outerbound is found to have a feasible solution, we find conditions under which a suitable inner and outer bound meet. For all such cases, this paper provides a partial characterization of the capacity region of the Gaussian two-user fading broadcast channel.

  18. 47 CFR 73.4163 - Noncommercial nature of educational broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Noncommercial nature of educational broadcast stations. 73.4163 Section 73.4163 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4163...

  19. 47 CFR 73.2090 - Ban on discrimination in broadcast transactions.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Ban on discrimination in broadcast transactions. 73.2090 Section 73.2090 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.2090 Ban on...

  20. 47 CFR 74.780 - Broadcast regulations applicable to translators, low power, and booster stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Broadcast regulations applicable to translators... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.780 Broadcast...

  1. 47 CFR 74.6 - Licensing of broadcast auxiliary and low power auxiliary stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Licensing of broadcast auxiliary and low power...) BROADCAST RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES General; Rules Applicable to All Services in Part 74 § 74.6 Licensing of broadcast auxiliary and...

  2. 78 FR 67025 - Domestic Requests for Broadcasting Board of Governors Program Materials

    Science.gov (United States)

    2013-11-08

    ...; and (b) The TV Marti Division of the Office of Cuba Broadcasting for broadcast-quality copies of TV or... for media and organization one-time requests for broadcast-quality agency program materials, and... as follows: Sec. 502.4 Media or organization one-time requests for broadcast quality agency program...

  3. 47 CFR 73.6026 - Broadcast regulations applicable to Class A television stations.

    Science.gov (United States)

    2010-10-01

    ... television stations. 73.6026 Section 73.6026 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6026 Broadcast regulations applicable to Class A television stations. The following rules are applicable to Class A...

  4. 47 CFR 73.9001 - Redistribution control of digital television broadcasts.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Redistribution control of digital television... RADIO SERVICES RADIO BROADCAST SERVICES Digital Broadcast Television Redistribution Control § 73.9001 Redistribution control of digital television broadcasts. Licensees of TV broadcast stations may utilize the...

  5. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  6. Broadcast spawning by Pocillopora species on the Great Barrier Reef.

    Science.gov (United States)

    Schmidt-Roach, Sebastian; Miller, Karen J; Woolsey, Erika; Gerlach, Gabriele; Baird, Andrew H

    2012-01-01

    The coral genus Pocillopora is one of the few to include some species that broadcast spawn gametes and some species that brood larvae, although reports of reproductive mode and timing vary within and among species across their range. Notably, the ubiquitous Pocillopora damicornis has been described as both a brooder and spawner, although evidence of broadcast spawning is rare. Here, we report observations of broadcast-spawning in four species of Pocillopora on the Great Barrier Reef (GBR), including P. damicornis. All species spawned predictably during the early morning, two days following the full moon, and spawning was observed in multiple months over the summer period (November to February). Eggs and sperm were free-spawned concurrently. Eggs were negatively buoyant and contained Symbiodinium. This newfound knowledge on the mode, timing and regularity of broadcast spawning in Pocillopora spp. on the GBR brings us one step closer to elucidating the complex reproductive ecology of these species.

  7. 78 FR 12967 - Broadcast Services; Children's Television; Cable Operators

    Science.gov (United States)

    2013-02-26

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Broadcast Services; Children's Television; Cable Operators AGENCY: Federal Communications Commission. ACTION: Final rule; announcement of effective date. SUMMARY: This document announces...

  8. 76 FR 43933 - Radio Broadcasting Services; Markham, TX

    Science.gov (United States)

    2011-07-22

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Markham, TX AGENCY: Federal Communications Commission... petition for reconsideration of Victoria Radio Works, LLC (``VRW''), seeking reconsideration of the Audio...

  9. The Educational Project for Media Literacy Using Radio Broadcasting System

    OpenAIRE

    北村, 順生; Kitamura, Yorio

    2009-01-01

    This report outlines the educational project for media literacy using radio broadcasting system. The practical activity to produce a radio program are very effective on the students to cultivate their media literacy.

  10. 77 FR 38761 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-06-29

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposal rule; dismissal. SUMMARY: The Audio Division dismisses the petition for...

  11. 78 FR 11987 - Radio Broadcasting Services; Avalon, California

    Science.gov (United States)

    2013-02-21

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Radio Broadcasting Services; Avalon, California AGENCY: Federal Communications Commission. ACTION: Final rule; announcement of effective date. SUMMARY: This document announces the...

  12. 75 FR 81190 - Television Broadcasting Services; Yuma, AZ

    Science.gov (United States)

    2010-12-27

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Yuma, AZ AGENCY: Federal Communications Commission. ACTION: Dismissal. SUMMARY: The Commission dismisses the petition for rulemaking filed by Arizona...

