WorldWideScience

Sample records for dense mobile ad

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  3. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  4. An Empirical Study of Mobile Ad Targeting

    OpenAIRE

    Book, Theodore; Wallach, Dan S.

    2015-01-01

    Advertising, long the financial mainstay of the web ecosystem, has become nearly ubiquitous in the world of mobile apps. While ad targeting on the web is fairly well understood, mobile ad targeting is much less studied. In this paper, we use empirical methods to collect a database of over 225,000 ads on 32 simulated devices hosting one of three distinct user profiles. We then analyze how the ads are targeted by correlating ads to potential targeting profiles using Bayes' rule and Pearson's ch...

  5. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  6. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  7. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    This paper presents and evaluates the stationary distribution for location, speed and pause time of a random waypoint mobility case. We show how to implement the random waypoint mobility model for ad-hoc networks without pausing, through a more efficient and reliable computer simulation, using MATrix LABoratory ...

  8. Payment of mobile value-added services

    OpenAIRE

    Pousttchi, Key

    2003-01-01

    The availability of appropriate payment functionality is an important condition for business profit of mobile commerce supply in B2C context. Value-added services are the most important subset of B2C mobile commerce and consist of a combination of content and data transfer. The payment occurs via bill of telecommunication services by the mobile network operator (MNO). If the content is not provided by the MNO but by a third party (content provider) a revenue sharing is necessary. There are th...

  9. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  10. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  11. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  12. Public-key management in mobile ad hoc networks

    Science.gov (United States)

    Lin, Haifeng; Jiang, Anna; Bai, Di; Liu, Yunfei

    A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public -key management model which does not need the third trusted authority.

  13. A Stable TORA Based for Routing in Mobile Ad Ηoc Networks

    Directory of Open Access Journals (Sweden)

    S. Jahanbakhsh Gudakahriz

    2018-02-01

    Full Text Available A mobile ad hoc network (MANET is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.

  14. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each node

  15. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  16. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  17. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  18. A Group Vehicular Mobility Model for Routing Protocol Analysis in Mobile Ad Hoc Network

    OpenAIRE

    Kulkarni, Shrirang Ambaji; Rao, G Raghavendra

    2010-01-01

    Performance of routing protocols in mobile ad-hoc networks is greatly affected by the dynamic nature of nodes, route failures, wireless channels with variable bandwidth and scalability issues. A mobility model imitates the real world movement of mobile nodes and is central component to simulation based studies. In this paper we consider mobility nodes which mimic the vehicular motion of nodes like Manhattan mobility model and City Section mobility model. We also propose a new Group Vehicular ...

  19. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  20. Formation and export of dense shelf water from the Adélie Depression, East Antarctica

    Science.gov (United States)

    Williams, G. D.; Bindoff, N. L.; Marsland, S. J.; Rintoul, S. R.

    2008-04-01

    Coastal polynyas in the Adélie Depression are an important source of Antarctic Bottom Water to the Australian-Antarctic Basin. We present time series (April 1998 to May 1999 and August 1999 to February 2000) of data from temperature-salinity sensors, in both the Adélie Depression and the known outflow region of the Adélie Sill, to describe the annual cycle of shelf water densities. From April through September, salinification beneath the polynya produces dense shelf waters. During September-October, shelf water densities in the depression peak at 27.94 kg m-3, and the cooling and freshening signature of Ice Shelf Water is observed north of Buchanan Bay. In November-December, shelf water densities decrease as intrusions of warm and relatively fresh modified Circumpolar Deep Water enter east of the Adélie Sill. From January-March the surface layer is conditioned by the cooling of the atmosphere, which overturns the upper water column. At the Adélie Sill, observed daily mean currents were approximately 10 cm s-1 with intense instantaneous currents greater than 50 cm s-1 at the sill depth. Using an idealized outflow region with a rectangular cross-sectional area (6 × 106 m2), we present the first estimates of shelf water export by potential density class. Assuming shelf water with a minimum density of 27.88 kg m-3 has sufficient negative buoyancy for downslope mixing and a fourfold volume increase (1:3 mixing ratio) from entrainment, the dense shelf water export of 0.1-0.5 Sv results in an annual average production of bottom water in this region of between 0.4 and 2.0 Sv. The wide range in bottom water estimate results from data limitations, and a narrowing of this range requires further mooring observations.

  1. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  2. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  3. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model...

  4. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  5. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. C. Dutta

    2013-06-01

    Full Text Available This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  6. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  7. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  8. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julián García Matesanz

    2011-03-01

    Full Text Available The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  9. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  10. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  11. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Abdulaziz Al-Nahari

    Full Text Available Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV, which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  12. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  13. Remote Upload of Evidence over Mobile Ad Hoc Networks

    Science.gov (United States)

    Ray, Indrajit

    In this work, we report on one aspect of an autonomous robot-based digital evidence acquisition system that we are developing. When forensic investigators operate within a hostile environment they may use remotely operated unmanned devices to gather digital evidence. These systems periodically upload the evidence to a remote central server using a mobile ad hoc network. In such cases, large pieces of information need to be fragmented and transmitted in an appropriate manner. To support proper forensic analysis, certain properties must ensured for each fragment of evidence — confidentiality during communication, authenticity and integrity of the data, and, most importantly, strong evidence of membership for fragments. This paper describes a framework to provide these properties for the robot-based evidence acquisition system under development.

  14. ADAPTIVE SERVICE PROVISIONING FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Cynthia Jayapal

    2010-09-01

    Full Text Available Providing efficient and scalable service provisioning in Mobile Ad Hoc Network (MANET is a big research challenge. In adaptive service provisioning mechanism an adaptive election procedure is used to select a coordinator node. The role of a service coordinator is crucial in any distributed directory based service provisioning scheme. The existing coordinator election schemes use either the nodeID or a hash function to choose the coordinator. In these schemes, the leader changes are more frequent due to node mobility. We propose an adaptive scheme that makes use of an eligibility factor that is calculated based on the distance to the zone center, remaining battery power and average speed to elect a core node that change according to the network dynamics. We also retain the node with the second highest priority as a backup node. Our algorithm is compared with the existing solution by simulation and the result shows that the core node selected by us is more stable and hence reduces the number of handoffs. This in turn improves the service delivery performance by increasing the packet delivery ratio and decreasing the delay, the overhead and the forwarding cost.

  15. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  16. Prediction of a Mobile Solid State in Dense Hydrogen under High Pressures.

    Science.gov (United States)

    Geng, Hua Y; Wu, Q; Sun, Y

    2017-01-05

    Solid rigidity and liquid-scale mobility are thought to be incompatible in elemental substances. One cannot have an elemental solid that is long-range positionally ordered wherein the atoms flow like in a liquid simultaneously. The only exception might be the hypothetical supersolid state of 4 He. In this work, we demonstrate that such exotic state could exist even in the classical regime. Using ab initio molecular dynamics (AIMD) and ab initio path integral molecular dynamics (AI-PIMD), a novel state of dense hydrogen that simultaneously has both long-range spatial ordering and liquid-scale atomic mobility is discovered at 1 to 1.5 TPa (1 TPa ≈ 10 000 000 atmospheric pressures). The features distinct from a normal solid and liquid are carefully characterized, and the stability and melting behavior are investigated. Extensive AI-PIMD simulations further revealed that this state might be (meta-)stable even at ultralow temperatures, suggesting an emerging candidate for an alternative type of supersolid state in dense metallic hydrogen.

  17. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  18. An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data

    Science.gov (United States)

    2016-01-01

    ARL-TR-7574 ● JAN 2016 US Army Research Laboratory An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log ...Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data by Jaime C Acosta and Yadira Jacquez Survivability/Lethality Analysis...August 2015 4. TITLE AND SUBTITLE An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data 5a. CONTRACT NUMBER 5b. GRANT

  19. The effect of mobility on local service discovery in the Ahoy ad-hoc network system

    NARCIS (Netherlands)

    Goering, P.T.H.; Heijenk, Geert; Haverkort, Boudewijn R.H.M.; Haarman, Robbert

    2007-01-01

    Ahoy, a protocol to perform local service discovery in ad-hoc networks is described in this paper. The protocol has been implemented in a discreteevent simulator to study its performance in case of a multihop mobile ad-hoc network. Especially the effect of mobility on the network load and the

  20. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  1. A survey of message diffusion portocols in mobile ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Ibrahim, M.; Simon, V.; Varga, E.; Carreras, I.

    2008-01-01

    For the last twenty years, mobile communications have experienced an explosive growth. In particular, one area of mobile communication, the Mobile Ad hoc Networks (MANETs), has attracted significant attention due to its multiple applications and its challenging research problems. On the other hand,

  2. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  3. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    than the employee trusts the supervisor. Fifth, trust is context-dependent [33]. For example, A may trust B as a wine expert but not as a car fixer... deposited at nodes by mobile agents called ”ants” and provide the mechanism for information exchange and interactions. These ”ants” can identify the

  4. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  5. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  6. Decentralized network-level synchronization in mobile ad hoc networks

    NARCIS (Netherlands)

    Voulgaris, Spyros; Dobson, Matthew; Van Steen, Maarten

    2016-01-01

    Energy is the scarcest resource in ad hoc wireless networks, particularly in wireless sensor networks requiring a long lifetime. Intermittently switching the radio on and off is widely adopted as the most effective way to keep energy consumption low. This, however, prevents the very goal of

  7. Decentralized Network-level Synchronization in Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    Voulgaris, Spyros; Dobson, Matthew; van Steen, Martinus Richardus

    Energy is the scarcest resource in ad hoc wireless networks, particularly in wireless sensor networks requiring a long lifetime. Intermittently switching the radio on and off is widely adopted as the most effective way to keep energy consumption low. This, however, prevents the very goal of

  8. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  9. Simulation and Evaluation of Routing Protocols for Mobile Ad Hoc Networks (MANETs)

    National Research Council Canada - National Science Library

    Kioumourtzis, George

    2005-01-01

    Mobile Ad hoc networks (MANETs) are of much interest to both the research community and the military because of the potential to establish a communication network in any situation that involves emergencies...

  10. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  11. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    OpenAIRE

    A. Sarfaraz Ahmed; T. Senthil Kumaran; S. Syed Abdul Syed; S. Subburam

    2015-01-01

    In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS)-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, ...

  12. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  13. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  14. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  15. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  16. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  17. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  18. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    OpenAIRE

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit pattern...

  19. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    OpenAIRE

    Vara, M.; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated i...

  20. SUPERMAN: Security using pre-existing r\\ud outing for mobile ad hoc networks

    OpenAIRE

    Hurley-Smith, Darren; Wetherall, Jodie; Adekunle, Andrew

    2017-01-01

    The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection. The use of communication security protocols originally developed for wireline and Wi...

  1. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    OpenAIRE

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of t...

  2. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  3. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    core network in assigning network address prefixes to gateways in mobile ad-hoc networks. This paper focuses on how CP-nets and the CPN computer tools have been applied in the development of ERDP. A CPN model has been constructed that constitutes a formal executable specification of ERDP. Simulation...

  4. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  5. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  6. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  7. Global Consistency Management Methods Based on Escrow Approaches in Mobile ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Takahiro Hara

    2010-01-01

    Full Text Available In a mobile ad hoc network, consistency management of data operations on replicas is a crucial issue for system performance. In our previous work, we classified several primitive consistency levels according to the requirements from applications and provided protocols to realize them. In this paper, we assume special types of applications in which the instances of each data item can be partitioned and propose two consistency management protocols which are combinations of an escrow method and our previously proposed protocols. We also report simulation results to investigate the characteristics of these protocols in a mobile ad hoc network. From the simulation results, we confirm that the protocols proposed in this paper drastically improve data availability and reduce the traffic for data operations while maintaining the global consistency in the entire network.

  8. An optimized node-disjoint multipath routing scheme in mobile ad hoc

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Liu, Zhiyu

    2016-02-01

    In mobile ad hoc networks (MANETs), link failures are caused frequently because of node’s mobility and use of unreliable wireless channels for data transmission. Multipath routing strategy can cope with the problem of the traffic overloads while balancing the network resource consumption. In the paper, an optimized node-disjoint multipath routing (ONMR) protocol based on ad hoc on-demand vector (AODV) is proposed to establish effective multipath to enhance the network reliability and robustness. The scheme combines the characteristics of reverse AODV (R-AODV) strategy and on-demand node-disjoint multipath routing protocol to determine available node-disjoint routes with minimum routing control overhead. Meanwhile, it adds the backup routing strategy to make the process of data salvation more efficient in case of link failure. The results obtained through various simulations show the effectiveness of the proposed scheme in terms of route availability, control overhead and packet delivery ratio.

  9. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  10. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  11. A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks

    OpenAIRE

    Chettibi, Saloua

    2009-01-01

    S. Chettibi, M. Benmohammed, "A comprehensive study of a new multipath energy aware routing protocol for mobile ad-hoc networks"; International Conference on Systems and Information Processing, ICSIP'09, May 02 – 04, 2009, Guelma, Algeria; Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in criti...

  12. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  13. A Review of routing protocols for mobile cognitive radio ad hoc networks

    OpenAIRE

    Selvakanmani, S.; Sumathi, M.

    2012-01-01

    Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The basic idea of cognitive radio networks is that the unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band once the licensed device (p...

  14. Stochastic Geometry based Medium Access Games in Mobile Ad hoc Networks

    OpenAIRE

    Hanawal, Manjesh Kumar; Altman, Eitan; Baccelli, Francois

    2011-01-01

    This paper studies the performance of Mobile Ad hoc Networks (MANETs) when the nodes, that form a Poisson point process, selfishly choose their Medium Access Probability (MAP). We consider goodput and delay as the performance metric that each node is interested in optimizing taking into account the transmission energy costs. We introduce a pricing scheme based on the transmission energy requirements and compute the symmetric Nash equilibria of the game in closed form. It is shown that by appr...

  15. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  16. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  17. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  18. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  19. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    Science.gov (United States)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  20. Prediction of a Mobile Solid State in Dense Hydrogen under High Pressures

    OpenAIRE

    Geng, Hua Y.; Wu, Q.; Sun, Y.

    2017-01-01

    Solid rigidity and liquid-scale mobility are thought incompatible in elemental substances. One cannot have an elemental solid that is long-range positionally ordered wherein the atoms flow like in a liquid simultaneously. The only exception might be the hypothetical supersolid state of 4He. In this work, we demonstrate that such exotic state could exist even in the classical regime. Using ab initio molecular dynamics (AIMD) and ab initio path integral molecular dynamics (AI-PIMD), a novel sta...

  1. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  2. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  3. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  4. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  5. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  6. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  7. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  8. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    Science.gov (United States)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  9. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    Science.gov (United States)

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro).

  10. A hierarchical virtual backbone construction protocol for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Bharti Sharma

    2016-07-01

    Full Text Available We propose a hierarchical backbone construction protocol for mobile ad hoc networks. Our protocol is based on the idea of using an efficient extrema finding method to create clusters comprising the nodes that are within certain prespecified wireless hop distance. Afterward, we apply our ‘diameter’ algorithm among clusters to identify the dominating nodes that are, finally, connected via multi-hop virtual links to construct the backbone. We present the analytic as well as simulation study of our algorithm and also a method for the dynamic maintenance of constructed backbone. In the end, we illustrate the use of the virtual backbone with the help of an interesting application.

  11. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  12. A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Bharti Sharma

    2017-07-01

    Full Text Available We propose a light weight layered architecture to support the computation of leader in mobile ad hoc networks. In distributed applications, the leader has to perform a number of synchronization activities among participating nodes and numerous applications; hence, it is a stressed node and consequently prone to failure. Thus, fast and fault tolerant leader election is a major concern and popular area of research in distributed computing networks, in general, and wireless ad hoc networks, in particular. In the present article, we have proposed a fault tolerant leader election approach. More importantly, the nodes elect the leader quickly on the basis of local information only. The illustration includes suitable examples. The correctness proof and performance evaluation has also been presented.

  13. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  14. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  15. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  16. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  17. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  18. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    Science.gov (United States)

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  19. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ramesh Sekaran

    2014-01-01

    Full Text Available The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET. The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  20. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Y. Harold Robinson

    2015-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO that uses continuous time recurrent neural network (CTRNN to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  1. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  2. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Directory of Open Access Journals (Sweden)

    Maha Abdelhaq

    Full Text Available A mobile ad hoc network (MANET is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  3. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  4. AUTOMATED 3D ROAD SIGN MAPPING WITH STEREOVISION-BASED MOBILE MAPPING EXPLOITING DISPARITY INFORMATION FROM DENSE STEREO MATCHING

    Directory of Open Access Journals (Sweden)

    S. Cavegn

    2012-07-01

    Full Text Available This paper presents algorithms and investigations on the automated detection, classification and mapping of road signs which systematically exploit depth information from stereo images. This approach was chosen due to recent progress in the development of stereo matching algorithms enabling the generation of accurate and dense depth maps. In comparison to mono imagery-based approaches, depth maps also allow 3D mapping of the objects. This is essential for efficient inventory and for future change detection purposes. Test measurements with the mobile mapping system by the Institute of Geomatics Engineering of the FHNW University of Applied Sciences and Arts Northwestern Switzerland demonstrated that the developed algorithms for the automated 3D road sign mapping perform well, even under difficult to poor lighting conditions. Approximately 90% of the relevant road signs with predominantly red, blue and yellow colors in Switzerland can be detected, and 85% can be classified correctly. Furthermore, fully automated mapping with a 3D accuracy of better than 10 cm is possible.

  5. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  6. Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppression and Loop Correction

    Science.gov (United States)

    Speakman, Lee; Owada, Yasunori; Mase, Kenichi

    Transient routing loops have been observed to form in Mobile Ad-hoc Networks running the OLSRv2 proactive link-state routing protocol. The packets falling into loops impact the surrounding network thus degrading throughput even though only a small proportion of the traffic may enter these loops and only for a short time. This becomes significantly more evident when Link Layer Notification is used to catch broken links, inadvertently leading to an increase in the number of loops. Two methods of Loop Detection are introduced and are used to trigger either Loop Suppression by selectively and preemptively discarding the looping packets that are unlikely to reach their destination, or Loop Correction by the notification of the routing protocol to cut the link over which the packet is looping. The newly introduced Loop Suppression and Loop Correction techniques used with Link Layer Notification are shown to significantly increase network performance over plain OLSRv2 and OLSRv2 with Link Layer Notification.

  7. Security enhancement for mobile ad hoc networks routing with OLSRv2

    Science.gov (United States)

    Wei, Zhexiong; Tang, Helen; Yu, F. Richard; Wang, Maoyu

    2013-05-01

    Some features of Mobile Ad hoc Networks (MANETs), including dynamic membership, topology, and open wireless medium, introduce a variety of security risks. Malicious nodes can drop or modify packets that are received from other nodes. These malicious activities may seriously affect the availability of services in MANETs. Therefore, secure routing in MANETs has emerged as an important MANET research area. In this paper, we propose a scheme that enhances the security of Optimal Link State Routing version 2 (OLSRv2) in MANETs based on trust. In the proposed scheme, more accurate trust can be obtained by considering different types of packets and other important factors that may cause dropping packets in friendly nodes, such as buffer overflows and unreliable wireless connections. Simulation results are presented to demonstrate the effectiveness of the proposed scheme.

  8. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  9. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  10. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  11. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  12. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  13. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  14. A Rough Penalty Genetic Algorithm for Multicast Routing in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chih-Hao Lin

    2013-01-01

    Full Text Available Multicast routing is an effective way to transmit messages to multiple hosts in a network. However, it is vulnerable to intermittent connectivity property in mobile ad hoc network (MANET especially for multimedia applications, which have some quality of service (QoS requirements. The goal of QoS provisioning is to well organize network resources to satisfy the QoS requirement and achieve good network delivery services. However, there remains a challenge to provide QoS solutions and maintain end-to-end QoS with user mobility. In this paper, a novel penalty adjustment method based on the rough set theory is proposed to deal with path-delay constraints for multicast routing problems in MANETs. We formulate the problem as a constrained optimization problem, where the objective function is to minimize the total cost of the multicast tree subject to QoS constraints. The RPGA is evaluated on three multicast scenarios and compared with two state-of-the-art methods in terms of cost, success rate, and time complexity. The performance analyses show that this approach is a self-adaptive method for penalty adjustment. Remarkably, the method can address a variety of constrained multicast routing problems even though the initial routes do not satisfy all QoS requirements.

  15. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  16. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  17. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  18. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  19. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  20. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  1. Distinguishing congestion from malicious behavior in mobile ad-hoc networks

    Science.gov (United States)

    Ding, Jin; Medidi, Sirisha R.

    2004-08-01

    Packet dropping in Mobile Ad-hoc Networks could be a result of wireless link errors, congestion, or malicious packet drop attack. Current techniques for detecting malicious behavior either do not consider congestion in the network or are not able to detect in real time. Further more, they usually work at network layer. In this paper, we propose a TCP-Manet protocol, which reacts to congestion like TCP Reno protocol, and has additional capability to distinguish among congestion, wireless link error, and malicious packet drop attack. It is an end-to-end mechanism that does not require additional modifications to the nodes in the network. Since it is an extension of existing TCP protocol, it is compatible with existing protocols. It works in conjunction with the network layer and an unobtrusive monitor to assist the network in the detection and characterization of the nature of the behavior. Experimental results show that TCP-Manet has the same performance as that of TCP-Reno in wired network, and performs better in wireless ad-hoc networks in terms of throughput while having good detection effectiveness.

  2. A Performance Analysis of the Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks

    Science.gov (United States)

    2012-03-22

    contagious enthusiasm bring a smile to my face and let me know that we will never be alone in our pursuits. I thank the Information Assurance...created a unique environment where I can take ownership of my ideas while providing a perfect blend of mentorship and encouragement. I truly am...summarizes the chapter. 2.2 Mobile Ad Hoc Networks A MANET represents a system of wireless mobile nodes that can freely and dynamically self-organize

  3. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  4. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  5. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  6. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  7. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  8. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  9. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  10. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  11. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  12. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  13. An artificial immune system for securing mobile ad hoc networks against intrusion attacks

    Science.gov (United States)

    Hortos, William S.

    2003-08-01

    To mitigate the problem of intrusion attacks by malicious nodes in mobile ad hoc networks (MANETs), security attributes and quantifiable trust levels, unique to the MANET's transient, self-organizing topology, augment or replace traditional protocol metrics of throughput, packet delay and hop-count in the ad hoc route discovery procedures. The new features are unique to the candidate security protocol, which views security as a quality metric to improve the relevance of the routes discovered by established reactive ad hoc routing protocols. Attributes of a secure route are identified in order to define the appropriate metrics to quantify the "level of security" associated with the protocol messaging and the detection of malicious activities by some intrusive nodes. A state vector of features and metrics based on the published Secure Routing Protocol (SRP) for MANETs is constructed to encode network security characteristics. This route discovery protocol mitigates the detrimental effects of various malicious behaviors to provide trustworthy connectivity information. The protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach the querying source node. In this paper, the pattern of values, taken by the state vector of the SRP features in the route request, discovery and reply operations, are analyzed to detect evidence of intrusion attacks by malicious nodes that could lead to denial of service and network shutdown. The pattern analysis applies a technique based on negative selection found in natural immune systems that can detect extraneous patterns in the (nonself) space that is the complement of vector values associated with correct route discovery and route maintenance. The immune system is well-suited to the distributed nature of the MANET. It does not rely on a central controller, but instead uses a distributed detection and response mechanism in order to respond to foreign invaders, mirroring the

  14. Blocking probabilities in mobile communications networks with time-varying rates ad redialing subscribers

    NARCIS (Netherlands)

    Abdalla, Nadra; Boucherie, Richardus J.

    Call-blocking probabilities are among the key performance measures in mobile communications networks. For their analysis, mobile networks can be modelled as networks of Erlang loss queues with common capacity restrictions dictated by the allocation of frequencies to the cells of the network.

  15. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  16. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  17. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  18. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  19. Simulation and Evaluation of Routing Protocols for Mobile Ad Hoc Networks (MANETs)

    National Research Council Canada - National Science Library

    Kioumourtzis, George

    2005-01-01

    .... The nodes act as routers in an environment without a fixed infrastructure, the nodes are mobile, the wireless medium has its own limitations compared to wired networks, and existing routing protocols...

  20. SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    SHEENU SHARMA

    2009-06-01

    Full Text Available A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Blackhole attacks on the network performance. We simulated Blackhole attacks in Qualnet Simulator and measured the packet loss in the network with and without a blackhole. The simulation is done on AODV (Ad hoc On Demand Distance Vector Routing Protocol. The network performance in the presence of a blackhole is reduced up to 26%.

  1. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    Figure Page 1 Model of topology of wireless ad hoc network by unit-disk graphs...Routing Independent Overlay Network OSI Open Systems Interconnect P2P peer-to-peer QoS quality of service RREP route reply RREQ route request UAV unmanned...chapter closes with a look at the current state of modeling ad hoc networks , the various simulators used, as well as a survey of simulation versus an

  2. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architecture...... and protocols. The main contributions of the LightPeers framework are: a mobile P2P framework including a specialized robust messaging protocol resilient to changes in the network topology, an developers API, and a suite of LightPeers applications supporting nomadic learning prototyping key features of LightPeers....

  3. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...

  4. Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kühnrich, Morten; Godskesen, Jens Christian

    2009-01-01

    and it is shown to be sound, i.e. protocols which are typeable are also safe. This result is lifted to open systems which involves Dolev-Yao attackers. Our Dolev-Yao attacker may use public keys for encryption and can attack any neighborhood it wishes. Our technique is applied to the Mobile IP registration...

  5. Beamspace Multiple Input Multiple Output. Part II: Steerable Antennas in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-09-01

    Networks with Beamforming Antennas,” IEEE Communications Surveys & Tutorials , vol. 14, no. 2, pp. 216–239. 17. Akyildiz, I. F., and X. Wang. 2005. “A... Survey on Wireless Mesh Networks,” IEEE Communications Magazine, vol. 43, no. 9, pp. S23–S30. 18. Ramanathan, R. 2001. “On the Performance of Ad Hoc...Ando, A. 2002. “Analysis of ESPAR Antennas in Indoor Multi-path Environments for Wireless Ad-hoc N etwork Systems.” IEEE Wireless Communications and

  6. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  7. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...

  8. Using firefighter mobility traces to understand ad-hoc networks in wildfires

    NARCIS (Netherlands)

    S. Cabrero Barros (Sergio); X.G. Pañeda (Xabriel); D. Melendi (David); R. Garcia (Roberto); Thomas Plagemann (T.)

    2017-01-01

    textabstractAd-hoc networks have long been studied as an ideal technology to provide communications in emergency operations when network infrastructures are not available. Nevertheless, this area has not yet delivered enough mature technologies or working prototypes. We suspect that, among other

  9. VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network

    Science.gov (United States)

    Zhang, Hongqi; Yang, Oliver; Zhao, Jiying

    We have implemented a testbed to study the performance of VoIP in wireless ad hoc networks. The ASNC (Adaptive Source Network-rate Control) scheme is used to battle packet loss by feeding MOS (Mean Opinion Score) and loss information back to the sender. Our different VoIP experiments with measurements on delay, packet loss rate and MOS have validated the feasibility and efficiency of our scheme. It further verifies the simulator we used in the initial investigation.

  10. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  11. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  12. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    Science.gov (United States)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  13. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  14. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  15. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  16. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  17. Overestimation of on-road air quality surveying data measured with a mobile laboratory caused by exhaust plumes of a vehicle ahead in dense traffic areas.

    Science.gov (United States)

    Woo, Sang-Hee; Kwak, Kyung-Hwan; Bae, Gwi-Nam; Kim, Kyung Hwan; Kim, Chang Hyeok; Yook, Se-Jin; Jeon, Sangzin; Kwon, Sangil; Kim, Jeongsoo; Lee, Seung-Bok

    2016-11-01

    The unintended influence of exhaust plumes emitted from a vehicle ahead to on-road air quality surveying data measured with a mobile laboratory (ML) at 20-40 km h -1 in dense traffic areas was investigated by experiment and life-sized computational fluidic dynamics (CFD) simulation. The ML equipped with variable sampling inlets of five columns by four rows was used to measure the spatial distribution of CO 2 and NO x concentrations when following 5-20 m behind a sport utility vehicle (SUV) as an emitter vehicle equipped with a portable emission monitoring system (PEMS). The PEMS measured exhaust gases at the tailpipe for input data of the CFD simulations. After the CFD method was verified with experimental results of the SUV, dispersion of exhaust plumes emitted from a bus and a sedan was numerically analyzed. More dilution of the exhaust plume was observed at higher vehicle speeds, probably because of eddy diffusion that was proportional to turbulent kinetic energy and vehicle speed. The CO 2 and NO x concentrations behind the emitter vehicle showed less overestimation as both the distance between the two vehicles and their background concentrations increased. If the height of the ML inlet is lower than 2 m and the ML travels within 20 m behind a SUV and a sedan ahead at 20 km h -1 , the overestimation should be considered by as much as 200 ppb in NO x and 80 ppm in CO 2 . Following a bus should be avoided if possible, because effect of exhaust plumes from a bus ahead could not be negligible even when the distance between the bus and the ML with the inlet height of 2 m, was more than 40 m. Recommendations are provided to avoid the unintended influence of exhaust plumes from vehicles ahead of the ML during on-road measurement in urban dense traffic conditions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  19. Dense Breasts

    Science.gov (United States)

    ... may lose breast density as a result of hormonal changes experienced during menopause. However, some younger women may have fatty breasts while some elderly women have dense breasts. Much of what determines a woman's ... and hormonal factors also affect a woman's breast density. About ...

  20. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  1. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  2. Emerging Radio and Manet Technology Study: Research Support for a Survey of State-of-the-art Commercial and Military Hardware/Software for Mobile Ad Hoc Networks

    Science.gov (United States)

    2014-10-01

    Architecture 2b: Tablet with External Router Existing products such as the ZuniConnect Travel Router or the ASUS 6-in-1 Wireless-N150 Mobile Router can...configuration and network topology information via a standard browser interface. The company claims scalability to 1000’s of units by removing routing...Systems (PS) is a US company based in New York City. They offer a proprietary mobile ad-hoc networking solution (Wave Relay) that is an adaptive mesh

  3. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available is available in densely populated areas, 2) the population density results in the use of micro or pico-cells, 3) the small cell footprint would result in an increase in the rate of inter-cell movement, 4) a higher probability of inter-cell movement may... Private Bag X1001, KwaDlangezwa, 3886 Tel: +27 (0)35 902 6012, +27 (0)35 902 6189 E-mail: 1. s021716@students.uzulu.ac.za, 2. madigun@pan.uzulu.ac.za, 3. eojustice@justice.com G These are reasonable assumptions in light of the expected users...

  4. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  5. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  8. Impact Of Mobility and Transmission Range On The Performance of Backoff Algorithms For IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks

    OpenAIRE

    Saini, Pooja

    2010-01-01

    In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the existing backoff algorithms in multi-hop ad hoc networks. Thus, in this paper, we considered two i...

  9. Mobilities

    DEFF Research Database (Denmark)

    and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...... for all students and scholars with an interest in the ‘mobilities turn’ and its contributions to a deeper understanding of the contemporary and mobile world. The entries chosen all are amongst the most creative, thought provoking, and thoughtful of this diverse field of analysis and thought. The selection...

  10. Does adding mobilization to stretching improve outcomes for people with frozen shoulder? A randomized controlled clinical trial.

    Science.gov (United States)

    Çelik, Derya; Kaya Mutlu, Ebru

    2016-08-01

    To assess the effectiveness of joint mobilization combined with stretching exercises in patients with frozen shoulder. A randomized controlled clinical pilot trial. Department of Orthopedics and Traumatology. Thirty patients with frozen shoulder. All participants were randomly assigned to one of two treatment groups: joint mobilization and stretching versus stretching exercises alone. Both groups performed a home exercise program and were treated for six weeks (18 sessions). The primary outcome measures for functional assessment were the Disabilities of the Arm, Shoulder and Hand score and the Constant score. The secondary outcome measures were pain level, as evaluated with a visual analog scale, and range of motion, as measured using a conventional goniometer. Patients were assessed before treatment, at the end of the treatment, and after one year as follow-up. Two-by-two repeated-measures ANOVA with Bonferroni corrections revealed significant increases in abduction (91.9° [CI: 86.1-96.7] to 172.8° [CI: 169.7-175.5]), external rotation (28.1° [CI: 22.2-34.2] to 77.7° [CI: 70.3-83.0]) and Constant score (39.1 [CI: 35.3-42.6] to 80.5 [75.3-86.6]) at the one-year follow-up in the joint mobilization combined with stretching exercise group, whereas the group performing stretching exercise alone did not show such changes. In the treatment of patients with frozen shoulder, joint mobilization combined with stretching exercises is better than stretching exercise alone in terms of external rotation, abduction range of motion and function score. © The Author(s) 2015.