  13. 76 FR 18497 - Television Broadcasting Services; Augusta, GA

    Science.gov (United States)

    2011-04-04

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Augusta, GA AGENCY: Federal Communications... 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division, Media...

  14. Real-time data compression of broadcast video signals

    Science.gov (United States)

    Shalkauser, Mary Jo W. (Inventor); Whyte, Wayne A., Jr. (Inventor); Barnes, Scott P. (Inventor)

    1991-01-01

    A non-adaptive predictor, a nonuniform quantizer, and a multi-level Huffman coder are incorporated into a differential pulse code modulation system for coding and decoding broadcast video signals in real time.

  15. Surveying woodland raptors by broadcast of conspecific vocalizations

    Science.gov (United States)

    Mosher, J.A.; Fuller, M.R.; Kopeny, M.

    1990-01-01

    We surveyed for raptors in forests on study areas in five of the eastern United States. For Cooper's Hawks (Accipiter cooperi), Red-shouldered Hawks (Buteo lineatus), and Barred Owls (Strix varia) the contact rates obtained by broadcasting taped vocalizations of conspecifics along roads were significantly greater than contact rates obtained by only looking and listening from the roadside. Broad-winged Hawks (B. platypterus) were detected only after their calls were broadcast. Most raptors were detected within 10 min of the beginning of the broadcasts. Red-tailed Hawks (B. jamaicensis) and Goshawks (A. gentilis) nested infrequently on our study areas, and we were unable to increase detections of these species. Generally, point count transects along woodland roads, from which conspecific vocalizations were broadcast, resulted in higher species specific detection rates than when walking, driving continuously, or only looking and listening for raptors at roadside stops.

  16. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli

    2014-12-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU\\'s interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  17. Print, Broadcast Students Share VDTs at West Fla.

    Science.gov (United States)

    Roberts, Churchill L.; Dickson, Sandra H.

    1985-01-01

    Describes the use of video display terminals in the journalism lab of a Florida university. Discusses the different purposes for which broadcast and print journalism students use such equipment. (HTH)

  18. How we use online broadcasting - Web TV - for community engagement

    Science.gov (United States)

    Allison, M. L.; Conway, F. M.; Matti, J.; Palmer, R.

    2013-12-01

    The Arizona Geological Survey uses online broadcasting (Webcast or 'Web TV') to help fulfill our statutory mission to 'Inform, advise and assist the public in matters concerning the geological processes, materials and landscapes and the development and use of the mineral resources of this state.' We launched a monthly online broadcast called 'Arizona Mining Review' via Livestream, a low-cost or free video streaming service. The show provides news, interviews, and discussions about mining and mineral resources topics of interest in Arizona, the nation's second largest non-fuel mining state. The costs to set up and broadcast are minor. Interviews with local guests are held in a corner of the AZGS conference room with easy chairs and a couch; long-distance interviews are held via Skype. The broadcast originates from a desktop computer with a webcam, a $60 microphone, three sets of earbud headphones and a powered amplifier. During broadcasts, we supplement interview footage with slides, photos, or video clips that we have or are provided by guests. Initial broadcasts were live; recordings of these were later uploaded to our YouTube channel. Because scheduling and executing a live Internet broadcast is stressful and demanding for both the production team and guests, we recently elected to record and produce episodes prior to broadcasting them. This allows us more control over supplementary materials used during the broadcast; it also permits us to record the broadcast using a high-definition digital video camera that cannot be used for streaming video. In addition to the Arizona Mining Review, we record conferences and workshops and special presentations on topical issues. A video on the recently discovered Little Chino fault has drawn over 3,000 views. Our latest presentations are short 1-2 minute 'video abstracts' delivered by authors of new publications released by the Survey. These include maps and graphics from the reports to help illustrate the topics and their

  19. At the Digital Watershed: Terrestrial Television Broadcasting in Japan

    OpenAIRE

    Koga-Browes, Scott

    2012-01-01

    The switch to digital terrestrial broadcasting on 24 July 2011 marked a watershed for the broadcasting industry in Japan. Digitalisation is the single largest industry-wide event since the advent of alternative distribution technologies, satellite and cable, in the 1980s. Preparation for the switch to digital, known as chideji-ka, has put existing business arrangements under pressure and has led to a renewed focus on the future shape of the industry. There is increasing acknowledgement that c...

  20. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  1. Recent and future applications of video compression in broadcasting

    Science.gov (United States)

    Drury, G. M.