  11. Adding Value to the Network: Exploring the Software as a Service and Platform as a Service Models for Mobile Operators

    Science.gov (United States)

    Gonçalves, Vânia

    The environments of software development and software provision are shifting to Web-based platforms supported by Platform/Software as a Service (PaaS/SaaS) models. This paper will make the case that there is equally an opportunity for mobile operators to identify additional sources of revenue by exposing network functionalities through Web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, several factors that should be taken into consideration in applying these models to the telecom world are delineated.

  12. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  13. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  14. Dense detector for baryon decay

    International Nuclear Information System (INIS)

    Courant, H.; Heller, K.; Marshak, M.L.; Peterson, E.A.; Ruddick, K.; Shupe, M.

    1981-01-01

    Our studies indicate that the dense detector represents a potentially powerful means to search for baryon decay and to study this process, if it occurs. The detector has good angular resolution and particle identification properties for both showering and non-showering events. Its energy resolution is particularly good for muons, but pion, electron and photon energies can also be measured with resolutions of at least 25 percent (standard deviation). The dense detector has strong logistical advantages over other proposed schemes. These advantages imply not only a lower cost but also faster construction and higher reliability. A particular advantage is that the dense detector can be prototyped in order to optimize its characteristics prior to the construction of a large module. Subsequent modules can also be added easily, while the initial detector continues operation

  15. Mobilities

    DEFF Research Database (Denmark)

    will cover diverse topics such as theories, concepts, methods, and approaches as well as it will explore various modes of mobilities and the relationship to everyday life practices. The selection also covers the ‘politics of mobilities’ from local urban planning schemes to geopolitical issues of refugees...

  16. Photogrammetric 3D reconstruction using mobile imaging

    Science.gov (United States)

    Fritsch, Dieter; Syll, Miguel

    2015-03-01

    In our paper we demonstrate the development of an Android Application (AndroidSfM) for photogrammetric 3D reconstruction that works on smartphones and tablets likewise. The photos are taken with mobile devices, and can thereafter directly be calibrated using standard calibration algorithms of photogrammetry and computer vision, on that device. Due to still limited computing resources on mobile devices, a client-server handshake using Dropbox transfers the photos to the sever to run AndroidSfM for the pose estimation of all photos by Structure-from-Motion and, thereafter, uses the oriented bunch of photos for dense point cloud estimation by dense image matching algorithms. The result is transferred back to the mobile device for visualization and ad-hoc on-screen measurements.

  17. AdS wormholes

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, A. [George and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); Lue, H. [George and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); Interdisciplinary Center of Theoretical Studies, USTC, Hefei, Anhui 230026 (China); Mei, Jianwei [George and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); Pope, C.N. [George and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); DAMTP, Centre for Mathematical Sciences, Cambridge University, Wilberforce Road, Cambridge CB3 0WA (United Kingdom)], E-mail: pope@physics.tamu.edu

    2009-03-21

    We obtain a large class of smooth Lorentzian p-brane wormholes in supergravities in various dimensions. They connect two asymptotically flat spacetimes. In cases where there is no dilaton involved in the solution, the wormhole can connect an AdS{sub n}xS{sup m} in one asymptotic region to a flat spacetime in the other. We obtain explicit examples for (n,m)=(4,7),(7,4),(5,5),(3,3),(3,2). These geometries correspond to field theories with UV conformal fixed points, and they undergo decompactification in the IR region. In the case of AdS{sub 3}, we compute the central charge of the corresponding conformal field theory.

  18. Dense plasma. 1

    International Nuclear Information System (INIS)

    Kulik, P.P.

    1977-01-01

    The known data on dense plasma investigation are summarized and systemized. The dense plasma is created by joint effect of high temperatures, resulting in thermal substance ionization, and high densities, resulting in ionization by pressure. The state of investigations of plasma properties has been analysed and a contribution of static and kinetic theories to equilibrium plasma investigation has been shown

  19. Atoms in dense plasmas

    Energy Technology Data Exchange (ETDEWEB)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs.

  20. Atoms in dense plasmas

    International Nuclear Information System (INIS)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs

  1. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  2. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  3. Modelling dense relational data

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    Relational modelling classically consider sparse and discrete data. Measures of influence computed pairwise between temporal sources naturally give rise to dense continuous-valued matrices, for instance p-values from Granger causality. Due to asymmetry or lack of positive definiteness they are no......Relational modelling classically consider sparse and discrete data. Measures of influence computed pairwise between temporal sources naturally give rise to dense continuous-valued matrices, for instance p-values from Granger causality. Due to asymmetry or lack of positive definiteness...... they are not naturally suited for kernel K-means. We propose a generative Bayesian model for dense matrices which generalize kernel K-means to consider off-diagonal interactions in matrices of interactions, and demonstrate its ability to detect structure on both artificial data and two real data sets....

  4. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  5. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  6. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  7. Dense Plasma Focus Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Li, Hui [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Li, Shengtai [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jungman, Gerard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hayes-Sterbenz, Anna Catherine [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-31

    The mechanisms for pinch formation in Dense Plasma Focus (DPF) devices, with the generation of high-energy ions beams and subsequent neutron production over a relatively short distance, are not fully understood. Here we report on high-fidelity 2D and 3D numerical magnetohydrodynamic (MHD) simulations using the LA-COMPASS code to study the pinch formation dynamics and its associated instabilities and neutron production.

  8. DENSE MEDIUM CYCLONE OPTIMIZATON

    Energy Technology Data Exchange (ETDEWEB)

    Gerald H. Luttrell; Chris J. Barbee; Peter J. Bethell; Chris J. Wood

    2005-06-30

    Dense medium cyclones (DMCs) are known to be efficient, high-tonnage devices suitable for upgrading particles in the 50 to 0.5 mm size range. This versatile separator, which uses centrifugal forces to enhance the separation of fine particles that cannot be upgraded in static dense medium separators, can be found in most modern coal plants and in a variety of mineral plants treating iron ore, dolomite, diamonds, potash and lead-zinc ores. Due to the high tonnage, a small increase in DMC efficiency can have a large impact on plant profitability. Unfortunately, the knowledge base required to properly design and operate DMCs has been seriously eroded during the past several decades. In an attempt to correct this problem, a set of engineering tools have been developed to allow producers to improve the efficiency of their DMC circuits. These tools include (1) low-cost density tracers that can be used by plant operators to rapidly assess DMC performance, (2) mathematical process models that can be used to predict the influence of changes in operating and design variables on DMC performance, and (3) an expert advisor system that provides plant operators with a user-friendly interface for evaluating, optimizing and trouble-shooting DMC circuits. The field data required to develop these tools was collected by conducting detailed sampling and evaluation programs at several industrial plant sites. These data were used to demonstrate the technical, economic and environmental benefits that can be realized through the application of these engineering tools.

  9. Dense ceramic articles

    International Nuclear Information System (INIS)

    Cockbain, A.G.

    1976-01-01

    A method is described for the manufacture of articles of substantially pure dense ceramic materials, for use in severe environments. Si N is very suitable for use in such environments, but suffers from the disadvantage that it is not amenable to sintering. Some disadvantages of the methods normally used for making articles of Si N are mentioned. The method described comprises mixing a powder of the substantially pure ceramic material with an additive that promotes densification, and which is capable of nuclear transmutation into a gas when exposed to radiation, and hot pressing the mixture to form a billet. The billet is then irradiated to convert the additive into a gas which is held captive in the billet, and it is then subjected to a hot forging operation, during which the captive gas escapes and an article of substantially pure dense ceramic material is forged. The method is intended primarily for use for Si N, but may be applied to other ceramic materials. The additive may be Li or Be or their compounds, to the extent of at least 5 ppm and not more than 5% by weight. Irradiation is effected by proton or neutron bombardment. (UK)

  10. Dense Axion Stars.

    Science.gov (United States)

    Braaten, Eric; Mohapatra, Abhishek; Zhang, Hong

    2016-09-16

    If the dark matter particles are axions, gravity can cause them to coalesce into axion stars, which are stable gravitationally bound systems of axions. In the previously known solutions for axion stars, gravity and the attractive force between pairs of axions are balanced by the kinetic pressure. The mass of these dilute axion stars cannot exceed a critical mass, which is about 10^{-14}M_{⊙} if the axion mass is 10^{-4}  eV. We study axion stars using a simple approximation to the effective potential of the nonrelativistic effective field theory for axions. We find a new branch of dense axion stars in which gravity is balanced by the mean-field pressure of the axion Bose-Einstein condensate. The mass on this branch ranges from about 10^{-20}M_{⊙} to about M_{⊙}. If a dilute axion star with the critical mass accretes additional axions and collapses, it could produce a bosenova, leaving a dense axion star as the remnant.

  11. Wireless Fractal Ultra-Dense Cellular Networks.

    Science.gov (United States)

    Hao, Yixue; Chen, Min; Hu, Long; Song, Jeungeun; Volk, Mojca; Humar, Iztok

    2017-04-12

    With the ever-growing number of mobile devices, there is an explosive expansion in mobile data services. This represents a challenge for the traditional cellular network architecture to cope with the massive wireless traffic generated by mobile media applications. To meet this challenge, research is currently focused on the introduction of a small cell base station (BS) due to its low transmit power consumption and flexibility of deployment. However, due to a complex deployment environment and low transmit power of small cell BSs, the coverage boundary of small cell BSs will not have a traditional regular shape. Therefore, in this paper, we discuss the coverage boundary of an ultra-dense small cell network and give its main features: aeolotropy of path loss fading and fractal coverage boundary. Simple performance analysis is given, including coverage probability and transmission rate, etc., based on stochastic geometry theory and fractal theory. Finally, we present an application scene and discuss challenges in the ultra-dense small cell network.

  12. Adding Ajax

    CERN Document Server

    Powers, Shelley

    2007-01-01

    Ajax can bring many advantages to an existing web application without forcing you to redo the whole thing. This book explains how you can add Ajax to enhance, rather than replace, the way your application works. For instance, if you have a traditional web application based on submitting a form to update a table, you can enhance it by adding the capability to update the table with changes to the form fields, without actually having to submit the form. That's just one example.Adding Ajax is for those of you more interested in extending existing applications than in creating Rich Internet Applica

  13. Hyperons in dense matter

    Energy Technology Data Exchange (ETDEWEB)

    Dapo, Haris

    2009-01-28

    The hyperon-nucleon YN low momentum effective interaction (V{sub low} {sub k}) allows for an extensive study of the behavior of hyperons in dense matter, together with an investigation of effects of the presence of hyperons on dense matter. The first step towards this goal is the construction of the matrix elements for the hyperon-nucleon low momentum potential. In order to assess the different properties of hyperons within these potentials we calculate the hyperon single-particle potentials in the Hartree-Fock approximation for all of the interactions. Their dependence on both momentum and density, is studied. The single-particle potentials are then used to determine the chemical potential of hyperons in neutron stars. For nucleonic properties, the nucleon-nucleon V{sub low} {sub k} can be used with the caveat that the calculation of the ground-state energy of symmetric nuclear matter does not correctly reproduce the properties of matter at saturation. With the nucleon-nucleon V{sub low} {sub k} one is unable to reach the densities needed for the calculation of neutron star masses. To circumvent this problem we use two approaches: in the first one, we parametrize the entire nucleonic sector. In the second one, we replace only the three-body force. The former will enable us to study neutron star masses, and the latter for studying the medium's response to the external probe. In this thesis we take the external probe to be the neutrino. By combining this parametrization with the YN V{sub low} {sub k} potential, we calculate the equation of state of equilibrated matter. Performing the calculation in the Hartree-Fock approximation at zero temperature, the concentrations of all particles are calculated. From these we can ascertain at which densities hyperons appear for a wide range of parameters. Finally, we calculate the masses of neutron stars with these concentrations. For the calculation of the medium's response to an external probe, we replace the three

  14. Dense MCA Sign

    Directory of Open Access Journals (Sweden)

    Richard J Chen

    2017-07-01

    Full Text Available History of present illness: A 77-year-old female presented to the emergency department after being found down at home, last seen normal 7 ½ hours prior to arrival. Patient had a history of hypertension, congestive heart failure, atrial fibrillation and breast cancer status post chemotherapy/radiation and lumpectomy. Physical exam showed right gaze preference, left facial droop and tongue deviation and flaccid left hemiplegia. Significant findings: A non-contrast computed tomography (CT scan showed a hyperdensity along the right middle cerebral artery (MCA consistent with acute thrombus. The red arrow highlights the hyperdensity in the annotated image. Discussion: The dense MCA sign can serve as an important tool in the diagnosis of acute stroke. It typically appears before other signs of infarct are apparent on CT imaging, and identifies an intracranial large artery occlusion and corresponding infarct, in the correct clinical setting.1 Calcifications in the same area of the brain could be mistaken for an MCA sign, but this sign carries a high specificity (95% and lower sensitivity (52% for arterial obstruction in ischemic stroke.2 Early identification allows for a wider array of treatment options for a patient with an ischemic stroke, including intra-venous or intra-arterial thrombolysis and mechanical thrombectomy. This patient was subsequently taken for mechanical thrombectomy. Mechanical thrombectomy was chosen for this patient because the resources were available, and recent clinical trials have shown that newer types of mechanical thrombectomy have a positive functional outcome in patients with an ischemic stroke from an intracranial large artery occlusion, as compared to intravenous tissue plasminogen activator (tPa alone.3,4,5,6 In facilities lacking the capability for mechanical thrombectomy, treatment considerations include rapid transfer to a facility with capability, or proceeding with intravenous tPa. After intervention, this

  15. Introductory Approach on Ad-hoc Networks and its Paradigms

    OpenAIRE

    Mehtab Singh Kahlon

    2012-01-01

    An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. With the advancement in wireless communications, more and more wireless networks appear, e.g., Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), etc. So, in this paper we have discussed Ad Hoc Networks along with it...

  16. Realtime multiprocessor for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    T. Jungeblut

    2008-05-01

    Full Text Available This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC. The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  17. Dense Crowds of Virtual Humans

    NARCIS (Netherlands)

    Stüvel, S.A.

    2016-01-01

    This thesis presents a novel crowd simulation method `Torso Crowds', aimed at the simulation of dense crowds. The method is based on the results of user studies and a motion capture experiment, which are also described in this thesis. Torso Crowds introduces a capsule shape to represent people in

  18. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  19. Building Evacuation with Mobile Devices

    OpenAIRE

    Merkel, Sabrina

    2014-01-01

    The rapidly growing world population and increasingly dense settlements demand ever-larger and more complex buildings from today's engineers. In comparison to this technological progress, a building's equipment for emergency evacuation has been hardly developed further. This work presents a concept for a building evacuation system based on mobile devices. Furthermore, various algorithms for route planning with mobile devices and for indoor localization of mobile devices are addressed.

  20. Suprathermal viscosity of dense matter

    International Nuclear Information System (INIS)

    Alford, Mark; Mahmoodifar, Simin; Schwenzer, Kai

    2010-01-01

    Motivated by the existence of unstable modes of compact stars that eventually grow large, we study the bulk viscosity of dense matter, taking into account non-linear effects arising in the large amplitude regime, where the deviation μ Δ of the chemical potentials from chemical equilibrium fulfills μ Δ > or approx. T. We find that this supra-thermal bulk viscosity can provide a potential mechanism for saturating unstable modes in compact stars since the viscosity is strongly enhanced. Our study confirms previous results on strange quark matter and shows that the suprathermal enhancement is even stronger in the case of hadronic matter. We also comment on the competition of different weak channels and the presence of suprathermal effects in various color superconducting phases of dense quark matter.

  1. Magnetic Monopoles in AdS

    International Nuclear Information System (INIS)

    Sutcliffe, Paul

    2011-01-01

    Applications to holographic theories have led to some recent interest in magnetic monopoles in four-dimensional Anti-de Sitter (AdS) spacetime. Some analytic and numerical results are discussed for monopoles in AdS, including the symmetries of minimal energy monopoles (which are often Platonic), a connection to Skyrmions, and the emergence of a hexagonal lattice in the large charge limit.

  2. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  3. Axion wormholes in AdS compactifications

    Science.gov (United States)

    Hertog, Thomas; Trigiante, Mario; Van Riet, Thomas

    2017-06-01

    We find regular axionic Euclidean wormhole solutions in Type IIB string theory compactified on {AdS}_5× {S}^5/{Z}_k . AdS/CFT enables a precise derivation of the axion content of the Euclidean theory, placing the string theory embedding of the wormholes on firm footing. This further sharpens the paradox posed by these solutions.

  4. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    In recent years, urban research has taken a ‘mobilities turn’. There has been a developing realisation that mobilities do not ‘just happen.’ Mobilities are carefully and meticulously designed, planned and staged (from above). However, they are equally importantly acted out, performed and lived...... asks: what are the physical, social, technical, and cultural conditions to the staging of contemporary urban mobilities? The theoretical framing in the Staging mobilities book is applied to four in-depth cases in the accompanying volume Designing mobilities.This book explore how places, sites...

  5. Constructing Dense Graphs with Unique Hamiltonian Cycles

    Science.gov (United States)

    Lynch, Mark A. M.

    2012-01-01

    It is not difficult to construct dense graphs containing Hamiltonian cycles, but it is difficult to generate dense graphs that are guaranteed to contain a unique Hamiltonian cycle. This article presents an algorithm for generating arbitrarily large simple graphs containing "unique" Hamiltonian cycles. These graphs can be turned into dense graphs…

  6. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  7. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  8. Ad-Coop Positioning System (ACPS)

    DEFF Research Database (Denmark)

    Frattasi, Simone; Monti, Marco

    2008-01-01

    In this paper, we propose an innovative solution for positioning determination in 4G wireless networks by introducing the Ad-Coop Positioning System (ACPS). The ACPS is supported by a hybrid cellular ad-hoc architecture, where the cellular network has a centralized control over the ad......-hoc connections among pairs of mobiles. Specifically, peer-to-peer (P2P) communications are exploited in a mesh fashion within cellular-established clusters for cooperation-aided localization purposes (from that, the word ad-coop is derived). The major contribution of this work is the design of the data fusion...... to conventional hybrid positioning techniques in cellular networks....

  9. ad hoc networks

    Directory of Open Access Journals (Sweden)

    Blanca Alicia Correa

    2007-01-01

    Full Text Available Los métodos de agrupamiento permiten que las MANET (redes móviles ad hoc presenten un mejor desempeño en cuanto a la rapidez de conexión, el enrutamiento y el manejo de la topología. En este trabajo se presenta una revisión sobre las técnicas de agrupamiento para MANET. Se introducen algunos temas preliminares que forman la base para el desarrollo de los algoritmos de agrupamiento, tales como: la topología de la red, el enrutamiento, la teoría de grafos y los algoritmos de movilidad. Adicionalmente, se describen algunas de las técnicas de agrupamiento más conocidas como Lowest-ID heuristic, Highest degree heuristic, DMAC (distributed mobility-adaptive clustering, WCA (weighted clustering algorithm, entre otros. El propósito central es ilustrar los conceptos principales respecto a las técnicas de agrupamiento en MANET.

  10. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  11. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  12. Gaugino mass in AdS space

    CERN Document Server

    Gripaios, Ben; Rattazzi, Riccardo; Redi, Michele; Scrucca, Claudio

    2009-01-01

    We study supersymmetric QED in AdS4 with massless matter. At 1-loop the ultra-violet regulator of the theory generates a contribution to the gaugino mass that is naively inconsistent with unbroken supersymmetry. We show that this effect, known in flat space as anomaly mediated supersymmetry breaking, is required to cancel an infra-red contribution arising from the boundary conditions in AdS space, which necessarily break chiral symmetry. We also discuss an analogous UV/IR cancellation that is independent of supersymmetry.

  13. A proxy for variance in dense matching over homogeneous terrain

    Science.gov (United States)

    Altena, Bas; Cockx, Liesbet; Goedemé, Toon

    2014-05-01

    Automation in photogrammetry and avionics have brought highly autonomous UAV mapping solutions on the market. These systems have great potential for geophysical research, due to their mobility and simplicity of work. Flight planning can be done on site and orientation parameters are estimated automatically. However, one major drawback is still present: if contrast is lacking, stereoscopy fails. Consequently, topographic information cannot be obtained precisely through photogrammetry for areas with low contrast. Even though more robustness is added in the estimation through multi-view geometry, a precise product is still lacking. For the greater part, interpolation is applied over these regions, where the estimation is constrained by uniqueness, its epipolar line and smoothness. Consequently, digital surface models are generated with an estimate of the topography, without holes but also without an indication of its variance. Every dense matching algorithm is based on a similarity measure. Our methodology uses this property to support the idea that if only noise is present, no correspondence can be detected. Therefore, the noise level is estimated in respect to the intensity signal of the topography (SNR) and this ratio serves as a quality indicator for the automatically generated product. To demonstrate this variance indicator, two different case studies were elaborated. The first study is situated at an open sand mine near the village of Kiezegem, Belgium. Two different UAV systems flew over the site. One system had automatic intensity regulation, and resulted in low contrast over the sandy interior of the mine. That dataset was used to identify the weak estimations of the topography and was compared with the data from the other UAV flight. In the second study a flight campaign with the X100 system was conducted along the coast near Wenduine, Belgium. The obtained images were processed through structure-from-motion software. Although the beach had a very low

  14. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  15. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  16. Mechanism Design for Mobile Geo-Location Advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  17. Breaking Dense Structures: Proving Stability of Densely Structured Hybrid Systems

    Directory of Open Access Journals (Sweden)

    Eike Möhlmann

    2015-06-01

    Full Text Available Abstraction and refinement is widely used in software development. Such techniques are valuable since they allow to handle even more complex systems. One key point is the ability to decompose a large system into subsystems, analyze those subsystems and deduce properties of the larger system. As cyber-physical systems tend to become more and more complex, such techniques become more appealing. In 2009, Oehlerking and Theel presented a (de-composition technique for hybrid systems. This technique is graph-based and constructs a Lyapunov function for hybrid systems having a complex discrete state space. The technique consists of (1 decomposing the underlying graph of the hybrid system into subgraphs, (2 computing multiple local Lyapunov functions for the subgraphs, and finally (3 composing the local Lyapunov functions into a piecewise Lyapunov function. A Lyapunov function can serve multiple purposes, e.g., it certifies stability or termination of a system or allows to construct invariant sets, which in turn may be used to certify safety and security. In this paper, we propose an improvement to the decomposing technique, which relaxes the graph structure before applying the decomposition technique. Our relaxation significantly reduces the connectivity of the graph by exploiting super-dense switching. The relaxation makes the decomposition technique more efficient on one hand and on the other allows to decompose a wider range of graph structures.

  18. Dense module enumeration in biological networks

    International Nuclear Information System (INIS)

    Tsuda, Koji; Georgii, Elisabeth

    2009-01-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  19. Finding dense locations in indoor tracking data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2014-01-01

    Finding the dense locations in large indoor spaces is very useful for getting overloaded locations, security, crowd management, indoor navigation, and guidance. Indoor tracking data can be very large and are not readily available for finding dense locations. This paper presents a graph-based model...... of the mapping table, along with associated construction, query processing, and pruning techniques. The DLT-Index supports very efficient aggregate point queries, interval queries, and dense location queries. A comprehensive experimental study with real data shows that the proposed techniques can efficiently...... find dense locations in large amounts of indoor tracking data....

  20. AdS solutions through transgression

    Energy Technology Data Exchange (ETDEWEB)

    Donos, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Theory Group; Gauntlett, J.P. [Imperial College, London (United Kingdom). Blackett Lab.]|[Imperial College, London (United Kingdom). The Institute for Mathematical Sciences; Kim, Nakwoo [Kyung Hee Univ., Seoul (Korea). Dept. of Physics and Research Inst. of Basic Science

    2008-07-15

    We present new classes of explicit supersymmetric AdS{sub 3} solutions of type IIB supergravity with non-vanishing five-form flux and AdS{sub 2} solutions of D=11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS{sub 3} solutions of type IIB supergravity and AdS{sub 2} solutions of D=11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or ''transgression'' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS3 solutions with only the NS fields being non-trivial. (orig.)

  1. Filter-Dense Multicolor Microscopy.

    Directory of Open Access Journals (Sweden)

    Siavash Kijani

    Full Text Available Immunofluorescence microscopy is a unique method to reveal the spatial location of proteins in tissues and cells. By combining antibodies that are labeled with different fluorochromes, the location of several proteins can simultaneously be visualized in one sample. However, because of the risk of bleed-through signals between fluorochromes, standard multicolor microscopy is restricted to a maximum of four fluorescence channels, including one for nuclei staining. This is not always enough to address common scientific questions. In particular, the use of a rapidly increasing number of marker proteins to classify functionally distinct cell populations and diseased tissues emphasizes the need for more complex multistainings. Hence, multicolor microscopy should ideally offer more channels to meet the current needs in biomedical science. Here we present an enhanced multi-fluorescence setup, which we call Filter-Dense Multicolor Microscopy (FDMM. FDMM is based on condensed filter sets that are more specific for each fluorochrome and allow a more economic use of the light spectrum. FDMM allows at least six independent fluorescence channels and can be applied to any standard fluorescence microscope without changing any operative procedures for the user. In the present study, we demonstrate an FDMM setup of six channels that includes the most commonly used fluorochromes for histology. We show that the FDMM setup is specific and robust, and we apply the technique on typical biological questions that require more than four fluorescence microscope channels.

  2. Dense sheet Z-pinches

    International Nuclear Information System (INIS)

    Tetsu, Miyamoto

    1999-01-01

    The steady state and quasi-steady processes of infinite- and finite-width sheet z-pinches are studied. The relations corresponding to the Bennett relation and Pease-Braginskii current of cylindrical fiber z-pinches depend on a geometrical factor in the sheet z-pinches. The finite-width sheet z-pinch is approximated by a segment of infinite-width sheet z-pinch, if it is wide enough, and corresponds to a number of (width/thickness) times fiber z-pinch plasmas of the diameter that equals the sheet thickness. If the sheet current equals this number times the fiber current, the plasma created in the sheet z-pinches is as dense as in the fiber z-pinches. The total energy of plasma and magnetic field per unit mass is approximately equal in both pinches. Quasi-static transient processes are different in several aspects from the fiber z-pinch. No radiation collapse occurs in the sheet z-pinch. The stability is improved in the sheet z-pinches. The fusion criterions and the experimental arrangements to produce the sheet z-pinches are also discussed. (author)

  3. DAWN: Dynamic Ad-hoc Wireless Network

    Science.gov (United States)

    2016-06-19

    Wireless Network 1 Introduction The network-centric battlefield includes sensors, troop carriers, unmanned air vehicle (UAV), aircraft, smart ...Bellman Control Heritage Award. • Honorary Doctorate at Technical University of Crete. • Best paper award at 2008 IEEE International Conference on Mobile Ad-hoc and Sensor Systems.

  4. Predicting AD conversion

    DEFF Research Database (Denmark)

    Liu, Yawu; Mattila, Jussi; Ruiz, Miguel �ngel Mu�oz

    2013-01-01

    To compare the accuracies of predicting AD conversion by using a decision support system (PredictAD tool) and current research criteria of prodromal AD as identified by combinations of episodic memory impairment of hippocampal type and visual assessment of medial temporal lobe atrophy (MTA) on MRI...

  5. Dense suspensions: force response and jamming

    NARCIS (Netherlands)

    von Kann, S.

    2012-01-01

    The response of dense suspensions to an external force was studied using two different experiments. In the first experiment, objects were settled in a deep bath of a dense cornstarch suspension. This is the only suspension to result in two unexpected phenomena: Velocity oscillations in the bulk, and

  6. AdS null deformations with inhomogeneities

    Science.gov (United States)

    Narayan, K.

    2012-12-01

    We study AdS×X null deformations arising as near horizon limits of D3-brane analogs of inhomogeneous plane waves. Restricting to normalizable deformations for the AdS5 case, these generically correspond in the dual field theory to super Yang-Mills states with light cone momentum density T++ varying spatially, the homogeneous case studied in [K. Narayan, arXiv:1202.5935] corresponding to uniform T++. All of these preserve some supersymmetry. Generically these inhomogeneous solutions exhibit analogs of horizons in the interior where a timelike Killing vector becomes null. From the point of view of x+-dimensional reduction, the circle pinches off on these horizon loci in the interior. We discuss similar inhomogeneous solutions with asymptotically Lifshitz boundary conditions, as well as aspects of Lifshitz singularities in string constructions involving anti-de Sitter null deformations. We also briefly discuss holographic entanglement entropy for some of these.

  7. Dense image correspondences for computer vision

    CERN Document Server

    Liu, Ce

    2016-01-01

    This book describes the fundamental building-block of many new computer vision systems: dense and robust correspondence estimation. Dense correspondence estimation techniques are now successfully being used to solve a wide range of computer vision problems, very different from the traditional applications such techniques were originally developed to solve. This book introduces the techniques used for establishing correspondences between challenging image pairs, the novel features used to make these techniques robust, and the many problems dense correspondences are now being used to solve. The book provides information to anyone attempting to utilize dense correspondences in order to solve new or existing computer vision problems. The editors describe how to solve many computer vision problems by using dense correspondence estimation. Finally, it surveys resources, code, and data necessary for expediting the development of effective correspondence-based computer vision systems.   ·         Provides i...

  8. Adding more value to added-value

    DEFF Research Database (Denmark)

    Marian, Livia

    Recent studies reveal that consumers respond favourably to “organic plus” products with additional ethical attributes. The aim of the current study is to explore whether consumers would notice and value further improvements in the animal welfare standards than those imposed by the organic...... it is probably valued less than expected. The added attributes need to be thoroughly considered when developing and marketing “organic plus” products, as their effect on other product characteristics (e.g. high prices) can detract from their added value....

  9. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  10. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers. Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...such as interstitial or video advertisements , but this is not an inherent limitation. Ad- Mob, Millennial Media, and Google AdSense make up 69% of ad...The first sample application uses the AdDroid API to fetch AdMob advertisements . The second uses the Ad- Droid API to fetch Millennial Media

  11. Dense Matter Physics with Rare Isotopes

    Science.gov (United States)

    Kim, Youngman

    Terrestrial dense matter from heavy ion collisions with rare isotope beams offers much opportunity to study compact stars, exotic nuclei and also many facets of QCD phase diagram with non-zero isospin asymmetry. We first review some recent results with a parity doublet model in dense matter and in nuclei to discuss the origin of nucleon mass other than that from chiral symmetry breaking. To study dense matter created in heavy ion collisions, a transport model is almost the only available tool on the market. We present a brief summary of a new transport code, DaeJeon Boltzmann-Uehling-Uhlenbeck.

  12. Astrophysics implication of dense matter phase diagram

    International Nuclear Information System (INIS)

    Sedrakian, A.

    2010-01-01

    I will discuss the ways that astrophysics can help us to understand the phase diagram of dense matter. The examples will include gravitational wave from compact stars, cooling of compact stars, and effects on vorticity on compact star dynamics. (author)

  13. Mobile Learning Using Mobile Phones

    Science.gov (United States)

    Vicente, Paula

    2013-01-01

    The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…

  14. Kinetic chemistry of dense interstellar clouds

    International Nuclear Information System (INIS)

    Graedel, T.E.; Langer, W.D.; Frerking, M.A.

    1982-01-01

    A detailed model of the time-dependent chemistry of dense interstellar clouds has been developed to study the dominant chemical processes in carbon and oxygen isotope fractionation, formation of nitrogen-containing molecules, evolution of product molecules as a function of cloud density and temperature, and other topics of interest. The full computation involves 328 individual reactions (expanded to 1067 to study carbon and oxygen isotope chemistry); photodegradation processes are unimportant in these dense clouds and are excluded

  15. METHOD OF PRODUCING DENSE CONSOLIDATED METALLIC REGULUS

    Science.gov (United States)

    Magel, T.T.

    1959-08-11

    A methcd is presented for reducing dense metal compositions while simultaneously separating impurities from the reduced dense metal and casting the reduced parified dense metal, such as uranium, into well consolidated metal ingots. The reduction is accomplished by heating the dense metallic salt in the presence of a reducing agent, such as an alkali metal or alkaline earth metal in a bomb type reacting chamber, while applying centrifugal force on the reacting materials. Separation of the metal from the impurities is accomplished essentially by the incorporation of a constricted passageway at the vertex of a conical reacting chamber which is in direct communication with a collecting chamber. When a centrifugal force is applled to the molten metal and slag from the reduction in a direction collinear with the axis of the constricted passage, the dense molten metal is forced therethrough while the less dense slag is retained within the reaction chamber, resulting in a simultaneous separation of the reduced molten metal from the slag and a compacting of the reduced metal in a homogeneous mass.