    1995-02-01

    This paper considers the role of video compression in the transmission of television signals. It highlights contribution and distribution as well as direct-to-home broadcasting applications on satellite which are current and describes aspects of the standards, technology and systems required to support them. Some aspects of system performance are discussed together with a brief summary of future developments particularly on other media than those traditionally used by broadcasters.

  2. Beyond Broadcast Yourself ™: The Future of YouTube

    OpenAIRE

    Jarrett, Kylie

    2008-01-01

    Since its launch in early 2005, video sharing website YouTube has emerged as a culturally, politically and economically significant medium and as one of the inheritors of the social role played by broadcast television. However its continued growth and journey to profitability is not guaranteed. This paper queries the future of YouTube by exploring the tension inherent in the site’s 3 key characteristics embodied within its slogan Broadcast Yourself ™. The site is based within r...

  3. Mobile user-preference-based data dissemination on mobile P2P networks

    Directory of Open Access Journals (Sweden)

    Kim Dohoon

    2011-01-01

    Full Text Available Abstract A considerable number of studies have been performed recently on mobile peer-to-peer networks (MOPNETs, as the number of services based on mobile devices has increased. However, existing studies still reveal numerous shortcomings, such as bandwidth overhead, and redundant transmission in terms of multi-broadcast between peers. Especially, owing to the characteristics of MOPNETs, it is extremely important to determine broadcast size and to disseminate data within the limited environment of the network. The mechanism directly affects how well resource information in a mobile device is discovered and how data are transmitted. In this context, it is vital to efficiently disseminate data to be able to arrange hierarchal sequences of resource information of each mobile device for better search performance. Especially, it is also vital to determine the broadcast size, considering the consumption patterns of mobile users. In this article, we propose an adaptable algorithm that determines weighted values and disseminates data using the high-order Markov chain (HoMC. We apply weighted values in consideration of the MOPNET environment. In addition, the proposed HoMC-based Mobile User-preference-based Data Dissemination algorithm was simulated with a Qualnet simulator. Results show that the proposed algorithm performs 17.3% better, on average, in terms of data dissemination, than the existing dissemination methods.

  4. French Musical Broadcasting from 1955 to 1964: New Paths for the Broadcasting of Music

    OpenAIRE

    Bennet, Christophe

    2015-01-01

    During the 55-64 decade, French radio knows very serious modifications. Beside the birth of the private station Europe #1 (which doesn't concern our topic, since it hardly broadcasts any classical music), which is going to overshadow the national radio, it is going to be transformed, parallel to the replacement of its successive managers. The eleven years with Wladimir Porché at the helm were essential. Parallel to the development of the radio (the multiplication of the stations, programs, tr...

  5. Gaze location prediction for broadcast football video.

    Science.gov (United States)

    Cheng, Qin; Agrafiotis, Dimitris; Achim, Alin M; Bull, David R

    2013-12-01

    The sensitivity of the human visual system decreases dramatically with increasing distance from the fixation location in a video frame. Accurate prediction of a viewer's gaze location has the potential to improve bit allocation, rate control, error resilience, and quality evaluation in video compression. Commercially, delivery of football video content is of great interest because of the very high number of consumers. In this paper, we propose a gaze location prediction system for high definition broadcast football video. The proposed system uses knowledge about the context, extracted through analysis of a gaze tracking study that we performed, to build a suitable prior map. We further classify the complex context into different categories through shot classification thus allowing our model to prelearn the task pertinence of each object category and build the prior map automatically. We thus avoid the limitation of assigning the viewers a specific task, allowing our gaze prediction system to work under free-viewing conditions. Bayesian integration of bottom-up features and top-down priors is finally applied to predict the gaze locations. Results show that the prediction performance of the proposed model is better than that of other top-down models that we adapted to this context.

  6. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    asks: what are the physical, social, technical, and cultural conditions to the staging of contemporary urban mobilities? The theoretical framing in the Staging mobilities book is applied to four in-depth cases in the accompanying volume Designing mobilities.This book explore how places, sites......In recent years, urban research has taken a ‘mobilities turn’. There has been a developing realisation that mobilities do not ‘just happen.’ Mobilities are carefully and meticulously designed, planned and staged (from above). However, they are equally importantly acted out, performed and lived......, and systems 'hosting' these multiple and complex mobilities are designed and how they are staging these in terms of their physical layout. By analysing specific cases of ‘mobilities design’ related to the four modes of moving; Walk, Bike, Train, and Car, the book uncover important and until now neglected...

  7. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  8. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  9. AdS braneworld with Backreaction

    CERN Document Server

    Bilic, Neven

    2014-01-01

    We review the tachyon model derived from the dynamics of a 3-brane moving in the AdS5 bulk. The bulk geometry is based on the Randall-Sundrum II model extended to include the radion. The effective tachyon Lagrangian is modified due to the back-reaction of the brane on the bulk geometry.