  16. AdS2 holographic dictionary

    International Nuclear Information System (INIS)

    Cvetič, Mirjam; Papadimitriou, Ioannis

    2016-01-01

    We construct the holographic dictionary for both running and constant dilaton solutions of the two dimensional Einstein-Maxwell-Dilaton theory that is obtained by a circle reduction from Einstein-Hilbert gravity with negative cosmological constant in three dimensions. This specific model ensures that the dual theory has a well defined ultraviolet completion in terms of a two dimensional conformal field theory, but our results apply qualitatively to a wider class of two dimensional dilaton gravity theories. For each type of solutions we perform holographic renormalization, compute the exact renormalized one-point functions in the presence of arbitrary sources, and derive the asymptotic symmetries and the corresponding conserved charges. In both cases we find that the scalar operator dual to the dilaton plays a crucial role in the description of the dynamics. Its source gives rise to a matter conformal anomaly for the running dilaton solutions, while its expectation value is the only non trivial observable for constant dilaton solutions. The role of this operator has been largely overlooked in the literature. We further show that the only non trivial conserved charges for running dilaton solutions are the mass and the electric charge, while for constant dilaton solutions only the electric charge is non zero. However, by uplifting the solutions to three dimensions we show that constant dilaton solutions can support non trivial extended symmetry algebras, including the one found by Compère, Song and Strominger http://dx.doi.org/10.1007/JHEP05(2013)152, in agreement with the results of Castro and Song http://arxiv.org/abs/1411.1948. Finally, we demonstrate that any solution of this specific dilaton gravity model can be uplifted to a family of asymptotically AdS 2 ×S 2 or conformally AdS 2 ×S 2 solutions of the STU model in four dimensions, including non extremal black holes. The four dimensional solutions obtained by uplifting the running dilaton solutions coincide

  17. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  18. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  19. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  20. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe

    2016-07-26

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations\\' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users\\' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  1. AdS3: the NHEK generation

    International Nuclear Information System (INIS)

    Bena, Iosif; Heurtier, Lucien; Puhm, Andrea

    2016-01-01

    It was argued in http://dx.doi.org/10.1007/JHEP03(2013)028 that the five-dimensional near-horizon extremal Kerr (NHEK) geometry can be embedded in String Theory as the infrared region of an infinite family of non-supersymmetric geometries that have D1, D5, momentum and KK monopole charges. We show that there exists a method to embed these geometries into asymptotically-AdS 3 ×S 3 /ℤ N solutions, and hence to obtain infinite families of flows whose infrared is NHEK. This indicates that the CFT dual to the NHEK geometry is the IR fixed point of a Renormalization Group flow from a known local UV CFT and opens the door to its explicit construction.

  2. Mobile Election

    OpenAIRE

    Long, Elena; Lovitskii, Vladimir; Thrasher, Michael; Traynor, David

    2009-01-01

    Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (ave...

  3. Mobile Advertising

    OpenAIRE

    Alamuri, Lavanya

    2009-01-01

    The aim of this project was to get an understanding of how companies adopt mobile as an advertising medium. The literature review aided in framing a draft of the factors that affect mobile advertising adoption and possible forms of mobile advertising. Considering the scope of the thesis work, branding strategy, service costs, personalization and privacy and platform were considered to be the factors that could affect the mobile advertising adoption. A few possible forms on mobile device we...

  4. Constitutive law of dense granular matter

    International Nuclear Information System (INIS)

    Hatano, Takahiro

    2010-01-01

    The frictional properties of dense granular matter under steady shear flow are investigated using numerical simulation. Shear flow tends to localize near the driving boundary unless the coefficient of restitution is close to zero and the driving velocity is small. The bulk friction coefficient is independent of shear rate in dense and slow flow, whereas it is an increasing function of shear rate in rapid flow. The coefficient of restitution affects the friction coefficient only in such rapid flow. Contrastingly, in dense and slow regime, the friction coefficient is independent of the coefficient of restitution and mainly determined by the elementary friction coefficient and the rotation of grains. It is found that the mismatch between the vorticity of flow and the angular frequency of grains plays a key role to the frictional properties of sheared granular matter.

  5. Nucleon structure and properties of dense matter

    International Nuclear Information System (INIS)

    Kutschera, M.; Pethick, C.J.; Illinois Univ., Urbana, IL

    1988-01-01

    We consider the properties of dense matter in a framework of the Skyrme soliton model and the chiral bag model. The influence of the nucleon structure on the equation of state of dense matter is emphasized. We find that in both models the energy per unit volume is proportional to n 4/3 , n being the baryon number density. We discuss the properties of neutron stars with a derived equation of state. The role of many-body effects is investigated. The effect of including higher order terms in the chiral lagrangian is examined. The phase transition to quark matter is studied. 29 refs., 6 figs. (author)

  6. Energy Assessment of Automated Mobility Districts

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yuche [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-08-03

    Automated vehicles (AVs) are increasingly being discussed as the basis for on-demand mobility services, introducing a new paradigm in which a fleet of AVs displace private automobiles for day-to-day travel in dense activity districts. This project examines such a concept to displace privately owned automobiles within a region containing dense activity generators (jobs, retail, entertainment, etc.), referred to as an automated mobility district (AMDs). The project reviews several such districts including airport, college campuses, business parks, downtown urban cores, and military bases, with examples of previous attempts to meet the mobility needs apart from private automobiles, some with automated technology and others with more traditional transit based solutions. The issues and benefits of AMDs are framed within the perspective of intra-district, inter-district, and border issues, and the requirements for a modeling framework are identified to adequately reflect the breadth of mobility, energy, and emissions impact anticipated with AMDs.

  7. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    that of ‘mobilities design’. The book revolves around the following research question: How are design decisions and interventions staging mobilities? It builds upon the Staging Mobilities model (Jensen 2013) in an explorative inquiry into the problems and potentials of the design of mobilities. The exchange value...... between mobilities and design research is twofold. To mobilities research this means getting closer to the ‘material’, and to engage in the creative, explorative and experimental approaches of the design world which offer new potentials for innovative research. Design research, on the other hand, might...... enter into a fruitful relationship with mobilities research, offering a relational and mobile design thinking and a valuable base for a reflective design practice around the ubiquitous structures, spaces and systems of mobilities....

  8. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...... designs, but also how the situated and embodied mobile everyday life practices are staged ‘from below’ in concrete acts of choice concerning modes of mobilities, ways of moving and interacting. The ‘staging mobilites’ framework opens up to an understanding of the meaning of ‘mobilities design...

  9. Correlation ion mobility spectroscopy

    Science.gov (United States)

    Pfeifer, Kent B [Los Lunas, NM; Rohde, Steven B [Corrales, NM

    2008-08-26

    Correlation ion mobility spectrometry (CIMS) uses gating modulation and correlation signal processing to improve IMS instrument performance. Closely spaced ion peaks can be resolved by adding discriminating codes to the gate and matched filtering for the received ion current signal, thereby improving sensitivity and resolution of an ion mobility spectrometer. CIMS can be used to improve the signal-to-noise ratio even for transient chemical samples. CIMS is especially advantageous for small geometry IMS drift tubes that can otherwise have poor resolution due to their small size.

  10. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  11. Dense Alternating Sign Matrices and Extensions

    Czech Academy of Sciences Publication Activity Database

    Fiedler, Miroslav; Hall, F.J.; Stroev, M.

    2014-01-01

    Roč. 444, 1 March (2014), s. 219-226 ISSN 0024-3795 Institutional support: RVO:67985807 Keywords : alternating sign matrix * dense matrix * totally unimodular matrix * combined matrix * generalized complementary basic matrix Subject RIV: BA - General Mathematics Impact factor: 0.939, year: 2014

  12. Precision Neuroscience: Dense Sampling of Individual Brains.

    Science.gov (United States)

    Poldrack, Russell A

    2017-08-16

    In this issue, Gordon et al. (2017) use dense sampling of resting and task fMRI within individuals to demonstrate that patterns of correlation in resting fMRI are closely aligned with functional architecture as identified using task fMRI. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Eculizumab in Pediatric Dense Deposit Disease

    NARCIS (Netherlands)

    Oosterveld, Michiel J. S.; Garrelfs, Mark R.; Hoppe, Bernd; Florquin, Sandrine; Roelofs, Joris J. T. H.; van den Heuvel, L. P.; Amann, Kerstin; Davin, Jean-Claude; Bouts, Antonia H. M.; Schriemer, Pietrik J.; Groothoff, Jaap W.

    2015-01-01

    Dense deposit disease (DDD), a subtype of C3 glomerulopathy, is a rare disease affecting mostly children. Treatment options are limited. Debate exists whether eculizumab, a monoclonal antibody against complement factor C5, is effective in DDD. Reported data are scarce, especially in children. The

  14. Preparation of a dense, polycrystalline ceramic structure

    Science.gov (United States)

    Cooley, Jason; Chen, Ching-Fong; Alexander, David

    2010-12-07

    Ceramic nanopowder was sealed inside a metal container under a vacuum. The sealed evacuated container was forced through a severe deformation channel at an elevated temperature below the melting point of the ceramic nanopowder. The result was a dense nanocrystalline ceramic structure inside the metal container.

  15. Fluidized bed dry dense medium coal beneficiation

    CSIR Research Space (South Africa)

    North, Brian C

    2017-10-01

    Full Text Available Coal beneficiation in South Africa is currently conducted mostly on a wet “float and sink” basis. This process is heavily water intensive and also potentially polluting. Dry beneficiation alternatives are being sought. The alternative of dry dense...

  16. A Note on Strongly Dense Matrices

    Czech Academy of Sciences Publication Activity Database

    Fiedler, Miroslav; Hall, F.J.

    2015-01-01

    Roč. 1, č. 4 (2015), s. 721-730 ISSN 2199-675X Institutional support: RVO:67985807 Keywords : strongly dense matrix * Boolean matrix * nonnegative matrix * idempotent matrix * intrinsic product * generalized complementary basic matrix Subject RIV: BA - General Mathematics

  17. Mobile economy

    OpenAIRE

    Pousttchi, Key

    2004-01-01

    Mobile economy : Transaktionen, Prozesse, Anwendungen und Dienste ; 4. Workshop Mobile Commerce, 02.-03. Februar 2004, Univ. Augsburg / K. Turowski ... (Hrsg.). - Bonn : Ges. für Informatik, 2004. - 189 S. : Ill., graph. Darst. - (GI-Edition : Proceedings ; 42)

  18. Mobile marketing

    OpenAIRE

    KLEČKOVÁ, Zuzana

    2013-01-01

    The main aim of this thesis was to provide a comprehensive overview of the mobile marketing and analyze selected campaigns of Czech mobile marketing in comparison to world successful campaigns. The research contained studying of available literature about the theme to gain general knowledge about the issue. The theoretical part of the thesis contains predominantly various definitions of mobile marketing and its tools, advantages of these tools and some information about Mobile Marketing Assoc...

  19. Mobile marketing

    OpenAIRE

    Gause, Matěj

    2012-01-01

    The goal of bachelor's thesis on the theme "Mobile marketing" is to outline its development and why is this new phenomen so important for all modern companies around the world. The work is not about simple description of mobile marketing media but it vividly informs about the latest trends and news from the world of mobile apps and games. It presents the most successful mobile apps which registered more than billion downloads and from their unique characteristics it unveils great potential of...

  20. Globally regular instability of AdS_3

    OpenAIRE

    Bizon, P.; Jałmużna, J.

    2013-01-01

    We consider three-dimensional AdS gravity minimally coupled to a massless scalar field and study numerically the evolution of small smooth circularly symmetric perturbations of the $AdS_3$ spacetime. As in higher dimensions, for a large class of perturbations, we observe a turbulent cascade of energy to high frequencies which entails instability of $AdS_3$. However, in contrast to higher dimensions, the cascade cannot be terminated by black hole formation because small perturbations have ener...

  1. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Within the so-called ‘mobilities turn’ (Adey 2010; Cresswell 2006; Urry 2007) much research has taken place during the last decade bringing mobilities into the centre of sociological analysis. However, the materiality and spatiality of artefacts, infrastructures, and sites hosting mobilities are ......: motorway ecologies, bicycle systems design, urban shopping malls and a train transit hub....

  2. Mobilities Design

    DEFF Research Database (Denmark)

    Lanng, Ditte Bendix; Wind, Simon; Jensen, Ole B.

    2017-01-01

    utilitarian transport from A to B; they constitute a rich societal phenomenon with, for example, social, cultural, sensorial, emotional, and material dimensions. The article proposes two fruitful links between the mobilities turn and the designerly examination of mobilities spaces. First, the mobilities turn...

  3. Subversive Mobilities

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2013-01-01

    The article approaches mobility through a cultural history of urban conflict. Using a case of “The Copenhagen Trouble,“ a series of riots in the Danish capital around 1900, a space of subversive mobilities is delineated. These turn-of-the-century riots points to a new pattern of mobile gathering...

  4. Intensive mobilities

    DEFF Research Database (Denmark)

    Vannini, Phillip; Bissell, David; Jensen, Ole B.

    which relate to transport, housing and employment. Yet we argue that the experiential dimensions of long distance mobilities have not received the attention that they deserve within geographical research on mobilities. This paper combines ideas from mobilities research and contemporary social theory...

  5. Nonlinear realization of supersymmetric AdS space isometries

    International Nuclear Information System (INIS)

    Clark, T. E.; Love, S. T.

    2006-01-01

    The isometries of AdS 5 space and supersymmetric AdS 5 xS 1 space are nonlinearly realized on four-dimensional Minkowski space. The resultant effective actions in terms of the Nambu-Goldstone modes are constructed. The dilatonic mode governing the motion of the Minkowski space probe brane into the covolume of supersymmetric AdS 5 space is found to be unstable and the bulk of the AdS 5 space is unable to sustain the brane. No such instability appears in the nonsupersymmetric case

  6. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  7. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  8. Mobile Semiotics

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2013-01-01

    This chapter aims to understand the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The chapter explores the potentials of semiotics and its relationship to the new mobilities literature. What takes place...... is a ‘mobile sense making’ where signs and materially situated meanings connect to the moving human body and thus create particular challenges and complexities of making sense of the world. The chapter includes notions of mobility systems and socio-technical networks in order to show how a ‘semiotic layer’ may...... work to afford or restrict mobile practices....

  9. Ads in Indonesia

    Directory of Open Access Journals (Sweden)

    Wulan Roro Retno

    2017-01-01

    Full Text Available Cosmetics industry created the beauty myth for women through advertising. A cosmetic ad in Indonesia has spread a new concept of white skin: East Asia beauty myth. The white concept of Asia white skin basically derived from colonial legacy. The purpose of the research was analyzing the beauty myth in Indonesia ads using postcolonial perspective. The principal result brought the discourse analysis and postcolonial perspective a new insight in communication research. Particularly on media and cultural studies. Major conclusions showed that the beauty myth since the Dutch colonial period never been change. The main concept is always in colonialism’s idea: “white is better”. The West is better than the East.

  10. Management job ads

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2014-01-01

    The article asks whether it is not the responsibility of corporations to address the issue of women being underrepresented in Danish management jobs. In other words, it is argued that corporations should be encouraged to engage more actively in the recruitment of both men and women for management...... jobs by discursively constructing job ads that appeal to both sexes. This argument is part of the broader field of corporate social responsibility, corporate citizenship, and stakeholder management, which involves discussions of the obligations of corporations to acknowledge and mitigate...... the increasingly widespread impact that their activities have on communities and social structures. The article emphasises the need for more active engagement on the part of corporations by analysing the discursive construction of preferred candidates in a small sample of Danish management job ads. By means...

  11. Philosophia ad bellum

    Directory of Open Access Journals (Sweden)

    Yu. O. Loboda

    2014-06-01

    Full Text Available In the paper «Philosophia ad bellum» is being realized an attempt to classify philosophic approaches to the study of phenomenon of war by the analogy with the structure of «Just war theory» – 1. Philosophia ad bellum – «philosophy for war», where are investigated ways of using of philosophic methods of cognition in applied military sciences; 2. Philosophia supra bello – «philosophy above war», which investigates world­view, historic­philosophic, existential, logic­epistemological aspects of war; 3. Philosophia contra belli – «philosophy against war», where research of the essence of war gets its logical conclusion in grounding of the absurdity of thinking schemes which justify war as an act of violence. In the article was made historic­philosophic overview of the part «Philosophia ad bellum», where were showed tangent questions, which are considered by philosophic logic and theory of strategic intelligence. It was stated, that specialists if military intelligence admit the important role of researches in logic and theory of cognition in their professional work; were defined basic questions, which have the most essential interest for military professionals. There were analyzed ways of using of philosophic methods in developing military strategies, was made a conclusion that philosophy can be a basis of strategic failures and victories as well.

  12. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2014-01-01

    Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation...... and the mobile user situation. The analysis is based on an empirical survey involving ten medical doctors and a monolingual app designed to support cognitive lexicographic functions, cf. (Tarp 2006:61-64). In test A the doctors looked up five medical terms while sitting down at a desk and in test B the doctors......:565), and it was found that the information access success of the mobile user situation is lower than that of the stationary user situation, primarily because users navigate in the physical world and in the mobile device at the same time. The data also suggest that the mobile user situation is not fully compatible...

  13. WARM EXTENDED DENSE GAS AT THE HEART OF A COLD COLLAPSING DENSE CORE

    International Nuclear Information System (INIS)

    Shinnaga, Hiroko; Phillips, Thomas G.; Furuya, Ray S.; Kitamura, Yoshimi

    2009-01-01

    In order to investigate when and how the birth of a protostellar core occurs, we made survey observations of four well-studied dense cores in the Taurus molecular cloud using CO transitions in submillimeter bands. We report here the detection of unexpectedly warm (∼30-70 K), extended (radius of ∼2400 AU), dense (a few times 10 5 cm -3 ) gas at the heart of one of the dense cores, L1521F (MC27), within the cold dynamically collapsing components. We argue that the detected warm, extended, dense gas may originate from shock regions caused by collisions between the dynamically collapsing components and outflowing/rotating components within the dense core. We propose a new stage of star formation, 'warm-in-cold core stage (WICCS)', i.e., the cold collapsing envelope encases the warm extended dense gas at the center due to the formation of a protostellar core. WICCS would constitute a missing link in evolution between a cold quiescent starless core and a young protostar in class 0 stage that has a large-scale bipolar outflow.

  14. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  15. Thermal and nonthermal motions in dense cores

    Energy Technology Data Exchange (ETDEWEB)

    Myers, P.C.; Ladd, E.F.; Fuller, G.A. (Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (USA))

    1991-05-01

    Kinetic temperature and NH3 line width data for 61 dense cores with embedded IRAS sources show that the nonthermal component of the core motions increases with source luminosity more rapidly than does the thermal component. The trends cross in the luminosity range 7-22 solar luminosities, which divides the regimes of thermal and nonthermal motions. Maps of line widths in dense cores and their surrounding clouds indicate that nonthermal line broadening is due not only to stellar winds, but also to gas properties independent of the star. The 'initial conditions' for motions in cores forming lower-mass stars are primarily thermal, while those in cores forming higher mass stars are probably primarily nonthermal. These differences in core properties may arise from differences in the relative proportion of magnetic and gravitational energy in the condensing core. 30 refs.

  16. Topological Surface States in Dense Solid Hydrogen.

    Science.gov (United States)

    Naumov, Ivan I; Hemley, Russell J

    2016-11-11

    Metallization of dense hydrogen and associated possible high-temperature superconductivity represents one of the key problems of physics. Recent theoretical studies indicate that before becoming a good metal, compressed solid hydrogen passes through a semimetallic stage. We show that such semimetallic phases predicted to be the most stable at multimegabar (∼300  GPa) pressures are not conventional semimetals: they exhibit topological metallic surface states inside the bulk "direct" gap in the two-dimensional surface Brillouin zone; that is, metallic surfaces may appear even when the bulk of the material remains insulating. Examples include hydrogen in the Cmca-12 and Cmca-4 structures; Pbcn hydrogen also has metallic surface states but they are of a nontopological nature. The results provide predictions for future measurements, including probes of possible surface superconductivity in dense hydrogen.

  17. The kinetic chemistry of dense interstellar clouds

    Science.gov (United States)

    Graedel, T. E.; Langer, W. D.; Frerking, M. A.

    1982-01-01

    A model of the time-dependent chemistry of dense interstellar clouds is formulated to study the dominant chemical processes in carbon and oxygen isotope fractionation, the formation of nitrogen-containing molecules, and the evolution of product molecules as a function of cloud density and temperature. The abundances of the dominant isotopes of the carbon- and oxygen-bearing molecules are calculated. The chemical abundances are found to be quite sensitive to electron concentration since the electron concentration determines the ratio of H3(+) to He(+), and the electron density is strongly influenced by the metals abundance. For typical metal abundances and for H2 cloud density not less than 10,000 molecules/cu cm, nearly all carbon exists as CO at late cloud ages. At high cloud density, many aspects of the chemistry are strongly time dependent. Finally, model calculations agree well with abundances deduced from observations of molecular line emission in cold dense clouds.

  18. Deterministic dense coding with partially entangled states

    Science.gov (United States)

    Mozes, Shay; Oppenheim, Jonathan; Reznik, Benni

    2005-01-01

    The utilization of a d -level partially entangled state, shared by two parties wishing to communicate classical information without errors over a noiseless quantum channel, is discussed. We analytically construct deterministic dense coding schemes for certain classes of nonmaximally entangled states, and numerically obtain schemes in the general case. We study the dependency of the maximal alphabet size of such schemes on the partially entangled state shared by the two parties. Surprisingly, for d>2 it is possible to have deterministic dense coding with less than one ebit. In this case the number of alphabet letters that can be communicated by a single particle is between d and 2d . In general, we numerically find that the maximal alphabet size is any integer in the range [d,d2] with the possible exception of d2-1 . We also find that states with less entanglement can have a greater deterministic communication capacity than other more entangled states.

  19. Highly Dense Isolated Metal Atom Catalytic Sites

    DEFF Research Database (Denmark)

    Chen, Yaxin; Kasama, Takeshi; Huang, Zhiwei

    2015-01-01

    -ray diffraction. A combination of electron microscopy images with X-ray absorption spectra demonstrated that the silver atoms were anchored on five-fold oxygen-terminated cavities on the surface of the support to form highly dense isolated metal active sites, leading to excellent reactivity in catalytic oxidation......Atomically dispersed noble-metal catalysts with highly dense active sites are promising materials with which to maximise metal efficiency and to enhance catalytic performance; however, their fabrication remains challenging because metal atoms are prone to sintering, especially at a high metal...... loading. A dynamic process of formation of isolated metal atom catalytic sites on the surface of the support, which was achieved starting from silver nanoparticles by using a thermal surface-mediated diffusion method, was observed directly by using in situ electron microscopy and in situ synchrotron X...

  20. Dense Output for Strong Stability Preserving Runge–Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2016-12-10

    We investigate dense output formulae (also known as continuous extensions) for strong stability preserving (SSP) Runge–Kutta methods. We require that the dense output formula also possess the SSP property, ideally under the same step-size restriction as the method itself. A general recipe for first-order SSP dense output formulae for SSP methods is given, and second-order dense output formulae for several optimal SSP methods are developed. It is shown that SSP dense output formulae of order three and higher do not exist, and that in any method possessing a second-order SSP dense output, the coefficient matrix A has a zero row.

  1. Accelerating Dense Linear Algebra on the GPU

    DEFF Research Database (Denmark)

    Sørensen, Hans Henrik Brandenborg

    and matrix-vector operations on GPUs. Such operations form the backbone of level 1 and level 2 routines in the Basic Linear Algebra Subroutines (BLAS) library and are therefore of great importance in many scientific applications. The target hardware is the most recent NVIDIA Tesla 20-series (Fermi...... architecture). Most of the techniques I discuss for accelerating dense linear algebra are applicable to memory-bound GPU algorithms in general....

  2. Particle identification system based on dense aerogel

    Energy Technology Data Exchange (ETDEWEB)

    Barnyakov, A.Yu. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Barnyakov, M.Yu. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State Technical University, 20, Karl Marx prospect, Novosibirsk, 630092 (Russian Federation); Beloborodov, K.I., E-mail: K.I.Beloborodov@inp.nsk.su [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Bobrovnikov, V.S.; Buzykaev, A.R. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Danilyuk, A.F. [Boreskov Institute of Catalysis, 5, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Golubev, V.B. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Gulevich, V.V. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Kononov, S.A.; Kravchenko, E.A. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Onuchin, A.P.; Martin, K.A. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State Technical University, 20, Karl Marx prospect, Novosibirsk, 630092 (Russian Federation); Serednyakov, S.I. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); and others

    2013-12-21

    A threshold Cherenkov counter based on dense aerogel with refraction index n=1.13 is described. This counter is used for kaon identification at momenta below 1 GeV/c in the SND detector, which takes data at the VEPP-2000 e{sup +}e{sup −} collider. The results of measurements of the counter efficiency using electrons, muons, pions, and kaons produced in e{sup +}e{sup −} annihilation are presented.

  3. Densely Aligned Graphene Nanoribbon Arrays and Bandgap Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Su, Justin [Stanford Univ., CA (United States); Chen, Changxin [Stanford Univ., CA (United States); Gong, Ming [Stanford Univ., CA (United States); Kenney, Michael [Stanford Univ., CA (United States)

    2017-01-04

    Graphene has attracted great interest for future electronics due to its high mobility and high thermal conductivity. However, a two-dimensional graphene sheet behaves like a metal, lacking a bandgap needed for the key devices components such as field effect transistors (FETs) in digital electronics. It has been shown that, partly due to quantum confinement, graphene nanoribbons (GNRs) with ~2 nm width can open up sufficient bandgaps and evolve into semiconductors to exhibit high on/off ratios useful for FETs. However, a challenging problem has been that, such ultra-narrow GNRs (~2 nm) are difficult to fabricate, especially for GNRs with smooth edges throughout the ribbon length. Despite high on/off ratios, these GNRs show very low mobility and low on-state conductance due to dominant scattering effects by imperfections and disorders at the edges. Wider GNRs (>5 nm) show higher mobility, higher conductance but smaller bandgaps and low on/off ratios undesirable for FET applications. It is highly desirable to open up bandgaps in graphene or increase the bandgaps in wide GNRs to afford graphene based semiconductors for high performance (high on-state current and high on/off ratio) electronics. Large scale ordering and dense packing of such GNRs in parallel are also needed for device integration but have also been challenging thus far. It has been shown theoretically that uniaxial strains can be applied to a GNR to engineer its bandgap. The underlying physics is that under uniaxial strain, the Dirac point moves due to stretched C-C bonds, leading to an increase in the bandgap of armchair GNRs by up to 50% of its original bandgap (i.e. bandgap at zero strain). For zigzag GNRs, due to the existence of the edge states, changes of bandgap are smaller under uniaxial strain and can be increased by ~30%. This work proposes a novel approach to the fabrication of densely aligned graphene nanoribbons with highly smooth edges afforded by anisotropic etching and uniaxial strain for

  4. Dense Aluminum Plasma Equation of State Measurements

    Science.gov (United States)

    Workman, J.; Tierney, T.; Kyrala Benage, G., Jr.

    1997-11-01

    Knowledge of the equation of state for any material is essential to a full understanding of its intrinsic and dynamic properties. Accurate experimental measurements of the equation of state for strongly coupled plasmas (Γ >= 1), relevant to astrophysical, geologic and ICF applications, have been extremely difficult. We present preliminary results on a novel method for off-Hugoniot measurements of the equation of state for dense plasmas (3 Marx pulsed power device to create plasma densities of up to one-tenth solid and temperatures of a few eV from a 200 μm diameter aluminum wire. Density and temperature profiles of the dense aluminum plasma are determined using laser-produced temporally- and spatially-resolved x-ray backlighters and optical streak records. Simulations indicate that the use of a laser-generated shock wave in the dense plasma can provide megabar pressures at 10 eV temperatures with ion densities of up to 10 times the initial density. Future experiments will concentrate on the use of this laser-generated shock to determine the equation of state through accurate density and shock-speed measurements.

  5. Formation and fragmentation of protostellar dense cores

    International Nuclear Information System (INIS)

    Maury, Anaelle

    2009-01-01

    Stars form in molecular clouds, when they collapse and fragment to produce protostellar dense cores. These dense cores are then likely to contract under their own gravity, and form young protostars, that further evolve while accreting their circumstellar mass, until they reach the main sequence. The main goal of this thesis was to study the formation and fragmentation of protostellar dense cores. To do so, two main studies, described in this manuscript, were carried out. First, we studied the formation of protostellar cores by quantifying the impact of protostellar outflows on clustered star formation. We carried out a study of the protostellar outflows powered by the young stellar objects currently formed in the NGc 2264-C proto-cluster, and we show that protostellar outflows seem to play a crucial role as turbulence progenitors in clustered star forming regions, although they seem unlikely to significantly modify the global infall processes at work on clump scales. Second, we investigated the formation of multiple systems by core fragmentation, by using high - resolution observations that allow to probe the multiplicity of young protostars on small scales. Our results suggest that the multiplicity rate of protostars on small scales increase while they evolve, and thus favor dynamical scenarios for the formation of multiple systems. Moreover, our results favor magnetized scenarios of core collapse to explain the small-scale properties of protostars at the earliest stages. (author) [fr

  6. Multishock Compression Properties of Warm Dense Argon

    Science.gov (United States)

    Zheng, Jun; Chen, Qifeng; Yunjun, Gu; Li, Zhiguo; Shen, Zhijun

    2015-10-01

    Warm dense argon was generated by a shock reverberation technique. The diagnostics of warm dense argon were performed by a multichannel optical pyrometer and a velocity interferometer system. The equations of state in the pressure-density range of 20-150 GPa and 1.9-5.3 g/cm3 from the first- to fourth-shock compression were presented. The single-shock temperatures in the range of 17.2-23.4 kK were obtained from the spectral radiance. Experimental results indicates that multiple shock-compression ratio (ηi = ρi/ρ0) is greatly enhanced from 3.3 to 8.8, where ρ0 is the initial density of argon and ρi (i = 1, 2, 3, 4) is the compressed density from first to fourth shock, respectively. For the relative compression ratio (ηi’ = ρi/ρi-1), an interesting finding is that a turning point occurs at the second shocked states under the conditions of different experiments, and ηi’ increases with pressure in lower density regime and reversely decreases with pressure in higher density regime. The evolution of the compression ratio is controlled by the excitation of internal degrees of freedom, which increase the compression, and by the interaction effects between particles that reduce it. A temperature-density plot shows that current multishock compression states of argon have distributed into warm dense regime.

  7. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    battalion during the battle for An Nasiriyah from 20–23 March 2003. Major Rohr described the difficulties of command and control in a chaotic battlefield...critical information was not able to reliably flow ( Rohr , 2006). The timely flow of information is heavily dependent on a reliable and integrated network...dpr/locus/Papers/Context%20GFN%20article.doc. Rohr , K. C. (2006). Fighting through the fog of war. Retrieved from Marine Corps Gazette website

  8. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-08-01

    But when 1m , the common method to solve (1) is the general-purpose convex problem solver known as CVX in Matlab. In [4], we established the...the dual problem can be solved with much less time than the primal problem. The resulting algorithm is much faster than CVX . c) Power Scheduling

  9. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed

    2017-08-17

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink or destination than the transmitting communication device relays the packet in a first hop. In a subsequent hop, a receiving communication device evaluates position information conveyed by the transmitting communication device of the first hop to determine whether to forward the packet. Accordingly, a receiving communication device receiver that offers progress towards the sink can elect to forward the packet.

  10. Attaining Realistic Simulations of Mobile Ad-hoc Networks

    Science.gov (United States)

    2010-06-01

    NS-2 to mimic the hardware utilized in the physical test bed, Proxim Orinoco 802.11 a/b/g cards. These settings are always applied equally to every...card in each node. The card selected was a Proxim 8480-WD Orinoco 802.11a/b/g ComboCard. The benefit to using these cards was that their drivers have

  11. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    the protocols for MANETs are usually more complicated and error-prone. In this thesis we discuss different models and their underlying theories which will facilitate the verification of protocols for MANETs. Process calculi have been used successfully as a formal method to verify and analyze functional...... equivalences and their logical characterizations have been proposed to combat the infamous states space explosion problem of PAs, but unfortunately it is well known that the behavioral equivalences are strictly stronger than the logical equivalences induced by PCTL or PCTL*. We address this problem...