  10. Generating Ideas for New Mobile TV Services

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone....... This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of ideas for more advanced services. The results shows that this group of users looks for personalized services...

  11. Effect of ADS-B Characteristics on Airborne Conflict Detection and Resolution

    NARCIS (Netherlands)

    Langejan, T.P.; Sunil, E.; Ellerbroek, J.; Hoekstra, J.M.

    2016-01-01

    Most Free-Flight concepts rely on self-separation by means of airborne Conflict Detection and Resolution (CD&R) algorithms. A key enabling technology for airborne CD&R is the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is used for direct state information exchange

  12. Quasi-ADS-B Based UAV Conflict Detection and Resolution to Manned Aircraft

    Directory of Open Access Journals (Sweden)

    Chin E. Lin

    2015-01-01

    Full Text Available A Conflict Detection and Resolution (CD&R system for manned/unmanned aerial vehicle (UAV based on Automatic Dependent Surveillance-Broadcast (ADS-B concept is designed and verified in this paper. The 900 MHz XBee-Pro is selected as data transponder to broadcast flight information among participating aircraft in omnirange. Standard Compact Position Report (CPR format packet data are automatically broadcasted by ID sequencing under Quasi-ADS-B mechanism. Time Division Multiple Access (TDMA monitoring checks the designated time slot and reallocates the conflict ID. This mechanism allows the transponder to effectively share data with multiple aircraft in near airspace. The STM32f103 microprocessor is designed to handle RF, GPS, and flight data with Windows application on manned aircraft and ground control station simultaneously. Different conflict detection and collision avoidance algorithms can be implemented into the system to ensure flight safety. The proposed UAV/CD&R using Quasi-ADS-B transceiver is tested using ultralight aircraft flying at 100–120 km/hr speed in small airspace for mission simulation. The proposed hardware is also useful to additional applications to mountain hikers for emergency search and rescue. The fundamental function by the proposed UAV/CD&R using Quasi-ADS-B is verified with effective signal broadcasting for surveillance and efficient collision alert and avoidance performance to low altitude flights.

  13. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  14. Integrated Display and Simulation for Automatic Dependent Surveillance-Broadcast and Traffic Collision Avoidance System Data Fusion.

    Science.gov (United States)

    Wang, Yanran; Xiao, Gang; Dai, Zhouyun

    2017-11-13

    Automatic Dependent Surveillance-Broadcast (ADS-B) is the direction of airspace surveillance development. Research analyzing the benefits of Traffic Collision Avoidance System (TCAS) and ADS-B data fusion is almost absent. The paper proposes an ADS-B minimum system from ADS-B In and ADS-B Out. In ADS-B In, a fusion model with a variable sampling Variational Bayesian-Interacting Multiple Model (VSVB-IMM) algorithm is proposed for integrated display and an airspace traffic situation display is developed by using ADS-B information. ADS-B Out includes ADS-B Out transmission based on a simulator platform and an Unmanned Aerial Vehicle (UAV) platform. This paper describes the overall implementation of ADS-B minimum system, including theoretical model design, experimental simulation verification, engineering implementation, results analysis, etc. Simulation and implementation results show that the fused system has better performance than each independent subsystem and it can work well in engineering applications.

  15. SURVEI PENANGANAN BROADCAST STORM PROBLEM PADA PROTOKOL ROUTING AODV DI MANET

    Directory of Open Access Journals (Sweden)

    Indera Zainul Muttaqien

    2015-07-01

    Full Text Available Komunikasi multi-hop pada lingkungan MANET dapat melibatkan broadcast paket dalam proses route discovery. Protokol routing pada MANET akan melakukan broadcast paket RREQ dan menjalarkannya ke node tujuan secepat dan seefisien mungkin, dimana paket RREQ dari rute yang optimal adalah paket RREQ yang terlebih dahulu sampai ke tujuan. Aktifitas broadcast yang tidak terkontrol dapat menyebabkan suatu kondisi yang disebut broadcast storm problem. Broadcast storm problem dapat berdampak pada terganggunya kinerja dari protokol routing akibat adanya packet redundancy, contention, dan collision. Broadcast storm problem dapat ditangani dengan membatasi jumlah node yang dapat melakukan broadcast. Tujuan utama dari pembuatan makalah ini adalah merangkum beberapa mekanisme terbaru yang telah diakukan oleh para peneliti untuk menangani broadcast storm problem. Kami juga menyajikan perbandingan dari mekanisme tersebut berdasarkan karakteristik dari mekanisme ditinjau dari kesesuaian dengan beberapa skema penanganan broadcast storm problem yang diajukan oleh peneliti sebelumnya, kebutuhan informasi tertentu antar node, lingkungan uji coba dan apakah mekanisme ini dapat diterapkan pada protokol routing lainnya.

  16. Digital terrestrial broadcasting receiver in the U.K; Eikoku chijoha digital hoso jushinki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Digital terrestrial broadcasting is broadcasted in parallel with existing UHF analog broadcasting, whereas each of allocated channel frequencies can transmit five to six programs simultaneously. Each home can receive a number of programs with the existing antenna without a need of installing a new satellite antenna or cable. Among the countries of the world running forward to digitization of broadcasting all at once, the U.K. develops advancing movements and leads the world by starting the digital terrestrial broadcasting. In addition to the digitized broadcasting of conventional analog broadcasting programs, the `Ondigitals` (broadcasting operators) have started newly the pay broadcasting. Toshiba has been selected as one of the six developers and manufacturers of digital terrestrial broadcasting receivers, and has developed the digital terrestrial broadcasting receiver DTB2000. For the modulation system, the orthogonal frequency division multiplex (OFDM) was chosen as a system being strong against ghost and most suitable for digital terrestrial broadcasting. In addition, the receiver is equipped with software download function by using the broadcasting waves, and the common interface being the communication specification specified in the DVB (digital video broadcasting) to provide future function expandability. (translated by NEDO)

  17. Implementation of Efficient seamless non-broadcast Routing algorithm for Wireless Mesh Network

    Science.gov (United States)

    Kbar, Ghassan; Mansoor, Wathiq

    Wireless Mesh Networks become popular and are used everywhere as an alternative to broadband connections. The ease of configuration of wireless mesh LAN, the mobility of clients, and the large coverage make it attractive choice for supporting wireless technology in LAN and MAN. However, there are some concerns in assigning the multiple channels for different node and having efficient routing algorithm to route packet seamlessly without affecting the network performance. Multiple channel usage has been addressed in previous research paper, but efficient routing algorithm still to be researched. In this paper an efficient seamless non-broadcast routing algorithm has been developed and implemented in C++ to support the wireless mesh network. This algorithm is based on mapping the mesh wireless routing nodes geographically according to 2 coordinates. Each node will apply this algorithm to find the closet neighboring node that leads to destination based on the mapped network without the need for broadcast such as the one used in traditional routing protocol in RIP, and OSPF.

  18. Digital Radio Broadcasting using the mixed satellite/terrestrial approach: An application study

    Science.gov (United States)

    Paiement, Richard V.; Voyer, Rene; Prendergast, Doug

    1995-01-01

    Digital radio broadcasting (DRB) is a new service that offers CD quality stereo programs to fixed, portable and mobile receivers. Terrestrial DRB in Canada is considered as a replacement technology for existing AM and FM services, and it is expected to start up in 1996. Canada currently favors Eureka 147 technology operating in the L-band, in the 1452-1492 MHz frequency band allocated during WARC'92 for DRB. Terrestrial DRB delivery is appropriate for small to medium sized service areas, such as cities and their associated suburbs. For larger areas such as provinces, as well as for sparsely populated areas such as the regions in northern Canada, satellite delivery is more appropriate. The mixed approach is based on both satellite and terrestrial broadcasting services using a common frequency band. Spectrum efficiency is achieved through close coordination of both service types, to achieve proper frequency sharing and spectrum re-use. As well, use of a common transmission format by both types of services allows for a common receiver. This mixed satellite/terrestrial approach to DRB is being seriously considered in Canada and in other countries. This paper studies the feasibility of such a mixed satellite/terrestrial DRB system. It looks at possible coverage scenarios for Canada, and at the satellite and receiver technology requirements.

  19. TV Recommendation and Personalization Systems: Integrating Broadcast and Video On demand Services

    Directory of Open Access Journals (Sweden)

    SOARES, M.

    2014-02-01

    Full Text Available The expansion of Digital Television and the convergence between conventional broadcasting and television over IP contributed to the gradual increase of the number of available channels and on demand video content. Moreover, the dissemination of the use of mobile devices like laptops, smartphones and tablets on everyday activities resulted in a shift of the traditional television viewing paradigm from the couch to everywhere, anytime from any device. Although this new scenario enables a great improvement in viewing experiences, it also brings new challenges given the overload of information that the viewer faces. Recommendation systems stand out as a possible solution to help a watcher on the selection of the content that best fits his/her preferences. This paper describes a web based system that helps the user navigating on broadcasted and online television content by implementing recommendations based on collaborative and content based filtering. The algorithms developed estimate the similarity between items and users and predict the rating that a user would assign to a particular item (television program, movie, etc.. To enable interoperability between different systems, programs? characteristics (title, genre, actors, etc. are stored according to the TV-Anytime standard. The set of recommendations produced are presented through a Web Application that allows the user to interact with the system based on the obtained recommendations.