  12. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-05-01

    quantizers whose codebooks are designed with MMSE criterion but the distortion measure is the ergodic capacity loss (i.e. mismatched design criterion...through a known preamble sequence [MZ12][MZ2]. While channel estimation through training sequence correlation or MMSE is a fairly well known approach...routing decision is made after transmission of data. While [1] suggests time- invariant critera such as hop-count, transmission rate, and transmission

  13. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-07-01

    may modify routing packets in such a way that packets traverse a cycle and so do not reach the intended destination [56]. • Wormhole attacks: A group...of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency communication link called a wormhole link...Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” Proc. 26th IEEE Int’l Conf. on Computer Communications, Anchorage, AK, 6

  14. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...... are provided to the application running on the robot. The services are generic because they can be used by many different applications, independent of the task to be solved. Likewise, specific services are requested from the underlying Virtual Machine, such as broadcast, multicast, and reliable unicast....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  15. Eating ad Libitum

    DEFF Research Database (Denmark)

    Hillersdal, Line

    using an ad libitum meal consisting of spaghetti bolognaise. I analyse the entanglement and concurrence of different knowledge practices and show how several scalings of appetite play out, one ex explaining the aim of the test, being to ”measure what your body would want the most” and hence producing...... an eater who: ”shouldn't restrain herself”. Practices of food and eating in the test meal I suggest, will allow us to tackle reductionism by showing the complex cultural context shaping clinical intervention....

  16. REFINEMENT OF COLORED MOBILE MAPPING DATA USING INTENSITY IMAGES

    Directory of Open Access Journals (Sweden)

    T. Yamakawa

    2016-06-01

    Full Text Available Mobile mapping systems (MMS can capture dense point-clouds of urban scenes. For visualizing realistic scenes using point-clouds, RGB colors have to be added to point-clouds. To generate colored point-clouds in a post-process, each point is projected onto camera images and a RGB color is copied to the point at the projected position. However, incorrect colors are often added to point-clouds because of the misalignment of laser scanners, the calibration errors of cameras and laser scanners, or the failure of GPS acquisition. In this paper, we propose a new method to correct RGB colors of point-clouds captured by a MMS. In our method, RGB colors of a point-cloud are corrected by comparing intensity images and RGB images. However, since a MMS outputs sparse and anisotropic point-clouds, regular images cannot be obtained from intensities of points. Therefore, we convert a point-cloud into a mesh model and project triangle faces onto image space, on which regular lattices are defined. Then we extract edge features from intensity images and RGB images, and detect their correspondences. In our experiments, our method worked very well for correcting RGB colors of point-clouds captured by a MMS.

  17. Mobility Work

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Bossen, Claus

    2005-01-01

    of coordination necessary in cooperative work, but focuses, we argue, mainly on the temporal aspects of cooperative work. As a supplement, the concept of mobility work focuses on the spatial aspects of cooperative work. Whereas actors seek to diminish the amount of articulation work needed in collaboration......We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts...... by constructing Standard Operation Procedures (SOPs), actors minimise mobility work by constructing Standard Operation Configurations (SOCs). We apply the concept of mobility work to the ethnography of hospital work, and argue that mobility arises because of the need to get access to people, places, knowledge and...

  18. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix; Wind, Simon

    2016-01-01

    In this paper, we identify the nexus between design (architecture, urban design, service design, etc.) and mobilities as a new and emerging research field. In this paper, we apply a “situational mobilities” perspective and take point of departure in the pragmatist question: “What design decisions...... and interventions affords this particular mobile situation?” The paper presents the contours of an emerging research agenda within mobilities research. The advent of “mobilities design” as an emerging research field points towards a critical interest in the material as well as practical consequences of contemporary......-making. The paper proposes that increased understanding of the material affordances facilitated through design provides important insight to planning and policymaking that at times might be in risk of becoming too detached from the everyday life of the mobile subject within contemporary mobilities landscapes....

  19. About chiral models of dense matter and its magnetic properties

    International Nuclear Information System (INIS)

    Kutschera, M.

    1990-12-01

    The chiral models of dense nucleon matter are discussed. The quark matter with broken chiral symmetry is described. The magnetic properties of dense matter are presented and conclusions are given. 37 refs. (A.S.)

  20. Hawking radiation from AdS black holes

    International Nuclear Information System (INIS)

    Hubeny, Veronika E; Rangamani, Mukund; Marolf, Donald

    2010-01-01

    We study Hartle-Hawking-like states of quantum field theories on asymptotically AdS black hole backgrounds, with particular regard to the phase structure of interacting theories. By a suitable analytic continuation we show that the equilibrium dynamics of field theories on large asymptotically AdS black holes can be related to the low-temperature states of the same field theory on the AdS soliton (or pure AdS) background. This allows us to gain insight into Hartle-Hawking-like states on large-radius Schwarzschild- or rotating-AdS black holes. Furthermore, we exploit the AdS/CFT correspondence to explore the physics of strongly coupled large N theories on asymptotically AdS black holes. In particular, we exhibit a plausibly complete set of phases for the M2-brane world-volume superconformal field theory on a BTZ black hole background. Our analysis partially resolves puzzles previously raised in connection with Hawking radiation on large AdS black holes.

  1. Mobil marketing

    OpenAIRE

    Engelová, Kateřina

    2006-01-01

    Mobil marketing - reklama a podpora prodeje prostřednictvím mobilních telefonů. Technologické a kulturní předpoklady vzniku tohoto odvětví. Mobil marketing a marketingový mix, možnosti synergie. Nástroje mobil marketingu - reklamní SMS a MMS, lokační služby, soutěže, ankety a hlasování, věrnostní systémy, mobilní obsah. Subjekty mobil marketingu. M-komerce. Využití pro podnikové aplikace.

  2. An Optimized Signature Verification System for Vehicle Ad hoc NETwork

    OpenAIRE

    Mamun, Mohammad Saiful Islam; Miyaji, Atsuko

    2012-01-01

    This paper1 presents an efficient approach to an existing batch verification system on Identity based group signature (IBGS) which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computations in batch verification proposed by B. Qin et al. for large scale VANET. We introduce a batch...

  3. XMM-Newton Mobile Web Application

    Science.gov (United States)

    Ibarra, A.; Kennedy, M.; Rodríguez, P.; Hernández, C.; Saxton, R.; Gabriel, C.

    2013-10-01

    We present the first XMM-Newton web mobile application, coded using new web technologies such as HTML5, the Query mobile framework, and D3 JavaScript data-driven library. This new web mobile application focuses on re-formatted contents extracted directly from the XMM-Newton web, optimizing the contents for mobile devices. The main goals of this development were to reach all kind of handheld devices and operating systems, while minimizing software maintenance. The application therefore has been developed as a web mobile implementation rather than a more costly native application. New functionality will be added regularly.

  4. Antecedents to Consumers' Acceptance of Mobile Advertisements

    DEFF Research Database (Denmark)

    Rajala, Risto; Westerlund, Mika

    2010-01-01

    The paper presents a hierarchical construct PLS structural equation model to analyze mobile advertisement acceptance. Hypotheses are established and tested about the hierarchical structure and the effects of the factors that precede consumers' behavioral intention to accept mobile advertisement....... The results suggest that valuable content and trust in advertisers are key predictors of mobile device users' acceptance of mobile advertising. In addition, subjective value of the ads and subjective norms mediate these antecedent-acceptance relationships. The results are invaluable to both scholars...... and business practitioners interested in mobile services....

  5. Evolution of dense spatially modulated electron bunches

    Science.gov (United States)

    Balal, N.; Bratman, V. L.; Friedman, A.

    2018-03-01

    An analytical theory describing the dynamics of relativistic moving 1D electron pulses (layers) with the density modulation affected by a space charge has been revised and generalized for its application to the formation of dense picosecond bunches from linear accelerators with laser-driven photo injectors, and its good agreement with General Particle Tracer simulations has been demonstrated. Evolution of quasi-one-dimensional bunches (disks), for which the derived formulas predict longitudinal expansion, is compared with that for thin and long electron cylinders (threads), for which the excitation of non-linear waves with density spikes was found earlier by Musumeci et al. [Phys. Rev. Lett. 106(18), 184801 (2011)] and Musumeci et al. [Phys. Rev. Spec. Top. -Accel. Beams 16(10), 100701 (2013)]. Both types of bunches can be used for efficiency enhancement of THz sources based on the Doppler frequency up-shifted coherent spontaneous radiation of electrons. Despite the strong Coulomb repulsion, the periodicity of a preliminary modulation in dense 1D layers persists during their expansion in the most interesting case of a relatively small change in particle energy. However, the period of modulation increases and its amplitude decreases in time. In the case of a large change in electron energy, the uniformity of periodicity is broken due to different relativistic changes in longitudinal scales along the bunch: the "period" of modulation decreases and its amplitude increases from the rear to the front boundary. Nevertheless, the use of relatively long electron bunches with a proper preliminary spatial modulation of density can provide a significantly higher power and a narrower spectrum of coherent spontaneous radiation of dense bunches than in the case of initially short single bunches with the same charge.

  6. Mobile Semiotics - signs and mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    This paper is about how to comprehend the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The paper explores the potentials of semiotics and its relationship to the new mobilities literature. The theoretical scope...... is therefore an attempt to mobilize semiotics by drawing on a central body of theory within and adjacent to the discipline. For instance the founding works of C. S. Peirce will be related to the contemporary notions of ‘geosemiotics’ by Scollon & Scollon. The paper’s theoretical claim is that semiotics hold...... a potential for mobilities studies if the awareness of seeing the environment as a semiotic layer and system can be sensitized to the insights of the ‘mobilities turn’. Empirically the paper tentatively explores the usefulness of a mobile semiotics approach to cases such as street signage, airport design...

  7. Mobile phones and mobile communication

    DEFF Research Database (Denmark)

    Ling, Richard; Donner, Jonathan

    With staggering swiftness, the mobile phone has become a fixture of daily life in almost every society on earth. In 2007, the world had over 3 billion mobile subscriptions. Prosperous nations boast of having more subscriptions than people. In the developing world, hundreds of millions of people who...... could never afford a landline telephone now have a mobile number of their own. With a mobile in our hand many of us feel safer, more productive, and more connected to loved ones, but perhaps also more distracted and less involved with things happening immediately around us. Written by two leading...... researchers in the field, this volume presents an overview of the mobile telephone as a social and cultural phenomenon. Research is summarized and made accessible though detailed descriptions of ten mobile users from around the world. These illustrate popular debates, as well as deeper social forces at work...

  8. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  9. Gravity-driven dense granular flows

    Energy Technology Data Exchange (ETDEWEB)

    ERTAS,DENIZ; GREST,GARY S.; HALSEY,THOMAS C.; DEVINE,DOV; SILBERT,LEONARDO E.

    2000-03-29

    The authors report and analyze the results of numerical studies of dense granular flows in two and three dimensions, using both linear damped springs and Hertzian force laws between particles. Chute flow generically produces a constant density profile that satisfies scaling relations suggestive of a Bagnold grain inertia regime. The type for force law has little impact on the behavior of the system. Failure is not initiated at the surface, consistent with the absence of surface flows and different principal stress directions at vs. below the surface.

  10. Graph Quasicontinuous Functions and Densely Continuous Forms

    Directory of Open Access Journals (Sweden)

    Lubica Hola

    2017-07-01

    Full Text Available Let $X, Y$ be topological spaces. A function $f: X \\to Y$ is said to be graph quasicontinuous if there is a quasicontinuous function $g: X \\to Y$ with the graph of $g$ contained in the closure of the graph of $f$. There is a close relation between the notions of graph quasicontinuous functions and minimal usco maps as well as the notions of graph quasicontinuous functions and densely continuous forms. Every function with values in a compact Hausdorff space is graph quasicontinuous; more generally every locally compact function is graph quasicontinuous.

  11. Fabrication of dense panels in lithium fluoride

    International Nuclear Information System (INIS)

    Farcy, P.; Roger, J.; Pointud, R.

    1958-04-01

    The authors report a study aimed at the fabrication of large and dense lithium fluoride panels. This sintered lithium fluoride is then supposed to be used for the construction of barriers of protection against a flow of thermal neutrons. They briefly present the raw material which is used under the form of chamotte obtained through a pre-sintering process which is also described. Grain size measurements and sample preparation are indicated. Shaping, drying, and thermal treatment are briefly described, and characteristics of the sintered product are indicated

  12. Leeuwpan fine coal dense medium plant

    CSIR Research Space (South Africa)

    Lundt, M

    2010-11-01

    Full Text Available Introduction Leeuwpan Colliery is located close to Delmas in the Mpumalanga Province, and is one of eight coal mines in the Exxaro Resources group. The dense media separation (DMS) plant at Leeuwpan was commissioned in 1997. The plant originally treated... three Witbank coal seams, namely seams no. 2, 4 and 5. A coal jig plant was built in 2005 to treat the top layer of coal—Seams 4 and 5—to supply a 30% ash coal to power stations. When the jig plant was commissioned, it increased the DMS plant...

  13. Dense hydrogen plasma: Comparison between models

    International Nuclear Information System (INIS)

    Clerouin, J.G.; Bernard, S.

    1997-01-01

    Static and dynamical properties of the dense hydrogen plasma (ρ≥2.6gcm -3 , 0.1< T<5eV) in the strongly coupled regime are compared through different numerical approaches. It is shown that simplified density-functional molecular-dynamics simulations (DFMD), without orbitals, such as Thomas-Fermi Dirac or Thomas-Fermi-Dirac-Weiszaecker simulations give similar results to more sophisticated descriptions such as Car-Parrinello (CP), tight binding, or path-integral Monte Carlo, in a wide range of temperatures. At very low temperature, screening effects predicted by DFMD are still less pronounced than CP simulations. copyright 1997 The American Physical Society

  14. Oscillating propagators in heavy-dense QCD

    CERN Document Server

    Akerlund, Oscar; Rindlisbacher, Tobias

    2016-10-11

    Using Monte Carlo simulations and extended mean field theory calculations we show that the $3$-dimensional $\\mathbb{Z}_3$ spin model with complex external fields has non-monotonic correlators in some regions of its parameter space. This model serves as a proxy for heavy-dense QCD in $(3+1)$ dimensions. Non-monotonic correlators are intrinsically related to a complex mass spectrum and a liquid-like (or crystalline) behavior. A liquid phase could have implications for heavy-ion experiments, where it could leave detectable signals in the spatial correlations of baryons.

  15. Optimization of ATSC Mobile Handheld Service Capacity

    Directory of Open Access Journals (Sweden)

    Omneya Issa

    2013-01-01

    Full Text Available Mobile TV has become a reality offered on several mobile delivery systems. Among them is the Advanced Television System Committee (ATSC system for mobile and handheld digital television services, known as ATSC Mobile DTV or ATSC M/H, which has moved from standardization to implementation. As the North American broadcast industry is preparing to provide Mobile DTV service to consumers, this work discusses important technical parameters that affect the TV service quality and capacity. Since additional error correction mechanisms were added to overcome mobile transmission problems, the available payload for M/H services is limited. This creates a need to efficiently use the available M/H bandwidth. The paper aims to optimize the Mobile DTV service capacity while maintaining an acceptable perceived quality. It presents tradeoffs between several factors affecting service capacity and signal robustness, which is prominent for designing Mobile TV broadcasting scenarios.

  16. Mobile Usability

    DEFF Research Database (Denmark)

    Aryana, Bijan; Clemmensen, Torkil

    2013-01-01

    In this article, a country specific comparative mobile usability study is presented, using Iran and Turkey as the two chosen emerging/emergent nation exemplars of smartphone usage and adoption. In a focus group study, three mobile applications were selected by first-time users of smartphones...

  17. Mobile phone

    International Nuclear Information System (INIS)

    2009-01-01

    Almost the entire Norwegian population has cell phone. The usefulness of the cell phone is great, but can use a mobile phone to health or discomfort? How can exposure be reduced? NRPA follows research and provides advice on mobile phone use. (AG)

  18. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...

  19. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... examples of mobile clouds applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept...... of resource sharing takes a wider and deeper meaning, creating the foundations for a global real-time multidimensional resource pool, the underlying infrastructure for shareconomy. Above all, this is an inspiring book for anyone who is concerned about the future of wireless and mobile communications networks...

  20. Staging Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    In recent years, the social sciences have taken a “mobilities turn.” There has been a developing realisation that mobilities do not “just happen.” Mobilities are carefully and meticulously designed, planned and staged (from above). However, they are equally importantly acted out, performed and li......, the book asks: what are the physical, social, technical, and cultural conditions to the staging of contemporary urban mobilities?...... that mobility is more than movement between point A and B. It explores how the movement of people, goods, information, and signs influences human understandings of self, other and the built environment. Moving towards a new understanding of the relationship between movement, interaction and environments...

  1. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    2016-01-01

    Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the backgound of the ‘mobilities turn’ (for short review paper on this see; Sheller 2011, Vannini 2010) this paper proposes a further development....... There is a need for research targeting the material, physical and design-oriented dimensions of the multiple mobilities from the local to the global. Despite its cross-disciplinary identity the ‘mobilities turn’ has not sufficiently capitalized from the potential in exploring issues of material design...... of life’ for billions of people in the everyday life. This paper is structured in three parts. After the general introduction we present the mobilities theory perspective of ‘staging mobilities’ and connects this to the empirical phenomenon of parking lots and their design. The paper ends in section three...

  2. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin.......dk and five students, who were asked to look up five terms with the dictionary app Gyldendal Engelsk-Dansk. The empirical data comprise approximately 15 hours of recordings of user behavior, think-aloud data and interview data. The data indicate that there is still much to be done in this area...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile...

  3. Mobile probes

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Jørgensen, Anna Neustrup; Noesgaard, Signe Schack

    2016-01-01

    to in an interview. This method provided valuable insight into the contextual use, i.e. how did the online resource transfer to the work practice. However, the research team also found that mobile probes may provide the scaffolding necessary for individual and peer learning at a very local (intra-school) community...... level. This paper is an initial investigation of how the mobile probes process proved to engage teachers in their efforts to improve teaching. It also highlights some of the barriers emerging when applying mobile probes as a scaffold for learning.......A project investigating the effectiveness of a collection of online resources for teachers' professional development used mobile probes as a data collection method. Teachers received questions and tasks on their mobile in a dialogic manner while in their everyday context as opposed...

  4. Mobility Challenges

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lassen, Claus

    2011-01-01

    This article takes point of departure in the challenges to understand the importance of contemporary mobility. The approach advocated is a cross-disciplinary one drawing on sociology, geography, urban planning and design, and cultural studies. As such the perspective is to be seen as a part...... of the so-called ‘mobility turn’ within social science. The perspective is illustrative for the research efforts at the Centre for Mobility and Urban Studies (C-MUS), Aalborg University. The article presents the contours of a theoretical perspective meeting the challenges to research into contemporary urban...... mobilities. In particular the article discusses 1) the physical city, its infrastructures and technological hardware/software, 2) policies and planning strategies for urban mobility and 3) the lived everyday life in the city and the region....

  5. Restricted Mobilities

    DEFF Research Database (Denmark)

    Nielsen, Mette; Lassen, Claus

    2012-01-01

    communities and shopping centres through mobility lenses. The article shows how different mobility systems enable and restrict the public access to private-public spaces, and it points out that proprietary communities create an unequal potential for human movement and access in the city. The main argument......Privatisation of public spaces in the contemporary city has increased during the last decades but only few studies have approached this field from a mobility perspective. Therefore the article seeks to rectify this by exploring two Australian examples of private spaces in the city; gated...... and stratification mechanisms. In conclusion the article therefore suggests that future urban research and planning also needs a mobile understanding of spaces in the cities and how different mobility systems play an important role to sustain the exclusiveness that often characterises the private/public spaces...

  6. Ad gist : Ad communication in a single eye fixation

    NARCIS (Netherlands)

    Pieters, R.; Wedel, M.

    2012-01-01

    Most ads in practice receive no more than a single eye fixation. This study investigates the limits of what ads can communicate under such adverse exposure conditions. We find that consumers already know at maximum levels of accuracy and with high degree of certainty whether something is an ad or is

  7. Neutrino interactions in hot and dense matter

    International Nuclear Information System (INIS)

    Reddy, S.; Prakash, M.; Lattimer, J.M.

    1998-01-01

    We study the charged and neutral current weak interaction rates relevant for the determination of neutrino opacities in dense matter found in supernovae and neutron stars. We establish an efficient formalism for calculating differential cross sections and mean free paths for interacting, asymmetric nuclear matter at arbitrary degeneracy. The formalism is valid for both charged and neutral current reactions. Strong interaction corrections are incorporated through the in-medium single particle energies at the relevant density and temperature. The effects of strong interactions on the weak interaction rates are investigated using both potential and effective field-theoretical models of matter. We investigate the relative importance of charged and neutral currents for different astrophysical situations, and also examine the influence of strangeness-bearing hyperons. Our findings show that the mean free paths are significantly altered by the effects of strong interactions and the multi-component nature of dense matter. The opacities are then discussed in the context of the evolution of the core of a protoneutron star. copyright 1998 The American Physical Society

  8. Solids flow rate measurement in dense slurries

    Energy Technology Data Exchange (ETDEWEB)

    Porges, K.G.; Doss, E.D.

    1993-09-01

    Accurate and rapid flow rate measurement of solids in dense slurries remains an unsolved technical problem, with important industrial applications in chemical processing plants and long-distance solids conveyance. In a hostile two-phase medium, such a measurement calls for two independent parameter determinations, both by non-intrusive means. Typically, dense slurries tend to flow in laminar, non-Newtonian mode, eliminating most conventional means that usually rely on calibration (which becomes more difficult and costly for high pressure and temperature media). These issues are reviewed, and specific solutions are recommended in this report. Detailed calculations that lead to improved measuring device designs are presented for both bulk density and average velocity measurements. Cross-correlation, chosen here for the latter task, has long been too inaccurate for practical applications. The cause and the cure of this deficiency are discussed using theory-supported modeling. Fluid Mechanics are used to develop the velocity profiles of laminar non-Newtonian flow in a rectangular duct. This geometry uniquely allows the design of highly accurate `capacitive` devices and also lends itself to gamma transmission densitometry on an absolute basis. An absolute readout, though of less accuracy, is also available from a capacitive densitometer and a pair of capacitive sensors yields signals suitable for cross-correlation velocity measurement.

  9. Redesigning Triangular Dense Matrix Computations on GPUs

    KAUST Repository

    Charara, Ali

    2016-08-09

    A new implementation of the triangular matrix-matrix multiplication (TRMM) and the triangular solve (TRSM) kernels are described on GPU hardware accelerators. Although part of the Level 3 BLAS family, these highly computationally intensive kernels fail to achieve the percentage of the theoretical peak performance on GPUs that one would expect when running kernels with similar surface-to-volume ratio on hardware accelerators, i.e., the standard matrix-matrix multiplication (GEMM). The authors propose adopting a recursive formulation, which enriches the TRMM and TRSM inner structures with GEMM calls and, therefore, reduces memory traffic while increasing the level of concurrency. The new implementation enables efficient use of the GPU memory hierarchy and mitigates the latency overhead, to run at the speed of the higher cache levels. Performance comparisons show up to eightfold and twofold speedups for large dense matrix sizes, against the existing state-of-the-art TRMM and TRSM implementations from NVIDIA cuBLAS, respectively, across various GPU generations. Once integrated into high-level Cholesky-based dense linear algebra algorithms, the performance impact on the overall applications demonstrates up to fourfold and twofold speedups, against the equivalent native implementations, linked with cuBLAS TRMM and TRSM kernels, respectively. The new TRMM/TRSM kernel implementations are part of the open-source KBLAS software library (http://ecrc.kaust.edu.sa/Pages/Res-kblas.aspx) and are lined up for integration into the NVIDIA cuBLAS library in the upcoming v8.0 release.

  10. Predicting diffusivities in dense fluid mixtures

    Directory of Open Access Journals (Sweden)

    C. DARIVA

    1999-09-01

    Full Text Available In this work the Enskog solution of the Boltzmann equation, as corrected by Speedy, together with the Weeks-Chandler-Andersen (WCA perturbation theory of liquids is employed in correlating and predicting self-diffusivities of dense fluids. Afterwards this theory is used to estimate mutual diffusion coefficients of solutes at infinite dilution in sub and supercritical solvents. We have also investigated the behavior of Fick diffusion coefficients in the proximity of a binary vapor-liquid critical point since this subject is of great interest for extraction purposes. The approach presented here, which makes use of a density and temperature dependent hard-sphere diameter, is shown to be excellent for predicting diffusivities in dense pure fluids and fluid mixtures. The calculations involved highly nonideal mixtures as well as systems with high molecular asymmetry. The predicted diffusivities are in good agreement with the experimental data for the pure and binary systems. The methodology proposed here makes only use of pure component information and density of mixtures. The simple algebraic relations are proposed without any binary adjustable parameters and can be readily used for estimating diffusivities in multicomponent mixtures.

  11. Quantum Linear System Algorithm for Dense Matrices

    Science.gov (United States)

    Wossnig, Leonard; Zhao, Zhikuan; Prakash, Anupam

    2018-02-01

    Solving linear systems of equations is a frequently encountered problem in machine learning and optimization. Given a matrix A and a vector b the task is to find the vector x such that A x =b . We describe a quantum algorithm that achieves a sparsity-independent runtime scaling of O (κ2√{n }polylog(n )/ɛ ) for an n ×n dimensional A with bounded spectral norm, where κ denotes the condition number of A , and ɛ is the desired precision parameter. This amounts to a polynomial improvement over known quantum linear system algorithms when applied to dense matrices, and poses a new state of the art for solving dense linear systems on a quantum computer. Furthermore, an exponential improvement is achievable if the rank of A is polylogarithmic in the matrix dimension. Our algorithm is built upon a singular value estimation subroutine, which makes use of a memory architecture that allows for efficient preparation of quantum states that correspond to the rows of A and the vector of Euclidean norms of the rows of A .

  12. INTERNAL MOTIONS IN STARLESS DENSE CORES

    International Nuclear Information System (INIS)

    Lee, Chang Won; Myers, Philip C.

    2011-01-01

    This paper discusses the statistics of internal motions in starless dense cores and the relation of these motions to core density and evolution. Four spectral lines from three molecular species are analyzed from single-pointing and mapped observations of several tens of starless cores. Blue asymmetric profiles are dominant, indicating that inward motions are prevalent in sufficiently dense starless cores. These blue profiles are found to be more abundant, and their asymmetry is bluer, at core positions with stronger N 2 H + line emission or higher column density. Thirty-three starless cores are classified into four different types according to the blueshift and redshift of the lines in their molecular line maps. Among these cores, contracting motions dominate: 19 are classified as contracting, 3 as oscillating, 3 as expanding, and 8 as static. Contracting cores have inward motions all over the core with those motions predominating near the region of peak density. Cores with the bluest asymmetry tend to have greater column density than other cores and all five cores with peak column density >6 x 10 21 cm -2 are found to be contracting. This suggests that starless cores are likely to have contracting motions if they are sufficiently condensed. Our classification of the starless cores may indicate a sequence of core evolution in the sense that column density increases from static to contracting cores: the static cores in the earliest stage, the expanding and/or the oscillating cores in the next, and the contracting cores in the latest stage.

  13. Dense, layered, inclined flows of spheres

    Science.gov (United States)

    Jenkins, James T.; Larcher, Michele

    2017-12-01

    We consider dense, inclined flows of spheres in which the particles translate in layers, whose existence may be promoted by the presence of a rigid base and/or sidewalls. We imagine that in such flows a sphere of a layer is forced up the back of a sphere of the layer below, lifting a column of spheres above it, and then falls down the front of the lower sphere, until it bumps against the preceding sphere of the lower layer. We calculate the forces and rate of momentum transfer associated with this process of rub, lift, fall, and bump and determine a relation between the ratio of shear stress to normal stress and the rate of strain that may be integrated to obtain the velocity profile. The fall of a sphere and that of the column above it results in a linear increase in the magnitude of the velocity fluctuations with distance from the base of the flow. We compare the predictions of the model with measured profiles of velocity and granular temperature in several different dense, inclined flows.

  14. Phosphorus in the dense interstellar medium

    International Nuclear Information System (INIS)

    Turner, B.E.; Tsuji, T.; Bally, J.; Guelin, M.; Cernicharo, J.

    1990-01-01

    An observational study was made of interstellar (and circumstellar) phosphorus chemistry by means of (1) a survey of PN in energetic star-forming regions (several new detections); (2) a search for PN in cold cloud cores; and (3) a search for HPO, HCP, and PH3 in interstellar and circumstellar sources. The results are consistent with previously developed ion-molecule models of phosphorus chemistry and imply large depletion factors for P in dense clouds: about 1000 in warm star-forming cores and more than 10,000 in cold cloud cores. Thermochemical equilibrium models have been developed for the P chemistry in C-rich and O-rich environments, and it is found that HCP contains all the phosphorus in the C-rich case. The search for HCP in IRC 10216 yields an upper limit which, taken together with the recent detection of CP, implies significant depletion of HCP onto grains. Depletion factors for first- and second-row elements in diffuse and dense interstellar clouds are summarized, and an overall picture of circumstellar and interstellar grain and gas-phase processes is proposed to explain the depletions of N, O, C, S, Si, P, and in particular the high depletions of Si and P. 101 refs

  15. Distributed Detection of Randomly Located Targets in Mobility-Assisted Sensor Networks with Node Mobility Management

    Directory of Open Access Journals (Sweden)

    Jayaweera SudharmanK

    2010-01-01

    Full Text Available Performance gain achieved by adding mobile nodes to a stationary sensor network for target detection depends on factors such as the number of mobile nodes deployed, mobility patterns, speed and energy constraints of mobile nodes, and the nature of the target locations (deterministic or random. In this paper, we address the problem of distributed detection of a randomly located target by a hybrid sensor network. Specifically, we develop two decision-fusion architectures for detection where in the first one, impact of node mobility is taken into account for decisions updating at the fusion center, while in the second model the impact of node mobility is taken at the node level decision updating. The cost of deploying mobile nodes is analyzed in terms of the minimum fraction of mobile nodes required to achieve the desired performance level within a desired delay constraint. Moreover, we consider managing node mobility under given constraints.

  16. Lock-and-key dimerization in dense Brownian systems of hard annular sector particles

    Science.gov (United States)

    Hodson, Wade D.; Mason, Thomas G.

    2016-08-01

    We develop a translational-rotational cage model that describes the behavior of dense two-dimensional (2D) Brownian systems of hard annular sector particles (ASPs), resembling C shapes. At high particle densities, pairs of ASPs can form mutually interdigitating lock-and-key dimers. This cage model considers either one or two mobile central ASPs which can translate and rotate within a static cage of surrounding ASPs that mimics the system's average local structure and density. By comparing with recent measurements made on dispersions of microscale lithographic ASPs [P. Y. Wang and T. G. Mason, J. Am. Chem. Soc. 137, 15308 (2015), 10.1021/jacs.5b10549], we show that mobile two-particle predictions of the probability of dimerization Pdimer, equilibrium constant K , and 2D osmotic pressure Π2 D as a function of the particle area fraction ϕA correspond closely to these experiments. By contrast, predictions based on only a single mobile particle do not agree well with either the two-particle predictions or the experimental data. Thus, we show that collective entropy can play an essential role in the behavior of dense Brownian systems composed of nontrivial hard shapes, such as ASPs.

  17. Fluorescence and absorption spectroscopy for warm dense matter studies and ICF plasma diagnostics

    Science.gov (United States)

    Hansen, S. B.; Harding, E. C.; Knapp, P. F.; Gomez, M. R.; Nagayama, T.; Bailey, J. E.

    2018-05-01

    The burning core of an inertial confinement fusion (ICF) plasma produces bright x-rays at stagnation that can directly diagnose core conditions essential for comparison to simulations and understanding fusion yields. These x-rays also backlight the surrounding shell of warm, dense matter, whose properties are critical to understanding the efficacy of the inertial confinement and global morphology. We show that the absorption and fluorescence spectra of mid-Z impurities or dopants in the warm dense shell can reveal the optical depth, temperature, and density of the shell and help constrain models of warm, dense matter. This is illustrated by the example of a high-resolution spectrum collected from an ICF plasma with a beryllium shell containing native iron impurities. Analysis of the iron K-edge provides model-independent diagnostics of the shell density (2.3 × 1024 e/cm3) and temperature (10 eV), while a 12-eV red shift in Kβ and 5-eV blue shift in the K-edge discriminate among models of warm dense matter: Both shifts are well described by a self-consistent field model based on density functional theory but are not fully consistent with isolated-atom models using ad-hoc density effects.

  18. Developing Cost-Effective Dense Continuous SDC Barrier Layers for SOFCs

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, Hoang Viet P.; Hardy, John S.; Coyle, Christopher A.; LU, Zigui; Stevenson, Jeffry W.

    2017-12-04

    Significantly improved performance during electrochemical testing of a cell with a dense continuous pulsed laser deposited (PLD) samarium doped ceria (SDC) layer spurred investigations into the fabrication of dense continuous SDC barrier layers by means of cost-effective deposition using screen printing which is amenable to industrial production of SOFCs. Many approaches to improve the SDC density have been explored including the use of powder with reduced particle sizes, inks with increased solids loading, and doping with sintering aids (1). In terms of sintering aids, dopants like Mo or binary systems of Mo+Cu or Fe+Co greatly enhance SDC sinterability. In fact, adding dopants to a screen printed, prefired, porous SDC layer made it possible to achieve a dense continuous barrier layer atop the YSZ electrolyte without sintering above 1200°C. Although the objective of fabricating a dense continuous layer was achieved, additional studies have been initiated to improve the cell performance. Underlying issues with constrained sintering and dopant-enhanced ceria-zirconia solid solubility are also addressed in this paper.

  19. The Adoption of Shared Mobility in California and Its Relationship with Other Components of Travel Behavior

    Science.gov (United States)

    2018-03-01

    Emerging technologies and shared mobility services are quickly changing transportation. The popularity of these services is particularly high among millennials and those living in the dense central parts of cities. Still, the reasons behind the adopt...

  20. Added masses of ship structures

    CERN Document Server

    Korotkin, Alexandr I

    2008-01-01

    This essentially self-contained reference book contains data on added masses of ships and various ship and marine engineering structures. Theoretical and experimental methods for determining added masses of these objects are described.

  1. Added Sugars and Cardiovascular Disease Risk in Children

    Science.gov (United States)

    Vos, Miriam B.; Kaar, Jill L.; Welsh, Jean A.; Van Horn, Linda V.; Feig, Daniel I.; Anderson, Cheryl A.M.; Patel, Mahesh J.; Munos, Jessica Cruz; Krebs, Nancy F.; Xanthakos, Stavra A.; Johnson, Rachel K.

    2017-01-01

    BACKGROUND Poor lifestyle behaviors are leading causes of preventable diseases globally. Added sugars contribute to a diet that is energy dense but nutrient poor and increase risk of developing obesity, cardiovascular disease, hypertension, obesity-related cancers, and dental caries. METHODS AND RESULTS For this American Heart Association scientific statement, the writing group reviewed and graded the current scientific evidence for studies examining the cardiovascular health effects of added sugars on children. The available literature was subdivided into 5 broad subareas: effects on blood pressure, lipids, insulin resistance and diabetes mellitus, nonalcoholic fatty liver disease, and obesity. CONCLUSIONS Associations between added sugars and increased cardiovascular disease risk factors among US children are present at levels far below current consumption levels. Strong evidence supports the association of added sugars with increased cardiovascular disease risk in children through increased energy intake, increased adiposity, and dyslipidemia. The committee found that it is reasonable to recommend that children consume ≤25 g (100 cal or ≈6 teaspoons) of added sugars per day and to avoid added sugars for children added sugars most likely can be safely consumed in low amounts as part of a healthy diet, few children achieve such levels, making this an important public health target. PMID:27550974

  2. Quantum Control of Open Systems and Dense Atomic Ensembles

    Science.gov (United States)

    DiLoreto, Christopher

    Controlling the dynamics of open quantum systems; i.e. quantum systems that decohere because of interactions with the environment, is an active area of research with many applications in quantum optics and quantum computation. My thesis expands the scope of this inquiry by seeking to control open systems in proximity to an additional system. The latter could be a classical system such as metal nanoparticles, or a quantum system such as a cluster of similar atoms. By modelling the interactions between the systems, we are able to expand the accessible state space of the quantum system in question. For a single, three-level quantum system, I examine isolated systems that have only normal spontaneous emission. I then show that intensity-intensity correlation spectra, which depend directly on the density matrix of the system, can be used detect whether transitions share a common energy level. This detection is possible due to the presence of quantum interference effects between two transitions if they are connected. This effect allows one to asses energy level structure diagrams in complex atoms/molecules. By placing an open quantum system near a nanoparticle dimer, I show that the spontaneous emission rate of the system can be changed "on demand" by changing the polarization of an incident, driving field. In a three-level, Lambda system, this allows a qubit to both retain high qubit fidelity when it is operating, and to be rapidly initialized to a pure state once it is rendered unusable by decoherence. This type of behaviour is not possible in a single open quantum system; therefore adding a classical system nearby extends the overall control space of the quantum system. An open quantum system near identical neighbours in a dense ensemble is another example of how the accessible state space can be expanded. I show that a dense ensemble of atoms rapidly becomes disordered with states that are not directly excited by an incident field becoming significantly populated

  3. AdS5 black holes with fermionic hair

    International Nuclear Information System (INIS)

    Burrington, Benjamin A.; Liu, James T.; Sabra, W. A.

    2005-01-01

    The study of new Bogomol'nyi-Prasad-Sommerfield (BPS) objects in AdS 5 has led to a deeper understanding of AdS/CFT. To help complete this picture, and to fully explore the consequences of the supersymmetry algebra, it is also important to obtain new solutions with bulk fermions turned on. In this paper we construct superpartners of the 1/2 BPS black hole in AdS 5 using a natural set of fermion zero modes. We demonstrate that these superpartners, carrying fermionic hair, have conserved charges differing from the original bosonic counterpart. To do so, we find the R-charge and dipole moment of the new system, as well as the mass and angular momentum, defined through the boundary stress tensor. The complete set of superpartners fits nicely into a chiral representation of AdS 5 supersymmetry, and the spinning solutions have the expected gyromagnetic ratio, g=1

  4. Going Mobile?

    DEFF Research Database (Denmark)

    Tallon, Loic; Froes, Isabel Cristina G.

    2011-01-01

    If the future is mobile, how is the museum community developing within that future? What are the challenges museums face within it? In which directions should we be seeking to evolve our collective knowledge share? It was to gain observations on questions such as these that the 2011 Museums...... & Mobile survey was developed: 660 museum professionals responded. In this paper the authors highlight nine survey observations that they believe are important to the museum community’s increased understanding of and continued progress within mobile interpretation....

  5. Accentual mobility

    DEFF Research Database (Denmark)

    Olander, Thomas Kristoffer

    slaviske mobile accentparadigmer i høj grad stemmer overens med hinanden, er det sandsynligt at accentmobiliteten i de to sproggrupper går tilbage til et fælles udgangspunkt. Formålet med afhandlingen er at bestemme den urindoeuropæiske baggrund for de baltoslaviske mobile accentparadigmer. I de...... paradigmatiske accent i urbaltoslavisk på grundlag af materiale fra de tre baltiske sprog og urslavisk. I kapitel IV foretages af en undersøgelse af den foreslåede accentlov ud fra en sammenligning af de rekonstruerede urindoeuropæiske endelser og de tilsvarende former i de urbaltoslaviske mobile...

  6. The dynamics of dense galactic nuclei

    Science.gov (United States)

    Lee, Man Hoi

    In this thesis, two topics on the dynamics of dense galactic nuclei are studied. They are relevant to the formation of massive black holes and the observations of several nearby galactic nuclei. An overview of the observations is given in Chapter 1. In Chapter 2, the dynamical evolution of dense clusters of compact stars is studied. The formation of binaries and their subsequent merging by gravitational radiation emission is important to the evolution of such clusters. Aarseth's NBODY5 N-body simulation code, which is modified to include these processes, is used to simulate small N clusters with different initial velocity dispersions. The initial evolution is similar to previous results from Fokker-Planck simulations and shows orderly formation of heavy objects. However, the late evolution shows runaway growth for the most massive object in the cluster. We present arguments to show that merger by gravitational radiation (and possibly hydrodynamic merger of normal stars) is expected to be unstable to runaway growth. These results suggest that a seed massive black hole can be formed by runaway growth in a dense cluster of compact stars. In Chapter 3, the effects of stellar encounters on rotating stellar systems with central massive black holes are studied. For axisymmetric stellar systems with distribution functions that depend only on the energy E and the angular momentum about one axis Jx, the steady-state stellar distribution is found by directly integrating the Fokker-Planck equation in E, J subx) space. Two sets of models with simple assumptions about the loss cone in phase space (due to loss of stars to the central black hole) are presented: the loss cone in the Jx direction is either ignored or completely empty. We find that the depletion of stars due to an empty loss cone is significant. Density and kinematic profiles are also presented. The ratio of rotation velocity to velocity dispersion, V/sigma at small radii is higher than that of the background

  7. Anomalous effects of dense matter under rotation

    Science.gov (United States)

    Huang, Xu-Guang; Nishimura, Kentaro; Yamamoto, Naoki

    2018-02-01

    We study the anomaly induced effects of dense baryonic matter under rotation. We derive the anomalous terms that account for the chiral vortical effect in the low-energy effective theory for light Nambu-Goldstone modes. The anomalous terms lead to new physical consequences, such as the anomalous Hall energy current and spontaneous generation of angular momentum in a magnetic field (or spontaneous magnetization by rotation). In particular, we show that, due to the presence of such anomalous terms, the ground state of the quantum chromodynamics (QCD) under sufficiently fast rotation becomes the "chiral soliton lattice" of neutral pions that has lower energy than the QCD vacuum and nuclear matter. We briefly discuss the possible realization of the chiral soliton lattice induced by a fast rotation in noncentral heavy ion collisions.

  8. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  9. Kaon condensation in dense stellar matter

    International Nuclear Information System (INIS)

    Lee, Chang-Hwan; Rho, M.; Washington Univ., Seattle, WA

    1995-03-01

    This article combines two talks given by the authors and is based on Works done in collaboration with G.E. Brown and D.P. Min on kaon condensation in dense baryonic medium treated in chiral perturbation theory using heavy-baryon formalism. It contains, in addition to what was recently published, astrophysical backgrounds for kaon condensation discussed by Brown and Bethe, a discussion on a renormalization-group analysis to meson condensation worked out together with H.K. Lee and S.J. Sin, and the recent results of K.M. Westerberg in the bound-state approach to the Skyrme model. Negatively charged kaons are predicted to condense at a critical density 2 approx-lt ρ/ρo approx-lt 4, in the range to allow the intriguing new phenomena predicted by Brown and Bethe to take place in compact star matter

  10. Frontiers and challenges in warm dense matter

    CERN Document Server

    Desjarlais, Michael; Redmer, Ronald; Trickey, Samuel

    2014-01-01

    Warm Dense Matter (WDM) occupies a loosely defined region of phase space intermediate between solid, liquid, gas, and plasma, and typically shares characteristics of two or more of these phases. WDM is generally associated with the combination of strongly coupled ions and moderately degenerate electrons, and careful attention to quantum physics and electronic structure is essential. The lack of a small perturbation parameter greatly limits approximate attempts at its accurate description. Since WDM resides at the intersection of solid state and high energy density physics, many high energy density physics (HEDP) experiments pass through this difficult region of phase space. Thus, understanding and modeling WDM is key to the success of experiments on diverse facilities. These include the National Ignition Campaign centered on the National Ignition Facility (NIF), pulsed-power driven experiments on the Z machine, ion-beam-driven WDM experiments on the NDCX-II, and fundamental WDM research at the Linear Coherent...

  11. Medical device disinfection by dense carbon dioxide.

    Science.gov (United States)

    Bertoloni, G; Bertucco, A; Rassu, M; Vezzù, K

    2011-01-01

    The employment of disinfection-sterilisation processes for the re-use of medical devices without negative effects such as the presence of toxic residues, material degradation or other modifications is an important consideration for reducing the costs of surgical and medical procedures. Ethylene oxide is the most commonly used low temperature sterilisation technique in healthcare facilities, but its associated toxicity has reduced interest in this technology for the reprocessing of medical equipment. The aim of this study was to examine the disinfection efficiency of a novel low temperature approach, based on dense carbon dioxide on artificially contaminated catheters. The results obtained demonstrated that this method provided a complete inactivation of all bacteria and yeast strains tested, and that no obvious modifications to the surfaces tested were observed with multiple treatments. Copyright © 2010 The Hospital Infection Society. Published by Elsevier Ltd. All rights reserved.

  12. Coherent neutrino interactions in a dense medium

    International Nuclear Information System (INIS)

    Kiers, K.; Weiss, N.

    1997-01-01

    Motivated by the effect of matter on neutrino oscillations (the MSW effect) we study in more detail the propagation of neutrinos in a dense medium. The dispersion relation for massive neutrinos in a medium is known to have a minimum at nonzero momentum p∼G F ρ/√(2). We study in detail the origin and consequences of this dispersion relation for both Dirac and Majorana neutrinos both in a toy model with only neutral currents and a single neutrino flavor and in a realistic open-quotes standard modelclose quotes with two neutrino flavors. We find that for a range of neutrino momenta near the minimum of the dispersion relation, Dirac neutrinos are trapped by their coherent interactions with the medium. This effect does not lead to the trapping of Majorana neutrinos. copyright 1997 The American Physical Society

  13. Particle Segregation in Dense Granular Flows

    Science.gov (United States)

    Gray, John Mark Nicholas Timm

    2018-01-01

    Granular materials composed of particles with differing grain sizes, densities, shapes, or surface properties may experience unexpected segregation during flow. This review focuses on kinetic sieving and squeeze expulsion, whose combined effect produces the dominant gravity-driven segregation mechanism in dense sheared flows. Shallow granular avalanches that form at the surface of more complex industrial flows such as heaps, silos, and rotating drums provide ideal conditions for particles to separate, with large particles rising to the surface and small particles percolating down to the base. When this is combined with erosion and deposition, amazing patterns can form in the underlying substrate. Gravity-driven segregation and velocity shear induce differential lateral transport, which may be thought of as a secondary segregation mechanism. This allows larger particles to accumulate at flow fronts, and if they are more frictional than the fine grains, they can feedback on the bulk flow, causing flow fingering, levee formation, and longer runout of geophysical mass flows.

  14. Charmonium propagation through a dense medium

    Directory of Open Access Journals (Sweden)

    Kopeliovich B.Z.

    2015-01-01

    Full Text Available Attenuation of a colourless c̄c dipole propagating with a large momentum through a hot medium originates from two sources, Debye screening (melting, and inelastic collisions with surrounding scattering centres (absorption. The former never terminates completely production of a bound charmonium in heavy ion collisions, even at very high temperatures. The latter, is controlled my the magnitude of the dipole cross section, related to the transport coefficient, which is the rate of transverse momentum broadening in the medium. A novel procedure of Lorentz boosting of the Schrödinger equation is developed, which allows to calculate the charmonium survival probability employing the path-integral technique, incorporating both melting and absorption. A novel mechanism of charmonium regeneration in a dense medium is proposed.

  15. Different views of AEGIS / AD-6 Experiment (AD facility) AD-6

    CERN Multimedia

    Maximilien Brice

    2012-01-01

    Different views of AEGIS / AD-6 Experiment (AD facility) in July of 2012. The visible parts are the positron accumulator (blue structures on top of of the antiproton extraction line) and the 5T magnet which traps the antiprotons.

  16. AdS Black Hole with Phantom Scalar Field

    Directory of Open Access Journals (Sweden)

    Limei Zhang

    2017-01-01

    Full Text Available We present an AdS black hole solution with Ricci flat horizon in Einstein-phantom scalar theory. The phantom scalar fields just depend on the transverse coordinates x and y, which are parameterized by the parameter α. We study the thermodynamics of the AdS phantom black hole. Although its horizon is a Ricci flat Euclidean space, we find that the thermodynamical properties of the black hole solution are qualitatively the same as those of AdS Schwarzschild black hole. Namely, there exists a minimal temperature and the large black hole is thermodynamically stable, while the smaller one is unstable, so there is a so-called Hawking-Page phase transition between the large black hole and the thermal gas solution in the AdS space-time in Poincare coordinates. We also calculate the entanglement entropy for a strip geometry dual to the AdS phantom black holes and find that the behavior of the entanglement entropy is qualitatively the same as that of the black hole thermodynamical entropy.

  17. Staying Mobile

    Science.gov (United States)

    ... the most appropriate aid(s). Mobility aids can: Make shopping trips manageable and visits to a museum or ... Association for Driver Rehabilitation Specialists (ADED) Provides an online search tool to locate rehabilitation specialists, certified driver ...

  18. Mobile museology

    DEFF Research Database (Denmark)

    Baggesen, Rikke Haller

    Drawing together perspectives from museology, digital culture studies and fashion theory, this thesis considers changes in and challenges for current - day museums as related to ‘mobile museology’. This concept is developed for and elucidated in the thesis to describe an orientation towards...... the fashionable, the ephemeral, and towards an (ideal) state of change and changeability. This orientation is characterised with the triplet concepts of mobile, mobility, and mobilisation, as related to mobile media and movability; to ‘trans - museal’ mediation; and to the mobilisation of collections, audiences...... and institutional mindsets. The research project’s transdisciplinary and exploratory approach takes inspiration from critical design, minding Latour’s (2004a) call for rethink ing critical approaches in the humanities. Through a creative process, focused on designs for framing fashion in everyday contexts...

  19. Dense gas dispersion in the atmosphere

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Morten

    1998-09-01

    Dense gas dispersion is characterized by buoyancy induced gravity currents and reduction of the vertical mixing. Liquefied gas releases from industrial accidents are cold because of the heat of evaporation which determines the density for a given concentration and physical properties. The temperature deficit is moderated by the heat flux from the ground, and this convection is an additional source of turbulence which affects the mixing. A simple model as the soil heat flux is used to estimate the ability of the ground to sustain the heat flux during release. The initial enthalpy, release rate, initial entrainment and momentum are discussed for generic source types and the interaction with obstacles is considered. In the MTH project BA experiments source with and without momentum were applied. The continuously released propane gas passed a two-dimensional removable obstacle perpendicular to the wind direction. Ground-level gas concentrations and vertical profiles of concentration, temperature, wind speed and turbulence were measured in front of and behind the obstacle. Ultrasonic anemometers providing fast velocity and concentration signals were mounted at three levels on the masts. The observed turbulence was influenced by the stability and the initial momentum of the jet releases. Additional information were taken from the `Dessert tortoise` ammonia jet releases, from the `Fladis` experiment with transition from dense to passive dispersion, and from the `Thorney Island` continuous releases of isothermal freon mixtures. The heat flux was found to moderate the negative buoyancy in both the propane and ammonia experiments. The heat flux measurements are compared to an estimate by analogy with surface layer theory. (au) 41 tabs., 146 ills., 189 refs.

  20. A constitutive law for dense granular flows.

    Science.gov (United States)

    Jop, Pierre; Forterre, Yoël; Pouliquen, Olivier

    2006-06-08

    A continuum description of granular flows would be of considerable help in predicting natural geophysical hazards or in designing industrial processes. However, the constitutive equations for dry granular flows, which govern how the material moves under shear, are still a matter of debate. One difficulty is that grains can behave like a solid (in a sand pile), a liquid (when poured from a silo) or a gas (when strongly agitated). For the two extreme regimes, constitutive equations have been proposed based on kinetic theory for collisional rapid flows, and soil mechanics for slow plastic flows. However, the intermediate dense regime, where the granular material flows like a liquid, still lacks a unified view and has motivated many studies over the past decade. The main characteristics of granular liquids are: a yield criterion (a critical shear stress below which flow is not possible) and a complex dependence on shear rate when flowing. In this sense, granular matter shares similarities with classical visco-plastic fluids such as Bingham fluids. Here we propose a new constitutive relation for dense granular flows, inspired by this analogy and recent numerical and experimental work. We then test our three-dimensional (3D) model through experiments on granular flows on a pile between rough sidewalls, in which a complex 3D flow pattern develops. We show that, without any fitting parameter, the model gives quantitative predictions for the flow shape and velocity profiles. Our results support the idea that a simple visco-plastic approach can quantitatively capture granular flow properties, and could serve as a basic tool for modelling more complex flows in geophysical or industrial applications.

  1. Mobile Commerce

    Directory of Open Access Journals (Sweden)

    Maria Cristina Enache

    2016-07-01

    Full Text Available Mobile commerce, or m-commerce, refers to the use of wireless digital devices to enable transactions on the Web. Described more fully in Chapter 3, m-commerce involves the use of wireless networks to connect cell phones, handheld devices such Blackberries, and personal computers to the Web. Once connected, mobile consumers can conduct transactions, including stock trades, in-store price comparisons, banking, travel reservations, and more.

  2. Asymptotically AdS spacetimes with a timelike Kasner singularity

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Jie [Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 91904 (Israel)

    2016-07-21

    Exact solutions to Einstein’s equations for holographic models are presented and studied. The IR geometry has a timelike cousin of the Kasner singularity, which is the less generic case of the BKL (Belinski-Khalatnikov-Lifshitz) singularity, and the UV is asymptotically AdS. This solution describes a holographic RG flow between them. The solution’s appearance is an interpolation between the planar AdS black hole and the AdS soliton. The causality constraint is always satisfied. The entanglement entropy and Wilson loops are discussed. The boundary condition for the current-current correlation function and the Laplacian in the IR is examined. There is no infalling wave in the IR, but instead, there is a normalizable solution in the IR. In a special case, a hyperscaling-violating geometry is obtained after a dimensional reduction.

  3. New massive gravity and AdS(4) counterterms.

    Science.gov (United States)

    Jatkar, Dileep P; Sinha, Aninda

    2011-04-29

    We show that the recently proposed Dirac-Born-Infeld extension of new massive gravity emerges naturally as a counterterm in four-dimensional anti-de Sitter space (AdS(4)). The resulting on-shell Euclidean action is independent of the cutoff at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS(4) Schwarzschild black hole entropy in a cutoff-independent manner. The parameter values of the resulting counterterm action correspond to a c=0 theory in the context of the duality between AdS(3) gravity and two-dimensional conformal field theory. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory.

  4. Instantons from geodesics in AdS moduli spaces

    Science.gov (United States)

    Ruggeri, Daniele; Trigiante, Mario; Van Riet, Thomas

    2018-03-01

    We investigate supergravity instantons in Euclidean AdS5 × S5/ℤk. These solutions are expected to be dual to instantons of N = 2 quiver gauge theories. On the supergravity side the (extremal) instanton solutions are neatly described by the (lightlike) geodesics on the AdS moduli space for which we find the explicit expression and compute the on-shell actions in terms of the quantised charges. The lightlike geodesics fall into two categories depending on the degree of nilpotency of the Noether charge matrix carried by the geodesic: for degree 2 the instantons preserve 8 supercharges and for degree 3 they are non-SUSY. We expect that these findings should apply to more general situations in the sense that there is a map between geodesics on moduli-spaces of Euclidean AdS vacua and instantons with holographic counterparts.

  5. Twistor description of spinning particles in AdS

    Science.gov (United States)

    Arvanitakis, Alex S.; Barns-Graham, Alec E.; Townsend, Paul K.

    2018-01-01

    The two-twistor formulation of particle mechanics in D-dimensional anti-de Sitter space for D = 4 , 5 , 7, which linearises invariance under the AdS isometry group Sp(4; K ) for K=R,C,H, is generalized to the massless N -extended "spinning particle". The twistor variables are gauge invariant with respect to the initial N local worldline supersymmetries; this simplifies aspects of the quantum theory such as implications of global gauge anomalies. We also give details of the two-supertwistor form of the superparticle, in particular the massive superparticle on AdS5.

  6. AdS5 magnetized solutions in minimal gauged supergravity

    Directory of Open Access Journals (Sweden)

    Jose Luis Blázquez-Salcedo

    2017-08-01

    Full Text Available We construct a generalization of the AdS charged rotating black holes with two equal magnitude angular momenta in five-dimensional minimal gauged supergravity. In addition to the mass, electric charge and angular momentum, the new solutions possess an extra-parameter associated with a non-zero magnitude of the magnetic potential at infinity. In contrast with the known cases, these new black holes possess a non-trivial zero-horizon size limit which describes a one parameter family of spinning charged solitons. All configurations reported in this work approach asymptotically an AdS5 spacetime in global coordinates and are free of pathologies.

  7. AdS5 magnetized solutions in minimal gauged supergravity

    Science.gov (United States)

    Blázquez-Salcedo, Jose Luis; Kunz, Jutta; Navarro-Lérida, Francisco; Radu, Eugen

    2017-08-01

    We construct a generalization of the AdS charged rotating black holes with two equal magnitude angular momenta in five-dimensional minimal gauged supergravity. In addition to the mass, electric charge and angular momentum, the new solutions possess an extra-parameter associated with a non-zero magnitude of the magnetic potential at infinity. In contrast with the known cases, these new black holes possess a non-trivial zero-horizon size limit which describes a one parameter family of spinning charged solitons. All configurations reported in this work approach asymptotically an AdS5 spacetime in global coordinates and are free of pathologies.

  8. Holography in Lovelock Chern-Simons AdS gravity

    Science.gov (United States)

    Cvetković, Branislav; Miskovic, Olivera; Simić, Dejan

    2017-08-01

    We analyze holographic field theory dual to Lovelock Chern-Simons anti-de Sitter (AdS) gravity in higher dimensions using first order formalism. We first find asymptotic symmetries in the AdS sector showing that they consist of local translations, local Lorentz rotations, dilatations and non-Abelian gauge transformations. Then, we compute 1-point functions of energy-momentum and spin currents in a dual conformal field theory and write Ward identities. We find that the holographic theory possesses Weyl anomaly and also breaks non-Abelian gauge symmetry at the quantum level.

  9. Stringy N = (2, 2) holography for AdS3

    Science.gov (United States)

    Datta, Shouvik; Eberhardt, Lorenz; Gaberdiel, Matthias R.

    2018-01-01

    We propose a class of AdS3/CFT2 dualities with N = (2, 2) supersymmetry. These dualities relate string theory on {AdS}_3× ({S}^3× T^4)/G to marginal deformations of the symmetric product orbifold of T^4/G , where G is a dihedral group. We demonstrate that the BPS spectrum calculated from supergravity and string theory agrees with that of the dual CFT. Moreover, the supergravity elliptic genus is shown to reproduce the CFT answer, thus providing further non-trivial evidence in favour of the proposal.

  10. Mobility Impact in Initializing Ring-Based P2P Systems over MANETs

    Directory of Open Access Journals (Sweden)

    Wei Ding

    2008-10-01

    Full Text Available With the encouragement from success of P2P systems in real world application, recently we have seen active research on synergy of P2P systems and mobile ad hoc networks. The paper proposes a solution for mobility disturbance problem in initialization of ring-based P2P systems over ad hoc networks. It is a decentralized ring construction protocol in presence of mobility. A Mobile Ring Ad-hoc Networks (MRAN protocol is presented. MRAN is an extension of RAN [1] under the mobile condition. Simulation result shows MRAN works well with mobility. Upper bound of maximum speed of moving nodes is investigated in simulation.

  11. Detection and Prevention of MAC Layer Misbehavior for ad hoc Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A; Radosavac, Svetlana; Baras, John S

    2004-01-01

    ...) attacks targeting the MAC layer. In this study we assess the performance of the CSMA/CA scheme and investigate its efficiency with regard to security and information assurance in mobile ad hoc wireless networks...

  12. Breast cancer screening in Korean woman with dense breast tissue

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hee Jung [Dept. of Radiology and Research Institute of Radiology, University of Ulsan College of Medicine, Asan Medical Center, Seoul (Korea, Republic of); Ko, Eun Sook [Dept. of Radiology, Sungkyunkwan University School of Medicine, Samsung Medical Center, Seoul (Korea, Republic of); Yi, Ann [Dept. of Radiology, Seoul National University College of Medicine, Seoul National University Hospital, Seoul (Korea, Republic of)

    2015-11-15

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results.

  13. Breast cancer screening in Korean woman with dense breast tissue

    International Nuclear Information System (INIS)

    Shin, Hee Jung; Ko, Eun Sook; Yi, Ann

    2015-01-01

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results

  14. Ultrafast visualization of the structural evolution of dense hydrogen towards warm dense matter

    Science.gov (United States)

    Fletcher, Luke

    2016-10-01

    Hot dense hydrogen far from equilibrium is ubiquitous in nature occurring during some of the most violent and least understood events in our universe such as during star formation, supernova explosions, and the creation of cosmic rays. It is also a state of matter important for applications in inertial confinement fusion research and in laser particle acceleration. Rapid progress occurred in recent years characterizing the high-pressure structural properties of dense hydrogen under static or dynamic compression. Here, we show that spectrally and angularly resolved x-ray scattering measure the thermodynamic properties of dense hydrogen and resolve the ultrafast evolution and relaxation towards thermodynamic equilibrium. These studies apply ultra-bright x-ray pulses from the Linac Coherent Light (LCLS) source. The interaction of rapidly heated cryogenic hydrogen with a high-peak power optical laser is visualized with intense LCLS x-ray pulses in a high-repetition rate pump-probe setting. We demonstrate that electron-ion coupling is affected by the small number of particles in the Debye screening cloud resulting in much slower ion temperature equilibration than predicted by standard theory. This work was supported by the DOE Office of Science, Fusion Energy Science under FWP 100182.

  15. Mystery cloud of AD 536

    Science.gov (United States)

    Stothers, R. B.

    1984-01-01

    The possible cause of the densest and most persistent dry fog on record, which was observed in Europe and the Middle East during AD 536 and 537, is discussed. The fog's long duration toward the south and the high sulfuric acid signal detected in Greenland in ice cores dated around AD 540 support the theory that the fog was due to the explosion of the Rabaul volcano, the occurrence of which has been dated at about AD 540 by the radiocarbon method.

  16. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    . A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes......This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses...... ad-talk would do singularly. The concept ad-talk develops a more nuanced understanding of the role of advertizing in consumer-to-consumer (C2C) communication, since it: (1) changes how brand value is created; (2) mobilizes WOM and (3) influences consumer responses....

  17. Penrose inequality for asymptotically AdS spaces

    Energy Technology Data Exchange (ETDEWEB)

    Itkin, Igor [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Oz, Yaron, E-mail: yaronoz@post.tau.ac.il [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2012-02-28

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  18. Penrose inequality for asymptotically AdS spaces

    International Nuclear Information System (INIS)

    Itkin, Igor; Oz, Yaron

    2012-01-01

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  19. Internet Advertising. Google AdWords versus Facebook Ads

    Directory of Open Access Journals (Sweden)

    Paul PAŞCU

    2014-05-01

    Full Text Available This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  20. Internet Advertising. Google AdWords versus Facebook Ads

    OpenAIRE

    Paul PAŞCU

    2014-01-01

    This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  1. Improved models of dense anharmonic lattices

    Energy Technology Data Exchange (ETDEWEB)

    Rosenau, P., E-mail: rosenau@post.tau.ac.il; Zilburg, A.

    2017-01-15

    We present two improved quasi-continuous models of dense, strictly anharmonic chains. The direct expansion which includes the leading effect due to lattice dispersion, results in a Boussinesq-type PDE with a compacton as its basic solitary mode. Without increasing its complexity we improve the model by including additional terms in the expanded interparticle potential with the resulting compacton having a milder singularity at its edges. A particular care is applied to the Hertz potential due to its non-analyticity. Since, however, the PDEs of both the basic and the improved model are ill posed, they are unsuitable for a study of chains dynamics. Using the bond length as a state variable we manipulate its dispersion and derive a well posed fourth order PDE. - Highlights: • An improved PDE model of a Newtonian lattice renders compacton solutions. • Compactons are classical solutions of the improved model and hence amenable to standard analysis. • An alternative well posed model enables to study head on interactions of lattices' solitary waves. • Well posed modeling of Hertz potential.

  2. Dense Gravity Currents with Breaking Internal Waves

    Science.gov (United States)

    Tanimoto, Yukinobu; Hogg, Charlie; Ouellette, Nicholas; Koseff, Jeffrey

    2017-11-01

    Shoaling and breaking internal waves along a pycnocline may lead to mixing and dilution of dense gravity currents, such as cold river inflows into lakes or brine effluent from desalination plants in near-coastal environments. In order to explore the interaction between gravity currents and breaking interfacial waves a series of laboratory experiments was performed in which a sequence of internal waves impinge upon a shelf-slope gravity current. The waves are generated in a two-layer thin-interface ambient water column under a variety of conditions characterizing both the waves and the gravity currents. The mixing of the gravity current is measured through both intrusive (CTD probe) and nonintrusive (Planar-laser inducted fluorescence) techniques. We will present results over a full range of Froude number (characterizing the waves) and Richardson number (characterizing the gravity current) conditions, and will discuss the mechanisms by which the gravity current is mixed into the ambient environment including the role of turbulence in the process. National Science Foundation.