  20. Baby Skyrmions in AdS

    Energy Technology Data Exchange (ETDEWEB)

    Elliot-Ripley, Matthew; Winyard, Thomas [Department of Mathematical Sciences, Durham University,South Rd, Durham (United Kingdom)

    2015-09-01

    We study the baby Skyrme model in a pure AdS background without a mass term. The tail decays and scalings of massless radial solutions are demonstrated to take a similar form to those of the massive flat space model, with the AdS curvature playing a similar role to the flat space pion mass. We also numerically find minimal energy solutions for a range of higher topological charges and find that they form concentric ring-like solutions. Popcorn transitions (named in analogy with studies of toy models of holographic QCD) from an n layer to an n+1-layer configuration are observed at topological charges 9 and 27 and further popcorn transitions for higher charges are predicted. Finally, a point-particle approximation for the model is derived and used to successfully predict the ring structures and popcorn transitions for higher charge solitons.

  1. AdS solutions through transgression

    Energy Technology Data Exchange (ETDEWEB)

    Donos, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Theory Group; Gauntlett, J.P. [Imperial College, London (United Kingdom). Blackett Lab.]|[Imperial College, London (United Kingdom). The Institute for Mathematical Sciences; Kim, Nakwoo [Kyung Hee Univ., Seoul (Korea). Dept. of Physics and Research Inst. of Basic Science

    2008-07-15

    We present new classes of explicit supersymmetric AdS{sub 3} solutions of type IIB supergravity with non-vanishing five-form flux and AdS{sub 2} solutions of D=11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS{sub 3} solutions of type IIB supergravity and AdS{sub 2} solutions of D=11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or ''transgression'' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS3 solutions with only the NS fields being non-trivial. (orig.)

  2. Obstacles to broadcasting for national integration in Nigeria.

    Science.gov (United States)

    Amienyi, O P

    1989-01-01

    In Nigeria, the media is the major government vehicle to achieve national integration. The problems arise from the approximately 250 ethnic groups speaking many languages. Television and radio have caused disintegration by emphasizing alienation and polarization rather than unity. With more than 178 languages there are major problems for radio and television. The government leaders have promoted a strong interest in creating a unified society through broadcasting, but at the same time have allowed media managers to operate towards goals of ethnic protection. Religion is also a factor that hinders broadcasting for national unity, since there are Hausa and Muslim in the north, Catholic in the south-east, and in the south-west there are many African ethnic religions. More than 60% of the local programming on television is keyed to local religious subjects. Illiteracy is also a problem in the use of broadcasting in the goal of national integration. Only through education of a socially conscious people can the religious fanaticism, ethnocentrism, and tribalism be overcome to form a united nation. Broadcasting can play an important role consistent with the needs of society as a whole. Managers in broadcasting must be well educated, well trained and understand the needs and ambitions of society. They need to support these needs and ambitions, and be constructively critical when necessary for the betterment of society.

  3. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  4. Water vapor estimation using digital terrestrial broadcasting waves

    Science.gov (United States)

    Kawamura, S.; Ohta, H.; Hanado, H.; Yamamoto, M. K.; Shiga, N.; Kido, K.; Yasuda, S.; Goto, T.; Ichikawa, R.; Amagai, J.; Imamura, K.; Fujieda, M.; Iwai, H.; Sugitani, S.; Iguchi, T.

    2017-03-01

    A method of estimating water vapor (propagation delay due to water vapor) using digital terrestrial broadcasting waves is proposed. Our target is to improve the accuracy of numerical weather forecast for severe weather phenomena such as localized heavy rainstorms in urban areas through data assimilation. In this method, we estimate water vapor near a ground surface from the propagation delay of digital terrestrial broadcasting waves. A real-time delay measurement system with a software-defined radio technique is developed and tested. The data obtained using digital terrestrial broadcasting waves show good agreement with those obtained by ground-based meteorological observation. The main features of this observation are, no need for transmitters (receiving only), applicable wherever digital terrestrial broadcasting is available and its high time resolution. This study shows a possibility to estimate water vapor using digital terrestrial broadcasting waves. In the future, we will investigate the impact of these data toward numerical weather forecast through data assimilation. Developing a system that monitors water vapor near the ground surface with time and space resolutions of 30 s and several kilometers would improve the accuracy of the numerical weather forecast of localized severe weather phenomena.