  3. Thermochemistry of dense hydrous magnesium silicates

    Science.gov (United States)

    Bose, Kunal; Burnley, Pamela; Navrotsky, Alexandra

    1994-01-01

    Recent experimental investigations under mantle conditions have identified a suite of dense hydrous magnesium silicate (DHMS) phases that could be conduits to transport water to at least the 660 km discontinuity via mature, relatively cold, subducting slabs. Water released from successive dehydration of these phases during subduction could be responsible for deep focus earthquakes, mantle metasomatism and a host of other physico-chemical processes central to our understanding of the earth's deep interior. In order to construct a thermodynamic data base that can delineate and predict the stability ranges for DHMS phases, reliable thermochemical and thermophysical data are required. One of the major obstacles in calorimetric studies of phases synthesized under high pressure conditions has been limitation due to the small (less than 5 mg) sample mass. Our refinement of calorimeter techniques now allow precise determination of enthalpies of solution of less than 5 mg samples of hydrous magnesium silicates. For example, high temperature solution calorimetry of natural talc (Mg(0.99) Fe(0.01)Si4O10(OH)2), periclase (MgO) and quartz (SiO2) yield enthalpies of drop solution at 1044 K to be 592.2 (2.2), 52.01 (0.12) and 45.76 (0.4) kJ/mol respectively. The corresponding enthalpy of formation from oxides at 298 K for talc is minus 5908.2 kJ/mol agreeing within 0.1 percent to literature values.

  4. Characterisation of Ferrosilicon Dense Medium Separation Material

    International Nuclear Information System (INIS)

    Waanders, F. B.; Mans, A.

    2003-01-01

    Ferrosilicon is used in the dense medium separation of iron ore at Kumba resources, Sishen, South Africa. Due to high cost and losses that occur during use, maximum recovery by means of magnetic separation is aimed for. The purpose of this project was to determine the characteristics of the unused Fe-Si and then to characterise the changes that occur during storage and use thereof. Scanning electron microscopy was used to determine the composition of each sample, whilst Moessbauer spectroscopy yielded a two-sextet spectrum with hyperfine magnetic field strengths of 20 and 31 T, respectively, for the fresh samples. Additional hematite oxide peaks appeared in the Moessbauer spectra after use of the Fe-Si over a length of time, but this did not result in a dramatic degradation of the medium. No definite changes occurred during correct storage methods. It was, however, found that the biggest loss of Fe-Si was due to the abrasion of the particles, which resulted in the formation of an oxihydroxide froth, during the process.

  5. Elemental nitrogen partitioning in dense interstellar clouds.

    Science.gov (United States)

    Daranlot, Julien; Hincelin, Ugo; Bergeat, Astrid; Costes, Michel; Loison, Jean-Christophe; Wakelam, Valentine; Hickson, Kevin M

    2012-06-26

    Many chemical models of dense interstellar clouds predict that the majority of gas-phase elemental nitrogen should be present as N(2), with an abundance approximately five orders of magnitude less than that of hydrogen. As a homonuclear diatomic molecule, N(2) is difficult to detect spectroscopically through infrared or millimeter-wavelength transitions. Therefore, its abundance is often inferred indirectly through its reaction product N(2)H(+). Two main formation mechanisms, each involving two radical-radical reactions, are the source of N(2) in such environments. Here we report measurements of the low temperature rate constants for one of these processes, the N + CN reaction, down to 56 K. The measured rate constants for this reaction, and those recently determined for two other reactions implicated in N(2) formation, are tested using a gas-grain model employing a critically evaluated chemical network. We show that the amount of interstellar nitrogen present as N(2) depends on the competition between its gas-phase formation and the depletion of atomic nitrogen onto grains. As the reactions controlling N(2) formation are inefficient, we argue that N(2) does not represent the main reservoir species for interstellar nitrogen. Instead, elevated abundances of more labile forms of nitrogen such as NH(3) should be present on interstellar ices, promoting the eventual formation of nitrogen-bearing organic molecules.

  6. Deuterium fractionation in dense interstellar clouds

    International Nuclear Information System (INIS)

    Millar, T.J.; Bennett, A.; Herbst, E.

    1989-01-01

    The time-dependent gas-phase chemistry of deuterium fractionation in dense interstellar clouds ranging in temperature between 10 and 70 K was investigated using a pseudo-time-dependent model similar to that of Brown and Rice (1986). The present approach, however, considers much more complex species, uses more deuterium fractionation reactions, and includes the use of new branching ratios for dissociative recombinations reactions. Results indicate that, in cold clouds, the major and most global source of deuterium fractionation is H2D(+) and ions derived from it, such as DCO(+) and H2DO(+). In warmer clouds, reactions of CH2D(+), C2HD(+), and associated species lead to significant fractionation even at 70 K, which is the assumed Orion temperature. The deuterium abundance ratios calculated at 10 K are consistent with those observed in TMC-1 for most species. However, a comparison between theory and observatiom for Orion, indicates that, for species in the ambient molecular cloud, the early-time results obtained with the old dissociative recombination branching ratios are superior if a temperature of 70 K is utilized. 60 refs

  7. Deuterium fractionation in dense interstellar clouds

    Science.gov (United States)

    Millar, T. J.; Bennett, A.; Herbst, Eric

    1989-05-01

    The time-dependent gas-phase chemistry of deuterium fractionation in dense interstellar clouds ranging in temperature between 10 and 70 K was investigated using a pseudo-time-dependent model similar to that of Brown and Rice (1986). The present approach, however, considers much more complex species, uses more deuterium fractionation reactions, and includes the use of new branching ratios for dissociative recombinations reactions. Results indicate that, in cold clouds, the major and most global source of deuterium fractionation is H2D(+) and ions derived from it, such as DCO(+) and H2DO(+). In warmer clouds, reactions of CH2D(+), C2HD(+), and associated species lead to significant fractionation even at 70 K, which is the assumed Orion temperature. The deuterium abundance ratios calculated at 10 K are consistent with those observed in TMC-1 for most species. However, a comparison between theory and observatiom for Orion, indicates that, for species in the ambient molecular cloud, the early-time results obtained with the old dissociative recombination branching ratios are superior if a temperature of 70 K is utilized.

  8. Load Designs For MJ Dense Plasma Foci

    Science.gov (United States)

    Link, A.; Povlius, A.; Anaya, R.; Anderson, M. G.; Angus, J. R.; Cooper, C. M.; Falabella, S.; Goerz, D.; Higginson, D.; Holod, I.; McMahon, M.; Mitrani, J.; Koh, E. S.; Pearson, A.; Podpaly, Y. A.; Prasad, R.; van Lue, D.; Watson, J.; Schmidt, A. E.

    2017-10-01

    Dense plasma focus (DPF) Z-pinches are compact pulse power driven devices with coaxial electrodes. The discharge of DPF consists of three distinct phases: first generation of a plasma sheath, plasma rail gun phase where the sheath is accelerated down the electrodes and finally an implosion phase where the plasma stagnates into a z-pinch geometry. During the z-pinch phase, DPFs can produce MeV ion beams, x-rays and neutrons. Megaampere class DPFs with deuterium fills have demonstrated neutron yields in the 1012 neutrons/shot range with pulse durations of 10-100 ns. Kinetic simulations using the code Chicago are being used to evaluate various load configurations from initial sheath formation to the final z-pinch phase for DPFs with up to 5 MA and 1 MJ coupled to the load. Results will be presented from the preliminary design simulations. LLNL-ABS-734785 This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory (LLNL) under Contract DE-AC52-07NA27344 and with support from the Computing Grand Challenge program at LLNL.

  9. Kinetic Simulations of Dense Plasma Focus Breakdown

    Science.gov (United States)

    Schmidt, A.; Higginson, D. P.; Jiang, S.; Link, A.; Povilus, A.; Sears, J.; Bennett, N.; Rose, D. V.; Welch, D. R.

    2015-11-01

    A dense plasma focus (DPF) device is a type of plasma gun that drives current through a set of coaxial electrodes to assemble gas inside the device and then implode that gas on axis to form a Z-pinch. This implosion drives hydrodynamic and kinetic instabilities that generate strong electric fields, which produces a short intense pulse of x-rays, high-energy (>100 keV) electrons and ions, and (in deuterium gas) neutrons. A strong factor in pinch performance is the initial breakdown and ionization of the gas along the insulator surface separating the two electrodes. The smoothness and isotropy of this ionized sheath are imprinted on the current sheath that travels along the electrodes, thus making it an important portion of the DPF to both understand and optimize. Here we use kinetic simulations in the Particle-in-cell code LSP to model the breakdown. Simulations are initiated with neutral gas and the breakdown modeled self-consistently as driven by a charged capacitor system. We also investigate novel geometries for the insulator and electrodes to attempt to control the electric field profile. The initial ionization fraction of gas is explored computationally to gauge possible advantages of pre-ionization which could be created experimentally via lasers or a glow-discharge. Prepared by LLNL under Contract DE-AC52-07NA27344.

  10. Packing frustration in dense confined fluids.

    Science.gov (United States)

    Nygård, Kim; Sarman, Sten; Kjellander, Roland

    2014-09-07

    Packing frustration for confined fluids, i.e., the incompatibility between the preferred packing of the fluid particles and the packing constraints imposed by the confining surfaces, is studied for a dense hard-sphere fluid confined between planar hard surfaces at short separations. The detailed mechanism for the frustration is investigated via an analysis of the anisotropic pair distributions of the confined fluid, as obtained from integral equation theory for inhomogeneous fluids at pair correlation level within the anisotropic Percus-Yevick approximation. By examining the mean forces that arise from interparticle collisions around the periphery of each particle in the slit, we calculate the principal components of the mean force for the density profile--each component being the sum of collisional forces on a particle's hemisphere facing either surface. The variations of these components with the slit width give rise to rather intricate changes in the layer structure between the surfaces, but, as shown in this paper, the basis of these variations can be easily understood qualitatively and often also semi-quantitatively. It is found that the ordering of the fluid is in essence governed locally by the packing constraints at each single solid-fluid interface. A simple superposition of forces due to the presence of each surface gives surprisingly good estimates of the density profiles, but there remain nontrivial confinement effects that cannot be explained by superposition, most notably the magnitude of the excess adsorption of particles in the slit relative to bulk.

  11. Inference by replication in densely connected systems.

    Science.gov (United States)

    Neirotti, Juan P; Saad, David

    2007-10-01

    An efficient Bayesian inference method for problems that can be mapped onto dense graphs is presented. The approach is based on message passing where messages are averaged over a large number of replicated variable systems exposed to the same evidential nodes. An assumption about the symmetry of the solutions is required for carrying out the averages; here we extend the previous derivation based on a replica-symmetric- (RS)-like structure to include a more complex one-step replica-symmetry-breaking-like (1RSB-like) ansatz. To demonstrate the potential of the approach it is employed for studying critical properties of the Ising linear perceptron and for multiuser detection in code division multiple access (CDMA) under different noise models. Results obtained under the RS assumption in the noncritical regime give rise to a highly efficient signal detection algorithm in the context of CDMA; while in the critical regime one observes a first-order transition line that ends in a continuous phase transition point. Finite size effects are also observed. While the 1RSB ansatz is not required for the original problems, it was applied to the CDMA signal detection problem with a more complex noise model that exhibits RSB behavior, resulting in an improvement in performance.

  12. Mobile Marketing

    OpenAIRE

    竹安, 数博; Takeyasu, Kazuhiro

    2005-01-01

    This article deals with one of the modern trends in marketing communication, which is mobile marketing. Towards the end of 2008, several projects which use mobile phones for target marketing communication were launched. Commercial SMS´s are sent on the base of agreement or registration of the consumers on special websites, for example hellomobil.cz. The benefit for the consumers is the bonus which can have more forms - not only sending money to the account, free SMS´s/MMS´s and minutes but al...

  13. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...... the symposium collects six articles written by authors who all presented papers at the event. Contributing authors: Ditte Bendix Lanng, Ole B. Jensen, David Pinder, Magnus Rönn, Jani Tartia, Anne Tietjen, Anne Elisabeth Toft, Even Smith Wergeland, Simon Wind...

  14. Muhammad As`ad Bugis

    NARCIS (Netherlands)

    Bruinessen, M.M. van

    1998-01-01

    MUHAMMAD AS`AD BUGIS [Wajo, South Sulawesi, Indonesia, 1907-1953] [Dictionnaire biographique des savants et grandes figures du monde musulman périphérique, du XIXe siècle à nos jours, Fasc. no 2. Paris: CNRS-EHESS, 1998, p. 22-23] Muhammad As`ad was one of the greatest `ulamâ of South

  15. AdS vacua from dilaton tadpoles and form fluxes

    Directory of Open Access Journals (Sweden)

    J. Mourad

    2017-05-01

    Full Text Available We describe how unbounded three-form fluxes can lead to families of AdS3×S7 vacua, with constant dilaton profiles, in the USp(32 model with “brane supersymmetry breaking” and in the U(32 0'B model, if their (projective-disk dilaton tadpoles are taken into account. We also describe how, in the SO(16×SO(16 heterotic model, if the torus vacuum energy Λ is taken into account, unbounded seven-form fluxes can support similar AdS7×S3 vacua, while unbounded three-form fluxes, when combined with internal gauge fields, can support AdS3×S7 vacua, which continue to be available even if Λ is neglected. In addition, special gauge field fluxes can support, in the SO(16×SO(16 heterotic model, a set of AdSn×S10−n vacua, for all n=2,..,8. String loop and α′ corrections appear under control when large form fluxes are allowed.

  16. A Space-Frequency Data Compression Method for Spatially Dense Laser Doppler Vibrometer Measurements

    Directory of Open Access Journals (Sweden)

    José Roberto de França Arruda

    1996-01-01

    Full Text Available When spatially dense mobility shapes are measured with scanning laser Doppler vibrometers, it is often impractical to use phase-separation modal parameter estimation methods due to the excessive number of highly coupled modes and to the prohibitive computational cost of processing huge amounts of data. To deal with this problem, a data compression method using Chebychev polynomial approximation in the frequency domain and two-dimensional discrete Fourier series approximation in the spatial domain, is proposed in this article. The proposed space-frequency regressive approach was implemented and verified using a numerical simulation of a free-free-free-free suspended rectangular aluminum plate. To make the simulation more realistic, the mobility shapes were synthesized by modal superposition using mode shapes obtained experimentally with a scanning laser Doppler vibrometer. A reduced and smoothed model, which takes advantage of the sinusoidal spatial pattern of structural mobility shapes and the polynomial frequency-domain pattern of the mobility shapes, is obtained. From the reduced model, smoothed curves with any desired frequency and spatial resolution can he produced whenever necessary. The procedure can he used either to generate nonmodal models or to compress the measured data prior to modal parameter extraction.

  17. Dense matter in strong gravitational field of neutron star

    Indian Academy of Sciences (India)

    Sajad A. Bhat

    2018-02-10

    Feb 10, 2018 ... Abstract. Mass, radius and moment of inertia are direct probes of compositions and Equation of State (EoS) of dense matter in neutron star interior. These are computed for novel phases of dense matter involving hyperons and antikaon condensate and their observable consequences are discussed in this ...

  18. Dense graph limits under respondent-driven sampling

    Indian Academy of Sciences (India)

    Siva Athreya

    Sub-graph count (fingerprints). Source: IUPUI Network Sampling course. Page 15. Aim and Result. • Motivation: provide a rigorous framework for Respondent. Driven Sampling on dense graphs. • Theorem : (in words). Limit of a dense graph sequence constructed via R.D.S., where the sequence of the vertex-sets is ergodic, ...

  19. Mining connected global and local dense subgraphs for bigdata

    Science.gov (United States)

    Wu, Bo; Shen, Haiying

    2016-01-01

    The problem of discovering connected dense subgraphs of natural graphs is important in data analysis. Discovering dense subgraphs that do not contain denser subgraphs or are not contained in denser subgraphs (called significant dense subgraphs) is also critical for wide-ranging applications. In spite of many works on discovering dense subgraphs, there are no algorithms that can guarantee the connectivity of the returned subgraphs or discover significant dense subgraphs. Hence, in this paper, we define two subgraph discovery problems to discover connected and significant dense subgraphs, propose polynomial-time algorithms and theoretically prove their validity. We also propose an algorithm to further improve the time and space efficiency of our basic algorithm for discovering significant dense subgraphs in big data by taking advantage of the unique features of large natural graphs. In the experiments, we use massive natural graphs to evaluate our algorithms in comparison with previous algorithms. The experimental results show the effectiveness of our algorithms for the two problems and their efficiency. This work is also the first that reveals the physical significance of significant dense subgraphs in natural graphs from different domains.

  20. Interparticle interaction and transport processes in dense semiclassical plasmas

    International Nuclear Information System (INIS)

    Baimbetov, F.B.; Giniyatova, Sh.G.

    2005-01-01

    On the basis of the density response formalism an expression for the pseudopotential of dense semiclassical plasma, which takes account of quantum-mechanical effects, local field corrections, and electronic screening effects is obtained. The static structure factors taking into account both local fields and quantum-mechanical effects are calculated. An electrical conductivity, thermal conductivity, and viscosity of dense semiclassical plasma are studied

  1. Dynamics of dense direct-seeded stands of southern pines

    Science.gov (United States)

    J.C.G. Goelz

    2006-01-01

    Direct seeding of southern pines is an effective method of artificial regeneration, producing extremely dense stands when survival exceeds expectations. Long-term studies of dense direct-seeded stands provide ideal data for exploring development of stands as they approach the limit of maximum stand density. I present data from seven studies with ages of stands ranging...

  2. The effect of playing advergames that promote energy-dense snacks or fruit on actual food intake among children.

    Science.gov (United States)

    Folkvord, Frans; Anschütz, Doeschka J; Buijzen, Moniek; Valkenburg, Patti M

    2013-02-01

    Previous studies have focused on the effects of television advertising on the energy intake of children. However, the rapidly changing food-marketing landscape requires research to measure the effects of nontraditional forms of marketing on the health-related behaviors of children. The main aim of this study was to examine the effect of advergames that promote energy-dense snacks or fruit on children's ad libitum snack and fruit consumption and to examine whether this consumption differed according to brand and product type (energy-dense snacks and fruit). The second aim was to examine whether advergames can stimulate fruit intake. We used a randomized between-subject design with 270 children (age: 8-10 y) who played an advergame that promoted energy-dense snacks (n = 69), fruit (n = 67), or nonfood products (n = 65) or were in the control condition (n = 69). Subsequently, we measured the free intake of energy-dense snacks and fruit. The children then completed questionnaire measures, and we weighed and measured them. The main finding was that playing an advergame containing food cues increased general energy intake, regardless of the advertised brand or product type (energy-dense snacks or fruit), and this activity particularly increased the intake of energy-dense snack foods. Children who played the fruit version of the advergame did not eat significantly more fruit than did those in the other groups. The findings suggest that playing advergames that promote food, including either energy-dense snacks or fruit, increases energy intake in children.

  3. Sustainable Mobility

    DEFF Research Database (Denmark)

    Kjærulff, Aslak Aamot

    This paper combines strands of mobilities theory and planning theory, and develops a qualitative approach to look across emerging planning practices. By actively following 8 Danish urban and transport planners, over the course of 2 years, we learn how their practices have changed, inspired...

  4. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  5. Driving advertising into mobile mediums : Study of consumer attitudes towards mobile advertising and of factors affecting on them

    OpenAIRE

    Pietz, Michal; Storbacka, Lauri

    2007-01-01

    The high penetration rate of mobile phones along with the recent technological development has created a whole new marketing medium named mobile advertising filled with possibilities for the advertisers. Earlier studies have although indicated the success of this new advertising channel to depend on user acceptance of receiving mobile ads. Wherefore a study of consumer attitudes towards mobile advertising can be considered necessary in order to create a lucrative business. Even though this to...

  6. Eculizumab in Pediatric Dense Deposit Disease.

    Science.gov (United States)

    Oosterveld, Michiel J S; Garrelfs, Mark R; Hoppe, Bernd; Florquin, Sandrine; Roelofs, Joris J T H; van den Heuvel, L P; Amann, Kerstin; Davin, Jean-Claude; Bouts, Antonia H M; Schriemer, Pietrik J; Groothoff, Jaap W

    2015-10-07

    Dense deposit disease (DDD), a subtype of C3 glomerulopathy, is a rare disease affecting mostly children. Treatment options are limited. Debate exists whether eculizumab, a monoclonal antibody against complement factor C5, is effective in DDD. Reported data are scarce, especially in children. The authors analyzed clinical and histologic data of five pediatric patients with a native kidney biopsy diagnosis of DDD. Patients received eculizumab as therapy of last resort for severe nephritic or nephrotic syndrome with alternative pathway complement activation; this therapy was given only when the patients had not or only marginally responded to immunosuppressive therapy. Outcome measures were kidney function, proteinuria, and urine analysis. In all, seven disease episodes were treated with eculizumab (six episodes of severe nephritic syndrome [two of which required dialysis] and one nephrotic syndrome episode). Median age at treatment start was 8.4 (range, 5.9-13) years. For three treatment episodes, eculizumab was the sole immunosuppressive treatment. In all patients, both proteinuria and renal function improved significantly within 12 weeks of treatment (median urinary protein-to-creatinine ratio of 8.5 [range, 2.2-17] versus 1.1 [range, 0.2-2.0] g/g, P<0.005, and eGFR of 58 [range, 17-114] versus 77 [range, 50-129] ml/min per 1.73 m(2), P<0.01). A striking finding was the disappearance of leukocyturia within 1 week after the first eculizumab dose in all five episodes with leukocyturia at treatment initiation. In this case series of pediatric patients with DDD, eculizumab treatment was associated with reduction in proteinuria and increase in eGFR. Leukocyturia resolved within 1 week of initiation of eculizumab treatment. These results underscore the need for a randomized trial of eculizumab in DDD. Copyright © 2015 by the American Society of Nephrology.

  7. 16. Hot dense plasma atomic processes

    International Nuclear Information System (INIS)

    Werner, Dappen; Totsuji, H.; Nishii, Y.

    2002-01-01

    This document gathers 13 articles whose common feature is to deal with atomic processes in hot plasmas. Density functional molecular dynamics method is applied to the hydrogen plasma in the domain of liquid metallic hydrogen. The effects of the density gradient are taken into account in both the electronic kinetic energy and the exchange energy and it is shown that they almost cancel with each other, extending the applicability of the Thomas-Fermi-Dirac approximation to the cases where the density gradient is not negligible. Another article reports about space and time resolved M-shell X-ray measurements of a laser-produced gas jet xenon plasma. Plasma parameters have been measured by ion acoustic and electron plasma waves Thomson scattering. Photo-ionization becomes a dominant atomic process when the density and the temperature of plasmas are relatively low and when the plasma is submitted to intense external radiation. It is shown that 2 plasmas which have a very different density but have the same ionization parameters, are found in a similar ionization state. Most radiation hydrodynamics codes use radiative opacity data from available libraries of atomic data. Several articles are focused on the determination of one group Rosseland and Planck mean analytical formulas for several single elements used in inertial fusion targets. In another paper the plasma density effect on population densities, effective ionization, recombination rate coefficients and on emission lines from carbon and Al ions in hot dense plasma, is studied. The last article is devoted to a new atomic model in plasmas that considers the occupation probability of the bound state and free state density in the presence of the plasma micro-field. (A.C.)

  8. Thermodynamics of Einstein-Proca AdS black holes

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hai-Shan [Institute for Advanced Physics & Mathematics, Zhejiang University of Technology, Hangzhou 310023 (China); Lü, H. [Department of Physics, Beijing Normal University, Beijing 100875 (China); Pope, C.N. [George P. & Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A& M University, College Station, TX 77843 (United States); DAMTP, Centre for Mathematical Sciences, Cambridge University, Wilberforce Road, Cambridge CB3 OWA (United Kingdom)

    2014-06-18

    We study static spherically-symmetric solutions of the Einstein-Proca equations in the presence of a negative cosmological constant. We show that the theory admits solutions describing both black holes and also solitons in an asymptotically AdS background. Interesting subtleties can arise in the computation of the mass of the solutions and also in the derivation of the first law of thermodynamics. We make use of holographic renormalisation in order to calculate the mass, even in cases where the solutions have a rather slow approach to the asymptotic AdS geometry. By using the procedure developed by Wald, we derive the first law of thermodynamics for the black hole and soliton solutions. This includes a non-trivial contribution associated with the Proca “charge”. The solutions cannot be found analytically, and so we make use of numerical integration techniques to demonstrate their existence.

  9. Oscillating shells and oscillating balls in AdS

    Science.gov (United States)

    Banerjee, Avik; Kundu, Arnab; Roy, Pratik; Virmani, Amitabh

    2017-07-01

    It has recently been reported that certain thin timelike shells undergo oscillatory motion in AdS. In this paper, we compute two-point function of a probe field in the geodesic approximation in such an oscillating shell background. We confirm that the two-point function exhibits an oscillatory behaviour following the motion of the shell. We show that similar oscillatory dynamics is possible when the perfect fluid on the shell has a polytropic equation of state. Moreover, we show that certain ball like configurations in AdS also exhibit oscillatory motion and comment on how such a solution can be smoothly matched to an appropriate exterior solution. We also demonstrate that the weak energy condition is satisfied for these oscillatory configurations.

  10. Smoothed transitions in higher spin AdS gravity

    International Nuclear Information System (INIS)

    Banerjee, Shamik; Shenker, Stephen; Castro, Alejandra; Hellerman, Simeon; Hijano, Eliot; Lepage-Jutier, Arnaud; Maloney, Alexander

    2013-01-01

    We consider CFTs conjectured to be dual to higher spin theories of gravity in AdS 3 and AdS 4 . Two-dimensional CFTs with W N symmetry are considered in the λ = 0 (k → ∞) limit where they are conjectured to be described by continuous orbifolds. The torus partition function is computed, using reasonable assumptions, and equals that of a free-field theory. We find no phase transition at temperatures of order 1; the usual Hawking–Page phase transition is removed by the highly degenerate light states associated with conical defect states in the bulk. Three-dimensional Chern–Simons matter CFTs with vector-like matter are considered on T 3 , where the dynamics is described by an effective theory for the eigenvalues of the holonomies. Likewise, we find no evidence for a Hawking–Page phase transition at a large level k. (paper)

  11. The Mixed Phase of Charged AdS Black Holes

    Directory of Open Access Journals (Sweden)

    Piyabut Burikham

    2016-01-01

    Full Text Available We study the mixed phase of charged AdS black hole and radiation when the total energy is fixed below the threshold to produce a stable charged black hole branch. The coexistence conditions for the charged AdS black hole and radiation are derived for the generic case when radiation particles carry charge. The phase diagram of the mixed phase is demonstrated for both fixed potential and charge ensemble. In the dual gauge picture, they correspond to the mixed phase of quark-gluon plasma (QGP and hadron gas in the fixed chemical potential and density ensemble, respectively. In the nuclei and heavy-ion collisions at intermediate energies, the mixed phase of exotic QGP and hadron gas could be produced. The mixed phase will condense and evaporate into the hadron gas as the fireball expands.

  12. AdS gravity and the scalar glueball spectrum

    Energy Technology Data Exchange (ETDEWEB)

    Vento, Vicente [Departament de Fisica Teorica, Universitat de Valencia y Institut de Fisica Corpuscular, Consejo Superior de Investigaciones Cientificas, Burjassot (Valencia) (Spain)

    2017-09-15

    The scalar glueball spectrum has attracted much attention since the formulation of Quantum Chromodynamics. Different approaches give very different results for the glueball masses. We revisit the problem from the perspective of the AdS/CFT correspondence. (orig.)

  13. AdS sub 2 supergravity and superconformal quantum mechanics

    CERN Document Server

    Astorino, M; Klemm, D; Zanon, D

    2003-01-01

    We investigate the asymptotic dynamics of topological anti-de Sitter supergravity in two dimensions. Starting from the formulation as a BF theory, it is shown that the AdS sub 2 boundary conditions imply that the asymptotic symmetries form a super-Virasoro algebra. Using the central charge of this algebra in Cardy's formula, we exactly reproduce the thermodynamical entropy of AdS sub 2 black holes. Furthermore, we show that the dynamics of the dilaton and its superpartner reduces to that of superconformal transformations that leave invariant one chiral component of the stress tensor supercurrent of a two-dimensional conformal field theory. This dynamics is governed by a supersymmetric extension of the de Alfaro-Fubini-Furlan model of conformal quantum mechanics. Finally, two-dimensional de Sitter gravity is also considered, and the dS sub 2 entropy is computed by counting CFT states.

  14. Evaluation of Radar-Rainfall Uncertainties by a Highly Dense Rain Gauge Network

    Science.gov (United States)

    Villarini, G.; Mandapaka, P. V.; Krajewski, W. F.

    2007-05-01

    It is well acknowledged that there are large uncertainties associated with radar-rainfall estimates. Numerous sources of these errors are due to parameter estimation, the observational system and measurement principle, and not fully understood physical processes. To describe these uncertainties, rain gauge data are usually considered as a good approximation of the true rainfall values. However, in the vast majority of the cases, the available networks are too sparse to accurately describe the true rainfall process, adding uncertainties to the radar-rain gauge comparison. The authors will use a large (seven years) dataset of rainfall measurements by a highly dense rain gauge network deployed during the HYdrological Radar EXperiment (HYREX) in the Brue catchment, south-west part of England. This network presents unprecedented opportunity for the investigation of radar-rainfall uncertainties. In addition to the length of the dataset, one unique characteristic resides in its configuration: on a regular grid with 2×2 km2 resolution, there are 20 pixels with one gauge, seven pixels with two gauges and two super-dense pixels with eight gauges. The radar-rainfall estimates for the same time period are from C-band weather radar located at approximately 40 km from the catchment. Focusing on the two very dense pixels, the authors describe the uncertainties in radar-rainfall estimates for different accumulation times (5-minute to daily), modeling the errors using an additive and a multiplicative model.

  15. Dense and Cellular Zirconia Produced by Gel Casting with Agar: Preparation and High Temperature Characterization

    Directory of Open Access Journals (Sweden)

    Jean-Marc Tulliani

    2013-01-01

    Full Text Available A modified gel-casting process was developed to produce both dense and highly porous (40% volume yttria tetragonal zirconia polycrystal (Y-TZP using agar, a natural polysaccharide, as gelling agent. A fugitive phase, made of commercial polyethylene spheres, was added to the ceramic suspension before gelling to produce cellular ceramic structures. The characterization of the microstructural features of both dense and cellular ceramics was carried out by FEG SEM analysis of cross-sections produced by focused ion beam. The mechanical properties of the components were characterized at room temperature by nanoindentation tests in continuous stiffness measurement mode, by investigating the direct effect of the presence of residual microporosity. The presence of a diffuse residual microporosity from incomplete gel deaeration resulted in a decay of the bending strength and of the elastic modulus. The mechanical behavior of both dense and cellular zirconia (in terms of elastic modulus, flexural strength, and deformation at rupture was investigated by performing four-point bending tests at the temperature of 1500°C.

  16. Mobile Prototyping Platforms for Remote Engineering Applications

    Directory of Open Access Journals (Sweden)

    Karsten Henke

    2009-08-01

    Full Text Available This paper describes a low-cost mobile communication platform as a universal rapid-prototyping system, which is based on the Quadrocopter concept. At the Integrated Hardware and Software Systems Group at the Ilmenau University of Technology these mobile platforms are used to motivate bachelor and master students to study Computer Engineering sciences. This could be done by increasing their interest in technical issues, using this platform as integral part of a new ad-hoc lab to demonstrate different aspects in the area of Mobile Communication as well as universal rapid prototyping nodes to investigate different mechanisms for self-organized mobile communication systems within the International Graduate School on Mobile Communications. Beside the three fields of application, the paper describes the current architecture concept of the mobile prototyping platform as well as the chosen control mechanism and the assigned sensor systems to fulfill all the required tasks.

  17. Bjorken flow from an AdS Schwarzschild black hole

    OpenAIRE

    Alsup, James; Siopsis, George

    2007-01-01

    We consider a large black hole in asymptotically AdS spacetime of arbitrary dimension with a Minkowski boundary. By performing an appropriate slicing as we approach the boundary, we obtain via holographic renormalization a gauge theory fluid obeying Bjorken hydrodynamics in the limit of large longitudinal proper time. The metric we obtain reproduces to leading order the metric recently found as a direct solution of the Einstein equations in five dimensions. Our results are also in agreement w...

  18. Generalised structures for N=1 AdS backgrounds

    Energy Technology Data Exchange (ETDEWEB)

    Coimbra, André [Institut für Theoretische Physik & Center for Quantum Engineering and Spacetime Research,Leibniz Universität Hannover,Appelstraße 2, 30167 Hannover (Germany); Strickland-Constable, Charles [Institut de physique théorique, Université Paris Saclay, CEA, CNRS, Orme des Merisiers, F-91191 Gif-sur-Yvette (France)

    2016-11-16

    We expand upon a claim made in a recent paper [http://arxiv.org/abs/1411.5721] that generic minimally supersymmetric AdS backgrounds of warped flux compactifications of Type II and M theory can be understood as satisfying a straightforward weak integrability condition in the language of E{sub d(d)}×ℝ{sup +} generalised geometry. Namely, they are spaces admitting a generalised G-structure set by the Killing spinor and with constant singlet generalised intrinsic torsion.