  5. Broadcasting football rights in Brazil: the case of Globo and "Club of 13" in the antitrust perspective

    Directory of Open Access Journals (Sweden)

    César Mattos

    2012-06-01

    Full Text Available In 2010, the Brazilian Antitrust Authority -CADE- concluded an agreeement with Globo and the "Club of 13" on a three-year deal for the exclusive broadcasting rights to all Brazilian Football League (BFL games spanning the five principal media platforms: free-to-air TV, pay TV, Pay per View, Internet and Mobile. The deal eliminates competition in broadcasting of Brazilian League games (primarily other networks, including Record, SBT, ESPN, etc., reducing "competition in the market." However, it is plausible to assume that exclusivity can bring efficiencies to the market by ensuring a return on investments. In addition, the sale of broadcasting rights accounts for nearly 40% of the revenues of Brazilian clubs. Banning exclusivity will likely reduce revenues and dampen sector efficiency. However, the contract included a preference clause for Globo that adversely affected "competition for the market." Globo abandoned the preference clause under the agreement. Another important provision of the agreement was the requirement that the Club of 13 auction the five media platforms separately. This article examines the economic rationale of the agreement and provides a brief analysis of the main lessons arising from the fragmentation of negotiations in 2011.

  6. DAWN: Dynamic Ad-hoc Wireless Network

    Science.gov (United States)

    2016-06-19

    Wireless Network 1 Introduction The network-centric battlefield includes sensors, troop carriers, unmanned air vehicle (UAV), aircraft, smart ...Bellman Control Heritage Award. • Honorary Doctorate at Technical University of Crete. • Best paper award at 2008 IEEE International Conference on Mobile Ad-hoc and Sensor Systems.

  7. Ad-Coop Positioning System (ACPS)

    DEFF Research Database (Denmark)

    Frattasi, Simone; Monti, Marco

    2008-01-01

    -hoc connections among pairs of mobiles. Specifically, peer-to-peer (P2P) communications are exploited in a mesh fashion within cellular-established clusters for cooperation-aided localization purposes (from that, the word ad-coop is derived). The major contribution of this work is the design of the data fusion...

  8. GEO NAV/CNAV-type Broadcast Ephemeris Fitting without Rotation of Inclination

    Directory of Open Access Journals (Sweden)

    DU Lan

    2017-03-01

    Full Text Available The GPS-type broadcast ephemerides are currently used by BDS constellation. However, a 5°-rotation added on the original orbital inclination is needed in the GEOs ephemeris parameters fitting algorithm as well as in the user satellite position computation because of the singularity due to small inclination. Besides, the phenomena of exceeding the given boundary happen occasionally for some ephemeris parameters of GEOs. In order to unify the user ephemerides algorithm for the hybrid constellation, a two-step GEO broadcast ephemerides fitting algorithm was analyzed based on the first class nonsingular orbital elements. After the investigation on the reason for the variations of some ephemeris parameters out of limited range, a reduced fitting parameter set was adopted by giving the underlying one or two parameters with fixed values. Fit simulations for 5 GEOs during both eclipsing and non-eclipsing periods show that the two-step fitting algorithm has considerable robustness to ensure the success rate and fitting accuracy. The mean fitting user range error of GEOs with 2 h for NAV and 3 h data set for CNAV are better than 3 mm. For specific fit arcs with the boundary-exceeding problem, it can be fully avoided by using the fitting algorithm with a reduced fitting parameter set. However, the fitting URE will increase to 2 cm.

  9. Predicting AD conversion

    DEFF Research Database (Denmark)

    Liu, Yawu; Mattila, Jussi; Ruiz, Miguel �ngel Mu�oz

    2013-01-01

    To compare the accuracies of predicting AD conversion by using a decision support system (PredictAD tool) and current research criteria of prodromal AD as identified by combinations of episodic memory impairment of hippocampal type and visual assessment of medial temporal lobe atrophy (MTA) on MRI...

  10. 47 CFR 1.525 - Agreements between parties for amendment or dismissal of, or failure to prosecute, broadcast...

    Science.gov (United States)

    2010-10-01

    ... dismissal of, or failure to prosecute, broadcast applications. 1.525 Section 1.525 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Broadcast Applications and Proceedings General Filing..., broadcast applications. See § 73.3525. ...

  11. Generating ideas for new mobile TV services - Accepting and socializing mobile television

    DEFF Research Database (Denmark)

    Sørensen, L.; Nicolajsen, H.W.

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone....... This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of ideas for more advanced services. The results shows that this group of users looks for personalized services...