  19. Aspects of holography and rotating AdS black holes

    CERN Document Server

    Berman, D S

    1999-01-01

    A comparison is made between the thermodynamics of weakly and stronglycoupled Yang-Mills with fixed angular momentum. The free energy of the stronglycoupled Yang-Mills is calculated by using a dual supergravity descriptioncorresponding to a rotating black hole in an Anti de Sitter (AdS) background.All thermodynamic quantities are shown have the same ratio of 3/4 (independentof angular momentum) between strong and weak coupling.

  20. ADS Bumblebee comes of age

    Science.gov (United States)

    Accomazzi, Alberto; Kurtz, Michael J.; Henneken, Edwin; Grant, Carolyn S.; Thompson, Donna M.; Chyla, Roman; McDonald, Steven; Shaulis, Taylor J.; Blanco-Cuaresma, Sergi; Shapurian, Golnaz; Hostetler, Timothy W.; Templeton, Matthew R.; Lockhart, Kelly E.

    2018-01-01

    The ADS Team has been working on a new system architecture and user interface named “ADS Bumblebee” since 2015. The new system presents many advantages over the traditional ADS interface and search engine (“ADS Classic”). A new, state of the art search engine features a number of new capabilities such as full-text search, advanced citation queries, filtering of results and scalable analytics for any search results. Its services are built on a cloud computing platform which can be easily scaled to match user demand. The Bumblebee user interface is a rich javascript application which leverages the features of the search engine and integrates a number of additional visualizations such as co-author and co-citation networks which provide a hierarchical view of research groups and research topics, respectively. Displays of paper analytics provide views of the basic article metrics (citations, reads, and age). All visualizations are interactive and provide ways to further refine search results. This new search system, which has been in beta for the past three years, has now matured to the point that it provides feature and content parity with ADS Classic, and has become the recommended way to access ADS content and services. Following a successful transition to Bumblebee, the use of ADS Classic will be discouraged starting in 2018 and phased out in 2019. You can access our new interface at https://ui.adsabs.harvard.edu

  1. Enthalpy and the mechanics of AdS black holes

    International Nuclear Information System (INIS)

    Kastor, David; Traschen, Jennie; Ray, Sourya

    2009-01-01

    We present geometric derivations of the Smarr formula for static AdS black holes and an expanded first law that includes variations in the cosmological constant. These two results are further related by a scaling argument based on Euler's theorem. The key new ingredient in the constructions is a two-form potential for the static Killing field. Surface integrals of the Killing potential determine the coefficient of the variation of Λ in the first law. This coefficient is proportional to a finite, effective volume for the region outside the AdS black hole horizon, which can also be interpreted as minus the volume excluded from a spatial slice by the black hole horizon. This effective volume also contributes to the Smarr formula. Since Λ is naturally thought of as a pressure, the new term in the first law has the form of effective volume times change in pressure that arises in the variation of the enthalpy in classical thermodynamics. This and related arguments suggest that the mass of an AdS black hole should be interpreted as the enthalpy of the spacetime.

  2. Ad skepticisms: Antecedents and consequences

    Directory of Open Access Journals (Sweden)

    Rafique Ahmed

    2016-11-01

    Full Text Available Engaging customer is the burning issue for companies especially the service sector, either online or offline. Minimizing the customer disengagement is the same like reducing dissatisfaction or churn. Customer disengagement may be caused by many factors, ad skepticism is one of them; ad skepticism has two main antecedents personality variable and consumption/influencing varia-bles. This research explores the relationship of ad skepticism with customer disengagement through personality variables which are cynicism, reactance and self-esteem. The unit of analysis is the telecom and banking industry of Pakistan which is foreseeing an era of virtual currency and both are customer oriented industries. Only offline disengagement is researched and data is collected from the Business centers of telecom and banking branches dealing with virtual curren-cy in Pakistan. Hypothetical model is given after digging the relevant literature; model is tested through confirmatory factor analysis and structural equation modeling. Eight hypotheses were purposed from the connections of model, all hypotheses are accepted except the cynicism posi-tive effect on social ad skepticism. This can be due to commonality of social and charity in Paki-stani society, Muslims consider charity as a pious act and they do not think for cynic behavior in charity or social related works. The results manifest that customers in telecom industry are hav-ing ad skepticism and that is becoming the cause of their disengagement. Further, social ad skep-ticism has more impact on the customer disengagement than the general ad skepticism. While the reactance has more effect on general ad skepticism than other antecedents and cynicism has the lowest impact on social ad skepticism than other antecedents.

  3. An Added Value of Neuroscientific Tools to Understand Consumers’ In-Store Behaviour

    DEFF Research Database (Denmark)

    Bagdziunaite, Dalia; Nassri, Khalid; Clement, Jesper

    2014-01-01

    Little is still understood about the actual in-store purchase process. Here, we report that prior ad exposure affects in-store decision-making. By using mobile eye-tracking and electroencephalography (EEG), we demonstrate that, unbeknownst to participants, the ad effect was driven by increased...... of consumer perception and choice....

  4. Survey on Security Issues in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bassem Mokhtar

    2015-12-01

    Full Text Available Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and having efficient data transfer. Thus, VANETs have different network concerns and security challenges to get the availability of ubiquitous connectivity, secure communications, and reputation management systems which affect the trust in cooperation and negotiation between mobile networking entities. In this survey, we discuss the security features, challenges, and attacks of VANETs, and we classify the security attacks of VANETs due to the different network layers.

  5. Mobile Customer Relationship Management and Mobile Security

    Science.gov (United States)

    Sanayei, Ali; Mirzaei, Abas

    The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.

  6. Anthropogenic CO2 in a dense water formation area of the Mediterranean Sea

    Science.gov (United States)

    Ingrosso, Gianmarco; Bensi, Manuel; Cardin, Vanessa; Giani, Michele

    2017-05-01

    There is growing evidence that the on-going ocean acidification of the Mediterranean Sea could be favoured by its active overturning circulation. The areas of dense water formation are, indeed, preferential sites for atmospheric carbon dioxide absorption and through them the ocean acidification process can quickly propagate into the deep layers. In this study we estimated the concentration of anthropogenic CO2 (Cant) in the dense water formation areas of the middle and southern Adriatic Sea. Using the composite tracer TrOCA (Tracer combining Oxygen, inorganic Carbon, and total Alkalinity) and carbonate chemistry data collected throughout March 2013, our results revealed that a massive amount of Cant has invaded all the identified water masses. High Cant concentration was detected at the bottom layer of the Pomo Pit (middle Adriatic, 96.8±9.7 μmol kg-1) and Southern Adriatic Pit (SAP, 85.2±9.4 μmol kg-1), associated respectively with the presence of North Adriatic Dense Water (NAdDW) and Adriatic Dense Water (AdDW). This anthropogenic contamination was clearly linked to the dense water formation events, which govern strong CO2 flux from the atmosphere to the sea and the sinking of dense, CO2-rich surface waters to the deep sea. However, a very high Cant level (94.5±12.5 μmol kg-1) was also estimated at the intermediate layer, as a consequence of a recent vertical mixing that determined the physical and biogeochemical modification of the water of Levantine origin (i.e. Modified Levantine Intermediate Water, MLIW) and favoured the atmospheric CO2 intrusion. The penetration of Cant in the Adriatic Sea determined a significant pH reduction since the pre-industrial era (- 0.139±0.019 pH units on average). This estimation was very similar to the global Mediterranean Sea acidification, but it was again more pronounced at the bottom of the Pomo Pit, within the layer occupied by NAdDW (- 0.157±0.018 pH units), and at the intermediate layer of the recently formed MLIW

  7. Obtaining of ceramics biphasic dense and porous

    International Nuclear Information System (INIS)

    Pallone, E.M.J.A.; Rigo, E.C.S.; Fraga, A.F.

    2010-01-01

    Among the bioceramic hydroxyapatite (HAP) and beta-tricalcium phosphate (beta-TCP) are materials commonly used in biomedical field. Their combined properties result in a material with absorbable and at the same time with bioactive surface. Called biphasic ceramics such materials respond more quickly when exposed to physiological environment. In this work, powders of HAP/beta-TCP were obtained by chemical precipitation. After obtaining the post-phase was added at a ratio of 0, 15% and 30w% aqueous solutions of corn starch in order to obtain porous bodies. After mixing the resulting solutions were dried, resigned in tablet form and sintered at 1300 deg C. The initial powder was characterized by X-ray diffraction with Rietveld refinement to quantify the phases present. Bodies-of-evidence has been characterized by calculating the bulk density, X-ray diffraction (XRD), scanning electron microscopy and diametral compression. (author)

  8. Neutrino reactions in hot and dense matter

    International Nuclear Information System (INIS)

    Lohs, Andreas

    2015-01-01

    In this thesis, neutrino reactions in hot and dense matter are studied. In particular, this work is concerned with neutrino-matter interactions that are relevant for neutrino transport in core-collapse supernovae (CCSNe). The majority of the energy from a CCSN is released in the form of neutrinos. Accurate understanding and computation of these interactions is most relevant to achieve sufficiently reliable predictions for the evolution of CCSNe and other related question such as the production of heavy elements or neutrino oscillations. For this purpose this work follows the combined approach of searching for new important neutrino reactions and improving the computation of those reactions that are already implemented. First we estimate the relevance of charged-current weak interactions that include muon-neutrinos or muons, as well as the role of neutron decay for neutrino transport in CCSNe. All of these reactions were previously neglected in CCSN-simulations. We derive and compute the matrix element and subsequent semi-analytic expressions for transport properties like the inverse mean free path of the new reactions. It is found that these reactions are important for muon neutrinos and low energy electron antineutrinos at very high densities in the protoneutron star surface. Consequently their implementation might lead to several changes in the prediction of CCSNe signatures such as the nucleosynthesis yields. Second we improve the precision in the computation of well known neutrino-nucleon reactions like neutrino absorption on neutrons. We derive semi-analytic expressions for transport properties that use less restrictive approximations while keeping the computational demand constant. Therefore we consider the full relativistic kinematics of all participating particles i.e. allowing for relativistic nucleons and finite lepton masses. Also the weak magnetism terms of the matrix elements are explicitly included to all orders. From our results we suggest that the

  9. Rates of Thermonuclear Reactions in Dense Plasmas

    International Nuclear Information System (INIS)

    Tsytovich, V.N.; Bornatici, M.

    2000-01-01

    The problem of plasma screening of thermonuclear reactions has attracted considerable scientific interest ever since Salpeter's seminal paper, but it is still faced with controversial statements and without any definite conclusion. It is of relevant importance to thermonuclear reactions in dense astrophysical plasmas, for which charge screening can substantially affect the reaction rates. Whereas Salpeter and a number of subsequent investigations have dealt with static screening, Carraro, Schafer, and Koonin have drawn attention to the fact that plasma screening of thermonuclear reactions is an essentially dynamic effect. In addressing the issue of collective plasma effects on the thermonuclear reaction rates, the first critical overview of most of the work carried out so far is presented and the validity of the test particle approach is assessed. In contrast to previous investigations, we base our description on the kinetic equation for nonequilibrium plasmas, which accounts for the effects on the rates of thermonuclear reactions of both plasma fluctuations and screening and allows one to analyze explicitly the effects of the fluctuations on the reaction rates. Such a kinetic formulation is more general than both Salpeter's approach and the recently developed statistical approaches and makes it possible to obtain a more comprehensive understanding of the problem. A noticeable result of the fluctuation approach is that the static screening, which affects both the interaction and the self-energy of the reacting nuclei, does not affect the reaction rates, in contrast with the results obtained so far. Instead, a reduction of the thermonuclear reaction rates is obtained as a result of the effect of plasma fluctuations related to the free self-energy of the reacting nuclei. A simple physical explanation of the slowing down of the reaction rates is given, and the relation to the dynamically screened test particle approach is discussed. Corrections to the reaction rates

  10. Neutrino reactions in hot and dense matter

    Energy Technology Data Exchange (ETDEWEB)

    Lohs, Andreas

    2015-04-13

    In this thesis, neutrino reactions in hot and dense matter are studied. In particular, this work is concerned with neutrino-matter interactions that are relevant for neutrino transport in core-collapse supernovae (CCSNe). The majority of the energy from a CCSN is released in the form of neutrinos. Accurate understanding and computation of these interactions is most relevant to achieve sufficiently reliable predictions for the evolution of CCSNe and other related question such as the production of heavy elements or neutrino oscillations. For this purpose this work follows the combined approach of searching for new important neutrino reactions and improving the computation of those reactions that are already implemented. First we estimate the relevance of charged-current weak interactions that include muon-neutrinos or muons, as well as the role of neutron decay for neutrino transport in CCSNe. All of these reactions were previously neglected in CCSN-simulations. We derive and compute the matrix element and subsequent semi-analytic expressions for transport properties like the inverse mean free path of the new reactions. It is found that these reactions are important for muon neutrinos and low energy electron antineutrinos at very high densities in the protoneutron star surface. Consequently their implementation might lead to several changes in the prediction of CCSNe signatures such as the nucleosynthesis yields. Second we improve the precision in the computation of well known neutrino-nucleon reactions like neutrino absorption on neutrons. We derive semi-analytic expressions for transport properties that use less restrictive approximations while keeping the computational demand constant. Therefore we consider the full relativistic kinematics of all participating particles i.e. allowing for relativistic nucleons and finite lepton masses. Also the weak magnetism terms of the matrix elements are explicitly included to all orders. From our results we suggest that the

  11. Shallow layer modelling of dense gas clouds

    Energy Technology Data Exchange (ETDEWEB)

    Ott, S.; Nielsen, M.

    1996-11-01

    The motivation for making shallow layer models is that they can deal with the dynamics of gravity driven flow in complex terrain at a modest computational cost compared to 3d codes. The main disadvantage is that the air-cloud interactions still have to be added `by hand`, where 3d models inherit the correct dynamics from the fundamental equations. The properties of the inviscid shallow water equations are discussed, focusing on existence and uniqueness of solutions. It is demonstrated that breaking waves and fronts pose severe problems, that can only be overcome if the hydrostatic approximation is given up and internal friction is added to the model. A set of layer integrated equations is derived starting from the Navier-Stokes equations. The various steps in the derivation are accompanied by plausibility arguments. These form the scientific basis of the model. The principle of least action is introduced as a means of generating consistent models, and as a tool for making discrete equations for numerical models, which automatically obey conservation laws. A numerical model called SLAM (Shallow LAyer Model) is presented. SLAM has some distinct features compared to other shallow layer models: A Lagrangian, moving grid; Explicit account for the turbulent kinetic energy budget; The entrainment rate is estimated on the basis of the local turbulent kinetic energy; Non-hydrostatic pressure; and Numerical methods respect conservation laws even for coarse grids. Thorney Island trial 8 is used as a reference case model tuning. The model reproduces the doughnut shape of the cloud and yield concentrations in reasonable agreement with observations, even when a small number of cells (e.g. 16) is used. It is concluded that lateral exchange of matter within the cloud caused by shear is important, and that the model should be improved on this point. (au) 16 ills., 38 refs.

  12. AD status and consolidation plans

    CERN Document Server

    Eriksson, T; Arnaudon, L; Belochitskii, P; Bojtar, L; Calviani, M; Caspers, F; Federmann, S; Jørgensen, L; Louwerse, R; Oliveira, C; Tranquille, G

    2013-01-01

    The CERN Antiproton Decelerator (AD) has now completed its 12th year of supplying low-energy antiproton beams for the successful physics program. Most of the machine’s key components are in operation since more than 25 years and prompted by the approval of the ELENA project, a substantial consolidation program is now being launched to ensure continued reliable operation. Over the course of the next few years a progressive renovation of the AD-Target area and the AD-ring with all the associated systems will take place. Status and performance of the AD are presented along with an overview of planned and ongoing consolidation activities with emphasis on stochastic and electron beam cooling.

  13. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...... discursive perceptions of the concept would foster greater insight into and understanding of both the challenges and potentials that it represents. It focused on some of the key themes currently facing cities and the urban: the transformation of the city and our built environment; migration; rural decline......; the interaction between city, architecture, and inhabitants; the role of architects and architecture in the creation of democratic and sustainable urban contexts; the city and its representation; the politics of intervention; and the actions of governing and developing. This proceedings publication from...

  14. Finding Hierarchical and Overlapping Dense Subgraphs using Nucleus Decompositions

    Energy Technology Data Exchange (ETDEWEB)

    Seshadhri, Comandur [The Ohio State Univ., Columbus, OH (United States); Pinar, Ali [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sariyuce, Ahmet Erdem [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Catalyurek, Umit [The Ohio State Univ., Columbus, OH (United States)

    2014-11-01

    Finding dense substructures in a graph is a fundamental graph mining operation, with applications in bioinformatics, social networks, and visualization to name a few. Yet most standard formulations of this problem (like clique, quasiclique, k-densest subgraph) are NP-hard. Furthermore, the goal is rarely to nd the \\true optimum", but to identify many (if not all) dense substructures, understand their distribution in the graph, and ideally determine a hierarchical structure among them. Current dense subgraph nding algorithms usually optimize some objective, and only nd a few such subgraphs without providing any hierarchy. It is also not clear how to account for overlaps in dense substructures. We de ne the nucleus decomposition of a graph, which represents the graph as a forest of nuclei. Each nucleus is a subgraph where smaller cliques are present in many larger cliques. The forest of nuclei is a hierarchy by containment, where the edge density increases as we proceed towards leaf nuclei. Sibling nuclei can have limited intersections, which allows for discovery of overlapping dense subgraphs. With the right parameters, the nuclear decomposition generalizes the classic notions of k-cores and k-trusses. We give provable e cient algorithms for nuclear decompositions, and empirically evaluate their behavior in a variety of real graphs. The tree of nuclei consistently gives a global, hierarchical snapshot of dense substructures, and outputs dense subgraphs of higher quality than other state-of-theart solutions. Our algorithm can process graphs with tens of millions of edges in less than an hour.

  15. The African Mobile Story

    DEFF Research Database (Denmark)

    This book identifies the factors that has enabled the growth of mobile telephony in Africa. The book covers the regulatory factors, the development and usage of mobile application, mobile security and sustainable power source for mobile networks......This book identifies the factors that has enabled the growth of mobile telephony in Africa. The book covers the regulatory factors, the development and usage of mobile application, mobile security and sustainable power source for mobile networks...

  16. Structural Mobility, Exchange Mobility and Subgroup Consistent Mobility Measurement – US–German Mobility Measurements Revisited

    OpenAIRE

    C. SCHLUTER; D. VAN DE GAER

    2008-01-01

    We formalize the concept of structural mobility and use the framework of subgroup consistent mobility measurement to derive a relative and an absolute measure of mobility that is increasing both in upward structural mobility and exchange mobility. In our empirical illustration, we contribute substantively to the ongoing debate about mobility rankings between the USA and Germany.

  17. Connectivity analysis of one-dimensional ad-hoc networks

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Rasmussen, Jakob Gulddahl; Schwefel, Hans-Peter

    Applications and communication protocols in dynamic ad-hoc networks are exposed to physical limitations imposed by the connectivity relations that result from mobility. Motivated by vehicular freeway scenarios, this paper analyzes a number of important connectivity metrics for instantaneous snaps...... analytic expressions for the distributions and moments of these random variables for general stationary MAP processes on a one dimensional space. The numerical results compares bursty vehicular traffic with independent movement scenarios described by a Poisson process....

  18. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  19. Dense interstellar cloud chemistry: Basic issues and possible dynamical solution

    International Nuclear Information System (INIS)

    Prasad, S.S.; Heere, K.R.; Tarafdar, S.P.

    1989-01-01

    Standing at crossroad of enthusiasm and frustration, dense intertellar cloud chemistry has a squarely posed fundamental problem: Why do the grains appear to play at best a minor role in the chemistry? Grain surface chemistry creates considerable difficulties when the authors treat dense clouds as static objects and ignore the implications of the processes by which the clouds became dense in the first place. A new generation of models which treat chemical and dynamical evolutions concurrently are therefore presented as possible solution to the current frustrations. The proposed modeling philosophy and agenda could make the next decade quite exciting for interstellar chemistry

  20. Wilson lines for AdS5 black strings

    International Nuclear Information System (INIS)

    Hristov, Kiril; Katmadas, Stefanos

    2015-01-01

    We describe a simple method of extending AdS 5 black string solutions of 5d gauged supergravity in a supersymmetric way by addition of Wilson lines along a circular direction in space. When this direction is chosen along the string, and due to the specific form of 5d supergravity that features Chern-Simons terms, the existence of magnetic charges automatically generates conserved electric charges in a 5d analogue of the Witten effect. Therefore we find a rather generic, model-independent way of adding electric charges to already existing solutions with no backreaction from the geometry or breaking of any symmetry. We use this method to explicitly write down more general versions of the Benini-Bobev black strings (http://dx.doi.org/10.1103/PhysRevLett.110.061601, http://dx.doi.org/10.1007/JHEP06(2013)005) and comment on the implications for the dual field theory and the similarities with generalizations of the Cacciatori-Klemm black holes (http://dx.doi.org/10.1007/JHEP01(2010)085) in AdS 4 .

  1. Herbert: A Second Generation Mobile Robot.

    Science.gov (United States)

    1988-01-01

    PROJECT. TASK S Artificial Inteligence Laboratory AREA A WORK UNIT NUMBERS ’ ~ 545 Technology Square Cambridge, MA 02139 11. CONTROLLING OFFICE NAME...AD-AI93 632 WMRT: A SECOND GENERTION MOBILE ROWT(U) / MASSACHUSETTS IMST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB R BROOKS ET AL .JAN l8 Al-M...MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY A. I. Memo 1016 January, 1988 HERBERT: A SECOND GENERATION MOBILE ROBOT Rodney A

  2. Fermionic currents in AdS spacetime with compact dimensions

    Science.gov (United States)

    Bellucci, S.; Saharian, A. A.; Vardanyan, V.

    2017-09-01

    We derive a closed expression for the vacuum expectation value (VEV) of the fermionic current density in a (D +1 )-dimensional locally AdS spacetime with an arbitrary number of toroidally compactified Poincaré spatial dimensions and in the presence of a constant gauge field. The latter can be formally interpreted in terms of a magnetic flux treading the compact dimensions. In the compact subspace, the field operator obeys quasiperiodicity conditions with arbitrary phases. The VEV of the charge density is zero and the current density has nonzero components along the compact dimensions only. They are periodic functions of the magnetic flux with the period equal to the flux quantum and tend to zero on the AdS boundary. Near the horizon, the effect of the background gravitational field is small and the leading term in the corresponding asymptotic expansion coincides with the VEV for a massless field in the locally Minkowski bulk. Unlike the Minkowskian case, in the system consisting of an equal number of fermionic and scalar degrees of freedom, with same masses, charges and phases in the periodicity conditions, the total current density does not vanish. In these systems, the leading divergences in the scalar and fermionic contributions on the horizon are canceled and, as a consequence of that, the charge flux, integrated over the coordinate perpendicular to the AdS boundary, becomes finite. We show that in odd spacetime dimensions the fermionic fields realizing two inequivalent representations of the Clifford algebra and having equal phases in the periodicity conditions give the same contribution to the VEV of the current density. Combining the contributions from these fields, the current density in odd-dimensional C -,P - and T -symmetric models are obtained. As an application, we consider the ground state current density in curved carbon nanotubes described in terms of a (2 +1 )-dimensional effective Dirac model.

  3. Bjorken flow from an AdS Schwarzschild black hole

    Science.gov (United States)

    Alsup, James; Siopsis, George

    2008-04-01

    We consider a large black hole in asymptotically AdS spacetime of arbitrary dimension with a Minkowski boundary. By performing an appropriate slicing as we approach the boundary, we obtain via holographic renormalization a gauge theory fluid obeying Bjorken hydrodynamics in the limit of large longitudinal proper time. The metric we obtain reproduces to leading order the metric recently found as a direct solution of the Einstein equations in five dimensions. Our results are also in agreement with recent exact results in three dimensions.

  4. Scalar charges in asymptotic AdS geometries

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hai-Shan, E-mail: hsliu.zju@gmail.com [Institute for Advanced Physics and Mathematics, Zhejiang University of Technology, Hangzhou 310023 (China); Lü, H., E-mail: mrhonglu@gmail.com [Department of Physics, Beijing Normal University, Beijing 100875 (China)

    2014-03-07

    We show that for n-dimensional Einstein gravity coupled to a scalar field with mass-squared m{sub 0}{sup 2}=−n(n−2)/(4ℓ{sup 2}), the first law of thermodynamics of (charged) AdS black holes will be modified by the boundary conditions of the scalar field at asymptotic infinity. Such scalars can arise in gauged supergravities in four and six dimensions, but not in five or seven. The result provides a guiding principle for constructing designer black holes and solitons in general dimensions, where the properties of the dual field theories depend on the boundary conditions.

  5. Exploring interspace: open space opportunities in dense urban areas

    Science.gov (United States)

    Paul H. Gobster; Kathleen E. Dickhut

    1995-01-01

    Using ideas from landscape ecology, this paper explores how small open spaces can aid urban forestry efforts in dense urban areas. A case study in Chicago illustrates the physical and social lessons learned in dealing with these spaces.

  6. Rheology and Segregation of Granular Mixtures in Dense Flows

    Indian Academy of Sciences (India)

    Devang Khakhar

    IIT Bombay. Rheology and Segregation of. Granular Mixtures in Dense Flows. Devang Khakhar. Department of Chemical Engineering. Indian Institute of Technology Bombay. Mumbai, India. Acknowledgment: Anurag Tripathi. 77th Annual Meeting of IASc, Ahmedabad, 18-20 Nov, 2011 ...

  7. Automated Motion Estimation for 2D Cine DENSE MRI

    Science.gov (United States)

    Gilliam, Andrew D.; Epstein, Frederick H.

    2013-01-01

    Cine displacement encoding with stimulated echoes (DENSE) is a magnetic resonance (MR) method that directly encodes tissue displacement into MR phase images. This technique has successfully interrogated many forms of tissue motion, but is most commonly used to evaluate cardiac mechanics. Currently, motion analysis from cine DENSE images requires manually delineated anatomical structures. An automated analysis would improve measurement throughput, simplify data interpretation, and potentially access important physiological information during the MR exam. In this article, we present the first fully automated solution for the estimation of tissue motion and strain from 2D cine DENSE data. Results using both simulated and human cardiac cine DENSE data indicate good agreement between the automated algorithm and the standard semi-manual analysis method. PMID:22575669

  8. Interference Management with Successive Cancellation for Dense Small Cell Networks

    DEFF Research Database (Denmark)

    Lopez, Victor Fernandez; Pedersen, Klaus I.; Steiner, Jens

    2016-01-01

    Network-Assisted Interference Cancellation and Suppression (NAICS) receivers have appeared as a promising way to curb inter-cell interference in future dense network deployments. This investigation compares the performance of a NAICS receiver with successive interference cancellation capabilities...

  9. Fine coal processing with dense-medium cyclones

    CSIR Research Space (South Africa)

    De Korte, GJ

    2012-10-01

    Full Text Available . The paper provides a brief overview of past and current application of dense medium cyclones in the processing of fine coal and reviews some of the important considerations for the successful application of the technique....

  10. Densely crosslinked polycarbosiloxanes .2. Thermal and mechanical properties

    NARCIS (Netherlands)

    Flipsen, T.A C; Derks, R.; van der Vegt, H.A.; Stenekes, R.; Pennings, A.J; Hadziioannou, G

    1997-01-01

    The thermal and mechanical properties of two densely crosslinked polycarbosiloxane systems were investigated in relation to the molecular structure. The networks were prepared from functional branched prepolymers and crosslinked via a hydrosilylation curing reaction. The prepolymers having only

  11. Physics of dense matter, neutron stars, and supernova

    International Nuclear Information System (INIS)

    Glendenning, N.K.

    1989-02-01

    Nuclear and astrophysical evidence on the equation of state of dense matter is examined. The role of hyperonization of matter in the development of proto-neutron stars is briefly discussed. 7 refs., 4 figs

  12. Introducing ADS 2.0

    Science.gov (United States)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Luker, J.; Chyla, R.; Murray, S. S.

    2014-01-01

    In the spring of 1993, the Smithsonian/NASA Astrophysics Data System (ADS) first launched its bibliographic search system. It was known then as the ADS Abstract Service, a component of the larger Astrophysics Data System effort which had developed an interoperable data system now seen as a precursor of the Virtual Observatory. As a result of the massive technological and sociological changes in the field of scholarly communication, the ADS is now completing the most ambitious technological upgrade in its twenty-year history. Code-named ADS 2.0, the new system features: an IT platform built on web and digital library standards; a new, extensible, industrial strength search engine; a public API with various access control capabilities; a set of applications supporting search, export, visualization, analysis; a collaborative, open source development model; and enhanced indexing of content which includes the full-text of astronomy and physics publications. The changes in the ADS platform affect all aspects of the system and its operations, including: the process through which data and metadata are harvested, curated and indexed; the interface and paradigm used for searching the database; and the follow-up analysis capabilities available to the users. This poster describes the choices behind the technical overhaul of the system, the technology stack used, and the opportunities which the upgrade is providing us with, namely gains in productivity and enhancements in our system capabilities.

  13. Neutrinos and Nucleosynthesis in Hot and Dense Matter

    Energy Technology Data Exchange (ETDEWEB)

    Fuller, George [Univ. of California, San Diego, CA (United States)

    2016-01-14

    The Topical Collaboration for Neutrinos and Nucleosynthesis in Hot and Dense matter brought together researchers from a variety of nuclear science specialties and a number of institutions to address nuclear physics and neutrino physics problems associated with dense matter and the origin of the elements. See attached final technical reports for (1) the UCSD award and (2) a copy of the report for the whole TC

  14. Dense matter in compact stars a pedagogical introduction

    CERN Document Server

    Schmitt, Andreas

    2010-01-01

    Cold and dense nuclear and/or quark matter can be found in the interior of compact stars. It is very challenging to determine the ground state and properties of this matter because of the strong-coupling nature of QCD. I give a pedagogical introduction to microscopic calculations based on phenomenological models, effective theories, and perturbative QCD. I discuss how the results of these calculations can be related to astrophysical observations to potentially rule out or confirm candidate phases of dense matter.

  15. Zero added oxygen for high quality sputtered ITO: A data science investigation of reduced Sn-content and added Zr

    International Nuclear Information System (INIS)

    Peshek, Timothy J.; Burst, James M.; Coutts, Timothy J.; Gessert, Timothy A.

    2016-01-01

    The authors demonstrate mobilities of >45 cm 2 /V s for sputtered tin-doped indium oxide (ITO) films at zero added oxygen. All films were deposited with 5 wt. % SnO 2 , instead of the more conventional 8–10 wt. %, and had varying ZrO 2 content from 0 to 3 wt. %, with a subsequent reduction in In 2 O 3 content. These films were deposited by radio-frequency magnetron sputtering from nominally stoichiometric targets with varying oxygen partial pressure in the sputter ambient. Anomalous behavior was discovered for films with no Zr-added, where a bimodality of high and low mobilities was discovered for nominally similar growth conditions. However, all films showed the lowest resistivity and highest mobilities when the oxygen partial pressure in the sputter ambient was zero. This result is contrasted with several other reports of ITO transport performance having a maximum for small but nonzero oxygen partial pressure. This result is attributed to the reduced concentration of SnO 2 . The addition of ZrO 2 yielded the highest mobilities at >55 cm 2 /V s and the films showed a modest increase in optical transmission with increasing Zr-content

  16. Mobile Marketing

    OpenAIRE

    Luengo Cascudo, Alberto

    2010-01-01

    El principal objetivo de este proyecto es explicar y entender la importancia del Mobile Marketing como nueva herramienta de negocio en el Marketing empresarial. Para ello, el primer objetivo es entender los dos factores que para mí son la clave de su importancia: la evolución del entorno tecnológico y el cambio en los hábitos del consumidor. Debido a la novedad de esta nueva forma de Marketing y al hecho de que está en constante definición, es básico exponer de la forma más cla...

  17. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    movements of people, goods, and information 'from A to B'. Accordingly, the way people, goods, and information moves shapes the way we understand our built environment, other consociates, and ourselves. The book contributes with a new and critical-creative gaze on what might seem to be trivial and mundane...... acts of moving in the city. 'Designing Mobilities' is based on more than a decade of academic research by Professor of Urban Theory, Ole B. Jensen and a must-read for students and scholars with an interest in urban studies, urban design, architecture, urban planning, transport planning and geography...

  18. Downwardly mobile

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-01-01

    P & H Mining Equipment has produced the 250XP rotary blasthole drill, its first `clean sheet` drill after eight years of upgrading the line of large rotaries it acquired from Gardner Denver in 1991. A prototype has been working on an Australian coal mine since June 1998. A further two units of the 250XP are being erected at a diamond mine in Botswana for start-up in January 1999 and another will begin drilling at a Wyoming, USA coal mine in February. The drill is a highly mobile, heavy duty, highly reliable diesel/hydraulic drill weighing 113,500 kg and can drill holes at angles up to 30 degrees.

  19. AdS pure spinor superstring in constant backgrounds

    Energy Technology Data Exchange (ETDEWEB)

    Chandia, Osvaldo [Departamento de Ciencias, Facultad de Artes Liberales, Universidad Adolfo Ibáñez,Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez,Diagonal Las Torres 2640, Peñalolén, Santiago (Chile); Bevilaqua, L. Ibiapina [Escola de Ciências e Tecnologia, Universidade Federal do Rio Grande do Norte,Caixa Postal 1524, 59072-970, Natal, RN (Brazil); Vallilo, Brenno Carlini [Facultad de Ciencias Exactas, Departamento de Ciencias Físicas, Universidad Andres Bello,Republica 220, Santiago (Chile)

    2014-06-05

    In this paper we study the pure spinor formulation of the superstring in AdS{sub 5}×S{sup 5} around point particle solutions of the classical equations of motion. As a particular example we quantize the pure spinor string in the BMN background.

  20. The PredictAD project

    DEFF Research Database (Denmark)

    Antila, Kari; Lötjönen, Jyrki; Thurfjell, Lennart

    2013-01-01

    can be managed. Today the significance of early and precise diagnosis of AD is emphasized in order to minimize its irreversible effects on the nervous system. When new drugs and therapies enter the market it is also vital to effectively identify the right candidates to benefit from these. The main...... objective of the PredictAD project was to find and integrate efficient biomarkers from heterogeneous patient data to make early diagnosis and to monitor the progress of AD in a more efficient, reliable and objective manner. The project focused on discovering biomarkers from biomolecular data...... candidates and implement the framework in software. The results are currently used in several research projects, licensed to commercial use and being tested for clinical use in several trials....

  1. Facilities Management and Added Value

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2010-01-01

    Aim: This paper aims to present different models of the concept of the added value of Facilities Management (FM), including the FM Value Map, which forms the basis of research group in EuroFM, and to present some of the results of this research collaboration. Approach and methodology: The paper...... is based on literature reviews of the most influential journals within the academic fields of FM, Corporate Real Estate Management and Business to Business Marketing and discussions between participants of the research group working on a further exploration and testing of the FM Value Map. Conclusions......: The research shows a number of different definitions and focus points of Added Value of FM, dependent on the academic field and the area of application. The different research perspectives explored a holistic view on the added value of FM by the integration of an external market based view (with a focus...

  2. Massive relic galaxies prefer dense environments

    Science.gov (United States)

    Peralta de Arriba, Luis; Quilis, Vicent; Trujillo, Ignacio; Cebrián, María; Balcells, Marc

    2016-09-01

    We study the preferred environments of z ∼ 0 massive relic galaxies (M⋆ ≳ 1010 M⊙ galaxies with little or no growth from star formation or mergers since z ∼ 2). Significantly, we carry out our analysis on both a large cosmological simulation and an observed galaxy catalogue. Working on the Millennium I-WMAP7 simulation we show that the fraction of today massive objects which have grown less than 10 per cent in mass since z ∼ 2 is ∼0.04 per cent for the whole massive galaxy population with M⋆ ≳ 1010 M⊙. This fraction rises to ∼0.18 per cent in galaxy clusters, confirming that clusters help massive galaxies remain unaltered. Simulations also show that massive relic galaxies tend to be closer to cluster centres than other massive galaxies. Using the New York University Value-Added Galaxy Catalogue, and defining relics as M⋆ ≳ 1010 M⊙ early-type galaxies with colours compatible with single-stellar population ages older than 10 Gyr, and which occupy the bottom 5-percentile in the stellar mass-size distribution, we find 1.11 ± 0.05 per cent of relics among massive galaxies. This fraction rises to 2.4 ± 0.4 per cent in high-density environments. Our findings point in the same direction as the works by Poggianti et al. and Stringer et al. Our results may reflect the fact that the cores of the clusters are created very early on, hence the centres host the first cluster members. Near the centres, high-velocity dispersions and harassment help cluster core members avoid the growth of an accreted stellar envelope via mergers, while a hot intracluster medium prevents cold gas from reaching the galaxies, inhibiting star formation.

  3. Smooth causal patches for AdS black holes

    Science.gov (United States)

    Raju, Suvrat

    2017-06-01

    We review the paradox of low energy excitations of a black hole in anti-de Sitter space (AdS). An appropriately chosen unitary operator in the boundary theory can create a locally strong excitation near the black hole horizon, whose global energy is small as a result of the gravitational redshift. The paradox is that this seems to violate a general rule of statistical mechanics, which states that an operator with energy parametrically smaller than k T cannot create a significant excitation in a thermal system. When we carefully examine the position dependence of the boundary unitary operator that produces the excitation and the bulk observable necessary to detect the anomalously large effect, we find that they do not both fit in a single causal patch. This follows from a remarkable property of position-space AdS correlators that we establish explicitly and resolves the paradox in a generic state of the system, since no combination of observers can both create the excitation and observe its effect. As a special case of our analysis, we show how this resolves the "Born rule" paradox of Marolf and Polchinski [J. High Energy Phys. 01 (2016) 008, 10.1007/JHEP01(2016)008] and we verify our solution using an independent calculation. We then consider boundary states that are finely tuned to display a spontaneous excitation outside the causal patch of the infalling observer, and we propose a version of causal patch complementarity in AdS/CFT that resolves the paradox for such states as well.

  4. ADS-B in space

    DEFF Research Database (Denmark)

    Knudsen, Bjarke Gosvig; Jensen, Morten; Birklykke, Alex

    2014-01-01

    them to the terrestrial receivers. This paper gives an overview of the GATOSS mission and of its highly-sensitive ADS-B software-defined radio receiver payload. Details of the design and implementation of the receiver's decoder are introduced. The first real-life, space-based results show that ADS......-B signals are indeed successfully received in space and retransmitted to a terrestrial station by the GATOSS nano-satellite orbiting at 700+ km altitudes, thus showing that GATOSS is capable of tracking flights, including transoceanic ones, from space....

  5. Three body dynamics in dense gravitational systems

    Science.gov (United States)

    Moody, Kenneth

    galactic black hole binaries as a background source. I also found that the binaries are ejected from the cluster with, for the most part, a velocity just above the escape speed of the cluster which is a few tens of km/sec. These gravitational wave sources are thus constrained in their host galaxies as the galactic escape velocity is some hundreds of km/sec which only a very few binaries achieve in special cases. I studied the effect of the Kozai mechanism on two pulsars, one in the globular cluster M4, and the other J1903+0327. The M4 pulsar pulsar was found to have an unusually large orbital eccentricity, given that it is in a binary with a period of nearly 200 days. This unusual behavior led to the conclusion that a planet-like third body of much less than a solar mass was orbiting the binary. I used my own code to integrate the secular evolution equations with a broad set of initial conditions to determine the first detailed properties of the third body; namely that the mass of the planet is about that of Jupiter. The second pulsar J1903+0327 consists of a 2.15ms pulsar and a near solar mass companion in an e = 0.44 orbit. A preliminary study of this pulsar showed that the high eccentricity can be reproduced by my models, and there are three candidate clusters from which this pulsar could have originated. My third project was a study of the effect of a planet at 50 AU on the inner solar system. The origin of this planet is assumed to be from an exchange with another solar system in the early stages of the sun's life while it was still in the dense star forming region where it was born. Similar studies have been done with the exchange of stars among binaries by Malmberg et al. (2007b). The exchange once again allows the Kozai effect to bring about drastic change in the inner system. A planet is chosen as the outer object as, unlike a stellar companion, it would remain unseen by current radial velocity and direct observation methods, although it could be detected by

  6. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  7. IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shahrukh Khalid

    2016-01-01

    Full Text Available Ad hoc networks lack support of infrastructure and operate in a shared bandwidth wireless environment. Presently, such networks have been realized by various adaptations in Internet Protocol (IP architecture which was developed for infrastructure oriented hierarchical networks. The IP architecture has its known problem and issues even in infrastructure settings, like IP address overloading, mobility, multihoming, and so forth. Therefore, when such architecture is implemented in ad hoc scenario the problems get multiplied. Due to this fact, ad hoc networks suffer from additional problems like IP address autoconfiguration, service provisioning, efficient bandwidth utilization, and node identification. In this paper we present IDHOCNET which is a novel implementation of service provisioning and application development framework in the ad hoc context. We illustrate a number of implemented features of the architecture which include IP address autoconfiguration, identification of nodes by using real world identifiers, IP based services support in ad hoc networks, and a new class of application known as ID based application. Moreover how identifiers can completely replace the IP addresses to run the IP based applications is shown. It is expected that this work will open new research horizons and paradigms for ad hoc networks.

  8. Potential and Actual Health Hazards in the Dense Urban Operational Environment: Critical Gaps and Solutions for Military Occupational Health.

    Science.gov (United States)

    Patterson, Steven L; Dancy, Blair C R; Ippolito, Danielle L; Stallings, Jonathan D

    2017-11-01

    : This paper presents environmental health risks which are prevalent in dense urban environments.We review the current literature and recommendations proposed by environmental medicine experts in a 2-day symposium sponsored by the Department of Defense and supported by the Johns Hopkins University Applied Physics Laboratory.Key hazards in the dense urban operational environment include toxic industrial chemicals and materials, water pollution and sewage, and air pollution. Four critical gaps in environmental medicine were identified: prioritizing chemical and environmental concerns, developing mobile decision aids, personalized health assessments, and better real-time health biomonitoring.As populations continue to concentrate in cities, civilian and military leaders will need to meet emerging environmental health concerns by developing and delivering adequate technology and policy solutions.

  9. Configuring Mobile Commerce Portals for Business Success

    DEFF Research Database (Denmark)

    Dholakia, Nikhilesh; Rask, Morten

    2004-01-01

    -portals must attract and retain customers. Success in mobile portal markets will depend on dynamic strategies that blend elements of personalization, permission, and specification of content. This chapter reviews the key differences between traditional e-commerce and the emergent m-commerce. It reviews......M-commerce entails transactions conducted via mobile telecommunications networks using communication, information, and payment devices such as mobile phones or palmtop units. Geographic positioning and location capabilities are also being added to such networks and devices. Rather than using...... general-purpose browsers, customers accessing mobile commerce applications often rely on specific mobile portals, or m-portals. These m-portals could be specific to the device that the user has, to the communications infrastructure provider, to the financial infrastructure provider, or to other service...

  10. Mobility Helps Peer-to-Peer Security

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre; Buttyan, Levente

    2006-01-01

    We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols...... are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile ad hoc networks. In the first scenario, we assume the presence of an offline certification authority and we show how mobility helps to set up security associations for secure routing; in this case...... by visual contact and by the activation of an appropriate secure side channel of their personal device; we show that the process can be fuelled by taking advantage of trusted acquaintances. We then show that the proposed solution is generic: It can be deployed on any mobile network and it can be implemented...

  11. STRAW - An Integrated Mobility and Traffic Model for VANETs

    National Research Council Canada - National Science Library

    Choffnes, David R; Bustamante, Fabian E

    2005-01-01

    Ad-hoc wireless communication among highly dynamic, mobile nodes in a urban network is a critical capability for a wide range of important applications including automated vehicles, real-time traffic...

  12. Black holes as bubbles of AdS

    Science.gov (United States)

    Danielsson, U. H.; Dibitetto, G.; Giri, S.

    2017-10-01

    In this paper we propose that bubbles of AdS within Minkowski spacetime, stabilized at a finite radius by stiff matter and an electromagnetic gas, can be an alternative endpoint of gravitational collapse. The bubbles are horizonless with a size up to 12.5% larger than their Schwarzschild radius depending on their charge. We argue that they are stable against small perturbations, and have thermodynamical properties similar to those of real black holes. We provide a realization of the bubbles within string theory that relies on a specific brane intersection giving rise to a shell carrying dissolved charges from lower dimensional D-branes as well as a gas of open strings. We also note that our construction provides a new way of understanding the entropy of Reissner-Nordström black holes in the extremal limit.

  13. Colliding waves on a string in AdS$_3$

    CERN Document Server

    Vegh, David

    2015-01-01

    This paper is concerned with the classical motion of a string in global AdS$_3$. The initially static string stretches between two antipodal points on the boundary circle. Both endpoints are perturbed which creates cusps at a steady rate. The cusps propagate towards the interior where they collide. The behavior of the string depends on the strength of forcing. Three qualitatively different phases can be distinguished: transparent, gray, and black. The transparent region is analogous to a standing wave. In the black phase, there is a horizon on the worldsheet and cusps never reach the other endpoint. The string keeps folding and its length grows linearly over time. In the gray phase, the string still grows linearly. However, cusps do cross to the other side. The transparent and gray regions are separated by a transition point where a logarithmic accumulation of cusps is numerically observed. A simple model reproduces the qualitative behavior of the string in the three phases.

  14. Superconformal interpretation of BPS states in AdS geometries

    CERN Document Server

    Ferrara, Sergio; Ferrara, Sergio; Sokatchev, Emery

    2001-01-01

    We carry out a general analysis of the representations of the superconformal algebras SU(2,2/N), OSp(8/4,R) and OSp(8^*/4) and give their realization in superspace. We present a construction of their UIR's by multiplication of the different types of massless superfields ("supersingletons"). Particular attention is paid to the so-called "short multiplets". Representations undergoing shortening have "protected dimension" and correspond to BPS states in the dual supergravity theory in anti-de Sitter space. These results are relevant for the classification of multitrace operators in boundary conformally invariant theories as well as for the classification of AdS black holes preserving different fractions of supersymmetry.

  15. Higher-derivative superparticle in AdS3 space

    Science.gov (United States)

    Kozyrev, Nikolay; Krivonos, Sergey; Lechtenfeld, Olaf

    2016-03-01

    Employing the coset approach we construct component actions for a superparticle moving in AdS3 with N =(2 ,0 ), D =3 supersymmetry partially broken to N =2 , d =1 . These actions may contain higher time-derivative terms, which are chosen to possess the same (super)symmetries as the free superparticle. In terms of the nonlinear-realization superfields, the component actions always take a simpler form when written in terms of covariant Cartan forms. We also consider in detail the reduction to the nonrelativistic case and construct the corresponding action of a Newton-Hooke superparticle and its higher-derivative generalizations. The structure of these higher time-derivative generalizations is completely fixed by invariance under the supersymmetric Newton-Hooke algebra extended by two central charges.

  16. Massless AdS 2 scattering and Bethe ansatz

    Science.gov (United States)

    Fontanella, A.; Torrielli, A.

    2017-09-01

    We first analyse the integrable scattering theory describing the massless excitations of AdS 2 × S 2 × T 6 superstrings in the relativistic limit. The matrix part of the S-matrix is obtained in the BMN limit from the conjectured exact expression, and compared to known S-matrices with N=1 supersymmetry in 1 + 1 dimensions. A dressing factor, yet unknown for the complete theory, is here constructed based on relativistic crossing symmetry. We derive a Bethe-ansatz condition by employing a transfer-matrix technique based on the so-called free-fermion condition. This is known to overcome the problem of lack of a reference state. We then generalise the method to the massless non-relativistic case, and compare the resulting Bethe-ansatz condition with a simple massless limit of the one conjectured by Sorokin, Tseytlin, Wulff and Zarembo.

  17. An investigation of AdS2 backreaction and holography

    International Nuclear Information System (INIS)

    Engelsöy, Julius; Mertens, Thomas G.; Verlinde, Herman

    2016-01-01

    We investigate a dilaton gravity model in AdS 2 proposed by Almheiri and Polchinski http://dx.doi.org/10.1007/JHEP11(2015)014 and develop a 1d effective description in terms of a dynamical boundary time with a Schwarzian derivative action. We show that the effective model is equivalent to a 1d version of Liouville theory, and investigate its dynamics and symmetries via a standard canonical framework. We include the coupling to arbitrary conformal matter and analyze the effective action in the presence of possible sources. We compute commutators of local operators at large time separation, and match the result with the time shift due to a gravitational shockwave interaction. We study a black hole evaporation process and comment on the role of entropy in this model.

  18. Thermodynamics of charged Lovelock: AdS black holes

    International Nuclear Information System (INIS)

    Prasobh, C.B.; Suresh, Jishnu; Kuriakose, V.C.

    2016-01-01

    We investigate the thermodynamic behavior of maximally symmetric charged, asymptotically AdS black hole solutions of Lovelock gravity. We explore the thermodynamic stability of such solutions by the ordinary method of calculating the specific heat of the black holes and investigating its divergences which signal second-order phase transitions between black hole states. We then utilize the methods of thermodynamic geometry of black hole spacetimes in order to explain the origin of these points of divergence. We calculate the curvature scalar corresponding to a Legendre-invariant thermodynamic metric of these spacetimes and find that the divergences in the black hole specific heat correspond to singularities in the thermodynamic phase space. We also calculate the area spectrum for large black holes in the model by applying the Bohr-Sommerfeld quantization to the adiabatic invariant calculated for the spacetime. (orig.)

  19. Modeling virtualized downlink cellular networks with ultra-dense small cells

    KAUST Repository

    Ibrahim, Hazem

    2015-09-11

    The unrelenting increase in the mobile users\\' populations and traffic demand drive cellular network operators to densify their infrastructure. Network densification increases the spatial frequency reuse efficiency while maintaining the signal-to-interference-plus-noise-ratio (SINR) performance, hence, increases the spatial spectral efficiency and improves the overall network performance. However, control signaling in such dense networks consumes considerable bandwidth and limits the densification gain. Radio access network (RAN) virtualization via control plane (C-plane) and user plane (U-plane) splitting has been recently proposed to lighten the control signaling burden and improve the network throughput. In this paper, we present a tractable analytical model for virtualized downlink cellular networks, using tools from stochastic geometry. We then apply the developed modeling framework to obtain design insights for virtualized RANs and quantify associated performance improvement. © 2015 IEEE.

  20. An experimental analysis of spatial competition in a dense infaunal community: The importance of relative effects

    Science.gov (United States)

    Wilson, W. Herbert

    1984-06-01

    A densely populated soft-sediment community was experimentally analysed for interspecific competition for space in laboratory experiments. No interspecific competitive interactions leading to a decrease in survivorship could be documented over a five-week period. The four most abundant species all coexisted in laboratory microcosms. The two tube-buiding species, the tanaid Leptochelia dubia and the polychaete Rhynchospio arenincola, could not exclude the mobile bivalve Transennella tantilla or the burrowing amphipod Paraphoxus spinosus. None of the species increases its emigration frequency when other species are present. Paraphoxus is found to be a browsing predator on Phynchospio but inflicts no detectable mortality. The coexistence of these species is permitted by virtue of the fact that none of the species can alter the soft-sediment habitat sufficiently to make the habitat unsuitable for the other species.

  1. Combining Dense Structure from Motion and Visual SLAM in a Behavior-Based Robot Control Architecture

    Directory of Open Access Journals (Sweden)

    Geert De Cubber

    2010-03-01

    Full Text Available In this paper, we present a control architecture for an intelligent outdoor mobile robot. This enables the robot to navigate in a complex, natural outdoor environment, relying on only a single on-board camera as sensory input. This is achieved through a twofold analysis of the visual data stream: a dense structure from motion algorithm calculates a depth map of the environment and a visual simultaneous localization and mapping algorithm builds a map of the surroundings using image features. This information enables a behavior-based robot motion and path planner to navigate the robot through the environment. In this paper, we show the theoretical aspects of setting up this architecture.

  2. Situational Effects on the Usage Intention of Mobile Games

    Science.gov (United States)

    Liang, Ting-Peng; Yeh, Yi-Hsuan

    As value-added services on mobile devices are developing rapidly, text messaging, multi-media messaging, music, video, games, GPS navigation, RFID, and mobile TV are all accessible from a single device. Mobile games that combine mobile communication with computer games are an emerging industry. The purpose of this research is to explore what situation factors may affect the intention to play mobile game. We propose a research model to fit the nature of mobile games and conducted an online survey to examine the effect of situational factors. The model integrates constructs in TAM and TRA. The findings are as follows. First, Subjective norm affects a user’s intention in using mobile games when a user has no other task. Second, perceived playfulness affects a user’s intention to use mobile games when the user has another task.

  3. Holography beyond conformal invariance and AdS isometry?

    CERN Document Server

    Barvinsky, A.O.

    2015-01-01

    We suggest that the principle of holographic duality can be extended beyond conformal invariance and AdS isometry. Such an extension is based on a special relation between functional determinants of the operators acting in the bulk and on its boundary, provided that the boundary operator represents the inverse propagators of the theory induced on the boundary by the Dirichlet boundary value problem from the bulk spacetime. This relation holds for operators of general spin-tensor structure on generic manifolds with boundaries irrespective of their background geometry and conformal invariance, and it apparently underlies numerous $O(N^0)$ tests of AdS/CFT correspondence, based on direct calculation of the bulk and boundary partition functions, Casimir energies and conformal anomalies. The generalized holographic duality is discussed within the concept of the "double-trace" deformation of the boundary theory, which is responsible in the case of large $N$ CFT coupled to the tower of higher spin gauge fields for t...

  4. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  5. Understanding Effects and Determinants of Mobile Support Tools: A Usability-Centered Field Study on IT Service Technicians

    OpenAIRE

    Pousttchi, Key; Thurnher, Bettina

    2006-01-01

    The integration of mobile workplaces is a major challenge for companies. First-wave mobile solutions mostly support existing business processes through adding value in terms of increased efficiency. Second-wave mobile solutions comprise a re-engineering of the mobile business processes, add value through increased effectiveness and may even enable new forms of mobility. In order to achieve a systematic approach to mobile integrated business processes it is important to analyze existing proces...

  6. Mobile Misfortune

    DEFF Research Database (Denmark)

    Vigh, Henrik Erdman

    2015-01-01

    part looks at the predicament of youth and the hope of migration in Bissau, the second illuminates the anguish of deportation and the despair of being forcefully ‘displaced back home.’ Following in the footsteps of the young men that seek to navigate the cocaine trade, in order to obtain better lives...... for themselves and their families, it shows how involvement in the cocaine trade is both a curse and a catalyst. Though trading the drug may facilitate migration and mobility, generating social being and worth in the process, it is an activity that is haunted by the threat of deportation and the termination...... migration from the global South often has negative potentiality as an end-point via the ascription of illegality and condition of deportability that shade it....

  7. MobiLED: mobile-led and leading via mobile

    CSIR Research Space (South Africa)

    Ford, M

    2009-03-01

    Full Text Available 250 million. China also has some 600 million cell phone subscribers so the potential for the mobile internet is enormous. Last year Google’s president in China, announced that Google was redesigning its products for a market where “most Chinese... browser [10]. Hadeda is a spelling "drill and practice" system that was developed as part of MobilED to investigate the use of the mobile web in education. Hadeda allows teachers and parents to create spelling lists using either a web browser or mobile...

  8. Experimental Studies of the Transport Parameters of Warm Dense Matter

    Energy Technology Data Exchange (ETDEWEB)

    Chouffani, Khalid [Idaho State Univ., Pocatello, ID (United States)

    2014-12-01

    There is a need to establish fundamental properties of matter and energy under extreme physical conditions. Although high energy density physics (HEDP) research spans a wide range of plasma conditions, there is one unifying regime that is of particular importance and complexity: that of warm dense matter, the transitional state between solid state condensed matter and energetic plasmas. Most laboratory experimental conditions, including inertial confinement implosion, fall into this regime. Because all aspects of laboratory-created high-energy-density plasmas transition through the warm dense matter regime, understanding the fundamental properties to determine how matter and energy interact in this regime is an important aspect of major research efforts in HEDP. Improved understanding of warm dense matter would have significant and wide-ranging impact on HEDP science, from helping to explain wire initiation studies on the Sandia Z machine to increasing the predictive power of inertial confinement fusion modeling. The central goal or objective of our proposed research is to experimentally determine the electrical resistivity, temperature, density, and average ionization state of a variety of materials in the warm dense matter regime, without the use of theoretical calculations. Since the lack of an accurate energy of state (EOS) model is primarily due to the lack of experimental data, we propose an experimental study of the transport coefficients of warm dense matter.

  9. Mobile phone interaction techniques for rural economy development ...

    African Journals Online (AJOL)

    The objective of this study is to identify the various researches on interaction techniques and user interface design as a first step to the design of suitable mobile interactions and user interfaces for rural users. This research project is also aimed at socio-economic development and adding value to mobile phone users in ...

  10. Micro Mobility Marketing

    DEFF Research Database (Denmark)

    Hosbond, Jens Henrik; Skov, Mikael B.

    2008-01-01

    Mobile marketing refers to marketing of services or goods using mobile technology and mobile marketing holds potentially great economical opportunities. Traditionally, mobile marketing has been viewed as mobility in the large taking place virtually anywhere, anytime. Further, research shows...... considerable number of studies on push-based SMS mobile marketing campaigns. This paper explores a related yet different form of mobile marketing namely micro mobility marketing. Micro mobility marketing denotes mobility in the small, meaning that promotion of goods takes place within a circumscribed location......, in our case a medium-sized retail supermarket. Two prototypes based on push and pull marketing strategies are implemented and evaluated. Taking outset in a synthesis of central issues in contemporary research on mobile marketing, we discuss their role in micro mobility marketing to point to similarities...

  11. MOBILITY: A SYSTEMS APPROACH

    Directory of Open Access Journals (Sweden)

    Mykola I. Striuk

    2015-10-01

    Full Text Available A comprehensive study on the problem of mobility in the socio-educational and technical systems was carried out: the evolution of the concept of mobility in scientific sources of XIX–XXI centuries was analyzed and the new sources on the issue of mobility introduced into scientific circulation, the interrelation of the types of mobility in the socio-pedagogical and technical systems are theoretically grounded, an integrative model of mobility in the information society is proposed. The major trends in academic mobility are identified (the transition from student mobility to mobility programs and educational services providers, the new mobility programs (franchising, double/joint degrees, combinations, nostrification etc. are characterized. The new types of mobility providers are reviewed and attention is focused on virtual universities that are now the basis of virtual mobility of students and activities which are based on the use of new ICT in higher education, especially – the Internet and mobile learning environments.

  12. Mobile Inquiry Based Learning

    NARCIS (Netherlands)

    Specht, Marcus

    2012-01-01

    Specht, M. (2012, 8 November). Mobile Inquiry Based Learning. Presentation given at the Workshop "Mobile inquiry-based learning" at the Mobile Learning Day 2012 at the Fernuniversität Hagen, Hagen, Germany.

  13. Impact of the infrastructure in mobile opportunistic networks

    OpenAIRE

    Trullols Cruces, Óscar; Morillo Pozo, Julián David; Barceló Ordinas, José María

    2011-01-01

    Invited paper Epidemic modeling has been used to analyze many disciplines such as biology, ecology and medicine. In the last years, it also has been applied to networking paradigms such as social networks, virus spreading in Internet and lastly to opportunistic networking in mobile networks. In this paper we revise some of the facts of epidemic modeling in mobile networks and use these models to analyze the impact of adding infrastructure to sparse opportunistic mobile networks. We show ho...

  14. Neutronic design of an ADS

    International Nuclear Information System (INIS)

    Cintas, A; Lopasso, E.M; Marquez Damian, J.I

    2009-01-01

    We present a LEU-ADS design based on an existing Argentine experimental facility, the RA-8 pool type zero power reactor. The versatility of this reactor allows measurement of different core configurations using different fuel enrichment, burnable poison rods, water perturbations and different control rods types in critical or subcritical configurations with an external source. To assess the feasibility of the LEU-ADS, multiplication factors, kinetic parameters, spectra, and time flux evolution were computed. Two external sources were considered: an isotopic 252 C f source, and a D-D pulsed neutron source. Parameters for different core configurations were calculated, and the feasibility of using continuous and pulsed neutron sources was verified. [es

  15. A mobile sensing system for structural health monitoring: design and validation

    International Nuclear Information System (INIS)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-01-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring

  16. Realizing "value-added" metrology

    Science.gov (United States)

    Bunday, Benjamin; Lipscomb, Pete; Allgair, John; Patel, Dilip; Caldwell, Mark; Solecky, Eric; Archie, Chas; Morningstar, Jennifer; Rice, Bryan J.; Singh, Bhanwar; Cain, Jason; Emami, Iraj; Banke, Bill, Jr.; Herrera, Alfredo; Ukraintsev, Vladamir; Schlessinger, Jerry; Ritchison, Jeff

    2007-03-01

    The conventional premise that metrology is a "non-value-added necessary evil" is a misleading and dangerous assertion, which must be viewed as obsolete thinking. Many metrology applications are key enablers to traditionally labeled "value-added" processing steps in lithography and etch, such that they can be considered integral parts of the processes. Various key trends in modern, state-of-the-art processing such as optical proximity correction (OPC), design for manufacturability (DFM), and advanced process control (APC) are based, at their hearts, on the assumption of fine-tuned metrology, in terms of uncertainty and accuracy. These trends are vehicles where metrology thus has large opportunities to create value through the engineering of tight and targetable process distributions. Such distributions make possible predictability in speed-sorts and in other parameters, which results in high-end product. Additionally, significant reliance has also been placed on defect metrology to predict, improve, and reduce yield variability. The necessary quality metrology is strongly influenced by not only the choice of equipment, but also the quality application of these tools in a production environment. The ultimate value added by metrology is a result of quality tools run by a quality metrology team using quality practices. This paper will explore the relationships among present and future trends and challenges in metrology, including equipment, key applications, and metrology deployment in the manufacturing flow. Of key importance are metrology personnel, with their expertise, practices, and metrics in achieving and maintaining the required level of metrology performance, including where precision, matching, and accuracy fit into these considerations. The value of metrology will be demonstrated to have shifted to "key enabler of large revenues," debunking the out-of-date premise that metrology is "non-value-added." Examples used will be from critical dimension (CD

  17. Trends in Mobile Marketing

    OpenAIRE

    Chocholová, Petra

    2010-01-01

    The principal aim of this thesis is to assess the state of the mobile marketing as of the first quarter of 2011 and to discuss various scenarios of the future development. This thesis defines the terms "mobile marketing" and "mobile advertising" and identifies the main players in the industry. It explores the main categories of mobile advertising such as mobile messaging, in-content and mobile internet advertising. Later, it analyzes the latest trends in the industry and describes in detail t...

  18. Mobile Search and Advertising

    OpenAIRE

    Lovitskii, Vladimir; McCaffery, Colin; Thrasher, Michael; Traynor, David; Wright, Peter

    2009-01-01

    Mobile advertising is a rapidly growing sector providing brands and marketing agencies the opportunity to connect with consumers beyond traditional and digital media and instead communicate directly on their mobile phones. Mobile advertising will be intrinsically linked with mobile search, which has transported from the internet to the mobile and is identified as an area of potential growth. The result of mobile searching show that as a general rule such search result exceed 1...

  19. Scattering States in AdS/CFT

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, A.Liam; /Boston U.; Kaplan, Jared; /SLAC

    2012-02-14

    We show that suitably regulated multi-trace primary states in large N CFTs behave like 'in' and 'out' scattering states in the flat-space limit of AdS. Their transition matrix elements approach the exact scattering amplitudes for the bulk theory, providing a natural CFT definition of the flat space S-Matrix. We study corrections resulting from the AdS curvature and particle propagation far from the center of AdS, and show that AdS simply provides an IR regulator that disappears in the flat space limit.

  20. Warm dense matter and Thomson scattering at FLASH

    International Nuclear Information System (INIS)

    Faeustlin, Roland Rainer

    2010-05-01

    X-ray free electron lasers are powerful tools to investigate moderately to strongly correlated solid density low temperature plasmas, named warm dense matter. These plasmas are of most interest for astrophysics and laser plasma interaction, particularly inertial confinement fusion. This work utilizes the ultrashort soft x-ray pulse duration and high brilliance of the free electron laser in Hamburg, FLASH, to generate warm dense matter and to study its ultrafast processes. The techniques applied are absorption measurement, emission spectroscopy and Thomson scattering. Radiative hydrodynamics and Thomson scattering simulations are used to investigate the impact of temperature and density gradients in the sample and to fit the experimental data. The measurements result in a comprehensive picture of soft x-ray matter interaction related to warm dense matter and yield insight into ultrafast equilibration and relaxation mechanisms, in particular impact ionization and radiative recombination. (orig.)