  12. A Simulation of the Reception of Automatic Dependent Surveillance-Broadcast Signals in Low Earth Orbit

    Directory of Open Access Journals (Sweden)

    Richard Van Der Pryt

    2015-01-01

    Full Text Available Automatic Dependent Surveillance-Broadcast (ADS-B is an air traffic surveillance technology in which aircraft transmit position and identification. The development of space-based ADS-B will allow precise control of aircraft in areas that are not covered by radar, such as oceanic regions and high latitudes. The Royal Military College of Canada has developed a spaceborne ADS-B receiver scheduled to fly on the Canadian Advanced Nanospace eXperiment-7 (CanX-7 satellite. The payload is planned to collect data over the North Atlantic region, which will then be compared to truth data provided by air traffic services. A model was created to determine power levels arriving at the satellite to provide confidence in the ADS-B receiver and antenna proposed for CanX-7. The model takes into account neutral atmosphere and ionospheric effects, aircraft-satellite geometry, and antenna radiation patterns. A simulation was run by inserting real aircraft data from the North Atlantic Track System into the model and placing the satellite at altitudes of 400, 600, and 800 km. Results of the simulation indicate that power received at the satellite, ranging between −98.5 dBm and −103 dBm for the selected altitudes, will be sufficient to successfully conduct the mission.

  13. 47 CFR 74.709 - Land mobile station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Land mobile station protection. 74.709 Section 74.709 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES... translator station field strength is calculated from the proposed effective radiated power (ERP) and the...

  14. Distribution of Multimedia Streams to Mobile Internet Users

    NARCIS (Netherlands)

    Hesselman, C.E.W.

    2005-01-01

    In this thesis, we consider the efficient distribution of live and scheduled multimedia content (e.g., radio and TV broadcasts) to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a content delivery system that (1) enables content owners to deliver their

  15. DVB-S Signal Tracking Techniques for Mobile Phased Arrays

    NARCIS (Netherlands)

    Blom, K.C.H.; van de Burgwal, M.D.; Rovers, K.C.; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2010-01-01

    A system that uses adaptive beamforming techniques for mobile Digital Video Broadcasting Satellite (DVB-S) reception is proposed in this paper. The purpose is to enable DVB-S reception in moving vehicles. Phased arrays are able to electronically track the desired signal during dynamic behaviour of

  16. Monitoring of the Process of System Information Broadcasting in Time

    Science.gov (United States)

    Mironowicz, P.; Korbicz, J. K.; Horodecki, P.

    2017-04-01

    One of the problems of quantum physics is how a measurement turns quantum, noncopyable data, towards copyable classical knowledge. We use the quantum state discrimination in a central system model to show how its evolution leads to the broadcasting of the information, and how orthogonalization and decoherence factors allow us to monitor the distance of the state in question to the one perfectly broadcasting information, in any moment of time not just asymptotically. We illustrate this in the spin-spin model where the distance is shown to be typically small and provide the related time scales.

  17. Adding more value to added-value

    DEFF Research Database (Denmark)

    Marian, Livia

    Recent studies reveal that consumers respond favourably to “organic plus” products with additional ethical attributes. The aim of the current study is to explore whether consumers would notice and value further improvements in the animal welfare standards than those imposed by the organic...... it is probably valued less than expected. The added attributes need to be thoroughly considered when developing and marketing “organic plus” products, as their effect on other product characteristics (e.g. high prices) can detract from their added value....

  18. Emerging Mobile Networking Architectures

    Science.gov (United States)

    2006-12-01

    years to address this problem area. Basic concepts began as early a the 1970s with DARPA sponsored "packet radio" research, yet a new flurry of design...routing, MAC , middleware). The appropriate mechanisms are also not orthogonal to the intended application or deployment scenario of the mobile ad hoc...technology that can improve the capability of future mobile architectures Original work dates back to DARPA packet radio work 1970s More recent flurry of

  19. Ultrasonic Sensor-Based Personalized Multichannel Audio Rendering for Multiview Broadcasting Services

    OpenAIRE

    Yong Guk Kim; Sang-Taeck Moon; Seung Ho Choi; Hong Kook Kim

    2013-01-01

    An ultrasonic sensor-based personalized multichannel audio rendering method is proposed for multiview broadcasting services. Multiview broadcasting, a representative next-generation broadcasting technique, renders video image sequences captured by several stereoscopic cameras from different viewpoints. To achieve realistic multiview broadcasting, multichannel audio that is synchronized with a user’s viewpoint should be rendered in real time. For this reason, both a real-time person-tracking t...

  20. 47 CFR 1.572 - Processing TV broadcast and translator station applications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Processing TV broadcast and translator station applications. 1.572 Section 1.572 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Broadcast Applications and Proceedings General Filing Requirements § 1.572 Processing TV broadcast...